thank you, I will try, but what confused me is that inside pptp netfilter patch source code: -> -> -> -> * TODO: - finish support for multiple calls within one session -> -> * (needs expect reservations in newnat) -> -> * - testing of incoming PPTP calls what is that ??? thank you andres -> -----Mensaje original----- -> De: netfilter-bounces@xxxxxxxxxxxxxxxxxxx -> [mailto:netfilter-bounces@xxxxxxxxxxxxxxxxxxx]En nombre de Rob -> Sterenborg -> Enviado el: Jueves, 19 de Enero de 2006 03:05 p.m. -> Para: netfilter@xxxxxxxxxxxxxxxxxxx -> Asunto: RE: vpn masquerading -> -> -> > outch !! -> -> Yes, well.. When I wrote this I was at work and unable to test. -> Now I'm back home and tested this. I have all modules loaded -> (ip_nat_pptp, ip_nat_proto_gre, ip_conntrack_pptp and -> ip_conntrack_proto_gre) and that is the only way I can connect multiple -> machines to a pptp server. -> So, my info was incorrect : keep those modules loaded. -> -> > -> Still, we don't know what you rule have so far concerning pptp... -> > -> It's a little hard to give advice this way. -> > -> > -> > I only have a "MASQUERADE" rule in POSTROTING nat table. -> > That's all. -> > -> > I need a specific rule to masquerade VPN ? -> -> Apparently that works (I have never used MASQUERADE on linux-2.4+), but -> the prefered way is to use SNAT. Maybe that will also solve your -> problem. -> -> Try something like : -> -> $ipt -P FORWARD DROP -> -> $ipt -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT -> -> $ipt -A FORWARD -m state --state NEW -i <if_lan> -o <if_inet> \ -> -s <net_lan> -p gre -j ACCEPT -> -> $ipt -A FORWARD -m state --state NEW -i <if_lan> -o <if_inet> \ -> -s <net_lan> -p tcp --dport 1723 -j ACCEPT -> -> $ipt -t nat -A POSTROUTING -o <if_out> -s <net_lan> \ -> -j SNAT --to <inet_ip> -> -> -> Gr, -> Rob -> ->