On 05/09/2017 08:37 AM, Gaiko Kyofusho wrote:
Doh... I was hoping there was another (safe) way, but can do that, just
need to get myself in the habit I guess.
Thx

You could add a rule like this to the top of your FORWARD chain:
-I FORWARD -i vif+ -o eth0 -d lan_subnet_here -j ACCEPT

Depending on how your VPN provider configured the VPN route commands, this may allow your VMs to talk to the LAN through the VPN VM. But there is no easy way to (consistently) allow this for only particular appVMs and there is the risk that a compromised appVM could attack devices on your LAN, identify you to third parties, etc.

--

Chris Laprise, tas...@openmailbox.org
https://twitter.com/ttaskett
PGP: BEE2 20C5 356E 764A 73EB  4AB3 1DC4 D106 F07F 1886

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/9d3b097e-c5a8-49de-8aa0-8a70d6bf2541%40openmailbox.org.
For more options, visit https://groups.google.com/d/optout.

Reply via email to