On 3/18/20 1:13 PM, Andrey Andreev wrote:
> am beginning to get it, it is the waterfall situation. So I have to
> exchange lines order to:
> 
> /etc/shorewall/snat
> SNAT(!9.9.9.9)  12.12.12.12/29 enp2s0       # exclude IPSec traffic:
> 9.9.9.9
> SNAT(11.11.11.11)    0.0.0.0/0  enp2s0       # local server WAN IP
> 
> Tomorrow will test it at the site.
> What is the effect of line 1 above: "All traffic only from LAN range
> 12.12.12.12/29 going out of enp2s0 will have its source changed to 'not
> 9.9.9.9' " ??
> LAN range 12.12.12.12/29 needs IPSec & internet, what happens to the
> outgoing traffic which should not be tunneled?

The effect will be that you will get an error:

 ERROR: Invalid IP Address (!9.9.9.9) /etc/shorewall/snat (line 10)

I had overlooked that you were using address exclusion.

What are you trying to accomplish? If you don't want IPSEC traffic to be
SNATed, the proper thing is to have this single rule:

SNAT(11.11.11.11)       0.0.0.0/0   enp2s0

By default, Shorewall creates an iptables rule that excludes IPSEC
traffic, unless you have something other than '-' in the IPSEC column.

-Tom
-- 
Tom Eastep        \ Q: What do you get when you cross a mobster
Shoreline,         \    with an international standard?
Washington, USA     \ A: Someone who makes you an offer you
http://shorewall.org \    can't understand
                      \________________________________________

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to