Discussion:
[Shorewall-users] Routing through a firewall/router
Johannes Graumann
2017-01-06 21:37:43 UTC
Permalink
Hello,

I'm running a 4 NIC firewall to route/organize my home network using shorewall/
dnsmasq and am at a loss why I can't connect (or ping) between subnets that
hang on different nets. Access to the net (eth0) is working beautifully) and
the subnets are able to ping the IP associated with the NICs on the FW, but
not into the subnets beyond. I'm running in circles and are unclear where the
problem is. Any advise is highly appreciated.

/sbin/shorewall version
4.6.4.3

ip addr show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group
default
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:dc brd ff:ff:ff:ff:ff:ff
inet 192.168.2.100/24 brd 192.168.2.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62dc/64 scope link
valid_lft forever preferred_lft forever
3: can0: <NOARP,ECHO> mtu 16 qdisc noop state DOWN group default qlen 10
link/can
4: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:dd brd ff:ff:ff:ff:ff:ff
inet 10.10.1.1/24 brd 10.10.1.255 scope global eth1
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62dd/64 scope link
valid_lft forever preferred_lft forever
5: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:de brd ff:ff:ff:ff:ff:ff
inet 10.10.4.1/24 brd 10.10.4.255 scope global eth2
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62de/64 scope link
valid_lft forever preferred_lft forever
6: eth3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:df brd ff:ff:ff:ff:ff:ff
inet 10.10.5.1/24 brd 10.10.5.255 scope global eth3
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62df/64 scope link
valid_lft forever preferred_lft forever

ip route show
default via 192.168.2.1 dev eth0
10.10.1.0/24 dev eth1 proto kernel scope link src 10.10.1.1
10.10.4.0/24 dev eth2 proto kernel scope link src 10.10.4.1
10.10.5.0/24 dev eth3 proto kernel scope link src 10.10.5.1
192.168.2.0/24 dev eth0 proto kernel scope link src 192.168.2.100

Reuslt of shorewall dump is attached.
Philip Le Riche
2017-01-06 23:40:00 UTC
Permalink
Try the command shorewall clear at a root shell to set the firewall temporarily open, and see if you can then route as you expect. If you still can't it would seem to be a routing problem rather than a shorewall problem.

Regards - Philip

Sent from my iPhone
Post by Johannes Graumann
Hello,
I'm running a 4 NIC firewall to route/organize my home network using shorewall/
dnsmasq and am at a loss why I can't connect (or ping) between subnets that
hang on different nets. Access to the net (eth0) is working beautifully) and
the subnets are able to ping the IP associated with the NICs on the FW, but
not into the subnets beyond. I'm running in circles and are unclear where the
problem is. Any advise is highly appreciated.
/sbin/shorewall version
4.6.4.3
ip addr show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group
default
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:dc brd ff:ff:ff:ff:ff:ff
inet 192.168.2.100/24 brd 192.168.2.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62dc/64 scope link
valid_lft forever preferred_lft forever
3: can0: <NOARP,ECHO> mtu 16 qdisc noop state DOWN group default qlen 10
link/can
4: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:dd brd ff:ff:ff:ff:ff:ff
inet 10.10.1.1/24 brd 10.10.1.255 scope global eth1
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62dd/64 scope link
valid_lft forever preferred_lft forever
5: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:de brd ff:ff:ff:ff:ff:ff
inet 10.10.4.1/24 brd 10.10.4.255 scope global eth2
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62de/64 scope link
valid_lft forever preferred_lft forever
6: eth3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:df brd ff:ff:ff:ff:ff:ff
inet 10.10.5.1/24 brd 10.10.5.255 scope global eth3
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62df/64 scope link
valid_lft forever preferred_lft forever
ip route show
default via 192.168.2.1 dev eth0
10.10.1.0/24 dev eth1 proto kernel scope link src 10.10.1.1
10.10.4.0/24 dev eth2 proto kernel scope link src 10.10.4.1
10.10.5.0/24 dev eth3 proto kernel scope link src 10.10.5.1
192.168.2.0/24 dev eth0 proto kernel scope link src 192.168.2.100
Reuslt of shorewall dump is attached.
<shorewall_dump.txt.bz2>
------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, SlashDot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
https://lists.sourceforge.net/lists/listinfo/shorewall-users
Matt Darfeuille
2017-01-07 12:25:40 UTC
Permalink
Post by Johannes Graumann
Hello,
I'm running a 4 NIC firewall to route/organize my home network using shorewall/
dnsmasq and am at a loss why I can't connect (or ping) between subnets that
hang on different nets. Access to the net (eth0) is working beautifully) and
the subnets are able to ping the IP associated with the NICs on the FW, but
not into the subnets beyond. I'm running in circles and are unclear where the
problem is. Any advise is highly appreciated.
/sbin/shorewall version
4.6.4.3
ip addr show
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group
default
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host
valid_lft forever preferred_lft forever
2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:dc brd ff:ff:ff:ff:ff:ff
inet 192.168.2.100/24 brd 192.168.2.255 scope global eth0
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62dc/64 scope link
valid_lft forever preferred_lft forever
3: can0: <NOARP,ECHO> mtu 16 qdisc noop state DOWN group default qlen 10
link/can
4: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:dd brd ff:ff:ff:ff:ff:ff
inet 10.10.1.1/24 brd 10.10.1.255 scope global eth1
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62dd/64 scope link
valid_lft forever preferred_lft forever
5: eth2: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:de brd ff:ff:ff:ff:ff:ff
inet 10.10.4.1/24 brd 10.10.4.255 scope global eth2
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62de/64 scope link
valid_lft forever preferred_lft forever
6: eth3: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP
group default qlen 1000
link/ether 00:00:24:d0:62:df brd ff:ff:ff:ff:ff:ff
inet 10.10.5.1/24 brd 10.10.5.255 scope global eth3
valid_lft forever preferred_lft forever
inet6 fe80::200:24ff:fed0:62df/64 scope link
valid_lft forever preferred_lft forever
ip route show
default via 192.168.2.1 dev eth0
10.10.1.0/24 dev eth1 proto kernel scope link src 10.10.1.1
10.10.4.0/24 dev eth2 proto kernel scope link src 10.10.4.1
10.10.5.0/24 dev eth3 proto kernel scope link src 10.10.5.1
192.168.2.0/24 dev eth0 proto kernel scope link src 192.168.2.100
Reuslt of shorewall dump is attached.
Try setting 'IP_FORWARDING=on' in shorewall.conf.

-Matt
--
Matt Darfeuille
Robert K Coffman Jr. -Info From Data Corp.
2017-01-07 15:03:35 UTC
Permalink
Post by Matt Darfeuille
Try setting 'IP_FORWARDING=on' in shorewall.conf.
I'm not any good at reading the dump, but if Matt's advice doesn't fix
it, make sure you allow traffic between the zones that your local
subnets are in. Make sure the subnet mask of your devices on those
subnets matches what the firewall thinks the subnet is, and of course
that they are using the correct default gateway.

I can't think of anything else that might be the issue.

- Bob
Tom Eastep
2017-01-07 16:44:21 UTC
Permalink
Post by Johannes Graumann
Hello,
I'm running a 4 NIC firewall to route/organize my home network
using shorewall/ dnsmasq and am at a loss why I can't connect (or
ping) between subnets that hang on different nets. Access to the
net (eth0) is working beautifully) and the subnets are able to ping
the IP associated with the NICs on the FW, but not into the subnets
beyond. I'm running in circles and are unclear where the problem
is. Any advise is highly appreciated.
You have enabled ping to/from the 'fw' zone and from the 'usr' zone to
the other zones only. If ping is failing from the 'usr' zone to one of
the other local zones, then please submit another dump collected as
described in the support guidelines. Namely:

- - 'shorewall clear'
- - perform the failing ping
- - take the dump
- - when you submit the dump, tell us the source IP and destination IP of
the failing test.

Thanks,
- -Tom
- --
Tom Eastep \ When I die, I want to go like my Grandfather who
Shoreline, \ died peacefully in his sleep. Not screaming like
Washington, USA \ all of the passengers in his car
http://shorewall.net \________________________________________________
Continue reading on narkive:
Loading...