Notes |
|
(0000761)
|
dloper
|
2013-03-22 15:59
|
|
This is also the case for ClearOS 5.x when hosts are part of the network and are assigned to 1:1, they are unable to reach hosts in the TUN network.
What is happening here is that the source packet is being nat'ed to the address in the 1:1 nat such that the host in the tunnel receives the packet with the public IP address represented in 1:1 instead of the internal IP as the respond-to address. The host then replies but NOT in the tunnel and the packet is received by the 1:1 alias address and is dropped because of a state violation. |
|
|
(0000762)
|
user2
|
2013-03-22 20:40
|
|
The firewall has some special rules to handle NAT policies for IPsec VPN. These same rules likely need to be applied to OpenVPN tunnels as well. |
|
|
(0000805)
|
dloper
|
2013-04-22 10:22
|
|
|
|
(0000806)
|
dloper
|
2013-04-22 10:23
|
|
|