Hey,

On 10/31/2013 09:58 AM, WorkingMan wrote:
iptables -t nat -A POSTROUTING -j MASQUERADE

try to flush all the iptables rules by:
iptables -t nat -F
iptables -t filter -F
iptables -t mangle -F

then add the next:
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
sysctl -w net.ipv4.ip_forward=1

The above rules should make the client able to do any network thing he needs to if the vpn client and server are configured to route all the traffic to the VPN server.
then use tcpdump:
tcpdump -i eth0 -nn port 80

to see what traffic is being sent from the server to the web.

then and only after these tests are made (note that the -F might need the POSTROUTING or any other name of a table after it) you can minimize the cause of the problem to the VPN level or to the iptables or any other level.

can you by any chance run a "ifconfig -a" command and share the output?

Eliezer

Reply via email to