On Sat, Mar 19, 2016 at 11:52:59PM +0000, Zoltán Szabó wrote:
> After some weeks of testing this config proved that it is working 
> great.
> 
> Now I would like to restrict some clients from accessing certain 
> services on the VPN.
> 
> So I am trying it with iptables but even if I add a really simple 
> rule just to drop everything coming from one client, it is not 
> dropping.
> 
> So adding this:
> iptables -A FORWARD -s 10.8.1.0 -j DROP

If you have enabled --client-to-client the kernel routing table & 
firewall is bypassed.  This is to be expected.  Remove 
--client-to-client if you need firewalling.

> Do you have any idea how can I make it work? Even I tired to add
> it to INPUT and OUTPUT.

Forwarded packets do not go to INPUT nor OUTPUT chains.
-- 
  http://rob0.nodns4.us/
  Offlist GMX mail is seen only if "/dev/rob0" is in the Subject:

------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://pubads.g.doubleclick.net/gampad/clk?id=278785231&iu=/4140
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to