I think I am doing something wrong.
I will try to explain my conf again (sorry about my english)
My box has shorewall installed with 2 ADSL and pptpd
ppp0 - ADSL connection (I use this only for VoIP). this is in eth1
ppp1 - ADSL connection. Internet Traffic. This is in eth2
eth0 - LAN - 192.168.10.0/24
IFCONFIG
----------------
eth0 Link encap:Ethernet HWaddr 00:14:85:AB:93:84
inet addr:192.168.10.1 Bcast:192.168.10.255 Mask:255.255.255.0
eth1 Link encap:Ethernet HWaddr 90:F6:52:03:A0:B6
inet6 addr: fe80::92f6:52ff:fe03:a0b6/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
eth2 Link encap:Ethernet HWaddr 00:01:02:E8:6D:6F
inet6 addr: fe80::201:2ff:fee8:6d6f/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
ppp0 Link encap:Point-to-Point Protocol
inet addr:186.48.234.250 P-t-P:200.40.21.7 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1492 Metric:1
ppp1 Link encap:Point-to-Point Protocol
inet addr:186.48.226.199 P-t-P:200.40.21.7 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1492 Metric:1
ppp2 Link encap:Point-to-Point Protocol
inet addr:192.168.10.80 P-t-P:192.168.10.90 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1496 Metric:1
PPTPD CONF
--------------------
localip 192.168.10.80-89
remoteip 192.168.10.90-99
SHOREWALL CONF
---------------------------------
interfaces
=======
FORMAT 2
###############################################################################
#ZONE INTERFACE OPTIONS
loc eth0
net ppp0
net ppp1
vpn ppp2 routeback
zones
=====
#ZONE TYPE OPTIONS IN OUT
# OPTIONS OPTIONS
fw firewall
net ipv4
loc ipv4
vpn ipv4
masq
====
#INTERFACE:DEST SOURCE ADDRESS PROTO PORT(S)
IPSEC MARK USER/ SWITCH
#
GROUP
eth0 192.168.10.0/24
ppp1 192.168.10.0/24
ppp0 192.168.10.0/24
ppp2 192.168.10.0/24
rules
====
#VPN
ACCEPT net $FW tcp 1723
ACCEPT vpn $FW tcp 22
ACCEPT vpn net tcp http,https,53
ACCEPT vpn net udp 53
ACCEPT vpn net icmp echo-request
ACCEPT vpn loc all
tunnels
=====
#TYPE ZONE GATEWAY(S) GATEWAY
# ZONE(S)
pptpserver net 0.0.0.0/0
I can access every server in my LAN, but no outside traffic
For example I have this when I am doing PING, but LOSS 100%
Sep 7 10:31:06 localhost kernel: Shorewall:vpn2net:ACCEPT:IN=ppp2 OUT=ppp0
SRC=192.168.10.90 DST=73.30.38.140 LEN=84 TOS=0x00 PREC=0x00 TTL=63
ID=48597 PROTO=ICMP TYPE=8 CODE=0 ID=152 SEQ=457
Sep 7 10:31:07 localhost kernel: Shorewall:vpn2net:ACCEPT:IN=ppp2 OUT=ppp0
SRC=192.168.10.90 DST=73.30.38.140 LEN=84 TOS=0x00 PREC=0x00 TTL=1 ID=1268
PROTO=ICMP TYPE=8 CODE=0 ID=172 SEQ=2272
Thanks
On Thu, Sep 6, 2012 at 6:45 PM, Gábor Majoros <[email protected]> wrote:
> Try the masq line I sent.
>
> Sorry for me that was the trick. Just did not realized...
>
> On 6 September 2012 22:40, Nico Pagliaro <[email protected]> wrote:
>
>> I try it with no luck
>>
>> El jueves, 6 de septiembre de 2012, Tom Eastep escribió:
>>
>> On 9/6/12 12:12 PM, Nico Pagliaro wrote:
>>> > the same
>>> > i have this in the log
>>> > Sep 6 16:56:43 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=8 ID=64596 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2193
>>> > Sep 6 16:56:43 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=9 ID=28511 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2194
>>> > Sep 6 16:56:43 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=10 ID=629 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2195
>>> > Sep 6 16:56:43 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=11 ID=30775 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2196
>>> > Sep 6 16:56:43 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=12 ID=13589 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2197
>>> > Sep 6 16:56:43 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=13 ID=23363 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2198
>>> > Sep 6 16:56:43 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=14 ID=29285 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2199
>>> > Sep 6 16:56:44 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=15 ID=40304 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2200
>>> > Sep 6 16:56:44 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=16 ID=25355 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2201
>>> > Sep 6 16:56:44 localhost kernel: Shorewall:sfilter:DROP:IN=ppp2
>>> > OUT=ppp0 SRC=192.168.10.90 DST=200.40.139.50 LEN=84 TOS=0x00 PREC=0x00
>>> > TTL=17 ID=7209 PROTO=ICMP TYPE=8 CODE=0 ID=184 SEQ=2202
>>>
>>> You need the 'routeback' option on the ppp+ entry in
>>> /etc/shorewall/interfaces.
>>>
>>> -Tom
>>> --
>>> Tom Eastep \ When I die, I want to go like my Grandfather who
>>> Shoreline, \ died peacefully in his sleep. Not screaming like
>>> Washington, USA \ all of the passengers in his car
>>> http://shorewall.net \________________________________________________
>>>
>>>
>>
>> ------------------------------------------------------------------------------
>> Live Security Virtual Conference
>> Exclusive live event will cover all the ways today's security and
>> threat landscape has changed and how IT managers can respond. Discussions
>> will include endpoint security, mobile security and the latest in malware
>> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
>> _______________________________________________
>> Shorewall-users mailing list
>> [email protected]
>> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>>
>>
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> Shorewall-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/shorewall-users
>
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users