> I think you are probably right. I do have forward rules to allow traffic
> between both my private 192.168.9 and 192.168.3. And those rules are
> added by myself in /etc/ipfilter.conf (based on what you did for DMZ,
> your DMZ is one-way, mine is 2-way). I will try to disable it asap, but
> my question is if I can still have traffic between my private networks
> and at the same time ipsec to remote private?
>
> Also I think I should use your scripts
> /etc/ipchains.input,
> /etc/ipchains.forward
> /etc/ipchains.output
>
> for those rules rather than inventing my own (and messing up things -:()
> but I cannot find them as examples.
>
> Could you help in this regard.
>
> And yes, I try to log protocol 50 and even 51 but nothing showed in my
> log. Again something is wrong here too.

It sounds like you probably don't have forwarding rules in place for your
VPN traffic, so it's being denied before the packets get turned into VPN
data.  Try adding the following to /etc/ipchains.forward:

$IPCH -A forward -j ACCEPT -s 192.168.9.0/24 -d 192.168.3.0/24 -b

The ipchains.* files are simply sourced by the firewall scripts, so you can
add or insert ipchains rules as required.  You can also use variables and
procedures from network.conf and ipfilter.conf (which is where $IPCH is
defined).

Charles Steinkuehler
http://lrp.steinkuehler.net
http://c0wz.steinkuehler.net (lrp.c0wz.com mirror)


_______________________________________________
Leaf-user mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user

Reply via email to