Displaying 20 results from an estimated 1000 matches similar to: "{Spam} shorewall-vpn with cisco router(vlan) problem"
2004 Jan 07
1
Forward some traffic to VPN
Hi. I am trying to force some traffic that goes to address 203.7.93.94
through a VPN tunnel. I use freeswan 1.98b and Shorewall 1.4.6c in one
machine. The 203.7.93.94 is in the DMZ on the other end. (Both ends use
the same shorewall and freeswan).
I have successfully set up a tunnel between the two network (using a
point to point topology, not hub).
I added a static routing that redirect
2004 Dec 11
5
Problem report -- shorewall 1.4
Hello list,
I wish to report a problem with openvpn tunnels.
Synopsis: Despite adding policies to the shorewall policy file, I have
to add extra rules to allow the UDP port 5000 packets to get through.
I have used no particular setup guide.
I believe this problem goes away with shorewall 2.0.9, as I have
implemented openvpn with that version on a different machine, and I see
no UDP:5000 packet
2004 Dec 30
5
Proxy Arp
Hello Tom,
I have successfully configured proxy arp subnettinng on my network with
three hosts in a Dmz.
And it works great. (using proxyarp in interfaces) I also tryed this on
network below same trouble.
However for this network below I have tryed to configure one host in a
Dmz (using /etc/shorewall/proxyarp) which works and comes up after I set it
up
and clear Isp''s arp
2004 Feb 26
4
Help! Martians invading through IPSec. :-)
[ sorry for cross-posting this to newbies and users, but I''m a bit
desperate to get this resolved ]
This is strange... I had this working before without any problems, and
recently we started to have some odd issues. I can''t be sure exactly
what has changed as I''m unfortunately not the only person with access
to the server. {sigh}
The problem is that I pretty much
2003 Aug 31
4
linux-ha heartbeat .. failover firewall
I have searched your FAQ''s and read the documentation on your site as well
as googling. I am not able to figure this out. If you have any ideas can
you please help.
I am using the linux-ha failover with redundant firewalls.
As part of the function of the linux-ha software consists a service called
heartbeat which is a connection from each failover node through a serial
cable or ethernet.
2004 Dec 04
7
vpn-zone wide open
Hello!
I am using shorewall shorewall-2.0.11-1 on fedora core2
(iptables-1.2.9-95.7). My box has 2 physical nicĀ“s plus one virt. ipsec
interface for a freeswan-vpn connection.
A few days ago, portsentry spit out a lot of connections from windows
clients (port 135, 445). Ooops.
I review my shorewall settings but could not find a mistake. So I took a
win-client and established a second
2017 Feb 21
1
Centos7: Intel nuc/Linksys usb-ethernet
Hello All,
I'm installing some DIY routers, composed of Intel nuc's ,Linksys usb-ethernet adapters and Centos7
On most machines I just plug in the usb device, install Centos7 and everything works.
But on this one machine the network interface doesn't work.
After installing ip addr shows:
[root at clgmol ~]# ip addr
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue
2003 Jan 09
2
AW: How do I configure 2 static net2net VPNs ov er one interface ipsec0?
Hi,
Problem:
I want 2 vpn tunnels for 2 subnets over one interface ipsec0.
Documentation only describes config for 1 vpn or road warriors.
I defined 2 vpn zones ''fre'' and ''swe''.
#ZONE DISPLAY COMMENTS
net Net Internet zone
loc Local Local
fre VPN_Fre VPN Fre
swe VPN_Swe VPN Swe
Interface ipsec0 is tunnel over eth1. Local is eth0.
ipsec0 serves 2 zones: fre
2006 Jul 26
1
IPSec tunnel mode, through a IPIP tunnel
Hello Gurus,
I am a small problem with routing and here are the details.
Interfaces on my server:
* ipsec0 - 172.19.58.94
* tunl0 - 172.19.58.94
* eth0 - 172.19.58.94
Now, the problem is that there is another host 172.19.58.200. All
communication to 172.19.58.200 should be through tunl0, and all the data
should be secured using IPSec (tunnel mode - because there are more
machines on my
2004 Jul 23
4
shorewall 2.0.3a, (ULOG) doesn''t log anything
Dear all:
Im using shorewall 2.0.3a (debian) w/ ULOG. shorewall starts ok, and the
firewall is running, but nothing is printed on the logs.
I try, for example, to do a connection to a port that is opened on the
server but closed by the FW and I get a connection refused. If I stop
the firewall, this port is accesible from the outside.
I think I''ve followed all the steps on
2006 Dec 15
1
catching DNAT''ed packet
Hi.
I have a Server''s network with some servers in it, all with
192.168.1.0/25 ips. There is also a router in that network with ip
192.168.1.1. This router also connected to a client''s network
10.10.0.0/16 with ip 10.10.100.1.
All services on each server are given their virtual address from one of
two virtual networks 192.168.1.128/28 and 192.168.1.144/28.
192.168.1.128/28 is
2009 Aug 25
1
[PATCH] A default log level of ULOG is ignored by the shorewall-perl compiler (but not by shorewall-shell)
Hello,
I tried Shorewall for the first time today. I am currently using an up-to-date
installation of Debian Sid, which has shorewall 4.2.10, shorewall-shell 4.2.10
and shorewall-perl 4.2.10.1.
I noticed that even though I had the following /etc/shorewall/policy file,
iptables would still show LOG rules at the end of the INPUT and OUTPUT chains
instead of ULOG rules. (Other logging related rules
2005 May 27
1
Still VPN
Hi, still trying to understand one thing. I would definitely like to
tell iptables to accept all packets coming from remote vpn only if they
hit the $VIRTUALVPNINTERFACE. I tried -o ipsec0 but this is not working,
looks like ipsec0 device doesn't exist or it is not recognized. I red on
the Openswan users list, that Linux kernel 2.6 native ipsec don't create
ipsec* interface (if I am
2005 Apr 26
0
(no subject)
------------------
---------| external ip eth0 | ----------
-------------------------- |
|---------------------------
| -------| Internal IP eth1 |
-------------------------- |
|--------------------------
---------| external Ip eth2 | ----------
--------------------------
i want to put web and ftp traffic
2005 Apr 26
1
2 internet connection problem :(
------------------
---------| external ip eth0 | ----------
-------------------------- |
|---------------------------
| -------| Internal IP eth1 |
-------------------------- |
|--------------------------
---------| external Ip eth2 | ----------
--------------------------
i want to put web and ftp traffic to
2002 Aug 15
0
conditional routing based on tos/fwmark not working with ipsec
Hello all,
I am working with kernel 2.2.20 with the necessary options configured into
the kernel to support all of the wonderfully fancy routing features:
- routing based on ToS
- routing based on fwmark
- multiple routing tables
This same kernel is in use elsewhere, and is routing based on fwmark with
success. This leads me to believe that my kernel is OK and that I have
another
2003 Oct 22
2
help seeing DMZ from LOC
I have a three interface network (net,loc,dmz).
The internet interface (eth0) has a static IP.
Windows machine in the local network (eth1) use DHCP to get IPs from
the 192.168.10.0/24 netblock.
The Debian machine in the DMZ (eth2) gets a fixed IP through DHCP in
the 192.168.11.0/24 netblock.
The DHCP server is running on the firewall machine (not ideal, I know,
but that''s the way
2011 Sep 13
1
[Bug 748] New: Range check for ulog-cprange is wrong
http://bugzilla.netfilter.org/show_bug.cgi?id=748
Summary: Range check for ulog-cprange is wrong
Product: iptables
Version: unspecified
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
ReportedBy:
2014 May 07
1
[Bug 921] New: log, ulog and nflog: command-line parameters are not supported
https://bugzilla.netfilter.org/show_bug.cgi?id=921
Summary: log, ulog and nflog: command-line parameters are not
supported
Product: nftables
Version: unspecified
Platform: x86_64
OS/Version: All
Status: NEW
Severity: normal
Priority: P5
Component: nft
AssignedTo: pablo at
2007 Jun 29
1
ipp2p traffic not rejected
Hi,
I''m using following rule in /etc/shorewall/rules
REJECT:ULOG:P2P loc net ipp2p:all ipp2p
iptables -L :
Chain loc2net (1 references)
target prot opt source destination
ACCEPT all -- anywhere anywhere state
RELATED,ESTABLISHED
ULOG all -- anywhere anywhere ipp2p
v0.8.2--ipp2p ULOG