Yes, thats right!!
And it works!!! the only thing that I was missing is to copy tun0 interface
in providers.

Now, this work fine in my lab, but in production I have another Shorewall
(older) 3.4.2 and i have made the same, but with non luck ;(
look, when I try from my client to my dmz in the log appear
 kernel: Shorewall:nic2dmz:ACCEPT:IN=tun0 OUT=eth0 SRC=10.8.0.13 DST=
192.168.0.15 LEN
(note that nic(nico) is openvpn zone)
There is no problem between internal zones, BUT if I try to go to my server
74.53.205.xxx
log this:_
 kernel: Shorewall:all2all:REJECT:IN=tun0 OUT=eth2 SRC=10.8.0.13 DST=
74.54.56.xxx

It sounds like there ir no policy that apply, but in my policie file I have
nic             net     ACCEPT  info
nic             fw      ACCEPT  info
nic             loc     ACCEPT  info
nic             dmz     ACCEPT  info

ZONES:
fw      firewall
cue     ipv4
adm     ipv4
dmz     ipv4
p2p     ipv4
vpn     ipv4
loc     ipv4
net     ipv4
nic     ipv4

Interfaces:
nic     tun0            -
-       eth0    detect  proxyarp
net     eth1    detect  norfc1918
net     eth2    detect  norfc1918

Providers
ded     1       1       main            eth1            $ETH1_GW
track,balance   eth0,tun0
ngt     2       2       main            eth2            $ETH2_GW
track,balance   eth0,tun0

RULES:
ACCEPT  nic     net     tcp     ssh,http
ACCEPT  nic     loc     all


Any Idea?


On 10/9/07, Tom Eastep <[EMAIL PROTECTED]> wrote:
>
> Jerry Vonau wrote:
>
> >
> > The openvpn tunnel, based on the masq entries, appears to be to
> > 201.221.xx.xx or 200.40.xx.xx *on the firewall*, that is supported by
> > the tunnels file entry.
> >
> > Based on the masq entries "eth1 10.8.0.0/24 201.221.xx.xx" it appears
> > that Nico wants to have the traffic from the vpn client to 74.53.205.xxx
> > appear to come from the fw/vpn-server's 201.221.xx.xx.
> > address, that would explain the push route in openvpn.
> >
> > I think this is what Nico wants:
> >
> > from the vpn-client to 74.53.205.xxx:
> > vpn-client (with host route) -> tunnel -> fw/vpn-server ->
> > masq to 201.221.xx.xx -> eth1gw -> 74.53.205.xxx
> >
> > from 74.53.205.xxx to the vpn-client:
> > 74.53.205.xxx -> eth1gw -> fw/vpn-server -> de-masq ->
> > tunnel -> vpn-client
> >
> > Nico:
> >
> > Could you clarify this for us please.
> >
>
> If that is indeed the case then your tip about the route_rules example in
> the Multi-ISP doc should solve the problem. The cause of the failure is
> that
> return traffic from 74.53.205.xxx is mis-routed.
>
> -Tom
> --
> Tom Eastep    \ Nothing is foolproof to a sufficiently talented fool
> Shoreline,     \ http://shorewall.net
> Washington USA  \ [EMAIL PROTECTED]
> PGP Public Key   \ https://lists.shorewall.net/teastep.pgp.key
>
>
> -------------------------------------------------------------------------
> This SF.net email is sponsored by: Splunk Inc.
> Still grepping through log files to find problems?  Stop.
> Now Search log events and configuration files using AJAX and a browser.
> Download your FREE copy of Splunk now >> http://get.splunk.com/
> _______________________________________________
> Shorewall-users mailing list
> Shorewall-users@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>
>
>
-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to