Tom Eastep wrote:
> Jerry Vonau wrote:
> 
>> The openvpn tunnel, based on the masq entries, appears to be to
>> 201.221.xx.xx or 200.40.xx.xx *on the firewall*, that is supported by
>> the tunnels file entry.
>>
>> Based on the masq entries "eth1 10.8.0.0/24 201.221.xx.xx" it appears
>> that Nico wants to have the traffic from the vpn client to 74.53.205.xxx
>> appear to come from the fw/vpn-server's 201.221.xx.xx.
>> address, that would explain the push route in openvpn.
>>
>> I think this is what Nico wants:
>>
>> from the vpn-client to 74.53.205.xxx:
>> vpn-client (with host route) -> tunnel -> fw/vpn-server ->
>> masq to 201.221.xx.xx -> eth1gw -> 74.53.205.xxx
>>
>> from 74.53.205.xxx to the vpn-client:
>> 74.53.205.xxx -> eth1gw -> fw/vpn-server -> de-masq ->
>> tunnel -> vpn-client
>>
>> Nico:
>>
>> Could you clarify this for us please.
>>
> 
> If that is indeed the case then your tip about the route_rules example in
> the Multi-ISP doc should solve the problem. The cause of the failure is that
> return traffic from 74.53.205.xxx is mis-routed.
> 

I agree, but there would be no route in the providers table for tun0. If
I recall correctly, no route in the ip table, no traffic, otherwise we
would not have to list the masq lan in the copy column.

Jerry




-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to