my tun0 device is configured with eth1 , so in my iptables rules i need to point the forward rules to eth1 instead of tun0 ? Jorge Davila <davila@nicaragua opensource.com> To Yaniv Fine <yfine@xxxxxxxxxx>, 06/10/2007 05:25 netfilter@xxxxxxxxxxxxxxxxxxx PM cc Subject Re: iptables port forwarding to tun0 device Yaniv: Since the tun device is created you can reference them as another network interface and configure the iptables rules as normal. Hope this help, Jorge Davila. On Wed, 6 Jun 2007 16:45:24 +0300 Yaniv Fine <yfine@xxxxxxxxxx> wrote: > > Hi experts > > i have the following configuration > eth0.10.90.20.3/24 > tun0=172.16.10.x/24 > > eth0 configure as Wan interface > eth1/tun0 are lan interface . > tun0 network 172.16.10.200 => web server > in side my tun0 there is a web server i need to manage for the outside > world (eth0, it can also be restricted to specific ip address ) > i am trying to find a way using port forwarding to enable this . > can some one please help me modify my correct iptables rules > > > > > IPTABLES="/sbin/iptables" > EXTIF="eth0" > INTIF="eth1" > > #Flush all rules > $IPTABLES -F > $IPTABLES -F -t nat > $IPTABLES -F -t mangle > > #Set default behaviour > $IPTABLES -P INPUT DROP > $IPTABLES -P FORWARD ACCEPT > $IPTABLES -P OUTPUT ACCEPT > > #Allow related and established on all interfaces (input) > $IPTABLES -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT > > #Allow releated, established and ssh on $EXTIF. Reject everything else. > $IPTABLES -A INPUT -i $EXTIF -p tcp -m tcp --dport 22 --syn -j ACCEPT > #$IPTABLES -A INPUT -i $EXTIF -p tcp -m tcp --dport 80 --syn -j ACCEPT > $IPTABLES -A INPUT -i $EXTIF -j REJECT > > #Allow related and established from $INTIF. Drop everything else. > $IPTABLES -A INPUT -i $INTIF -j DROP > > #Allow http and https on other interfaces (input). > #This is only needed if authentication server is on same server as chilli > $IPTABLES -A INPUT -p tcp -m tcp --dport 80 --syn -j ACCEPT > $IPTABLES -A INPUT -p tcp -m tcp --dport 443 --syn -j ACCEPT > > #Allow 3990 on other interfaces (input). > $IPTABLES -A INPUT -p tcp -m tcp --dport 3990 --syn -j ACCEPT > > #Allow ICMP echo on other interfaces (input). > $IPTABLES -A INPUT -p icmp --icmp-type echo-request -j ACCEPT > > #Allow everything on loopback interface. > $IPTABLES -A INPUT -i lo -j ACCEPT > > # Drop everything to and from $INTIF (forward) > # This means that access points can only be managed from ChilliSpot > $IPTABLES -A FORWARD -i $INTIF -j DROP > $IPTABLES -A FORWARD -o $INTIF -j DROP > > #Enable NAT on output device > $IPTABLES -t nat -A POSTROUTING -o $EXTIF -j MASQUERADE > > > thank you ! > > > Jorge Isaac Davila Lopez Nicaragua Open Source +505 430 5462 davila@xxxxxxxxxxxxxxxxxxxxxxx