|
From: Schley A. K. <sa...@gm...> - 2009-12-10 14:13:26
|
> the default is that everything is allowed ; iptables -L -n -v will show you that (maybe list 'iptables -t nat -L -n -v' to be safe) [0]root@vault:~$ iptables -L -n -v Chain INPUT (policy ACCEPT 9232 packets, 1856K bytes) pkts bytes target prot opt in out source destination Chain FORWARD (policy ACCEPT 9183 packets, 1533K bytes) pkts bytes target prot opt in out source destination Chain OUTPUT (policy ACCEPT 4264 packets, 686K bytes) pkts bytes target prot opt in out source destination Looks good to me. > routing is enabled on the machine, I assume (because otherwise some other things would have failed already) ? /proc/sys/net/ipv4/ip_forward is set to 0, but everything else is working. I thought this was strange as well. I just assumed because I'm using a tunnel for OpenVPN and not bridging, that OpenVPN handled the routing. > I'd run tcpdump on the box on various interfaces (eth0, eth2, br0, tun0) and then do a ping from the KVM client to the OpenVPN client. Who's responding and who isn't ? Also, what do the ARP tables show after a ping attempt? I'll run this and get back to the list with the results. Thanks! -- -a "The boys are thirsty in Atlanta and there's beer in Texarkana" --Jerry Reed |