RHudack Posted March 9, 2018 Share Posted March 9, 2018 I have several LAN Turtles that I deploy to customer environments to perform vulnerability scans. I mainly use AutoSSH for my phone home and reverse SSH into the Turtle (failsafe); and OpenVPN for NAT into the client environment. After I update one of my lanturtles to the lastest v4 firmware, it seems that my reverse NAT no longer works. I did some digging and found the v3 and v4 iptables are very different. the v4 is missing a statement regarding NAT. I dug and found that if I run "iptables -t nat -A POSTROUTING -j MASQUERADE" after the OpenVPN connects then I can get into the client environment. I need to know how to make this setting persistent in the IPTables config. I am not a linux guy so please go easy on me if this is super simple fix. Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.