Strange. I tried again, while tailing the log, got one packet deny (below), then it connected (presumably no more denies):
Oct 30 09:27:58 sme2 kernel: denylog:IN=eth1 OUT= MAC=00:50:fc:9a:ab:89:00:0c:31:f1:e8:70:08:00 SRC=<remote-ip> DST=<local-ip> LEN=55 TOS=0x00 PREC=0x00 TTL=108 ID=0 DF PROTO=47
I don't think this is related to network traffic, as the traffic is very low at both ends at the moment. Besides, the log shows a definate deny, not a timeout.
-- JJ
As you may or may not know gre there can be a few problems.
Gre is at the same level as tcp/udp, and is protocol 47 under ip. Therefore you cannot just "nat" it. It has no "ports" as tcp and udp have to nat with.
I know there was a patch in kernel 2.4/iptables for it in the past. I do not know the current status on this.
But if I understand you right you have problems when pptp on the sme itself is on, right? And you try pptp from the lan to the internet.
I am a bit confused as to your exact setup when you have the logging you show.
On the internet I see rules like:
iptables -A INPUT -i eth0 -o eth1 -p 47 -j ACCEPT
or perhaps for you this should be
#first log inside to outside
/sbin/iptables --append FORWARD -i eth0 -o eth1 -p 47 -m state --state NEW -j LOG --log-prefix AcceptServicesIn
#and then let it out
/sbin/iptables --append FORWARD -i eth0 -o eth1 -p 47 -m state --state NEW -j ACCEPT
#traffic back
/sbin/iptables --append FORWARD -p 47 -m state --state ESTABLISHED,RELATED -j ACCEPT
But I do not know if the traffic coming back will be accepted by the statefull filter rules.
You might try that when you have the problems with pptp from your lan to internet and see if it works.
But that is from quite old ulrs like:
http://lists.suse.com/archive/suse-security/2003-Dec/0015.htmlYou might want to examin the output of a command like this:
iptables -vnL
iptables -t nat -vnL
when things work, and when things do not work.
In my understanding I would expect thingd to just work, but reality apparently sais otherwise.
Hans-Cees