You are not logged in.

#1 2016-01-31 10:53:45

dtw
Forum Fellow
From: UK
Registered: 2004-08-03
Posts: 4,439
Website

Stateful Firewall and Protocol 47

I'm trying to connect to my work VPN. I have configured the Stateful Firewall (long ago) and it's blocking (as I'd expect) the VPN traffic. The VPN connects fine with iptables stopped so I know it's not a config issue.

In the log I can see a lot of lines ending with:

PROTO=47

So, I've figure I need to allow those packets but something as simple as:

-A INPUT -p 47 -j ACCEPT

Isn't working - any ideas?

Offline

#2 2016-01-31 11:37:35

aiBo
Member
Registered: 2010-11-10
Posts: 50

Re: Stateful Firewall and Protocol 47

Please post your entire iptables ruleset using iptables-save. Also the openvpn-config, the complete error message from the log and the output of "ip a" when all is working (VPN up).

Last edited by aiBo (2016-01-31 11:45:13)

Offline

#3 2016-01-31 12:39:48

brebs
Member
Registered: 2007-04-03
Posts: 3,742

Re: Stateful Firewall and Protocol 47

For GRE firewalling, there are *2* interfaces involved:

1. The GRE (virtual) interface
2. The interface that carries the GRE packets.

There are also some GRE-related kernel modules:

ip_gre
nf_conntrack_proto_gre
nf_nat_proto_gre

Offline

#4 2016-01-31 16:31:45

branch
Member
Registered: 2014-03-16
Posts: 209

Re: Stateful Firewall and Protocol 47

According to the wiki you linked, the last rule in the INPUT chain is

INPUT -j REJECT --reject-with icmp-proto-unreachable

Any rule added after this is unreachable.

The wiki you linked indicates such a new rule should go in in the TCP or UDP chain depending on protocol, which should be specified in the rule.

Offline

#5 2016-01-31 21:41:44

R00KIE
Forum Fellow
From: Between a computer and a chair
Registered: 2008-09-14
Posts: 4,734

Re: Stateful Firewall and Protocol 47

You'll need to provide your full list of firewall rules and any module options you may be passing to nf_conntrack or any other modules related to network filtering/tracking.


R00KIE
Tm90aGluZyB0byBzZWUgaGVyZSwgbW92ZSBhbG9uZy4K

Offline

Board footer

Powered by FluxBB