diff --git a/patches/systemvm/debian/config/opt/cloud/bin/ipsectunnel.sh b/patches/systemvm/debian/config/opt/cloud/bin/ipsectunnel.sh index 0b8c992dd11..d4f4153bd78 100755 --- a/patches/systemvm/debian/config/opt/cloud/bin/ipsectunnel.sh +++ b/patches/systemvm/debian/config/opt/cloud/bin/ipsectunnel.sh @@ -68,6 +68,7 @@ check_and_enable_iptables() { then sudo iptables -A INPUT -i $outIf -p udp -m udp --dport 500 -j ACCEPT sudo iptables -A INPUT -i $outIf -p udp -m udp --dport 4500 -j ACCEPT + sudo iptables -A INPUT -i $outIf -p 50 -j ACCEPT # Prevent NAT on "marked" VPN traffic, so need to be the first one on POSTROUTING chain sudo iptables -t nat -I POSTROUTING -t nat -o $outIf -m mark --mark $vpnoutmark -j ACCEPT fi @@ -92,6 +93,7 @@ check_and_disable_iptables() { #Nobody else use s2s vpn now, so delete the iptables rules sudo iptables -D INPUT -i $outIf -p udp -m udp --dport 500 -j ACCEPT sudo iptables -D INPUT -i $outIf -p udp -m udp --dport 4500 -j ACCEPT + sudo iptables -D INPUT -i $outIf -p 50 -j ACCEPT sudo iptables -t nat -D POSTROUTING -t nat -o $outIf -m mark --mark $vpnoutmark -j ACCEPT fi return 0