Hey,
On 10/31/2013 09:58 AM, WorkingMan wrote:
> iptables -t nat -A POSTROUTING -j MASQUERADE
try to flush all the iptables rules by:
iptables -t nat -F
iptables -t filter -F
iptables -t mangle -F
then add the next:
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
sysctl -w net.ipv4.ip_forward=1
The above rules should make the client able to do any network thing he
needs to if the vpn client and server are configured to route all the
traffic to the VPN server.
then use tcpdump:
tcpdump -i eth0 -nn port 80
to see what traffic is being sent from the server to the web.
then and only after these tests are made (note that the -F might need
the POSTROUTING or any other name of a table after it) you can minimize
the cause of the problem to the VPN level or to the iptables or any
other level.
can you by any chance run a "ifconfig -a" command and share the output?
Eliezer
Received on Thu Oct 31 2013 - 08:26:50 MDT
This archive was generated by hypermail 2.2.0 : Fri Nov 01 2013 - 12:00:07 MDT