> >     May 28 08:06:30 border000 kernel: [34372.977048] SW:fw2vpn1:DROP IN= 
> > OUT=tun1 SRC=10.0.2.53 DST=10.254.254.1 LEN=143 TOS=0x00 PREC=0x00 TTL=64 
> > ID=3671 PROTO=UDP SPT=63068 DPT=53 LEN=123

> Please forward the output of 'shorewall dump' taken after you have
> produced the above log message.

As mere luck would have it, amidst my incessant tweaking, I've 'changed 
something'.  Now, the traffic flows,

        local/udp

                May 28 13:51:59 border000 kernel: [54502.157446] 
SW:[P4][TEST1]:ACCEPT IN= OUT=tun1 SRC=10.0.2.53 DST=10.254.254.1 LEN=145 
TOS=0x00 PREC=0x00 TTL=64 ID=18088 PROTO=UDP SPT=24495 DPT=53 LEN=125 

        remote/tcp

                May 28 13:51:59 vps000 kernel: [54743.048152] 
SW:[P4]fw2vpn1:ACCEPT IN= OUT=tun1 SRC=10.254.254.1 DST=10.0.2.53 LEN=52 
TOS=0x00 PREC=0x00 TTL=64 ID=59461 DF PROTO=TCP SPT=60797 DPT=53 WINDOW=29200 
RES=0x00 SYN URGP=0 

I'll figure out what actually fixed that problem in a bit.

Which brings me back to the original question:  how/where to masq, dnat, etc so 
that the SRC/DST=10.254.254.1, instead of reporting just the tunnel endpoint, 
shows the actual SRC/DST=10.0.1.53 of the remote DNS server?

------------------------------------------------------------------------------
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to