similar to: OpenVPN traffic will not be routed into network / as DefaultGW traffic ... with 1 NIC

Displaying 20 results from an estimated 1000 matches similar to: "OpenVPN traffic will not be routed into network / as DefaultGW traffic ... with 1 NIC"

2017 Dec 29
1
OpenVPN server and firewalld
On Fri, Dec 29, 2017 at 10:32 AM, Kenneth Porter <shiva at sewingwitch.com> wrote: > How do I insert the iptables rule below using firewalld? > > I'm moving up from CentOS 6 to 7 on an office gateway and I'm trying to > get OpenVPN working to allow home workers to access PCs at the office. I've > got it all working but only by manually inserting an ACCEPT rule in
2017 Sep 30
1
Configuration working with 2 hosts but not with 3
Hi there, I would need some help with my configuration. I have tried a long time, but did not find my error. Thus I would really appreciate your help. There are three hosts: 1. h181 2. h182: Should ConnectTo h181 3. h183: Should ConnectTo h181 *Files under /etc/tinc/vpn0/hosts* [h181:] Address = 94.130.108.xxx Subnet = 172.16.1.1/32 -----BEGIN RSA PUBLIC KEY----- *** -----END RSA PUBLIC
2004 Aug 15
1
multi ADSLs links
hi, I''ve a dedicated internet link 512k with a cisco router, and now, I want to upgrade bandwidth with 8 ADSLs (512k each) then: - build kernel 2.4.27 with pachs: - patch-o-matic-ng-20040621 : CONNMARK, H323, etc... - http://www.ssi.bg/~ja/#multigw Julian''s patch. - Activate "equal cost multi path" (Advanced Router-Networking Options) and so on -
2008 Mar 26
8
Hub/Spoke OpenVPN can't communicate from Client A to Client B - FORWARD:REJECT:IN=tun0 OUT=tun0
Hi, I am running OpenVPN where i have one central hub VPN server, and multiple spoke VPN clients. I can ping from each client to the server and each client to computers on the subnet which the server resides (192.168.2.0/24) so it works ok there. I cannot however, ping from one client to another client. I guess the packet path would go: clienta -> vpn -> shorewall/router -> vpn ->
2017 Dec 29
5
OpenVPN server and firewalld
How do I insert the iptables rule below using firewalld? I'm moving up from CentOS 6 to 7 on an office gateway and I'm trying to get OpenVPN working to allow home workers to access PCs at the office. I've got it all working but only by manually inserting an ACCEPT rule in the FORWARD iptables chain: iptables -I FORWARD 3 -i tun+ -j ACCEPT This rule was extracted from my iptables
2004 Oct 12
1
Equalize Patch
There has been numerous threads etc regarding this but all that has left me is more than a little confused :-(. I have setup and environment consisting of two OpenVPN tunnels and wish to load balance at the packet level between them. I am currently running on Linux edm 2.4.21-20.EL.c0custom #2 Tue Oct 12 08:52:23 BST 2004 i686 i686 i386 GNU/Linux And have install Quagga at each end to provide
2003 Oct 10
3
tinc and routing
I have two internal networks 192.168.9.0/24 and 192.168.0.0/24 each connected to the internet and each connected as a VPN via tinc (device vpn). The gateways are 192.168.9.1 and 192.168.0.1 Attached to the 192.168.9.0/24 network is another network 172.16.1.0/24 via a gateway 192.168.0.1 <==> 172.16.1.1. On 192.168.0.1 gateway I have routes (route -n) like this: Kernel IP routing table
2009 Nov 26
1
Shorewall, OpenVPN, Routing - more a routing(?) problem ...
Hi, I don''t know any other group of routing gurus like the members of this list, so may be you can give me some hints. I do have a shorewall firewall up and running, openvpn is installed on this server too and is working fine so far except one new situation: I have set up a new local vlan, which I can access from my other local vlans, but not from the opnevpn-vlan. All "old"
2017 Dec 29
0
OpenVPN server and firewalld
W dniu 29.12.2017 o?10:32, Kenneth Porter pisze: > How do I insert the iptables rule below using firewalld? > > I'm moving up from CentOS 6 to 7 on an office gateway and I'm trying > to get OpenVPN working to allow home workers to access PCs at the > office. I've got it all working but only by manually inserting an > ACCEPT rule in the FORWARD iptables chain: >
2017 Dec 29
0
OpenVPN server and firewalld
Le 29/12/2017 ? 10:32, Kenneth Porter a ?crit?: > How do I insert the iptables rule below using firewalld? > > I'm moving up from CentOS 6 to 7 on an office gateway and I'm trying > to get OpenVPN working to allow home workers to access PCs at the > office. I've got it all working but only by manually inserting an > ACCEPT rule in the FORWARD iptables chain: >
2004 Dec 28
5
Multiple IP´s in one Zone
Hi everybody I have a Problem with Masquerading from my local net (loc) to my VPN (loc2). I can reach every Service from loc2 in loc, but I can''t get reach any service from loc in loc2. Has somebody an Idea where my mistake is ? Without shorewall, it was working. Thanks for helping Lars Technical Information : Shorewall 2.0.13 Suse 9.0 *177.177.77.X The first 3 Counts are changed
2006 Aug 02
1
Openvpn problem not able to access the other machines on remote subnet
hey friends, I have installed OpenVPN 2.0.7 (i386-redhat-linux-gnu [SSL] [LZO] [EPOLL] built on Apr 29 2006) on Centos4.0 through rpm (diag repository). The network scenario of my office is below Remote Client ----> Internet <-------> Cisco Pix Firewall (Gateway) <----> VPN Server & LAN Clients
2004 Dec 30
0
MultipleIP´s in one Zone
Hi Tom Here is the output of shorewall status Thanks Lars [H[2JShorewall-2.0.13 Status at - Thu Dec 30 21:43:44 CET 2004 Counters reset Thu Dec 30 15:38:17 CET 2004 Chain INPUT (policy DROP 0 packets, 0 bytes) pkts bytes target prot opt in out source destination 38383 11M ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0 0 0 DROP !icmp --
2006 Aug 28
0
[Bug 507] New: tun99 don't trapped by tun+
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=507 Summary: tun99 don't trapped by tun+ Product: netfilter/iptables Version: linux-2.6.x Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: ip_tables (kernel) AssignedTo: laforge@netfilter.org
2003 Nov 05
0
Bug? wildcard interfaces not accepted in fwd chain
Hi, [Summary] There seems to be a bug when using the "+" wildcard notation in the interfaces file, in that rules are not generated in the fwd chain to permit traffic going out an interface with a "+" in it. [Details] The interface entries: loc tun0 detect routeback,newnotsyn loc tun1 detect routeback,newnotsyn loc tun2
2020 Jun 28
0
Port forward internal host not working
Hi, I am trying to reach a Raspberry Pi on my physical LAN (192.168.10.132), via OpenVPN, from the internet. The Internet host is 154.77.x.x. This is also the OpenVPN router, 10.8.0.1. The Pi is on 10.8.0.203. I am trying to reach port 3000 from the internet. >From the CentOS 7 server, I can access the Pi over OpenVPN: root at ns1:[~]$ telnet 10.8.0.203 3000 Trying 10.8.0.203... Connected
2002 Feb 27
6
Newbie question
Hello All, I have two Internet link and two LAN networks I have Redhat-7.1 linux-2.4.17 kernel and 2 NICs In eth0 172.16.1.1 and eth0:1 192.168.1.1 in eth1 are public ips of isps as eth1 a.b.c.d and eth1:0 w.x..y.z I want do source routing using ip rule command. echo 200 isp1 >> /etc/iproute2/rt_tables ip rule add from 172.16.1.0/24 table isp1 ip rule ls 0: from all lookup local
1999 Jul 03
2
Dual Homed Samba Server Problem
Hi, There may be a simple mistake of mine, but i just can't figure it out: I tryed to play around with options but with no success. If you could help me i'll be grateful, so that's is my environment: - there are 2 networks: 172.16.0.0/255.255.255.0 and 172.16.1.0/255.255.255.0 - i've setup up a Linux box with 2 cards : eth0 172.16.0.2 and eth1 172.16.1.2 - i have Win9x clients
2005 Apr 06
6
UDP port 1194 marking/routing problem
Hi folks, I have OpenVPN (respect for it developers) running on my FW. Is has two external NICs and on internal everything is fine, except I want OpenVPN (UDP port 1194) going not via default route/network interface. I use such commands: iptables -t mangle -D POSTROUTING -o eth0 -p udp --dport 1194 -j MARK --set-mark 0x990 ip rule add fwmark 0x990
2009 Aug 21
2
Multiple interfaces in a zone (not a standard case)
Hi, This subject has been brought up in the forum, but it''s a bit different. If I have a set of tun interfaces. I already defined tun+ as zone A, and I have excluded tun15 as zone B (a subset of zone A). I need to add tun16 to zone B. My config: /etc/shorewall/interfaces: A tun+ - routeback B tun15 /etc/shorewall/ A ipv4 B:A ipv4 I tried to define in