Собствено, не получается протолкнуть через файервол VPN. При отключенном iptables VPN коннектится, но тогда вся сетка без Инет.
Вопрос: как протолкнуть через iptables VPN?
Конфиг iptables:
*filter
:FORWARD DROP [0:0]
:INPUT DROP [0:0]
:RH-Firewall-1-INPUT - [0:0]
:OUTPUT DROP [0:0]
-A INPUT -j RH-Firewall-1-INPUT
-A INPUT -s 192.168.0.0/255.255.255.0 -i eth1 -j ACCEPT
-A INPUT -d 127.0.0.1 -j ACCEPT
-A INPUT -d 192.168.0.1 -j ACCEPT
-A INPUT -p tcp -m tcp -d 89.20.45.247 --dport 1194 -j ACCEPT
-A INPUT -p tcp -m tcp -d 89.20.45.247 --dport 25 -j ACCEPT
-A INPUT -p tcp -m tcp -d 89.20.45.247 --dport 80 -j ACCEPT
-A INPUT -p udp -m udp --sport 53 -j ACCEPT
-A INPUT -p udp -m udp --dport 53 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 10000 -j ACCEPT
-A INPUT -p udp -m udp --dport 1194 -j ACCEPT
-A INPUT -p udp -m udp --dport 67 -j ACCEPT
-A INPUT -p gre -s 192.168.0.0/255.255.255.0 -j ACCEPT
-A INPUT -p tcp -m tcp --dport 1723 -j ACCEPT
-A INPUT -p tcp -m tcp -i eth0 --dport 1723 -j ACCEPT
-A INPUT -p tcp -m tcp -i eth1 --dport 1723 -j ACCEPT
-A INPUT -p gre -i eth0 -j ACCEPT
-A INPUT -p gre -i eth1 -j ACCEPT
-A INPUT -p gre -j ACCEPT
-A INPUT -s 192.168.0.0/255.255.255.0 -i ppp+ -j ACCEPT
-A FORWARD -j ACCEPT
-A FORWARD -i eth1 -j ACCEPT
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m state -i eth0 -o ppp+ --state RELATED,ESTABLISHED -j ACCEPT
-A FORWARD -m state -i eth1 -o ppp+ --state RELATED,ESTABLISHED -j ACCEPT
-A OUTPUT -s 127.0.0.1 -j ACCEPT
-A OUTPUT -s 192.168.0.1 -j ACCEPT
-A OUTPUT -s 89.20.45.247 -j ACCEPT
-A OUTPUT -p udp -m udp --dport 68 -j ACCEPT
-A OUTPUT -s 192.168.0.0/255.255.255.0 -j ACCEPT
-A RH-Firewall-1-INPUT -i lo -j ACCEPT
-A RH-Firewall-1-INPUT -p icmp -m icmp --icmp-type any -j ACCEPT
-A RH-Firewall-1-INPUT -p esp -j ACCEPT
-A RH-Firewall-1-INPUT -p ah -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp -d 224.0.0.251 --dport 5353 -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m udp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 21 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 2049 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 22 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m state -m udp --dport 137 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p udp -m state -m udp --dport 138 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 139 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 445 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 47 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 23 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 80 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 443 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -p tcp -m state -m tcp --dport 25 --state NEW -j ACCEPT
-A RH-Firewall-1-INPUT -j REJECT --reject-with icmp-host-prohibited
COMMIT
# Completed on Mon Mar 23 20:07:03 2009
# Generated by iptables-save v1.3.8 on Mon Mar 23 20:07:03 2009
*mangle
:PREROUTING ACCEPT [8509:2054645]
:INPUT ACCEPT [7260:1504251]
:FORWARD ACCEPT [697:505140]
:OUTPUT ACCEPT [1566:281305]
:POSTROUTING ACCEPT [2263:786445]
COMMIT
# Completed on Mon Mar 23 20:07:03 2009
# Generated by iptables-save v1.3.8 on Mon Mar 23 20:07:03 2009
*nat
:PREROUTING ACCEPT [1253:169674]
:POSTROUTING ACCEPT [1:60]
:OUTPUT ACCEPT [131:14609]
-A PREROUTING -s 192.168.0.0/255.255.255.0 -i ppp0 -j DROP
-A POSTROUTING -o ppp0 -j MASQUERADE
-A POSTROUTING -s 192.168.0.0/255.255.255.0 -j SNAT --to-source 89.20.45.247
COMMIT