From 20ccb6c1cbf92de7d230b3744025c945a0e4bb61 Mon Sep 17 00:00:00 2001 From: Sheng Yang Date: Mon, 20 Aug 2012 11:15:51 -0700 Subject: [PATCH] S2S VPN: CS-16092: Add ESP rule to iptables Otherwise the other end cannot initiate connection. --- patches/systemvm/debian/config/opt/cloud/bin/ipsectunnel.sh | 2 ++ 1 file changed, 2 insertions(+) diff --git a/patches/systemvm/debian/config/opt/cloud/bin/ipsectunnel.sh b/patches/systemvm/debian/config/opt/cloud/bin/ipsectunnel.sh index 0b8c992dd11..d4f4153bd78 100755 --- a/patches/systemvm/debian/config/opt/cloud/bin/ipsectunnel.sh +++ b/patches/systemvm/debian/config/opt/cloud/bin/ipsectunnel.sh @@ -68,6 +68,7 @@ check_and_enable_iptables() { then sudo iptables -A INPUT -i $outIf -p udp -m udp --dport 500 -j ACCEPT sudo iptables -A INPUT -i $outIf -p udp -m udp --dport 4500 -j ACCEPT + sudo iptables -A INPUT -i $outIf -p 50 -j ACCEPT # Prevent NAT on "marked" VPN traffic, so need to be the first one on POSTROUTING chain sudo iptables -t nat -I POSTROUTING -t nat -o $outIf -m mark --mark $vpnoutmark -j ACCEPT fi @@ -92,6 +93,7 @@ check_and_disable_iptables() { #Nobody else use s2s vpn now, so delete the iptables rules sudo iptables -D INPUT -i $outIf -p udp -m udp --dport 500 -j ACCEPT sudo iptables -D INPUT -i $outIf -p udp -m udp --dport 4500 -j ACCEPT + sudo iptables -D INPUT -i $outIf -p 50 -j ACCEPT sudo iptables -t nat -D POSTROUTING -t nat -o $outIf -m mark --mark $vpnoutmark -j ACCEPT fi return 0