Hi,
is there a way to obtain an iptables nat module that can be used with NS2 FW15 firmware version ?
Thanks a lot
Spider
root@Kappa:/ # which iptables
/usr/sbin/iptables
# IP: Netfilter Configuration
#
CONFIG_NF_DEFRAG_IPV4=y
CONFIG_NF_CONNTRACK_IPV4=y
CONFIG_NF_CONNTRACK_PROC_COMPAT=y
CONFIG_IP_NF_IPTABLES=y
# CONFIG_IP_NF_MATCH_AH is not set
# CONFIG_IP_NF_MATCH_ECN is not set
# CONFIG_IP_NF_MATCH_RPFILTER is not set
# CONFIG_IP_NF_MATCH_TTL is not set
CONFIG_IP_NF_FILTER=y
CONFIG_IP_NF_TARGET_REJECT=y
# CONFIG_IP_NF_TARGET_ULOG is not set
# CONFIG_NF_NAT_IPV4 is not set
CONFIG_IP_NF_MANGLE=y
# CONFIG_IP_NF_TARGET_CLUSTERIP is not set
# this allows only 1 client to be connected
# server will get 10.8.0.1 and client 10.8.02
dev tun
ifconfig 10.8.0.1 10.8.0.2
secret /etc/openvpn/ta.key
# this allows singel connection to server that has remote IP
# server wil get 10.8.0.1 and client 10.8.0.2
# this file is for the client
remote 192.168.1.197
dev tun
ifconfig 10.8.0.2 10.8.0.1
secret ta.key
port 1194
proto udp
# server IP in the LAN
local 192.168.1.197
dev tun
server 10.9.0.0 255.255.255.0
ifconfig-pool-persist ipp.txt
ca /etc/openvpn/ca.crt
cert /etc/openvpn/server.crt
key /etc/openvpn/server.key
dh /etc/openvpn/dh1024.pem
push "route 10.9.0.0 255.255.255.0"
push "dhcp-option DNS 192.168.1.1"
#push "redirect-gateway def1"
keepalive 10 120
persist-tun
persist-key
user nobody
group nobody
verb 3
client-to-client
daemon
port 1194
proto udp
client
# IP of VPN server to be contacted
remote 192.168.1.197
dev tun
ca ca.crt
cert EXAMPLE.crt
key EXAMPLE.key
resolv-retry infinite
nobind
persist-key
persist-tun
verb 3
ns-cert-type server
openvpn --config /etc/openvpn/openvpn.conf
Dec 7 18:10:13 (none) daemon.notice openvpn[13037]: OpenVPN 2.2.2 armv5tel-unknown-linux-gnueabi [SSL] [EPOLL] [eurephia] built on May 12 2012
Dec 7 18:10:13 (none) daemon.warn openvpn[13037]: NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes
Dec 7 18:10:13 (none) daemon.warn openvpn[13037]: NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Dec 7 18:10:14 (none) daemon.notice openvpn[13037]: Diffie-Hellman initialized with 1024 bit key
Dec 7 18:10:14 (none) daemon.warn openvpn[13037]: WARNING: file '/etc/openvpn/server.key' is group or others accessible
Dec 7 18:10:14 (none) daemon.notice openvpn[13037]: TLS-Auth MTU parms [ L:1541 D:138 EF:38 EB:0 ET:0 EL:0 ]
Dec 7 18:10:14 (none) daemon.notice openvpn[13037]: Socket Buffers: R=[163840->131072] S=[163840->131072]
Dec 7 18:10:14 (none) daemon.notice openvpn[13037]: ROUTE default_gateway=192.168.1.1
Dec 7 18:10:14 (none) daemon.notice openvpn[13037]: TUN/TAP device tun0 opened
Dec 7 18:10:14 (none) daemon.notice openvpn[13037]: TUN/TAP TX queue length set to 100
Dec 7 18:10:14 (none) daemon.notice openvpn[13037]: /sbin/ifconfig tun0 10.9.0.1 pointopoint 10.9.0.2 mtu 1500
Dec 7 18:10:14 (none) daemon.notice openvpn[13037]: /sbin/route add -net 10.9.0.0 netmask 255.255.255.0 gw 10.9.0.2
Dec 7 18:10:14 (none) daemon.notice openvpn[13037]: Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Dec 7 18:10:14 (none) daemon.notice openvpn[13044]: GID set to nobody
Dec 7 18:10:14 (none) daemon.notice openvpn[13044]: UID set to nobody
Dec 7 18:10:14 (none) daemon.notice openvpn[13044]: UDPv4 link local (bound): 192.168.1.188:1194
Dec 7 18:10:14 (none) daemon.notice openvpn[13044]: UDPv4 link remote: [undef]
Dec 7 18:10:14 (none) daemon.notice openvpn[13044]: MULTI: multi_init called, r=256 v=256
Dec 7 18:10:14 (none) daemon.notice openvpn[13044]: IFCONFIG POOL: base=10.9.0.4 size=62
Dec 7 18:10:14 (none) daemon.notice openvpn[13044]: IFCONFIG POOL LIST
Dec 7 18:10:14 (none) daemon.notice openvpn[13044]: Initialization Sequence Completed
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: MULTI: multi_create_instance called
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Re-using SSL/TLS context
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Control Channel MTU parms [ L:1541 D:138 EF:38 EB:0 ET:0 EL:0 ]
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Data Channel MTU parms [ L:1541 D:1450 EF:41 EB:4 ET:0 EL:0 ]
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Local Options hash (VER=V4): '239669a8'
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Expected Remote Options hash (VER=V4): '3514370b'
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 TLS: Initial packet from 192.168.1.44:54098, sid=c6975e0b 5c6cf2fa
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 VERIFY OK: depth=1, /C=NL/ST=ALL/L=city/O=Fvdw-SL/OU=changeme/CN=changeme/name=changeme/emailAddress=xxxxxxx@xxxxxx.xx
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 VERIFY OK: depth=0, /C=NL/ST=ALL/L=city/O=Fvdw-SL/OU=changeme/CN=EXAMPLE/name=client1/emailAddress=xxxxx@xxxxx.xxx
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: 192.168.1.44:54098 [EXAMPLE] Peer Connection Initiated with 192.168.1.44:54098
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: MULTI: new connection by client 'EXAMPLE' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: MULTI: Learn: 10.9.0.6 -> FRANS-W7/192.168.1.44:54098
Dec 7 18:17:16 (none) daemon.notice openvpn[13044]: MULTI: primary virtual IP for EXAMPLE/192.168.1.44:54098: 10.9.0.6
Dec 7 18:17:18 (none) daemon.notice openvpn[13044]: FRANS-W7/192.168.1.44:54098 PUSH: Received control message: 'PUSH_REQUEST'
Dec 7 18:17:18 (none) daemon.notice openvpn[13044]: FRANS-W7/192.168.1.44:54098 SENT CONTROL [FRANS-W7]: 'PUSH_REPLY,route 10.9.0.0 255.255.255.0,dhcp-option DNS 192.168.1.1,route 10.9.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.9.0.6 10.9.0.5'
Dec 7 18:17:18 (none) daemon.warn openvpn[13044]: FRANS-W7/192.168.1.44:54098 IPv6 in tun mode is not supported in OpenVPN 2.2
Return to Lacie Network Space vs2 and max version
Users browsing this forum: No registered users and 7 guests