Yes, that is also what I thought. However it does not work in my test. I add a SNAT rule on the host of 192.168.1.20 as following: iptables -t nat -A POSTROUTING -p udp --dport 5002 -o eth0 -j SNAT --to-source 192.168.1.55 to change the source address of outgoing upd packets with port 5002 to 192.168.1.55. I also insert one SPs as follows (output of "ip xfrm policy list"): ... src 192.168.1.55/32 dst 192.168.1.21/32 dir out priority 2080 ptype main tmpl src 192.168.1.20 dst 192.168.1.21 proto esp reqid 16409 mode tunnel ... Then I send udp multicast at the port 5002. But, I cannot see any ESP packets by tcpdump. Furthermore, on the recipient side, I can get the muliticast udp with the changed source IP (192.168.1.55). Actually I have stopped IPsec on the recipient side. It looks that IPsec on the sender side is bypassed. Do I miss something? Thanks On 2/18/09, Jan Engelhardt <jengelh@xxxxxxxxxx> wrote: > > On Wednesday 2009-02-18 17:17, Jianqing Zhang wrote: > >>If I configure both IPsec SPs and iptables, when an IP packet is going >>out or coming, which will process the packet first? SP or iptables >>(netfilters) rules? > > On the input path, obviously ESP is the first one seen, then the unpacked > one; > on the output path this is precisely reversed. > -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html