I asked about this last week in the general netfilter list, but it appears that most folks are still using FreeS/WAN for IPsec. I'm using the in-kernel IPsec and want to be able to filter ESP packets based on protocol or port number. These values are encapsulated in the ESP payload and are unavailable to netfilter. If I were using FreeS/WAN, I could use standard netfilter techniques on the ipsec0 device. With the in-kernel IPsec, there's no extra pseudo-device with which to examine unencapsulated ESP packets. It looks too me like netfilter sees the packet as ESP in all chains in all tables. (I'd be delighted to be corrected.) Since ESP packets that reach the mangle INPUT chain are destined for a local process, why not unencapsulate them just before that point? It might still be nice to have an indication that this was once an ESP packet for filtering, but that could be done by setting a mark in the mangle PREROUTING chain. I realize that this would probably require some heavy lifting in the network layer to accomplish this nesting of functionality. Am I missing something obvious? -- Rick Kennell <kennell@xxxxxxxxxxxxxx> Purdue University School of Electrical and Computer Engineering