On Mon, Mar 7, 2016 at 6:34 PM, Tom Eastep <teas...@shorewall.net> wrote:
> Have you set CLAMPMSS=Yes?


Yes.

Could the problem be related to the net_dnat chain?

Chain net_dnat (2 references)
 pkts bytes target     prot opt in     out     source
destination
    0     0 DNAT       tcp  --  eth3   *       0.0.0.0/0
81.63.145.193        multiport dports 80,443,8080 to:81.63.145.197
  994 55601 DNAT       tcp  --  eth3   *       0.0.0.0/0
5.145.19.28          multiport dports 80,443,8080 to:81.63.145.197

The interface serving destination  81.63.145.193 has a 1492 MTU and
the other a 1500 MTU.

Is there a easy way to better constrain the DNAT rule such that the
entry for destination 81.63.145.193 is not generated?
DNAT    net:eth3        dmz:81.63.145.197     tcp     80,443,8080

The eth3 interface gets its address via DHCP but will always fall
within the 5.145.19.28/19 range.

Thanks!

jCandlish
.

------------------------------------------------------------------------------
Transform Data into Opportunity.
Accelerate data analysis in your applications with
Intel Data Analytics Acceleration Library.
Click to learn more.
http://makebettercode.com/inteldaal-eval
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to