On 05/09/2017 08:37 AM, Gaiko Kyofusho wrote:
Doh... I was hoping there was another (safe) way, but can do that, just
need to get myself in the habit I guess.
Thx
You could add a rule like this to the top of your FORWARD chain:
-I FORWARD -i vif+ -o eth0 -d lan_subnet_here -j ACCEPT
Depending on how your VPN provider configured the VPN route commands,
this may allow your VMs to talk to the LAN through the VPN VM. But there
is no easy way to (consistently) allow this for only particular appVMs
and there is the risk that a compromised appVM could attack devices on
your LAN, identify you to third parties, etc.
--
Chris Laprise, tas...@openmailbox.org
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB 4AB3 1DC4 D106 F07F 1886
--
You received this message because you are subscribed to the Google Groups
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit
https://groups.google.com/d/msgid/qubes-users/9d3b097e-c5a8-49de-8aa0-8a70d6bf2541%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.