RE: vpn masquerading

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



thank you, I  will try, but what confused me is that 
inside pptp netfilter patch source code:

-> ->
-> ->  * TODO: - finish support for multiple calls within one session
-> ->  *     (needs expect reservations in newnat)
-> ->  *   - testing of incoming PPTP calls


what is that ???

thank you
andres




-> -----Mensaje original-----
-> De: netfilter-bounces@xxxxxxxxxxxxxxxxxxx
-> [mailto:netfilter-bounces@xxxxxxxxxxxxxxxxxxx]En nombre de Rob
-> Sterenborg
-> Enviado el: Jueves, 19 de Enero de 2006 03:05 p.m.
-> Para: netfilter@xxxxxxxxxxxxxxxxxxx
-> Asunto: RE: vpn masquerading
-> 
-> 
-> > outch !!
-> 
-> Yes, well.. When I wrote this I was at work and unable to test.
-> Now I'm back home and tested this. I have all modules loaded
-> (ip_nat_pptp, ip_nat_proto_gre, ip_conntrack_pptp and
-> ip_conntrack_proto_gre) and that is the only way I can connect multiple
-> machines to a pptp server.
-> So, my info was incorrect : keep those modules loaded.
-> 
-> > -> Still, we don't know what you rule have so far concerning pptp...
-> > -> It's a little hard to give advice this way.
-> > 
-> > 
-> > I only have a "MASQUERADE" rule in POSTROTING nat table.
-> > That's all.
-> > 
-> > I need a specific rule to masquerade VPN ?
-> 
-> Apparently that works (I have never used MASQUERADE on linux-2.4+), but
-> the prefered way is to use SNAT. Maybe that will also solve your
-> problem.
-> 
-> Try something like :
-> 
-> $ipt -P FORWARD DROP
-> 
-> $ipt -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-> 
-> $ipt -A FORWARD -m state --state NEW -i <if_lan> -o <if_inet> \
->   -s <net_lan> -p gre -j ACCEPT
-> 
-> $ipt -A FORWARD -m state --state NEW -i <if_lan> -o <if_inet> \
->   -s <net_lan> -p tcp --dport 1723 -j ACCEPT
-> 
-> $ipt -t nat -A POSTROUTING -o <if_out> -s <net_lan> \
->   -j SNAT --to <inet_ip>
-> 
-> 
-> Gr,
-> Rob
-> 
-> 


[Index of Archives]     [Linux Netfilter Development]     [Linux Kernel Networking Development]     [Netem]     [Berkeley Packet Filter]     [Linux Kernel Development]     [Advanced Routing & Traffice Control]     [Bugtraq]

  Powered by Linux