1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Help with Iptables with OpenVpn in Wireless Ethernet bridge

Discussion in 'Tomato Firmware' started by Almaz, Dec 15, 2013.

  1. Almaz

    Almaz Serious Server Member

    I'm trying to setup OpenVpn in Wireless Ethernet bridge but so far I can't get anywhere. If I setup Tomato Router in Wireless Client mode then everything is working. Is it even possible to setup OpenVPN in Wireless Ethernet Bridge mode?

    It looks like the problem is with iptables. I setup remote admin web access on 45678 port and can't even connect to the router remotely. Can somebody help to reroute properly ports using iptables?


    Code:
    root@unknown:/tmp# iptables -L -n -v
    Chain INPUT (policy DROP 0 packets, 0 bytes)
    pkts bytes target    prot opt in    out    source              destination
        0    0 ACCEPT    udp  --  *      *      0.0.0.0/0            0.0.0.0/0          udp dpt:45678
        0    0 ACCEPT    tcp  --  *      *      0.0.0.0/0            0.0.0.0/0          tcp dpt:45678
        0    0 DROP      all  --  *      *      0.0.0.0/0            0.0.0.0/0          state INVALID
    4407  511K ACCEPT    all  --  *      *      0.0.0.0/0            0.0.0.0/0          state RELATED,ESTABLISHED
        2  104 shlimit    tcp  --  *      *      0.0.0.0/0            0.0.0.0/0          tcp dpt:22 state NEW
        0    0 ACCEPT    all  --  lo    *      0.0.0.0/0            0.0.0.0/0
    1317  139K ACCEPT    all  --  br0    *      0.0.0.0/0            0.0.0.0/0
        0    0 ACCEPT    tcp  --  *      *      0.0.0.0/0            0.0.0.0/0          tcp dpt:45678
    
    Chain FORWARD (policy DROP 0 packets, 0 bytes)
    pkts bytes target    prot opt in    out    source              destination
        0    0 ACCEPT    all  --  br0    br0    0.0.0.0/0            0.0.0.0/0
        0    0 DROP      all  --  *      *      0.0.0.0/0            0.0.0.0/0          state INVALID
        0    0 TCPMSS    tcp  --  *      *      0.0.0.0/0            0.0.0.0/0          tcp flags:0x06/0x02 TCPMSS clamp to PMTU
        0    0 ACCEPT    all  --  *      *      0.0.0.0/0            0.0.0.0/0          state RELATED,ESTABLISHED
        0    0 wanin      all  --  vlan1  *      0.0.0.0/0            0.0.0.0/0
        0    0 wanout    all  --  *      vlan1  0.0.0.0/0            0.0.0.0/0
        0    0 ACCEPT    all  --  br0    *      0.0.0.0/0            0.0.0.0/0
    
    Chain OUTPUT (policy ACCEPT 275 packets, 30400 bytes)
    pkts bytes target    prot opt in    out    source              destination
    
    Chain shlimit (1 references)
    pkts bytes target    prot opt in    out    source              destination
        2  104            all  --  *      *      0.0.0.0/0            0.0.0.0/0          recent: SET name: shlimit side: source
        0    0 DROP      all  --  *      *      0.0.0.0/0            0.0.0.0/0          recent: UPDATE seconds: 60 hit_count: 4 name: shlimit side: source
    
    Chain wanin (1 references)
    pkts bytes target    prot opt in    out    source              destination
    
    Chain wanout (1 references)
    pkts bytes target    prot opt in    out    source              destination
    root@unknown:/tmp#
    
    Code:
    root@unknown:/tmp# route -n
    Kernel IP routing table
    Destination    Gateway        Genmask        Flags Metric Ref    Use Iface
    10.0.0.0        0.0.0.0        255.255.255.0  U    0      0        0 br0
    127.0.0.0      0.0.0.0        255.0.0.0      U    0      0        0 lo
    
     
    Last edited: Dec 15, 2013

Share This Page