even if iptables was disabled before. These rules will not impact firewall configuration for the physical network. If xen environment is not used, these rules are not needed at all. In a non-xen environment, it is safe to turn the service libvirtd off by...
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -oeth0-j MASQUERADE if unsure of eth0 (network interface) use ifconfig to look it up first service iptables save nano-w /etc/sysctl.conf Replace net.ipv4.ip_forward = 0 net.ipv4.ip_forward = 1 Save and exit nano service openvpn start...
$ sudo iptables -t nat -L ... Chain POSTROUTING (policy ACCEPT) target prot optsourcedestination ... MASQUERADE tcp -- 172.17.0.2 172.17.0.2 tcp dpt:http Chain DOCKER (2 references) target prot optsourcedestination ... DNAT tcp -- anywhere anywhere tcp dpt:8080 to:172.17.0.2:80 ...
iptables -t nat -A POSTROUTING -s 172.17.0.0/16 ! -o docker0 -j MASQUERADE iptables -t filter -N DOCKER iptables -t filter -A FORWARD -o docker0 -j DOCKER iptables -t filter -A FORWARD -o docker0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT iptables -t filter -A FORWARD...
iptables -t nat -A POSTROUTING -s $VPN_SUBNET -j SNAT --to-source $VPNEXTERNALIP # Alternate rule if your server has dynamic IP #iptables -t nat -A POSTROUTING -s $VPN_SUBNET -o $NET_INTERFACE -j MASQUERADE # # Allow VPN Interface to access the whole world, back and forth. iptab...