Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    VPN gleiches Netz + 1 statische Route?

    Scheduled Pinned Locked Moved Deutsch
    23 Posts 5 Posters 4.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • C
      cyberexpress
      last edited by

      Servus,

      ja - da ist wohl was wahres dran :-)
      Jetzt ist er zumindest mal im VPN Netz und im LAN erreichbar. Das NAT will nur noch nicht. Bin mit iptables nicht noch nicht ganz auf Kurs:

      Hier der Output von ifconfig:

      br0        Link encap:Ethernet  HWaddr 20:AA:4B:22:7E:1E 
                inet addr:192.168.1.250  Bcast:192.168.1.255  Mask:255.255.255.0
                UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
                RX packets:3723 errors:0 dropped:0 overruns:0 frame:0
                TX packets:1399 errors:0 dropped:0 overruns:0 carrier:0
                collisions:0 txqueuelen:0 
                RX bytes:638159 (623.2 KiB)  TX bytes:678375 (662.4 KiB)

      eth0      Link encap:Ethernet  HWaddr 20:AA:4B:22:7E:1E 
                UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
                RX packets:6966 errors:0 dropped:0 overruns:0 frame:0
                TX packets:1815 errors:0 dropped:0 overruns:0 carrier:0
                collisions:0 txqueuelen:1000 
                RX bytes:1419031 (1.3 MiB)  TX bytes:739037 (721.7 KiB)
                Interrupt:4 Base address:0x1000

      eth1      Link encap:Ethernet  HWaddr 20:AA:4B:22:7E:20 
                UP BROADCAST RUNNING ALLMULTI MULTICAST  MTU:1500  Metric:1
                RX packets:0 errors:0 dropped:0 overruns:0 frame:0
                TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
                collisions:0 txqueuelen:1000 
                RX bytes:0 (0.0 B)  TX bytes:0 (0.0 B)
                Interrupt:13 Base address:0x5000

      lo        Link encap:Local Loopback 
                inet addr:127.0.0.1  Mask:255.0.0.0
                UP LOOPBACK RUNNING MULTICAST  MTU:16436  Metric:1
                RX packets:22 errors:0 dropped:0 overruns:0 frame:0
                TX packets:22 errors:0 dropped:0 overruns:0 carrier:0
                collisions:0 txqueuelen:0 
                RX bytes:1622 (1.5 KiB)  TX bytes:1622 (1.5 KiB)

      tun11      Link encap:UNSPEC  HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 
                inet addr:172.20.0.18  P-t-P:172.20.0.17  Mask:255.255.255.255
                UP POINTOPOINT RUNNING NOARP MULTICAST  MTU:1500  Metric:1
                RX packets:62 errors:0 dropped:0 overruns:0 frame:0
                TX packets:64 errors:0 dropped:0 overruns:0 carrier:0
                collisions:0 txqueuelen:100 
                RX bytes:3848 (3.7 KiB)  TX bytes:3984 (3.8 KiB)

      vlan0      Link encap:Ethernet  HWaddr 20:AA:4B:22:7E:1E 
                UP BROADCAST RUNNING ALLMULTI MULTICAST  MTU:1500  Metric:1
                RX packets:3726 errors:0 dropped:0 overruns:0 frame:0
                TX packets:1399 errors:0 dropped:0 overruns:0 carrier:0
                collisions:0 txqueuelen:0 
                RX bytes:653593 (638.2 KiB)  TX bytes:683971 (667.9 KiB)

      vlan1      Link encap:Ethernet  HWaddr 20:AA:4B:22:7E:1F 
                inet addr:192.168.2.121  Bcast:192.168.2.255  Mask:255.255.255.0
                UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
                RX packets:3240 errors:0 dropped:0 overruns:0 frame:0
                TX packets:416 errors:0 dropped:0 overruns:0 carrier:0
                collisions:0 txqueuelen:0 
                RX bytes:640050 (625.0 KiB)  TX bytes:55066 (53.7 KiB)

      iptables -L gibt folgendes aus:

      Chain INPUT (policy DROP)
      target    prot opt source              destination         
      ACCEPT    all  –  anywhere            anywhere           
      DROP      all  --  anywhere            192.168.2.121       
      DROP      all  --  anywhere            anywhere            state INVALID 
      ACCEPT    all  --  anywhere            anywhere            state RELATED,ESTABLISHED 
      ACCEPT    all  --  anywhere            anywhere           
      ACCEPT    all  --  anywhere            anywhere           
      ACCEPT    icmp --  anywhere            anywhere            limit: avg 1/sec burst 5 
      ACCEPT    udp  --  anywhere            anywhere            udp dpts:33434:33534 limit: avg 5/sec burst 5 
      ACCEPT    udp  --  anywhere            anywhere            udp spt:bootps dpt:bootpc

      Chain FORWARD (policy DROP)
      target    prot opt source              destination         
      ACCEPT    all  --  anywhere            anywhere           
      ACCEPT    all  --  anywhere            anywhere

      Chain OUTPUT (policy ACCEPT)
      target    prot opt source              destination

      Chain upnp (0 references)
      target    prot opt source              destination

      Chain wanin (0 references)
      target    prot opt source              destination         
      ACCEPT    tcp  --  172.20.0.18          192.168.1.240      tcp dpt:laserjet 
      ACCEPT    tcp  --  172.20.0.18          192.168.1.240      tcp dpt:www

      Chain wanout (0 references)
      target    prot opt source              destination

      In der Anlage habe ich meine derzeitigen NAT Regeln angehängt. Aber ich kann da auch keinen VPN Adapter auswählen. :-(

      ![Bildschirmfoto 2014-12-27 um 18.42.33.png](/public/imported_attachments/1/Bildschirmfoto 2014-12-27 um 18.42.33.png)
      ![Bildschirmfoto 2014-12-27 um 18.42.33.png_thumb](/public/imported_attachments/1/Bildschirmfoto 2014-12-27 um 18.42.33.png_thumb)

      1 Reply Last reply Reply Quote 0
      • JeGrJ
        JeGr LAYER 8 Moderator
        last edited by

        IPTables? Screenshot? Huh? Was hat das da denn mit pfSense zu tun? verwirrt

        Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

        If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

        1 Reply Last reply Reply Quote 0
        • C
          cyberexpress
          last edited by

          Hallo,

          ja - hast du natürlich recht :-) Dachte man könnte das vielleicht noch als angrenzendes Gebiet betrachten. Ich habe es mittlerweile gelöst. Für die Allgemeinheit wie Versprochen:

          iptables -t nat -I PREROUTING -i tun11 -p tcp –dport 9100 -j DNAT --to-destination 192.168.1.240

          Das war die Lösung. Alles was vom VPN Netz an Port 9100 sendet, wird an 192.168.1.240 weitergeleitet.
          Die Konfiguration unter Portforwarding in der Tomatofirmware hat keinen Einfluss darauf! Habe diese wieder gelöscht

          liebe Grüße und Danke für die Unterstützung bei den anderen Fragen!

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.