I'm trying to setup a test VPN connection between two
networks using OpenSWAN with FireHol to generate my
iptables.  I'm stuck with this problem:  I need to
accomplish the command in FrieHol:

iptables -t nat -A POSTROUTING -o eth0 -d !
192.0.2.128/29 -j MASQUERADE

I tried the setting:

router lan2anywhere inface eth1 outface eth0
masquerade eth0 dst not 192.0.2.128/29
route all accept

But this resulted in all packets being sent to
192.0.2.128/29 to be rejected because the resulting
entries (via iptables -t nat -n -L) is:

Chain PREROUTING (policy ACCEPT)
target     prot opt source               destination

Chain POSTROUTING (policy ACCEPT)
target     prot opt source               destination
POSTROUTING.1  all  --  0.0.0.0/0            0.0.0.0/0

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination

Chain POSTROUTING.1 (1 references)
target     prot opt source               destination
RETURN     all  --  0.0.0.0/0
192.0.2.128/29
MASQUERADE  all  --  0.0.0.0/0            0.0.0.0/0


The second to the last line I think rejects all
traffic to 192.0.2.128/29.

If any, I looking for the correct setting to avoid
firehol putting the RETURN entry and the last line
should reflect:

MASQUERADE  all  --  0.0.0.0/0
!192.0.2.128/29

Any help would be greatly appreciated.

Hey Mike,

You could just put the iptables command in your firehol.conf.

Don't know if it helps, but I use freeswan on two TSL 2.0 boxes to tunnel all
traffic from internal eth0 to external eth1 (becomes ipsec0) to connect two
private LAN's over the internet, with the following setting in firehol.conf:

# IPSEC interface for tunneling
interface ipsec0 tunnel
       policy accept

router IPSECsend inface eth0 outface ipsec0
       route all accept

router IPSECreturn inface ipsec0 outface eth0
       route all accept


--
Ari�n Huisken
Xilay Software


_______________________________________________
tsl-discuss mailing list
[email protected]
http://lists.trustix.org/mailman/listinfo/tsl-discuss

Reply via email to