LVS
lvs-users
Google
 
Web LinuxVirtualServer.org

Re: iptables NAT and how it might affect ipvs

To: lvs-users@xxxxxxxxxxxxxxxxxxxxxx
Subject: Re: iptables NAT and how it might affect ipvs
From: Roberto Nibali <ratz@xxxxxx>
Date: Mon, 04 Nov 2002 14:38:36 +0100
Hi,

-A POSTROUTING -s 192.168.10.5/255.255.255.255 -o eth0:5 -j MASQUERADE
-A POSTROUTING -s 192.168.10.6/255.255.255.255 -o eth0:6 -j MASQUERADE
-A POSTROUTING -s 192.168.10.7/255.255.255.255 -o eth0:7 -j MASQUERADE
>
I don't know that iptables works with ip aliases. I don't think that
ipchains even did

It kind of works by stripping away the stuff after the ':'. There are different versions of this floating around including a patch of mine. While it doesn't make sense to specify a label when a device entry is asked for, I can imagine that people like to get the label as an output to 'ip[chains|tables] -n -L'.

I've made a patch for ipchains to support labels (aliases) as an input but it will only strip away the rest of the label because the matching is still on the physically underlying interface, in the OP's case: eth0.

For iptables, I found out that due to massive inconsistency in the iptables userspace tool in the parser there are combinations of table/chain/target where a label is happily accepted and there are combinations where it isn't.

Once I've done a complete analysis on the aberrant behaviour of iptables with complex <table/chain/target/match> tuples I will forward my findings to Harald as a bug report.

Regards,
Roberto Nibali, ratz
--
echo '[q]sa[ln0=aln256%Pln256/snlbx]sb3135071790101768542287578439snlbxq' | dc



<Prev in Thread] Current Thread [Next in Thread>
  • Re: iptables NAT and how it might affect ipvs, Roberto Nibali <=