On Wed, 11 Oct 2017, Tom Eastep wrote:

If you 'shorewall clear' on both firewalls, can you communicate between
the two LANs? (be sure to 'shorewall start' both after the test).

No.
Tried to flip the roles/configuration opf openvpn, same result.


Then you have an OpenVPN configuration problem, not a Shorewall problem.
You might be able to work around it by masquerading your local LANs out
of the tun0 interfaces.

You mean insert:

MASQUERADE      10.8.0.0/24  tun0

into snat files?

Yes.

Already inserted without success :-(

In the "server" side my snat file is:

MASQUERADE      192.168.107.0/24 ens18
MASQUERADE      10.8.0.0/24      tun0

And
# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.117.1   0.0.0.0         UG    0      0        0 ens18
10.0.0.0        10.8.0.2        255.255.255.0   UG    0      0        0 tun0
10.8.0.0        0.0.0.0         255.255.255.0   U     0      0        0 tun0
192.168.107.0   0.0.0.0         255.255.255.0   U     0      0        0 ens19
192.168.117.0   0.0.0.0         255.255.255.0   U     0      0        0 ens18

In the "client" side:

MASQUERADE      10.0.0.0/24  vmbr1
MASQUERADE      10.8.0.0/24  tun0

and:
# route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
0.0.0.0         192.168.189.254 0.0.0.0         UG    0      0        0 vmbr1
10.0.0.0        0.0.0.0         255.255.255.0   U     0      0        0 vmbr0
10.8.0.0        0.0.0.0         255.255.255.0   U     0      0        0 tun0
192.168.107.0   10.8.0.1        255.255.255.0   UG    0      0        0 tun0
192.168.189.0   0.0.0.0         255.255.255.0   U     0      0        0 vmbr1

Is it possible to use tcpdump to monitor packets into the tunnel?

Yes, it is.

        tcpdump -ni tun0 <selection expression>

That is what I tried in my experiments whithout result (so I supposed there is some limit or trick to sniff the tunnel)

In LinuxGW2 I did:

tcpdump -ni tun0 host 10.0.0.242


From LAN1, box 10.0.0.242:

root@serverdoc ~# ping 192.168.107.94
PING 192.168.107.94 (192.168.107.94) 56(84) bytes of data.
^C
--- 192.168.107.94 ping statistics ---
54 packets transmitted, 0 received, 100% packet loss, time 54254ms

root@serverdoc ~# telnet  192.168.107.94 80
Trying 192.168.107.94...
^C
root@serverdoc ~# ping 10.8.0.2
PING 10.8.0.2 (10.8.0.2) 56(84) bytes of data.
64 bytes from 10.8.0.2: icmp_seq=1 ttl=64 time=0.157 ms
64 bytes from 10.8.0.2: icmp_seq=2 ttl=64 time=0.416 ms
64 bytes from 10.8.0.2: icmp_seq=3 ttl=64 time=0.388 ms
64 bytes from 10.8.0.2: icmp_seq=4 ttl=64 time=0.336 ms
64 bytes from 10.8.0.2: icmp_seq=5 ttl=64 time=0.384 ms
64 bytes from 10.8.0.2: icmp_seq=6 ttl=64 time=0.417 ms
64 bytes from 10.8.0.2: icmp_seq=7 ttl=64 time=0.383 ms
64 bytes from 10.8.0.2: icmp_seq=8 ttl=64 time=0.392 ms
64 bytes from 10.8.0.2: icmp_seq=9 ttl=64 time=0.388 ms
64 bytes from 10.8.0.2: icmp_seq=10 ttl=64 time=0.320 ms
^C
--- 10.8.0.2 ping statistics ---
10 packets transmitted, 10 received, 0% packet loss, time 9204ms
rtt min/avg/max/mdev = 0.157/0.358/0.417/0.073 ms

root@serverdoc ~# ping 10.8.0.1
PING 10.8.0.1 (10.8.0.1) 56(84) bytes of data.
^C
--- 10.8.0.1 ping statistics ---
27 packets transmitted, 0 received, 100% packet loss, time 26602ms


tcpdump in LinuxGW2 didn't receive any packet :-(

--

Thanks,
                         Paolo

____________________________________________


------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to