[Bug 507] New: tun99 don't trapped by tun+
bugzilla-daemon at bugzilla.netfilter.org
bugzilla-daemon at bugzilla.netfilter.org
Mon Aug 28 18:32:33 CEST 2006
https://bugzilla.netfilter.org/bugzilla/show_bug.cgi?id=507
Summary: tun99 don't trapped by tun+
Product: netfilter/iptables
Version: linux-2.6.x
Platform: All
OS/Version: All
Status: NEW
Severity: normal
Priority: P2
Component: ip_tables (kernel)
AssignedTo: laforge at netfilter.org
ReportedBy: fguiliani at perinfo.com
I've about 30 VPN with vtun who use tunXX interfaces (from tun0 to tun40). I've
others VPN with OpenVPN but all is using only one interface: tun99.
For some strange reasons if you look at my "iptables -L FORWARD -v", the rule
who match in:tun+/out:any doesn't match packets from tun99. The packets count
reveal the problem. So I've manuelly added tun99 to trap the packets:
[root at perack ~]# iptables -L FORWARD -v
Chain FORWARD (policy DROP 4 packets, 366 bytes)
pkts bytes target prot opt in out source destination
677K 448M eth0_fwd all -- eth0 any anywhere anywhere
417K 452M tun_fwd all -- tun+ any anywhere anywhere
294 34569 tun99_fwd all -- tun99 any anywhere anywhere
1600 696K eth1_fwd all -- eth1 any anywhere anywhere
244K 67M eth3_fwd all -- eth3 any anywhere anywhere
0 0 Reject all -- any any anywhere anywhere
0 0 LOG all -- any any anywhere anywhere
LOG level info prefix `Shorewall:FORWARD:REJECT:'
0 0 reject all -- any any anywhere anywhere
Or perhaps I do something wrong. Any Idea?
--
Configure bugmail: https://bugzilla.netfilter.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
More information about the netfilter-buglog
mailing list