On Wed, 2004-12-01 at 17:51, Helge Weissig wrote: <snip> > Here is my current iptables configuration > > $IPTABLES -P INPUT ACCEPT > $IPTABLES -F INPUT > $IPTABLES -P OUTPUT ACCEPT > $IPTABLES -F OUTPUT > $IPTABLES -P FORWARD DROP > $IPTABLES -F FORWARD > $IPTABLES -t nat -F > > echo "Enabling PORTFW Redirection on the external LAN.." > $IPTABLES -A FORWARD -i $EXTIF -o $INTIF -p esp -j ACCEPT > $IPTABLES -A PREROUTING -t nat -d $VPN_SERVER -p esp -j DNAT \ > --to-destination $VPN_CLIENT what on earth is that rule supposed to accomplish? it's says "any esp packet destined for $VPN_SERVER should be destination translated to $VPN_CLIENT." if this is the firewall in front of $VPN_CLIENT (which it sounds like it is), you have created (for lack of a better term) a packet reflector. any esp packet sent from VPN client to VPN server will be spit back at the VPN client. > echo " FWD: Allow all connections OUT and only existing and related > ones IN" > $IPTABLES -A FORWARD -i $EXTIF -o $INTIF -m state \ > --state ESTABLISHED,RELATED -j ACCEPT > $IPTABLES -A FORWARD -i $INTIF -o $EXTIF -j ACCEPT > $IPTABLES -A FORWARD -j LOG > > echo " Enabling SNAT (MASQUERADE) functionality on $EXTIF" > $IPTABLES -t nat -A POSTROUTING -o $EXTIF -j MASQUERADE > > here is the tcpdump info I see on $EXTIF: > > 10:23:09.234937 (vpn server ip) > (my ip): ESP(spi=0x00000000,seq=0x0) > 10:23:09.235055 (my ip) > (vpn server ip): icmp: (my ip) protocol 50 > unreachable [tos 0xc0] > > (these are empty packets sent by nmap but it looks the same for legit > ones coming from the vpn server ip). FWIW, when the ipsec tunnel is > established and I try to ping the a host behind the vpn server, I see > the outgoing packets on all three interfaces, but not response. > > thanks for any information or pointers in advance! > h. simplify: # start fresh for t in mangle nat filter; do iptables -t $t -F iptables -t $t -X iptables -t $t -Z done for c in INPUT FORWARD OUTPUT; do iptables -P $c ACCEPT done # hide-nat outbound traffic iptables -t nat -A POSTROUTING -o $EXTIF -j MASQUERADE # ip forwarding sysctl -w net.ipv4.ip_forward=1 try and connect with your VPN client to your VPN server with that script. if you can't connect--it's more likely an IPSec configuration detail that your missing. -j -- "This has purple stuff inside - purple is a fruit." --The Simpsons