Hello Tom,
    I have successfully configured proxy arp subnettinng on my network with 
three hosts in a Dmz.
And it works great. (using proxyarp in interfaces) I also tryed this on 
network below same trouble.
    However for this network below I have tryed to configure one host in a 
Dmz (using /etc/shorewall/proxyarp) which works and comes up after I set it 
up
and clear Isp''s arp cache. But the Dmz server is slow when trying to
hit the
web server and times out on web server connections.
Web pages may or may not come up when I called people outside my netwok to 
test it.
    The only difference is the network below and my network is this netork 
is running ipsec and ipsec complained of duplicate
IP when I entered 64.42.53.203 on eth2 so as you can see below I configured 
eth2 192.168.10.0/24.
    I tried two different nights to set this up one night I used crossover 
cable between eth2 and Dmz and had same
problem (slow or no connections from outside networks on the net) I could 
get successfull high speed connections to the Dmz server from
the internal lan to the Dmz server.
    The second night I thought since the Dmz server has a gigbit nic and 
shorewall eth2 did not that this may be the trouble. So I put a Cisco
10/100 swich between shorewall eth2 and Dmz servers single nic 10/1000. And 
I came up with same trouble.
    Since the server has to be up 24/7 I have it back out on the firing line 
(net).
Can the list provide me with any suggestions how to trouble shoot this. If 
not I was thinking (which is a lot of trouble to bring another server in
to test this Dmz)
Thanks,
Mike
PS. Does anyone know how to tell ipsec not to add the 169.254 network below 
:(
[root@ns1 root]# /sbin/shorewall status > /tmp/status.txt
[root@ns1 root]# ip route show
64.42.53.200/29 dev eth0  scope link
64.42.53.200/29 dev eth0  proto kernel  scope link  src 64.42.53.202
64.42.53.200/29 dev ipsec0  proto kernel  scope link  src 64.42.53.202
10.192.139.0/24 via 64.42.53.201 dev ipsec0
10.201.144.0/24 via 10.19.227.193 dev eth1
10.19.227.0/24 dev eth1  scope link
192.168.10.0/24 dev eth2  scope link
172.30.0.0/16 via 10.19.227.190 dev eth1
169.254.0.0/16 dev eth2  scope link
127.0.0.0/8 dev lo  scope link
default via 64.42.53.201 dev eth0
[root@ns1 root]# shorewall version
2.0.2c
[root@ns1 root]# ip route show
64.42.53.200/29 dev eth0  scope link
64.42.53.200/29 dev eth0  proto kernel  scope link  src 64.42.53.202
64.42.53.200/29 dev ipsec0  proto kernel  scope link  src 64.42.53.202
10.192.139.0/24 via 64.42.53.201 dev ipsec0
10.201.144.0/24 via 10.19.227.193 dev eth1
10.19.227.0/24 dev eth1  scope link
192.168.10.0/24 dev eth2  scope link
172.30.0.0/16 via 10.19.227.190 dev eth1
169.254.0.0/16 dev eth2  scope link
127.0.0.0/8 dev lo  scope link
default via 64.42.53.201 dev eth0
[root@ns1 root]# ip addr show
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
5: eth1: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:04:e2:18:93:1b brd ff:ff:ff:ff:ff:ff
    inet 10.19.227.20/24 brd 10.19.227.255 scope global eth1
6: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:04:e2:1c:f5:db brd ff:ff:ff:ff:ff:ff
    inet 64.42.53.202/29 brd 64.42.53.207 scope global eth0
7: eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:04:e2:18:ad:60 brd ff:ff:ff:ff:ff:ff
    inet 192.168.10.1/24 brd 192.168.100.255 scope global eth2
12: ipsec0: <NOARP,UP> mtu 1500 qdisc pfifo_fast qlen 10
    link/ether 00:04:e2:1c:f5:db brd ff:ff:ff:ff:ff:ff
    inet 64.42.53.202/29 brd 64.42.53.207 scope global ipsec0
13: ipsec1: <NOARP> mtu 0 qdisc noop qlen 10
    link/void
14: ipsec2: <NOARP> mtu 0 qdisc noop qlen 10
    link/void
15: ipsec3: <NOARP> mtu 0 qdisc noop qlen 10
    link/void
[root@ns1 root]#
On Thu, 2004-12-30 at 09:14 -0800, Mike Lander wrote:> Since the server has to be up 24/7 I have it back out on the firing line > (net). > Can the list provide me with any suggestions how to trouble shoot this. If > not I was thinking (which is a lot of trouble to bring another server in > to test this Dmz)I would capture a packet trace on the firewall''s external interface. Be sure to capture all traffic associated with the server.> > Thanks, > Mike > > PS. Does anyone know how to tell ipsec not to add the 169.254 network below > :(It''s probably not IPSEC that is creating the route -- check the archives; this question gets asked periodically.> [root@ns1 root]# ip route show > 64.42.53.200/29 dev eth0 scope link > 64.42.53.200/29 dev eth0 proto kernel scope link src 64.42.53.202 > 64.42.53.200/29 dev ipsec0 proto kernel scope link src 64.42.53.202 > 10.192.139.0/24 via 64.42.53.201 dev ipsec0 > 10.201.144.0/24 via 10.19.227.193 dev eth1 > 10.19.227.0/24 dev eth1 scope link > 192.168.10.0/24 dev eth2 scope link > 172.30.0.0/16 via 10.19.227.190 dev eth1 > 169.254.0.0/16 dev eth2 scope link > 127.0.0.0/8 dev lo scope link > default via 64.42.53.201 dev eth0Where is the route to the server connected to eth2? Or did you really gather all of this information while the server WASN''T behind the firewall? -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key
> Where is the route to the server connected to eth2? Or did you really > gather all of this information while the server WASN''T behind the > firewall? > > -TomI gathered when the dmz WASN''T behind the firewall? With hopes that someone would find a typo I made or wrong config. I know thats my job but I have went over this until blue :<) face! Thanks Mike
On Thu, 2004-12-30 at 11:15 -0800, Mike Lander wrote:> > Where is the route to the server connected to eth2? Or did you really > > gather all of this information while the server WASN''T behind the > > firewall? > > > > -Tom > I gathered when the dmz WASN''T behind the firewall? With hopes > that someone would find a typo I made or wrong config. I know thats > my job but I have went over this until blue :<) face!Shorewall configuration errors usually result in connections being denied. Unless you are using rate-limiting (which I didn''t see in your config), it''s hard to envision how Shorewall can make traffic go slowly after connections have been established (which sounds like what is happening in your case). -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key
>> I gathered when the dmz WASN''T behind the firewall? With hopes >> that someone would find a typo I made or wrong config. I know thats >> my job but I have went over this until blue :<) face! > > Shorewall configuration errors usually result in connections being > denied. Unless you are using rate-limiting (which I didn''t see in your > config), it''s hard to envision how Shorewall can make traffic go slowly > after connections have been established (which sounds like what is > happening in your case). > > -TomYes the first night I tryed this it was up three days until someone noticed web site timing out etc; the odd thing is that the Dmz (windoz 2000 server) is running 300 e-mail clients pop3 and smtp and I recieved no e-mail compaints which I assumed the trouble was just on port 80 because oddly you could hit port 443 and the connections where fast. Parts of the web page gif''s for example in the javascript nav menu would be missing as you watched browser time outs. Yet if you hit the same page on 443 no trouble. So I need some week end time to trouble shoot, this is hard to do when so many people depend on a server that you can''t test for very long. Tom''s advice I would capture a packet trace on the firewall''s external interface. Be sure to capture all traffic associated with the server. Are you talking about tcpdump -nei eth0 (net)???? Thanks for the advice. -------------Mike
I think I found the trouble, I was looking at output of shorewall status
I noticed dmz old address 192.168.100.255
Chain smurfs (0 references)
 pkts bytes target     prot opt in     out     source 
destination
    0     0 LOG        all  --  *      *       64.42.53.207 
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       64.42.53.207 
0.0.0.0/0
    0     0 LOG        all  --  *      *       10.19.227.255 
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       10.19.227.255 
0.0.0.0/0
    0     0 LOG        all  --  *      *       192.168.100.255 
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       192.168.100.255 
0.0.0.0/0
    0     0 LOG        all  --  *      *       255.255.255.255 
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       255.255.255.255 
0.0.0.0/0
    0     0 LOG        all  --  *      *       224.0.0.0/4 
0.0.0.0/0          LOG flags 0 level 6 prefix `Shorewall:smurfs:DROP:''
    0     0 DROP       all  --  *      *       224.0.0.0/4          0.0.0.0/
note broadcast below
     I found old dmz broadcast entry
eth2: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast qlen 1000
    link/ether 00:04:e2:18:ad:60 brd ff:ff:ff:ff:ff:ff
    inet 192.168.10.1/24 brd 192.168.100.255 scope global eth2
How the world did  I do this???
Thanks Tom
Mike