Ik ben via deze tutorial bezig om OpenVPN op een CentOS7 bak te installeren. Dit gaat eigenlijk goed en lijkt zonder fouten te zitten. Totdat we ons bezig moeten gaan houden met Iptables (zucht).
Het volgende is het geval:
Het volgende is het geval:
Dus doen we een systemctl status iptables.service:[root@vpn2 easy-rsa]# systemctl mask firewalld
ln -s '/dev/null' '/etc/systemd/system/firewalld.service'
[root@vpn2 easy-rsa]# systemctl enable iptables
ln -s '/usr/lib/systemd/system/iptables.service' '/etc/systemd/system/basic.target.wants/iptables.service'
[root@vpn2 easy-rsa]# systemctl stop firewalld
[root@vpn2 easy-rsa]# systemctl start iptables
Job for iptables.service failed. See 'systemctl status iptables.service' and 'journalctl -xn' for details.
Dus lees ik /etc/sysconfig/iptables in waarin ik dus line 14 bestudeer:[root@vpn2 easy-rsa]# systemctl status iptables.service
iptables.service - IPv4 firewall with iptables
Loaded: loaded (/usr/lib/systemd/system/iptables.service; enabled)
Active: failed (Result: exit-code) since do 2015-02-05 05:51:33 EST; 18min ago
Process: 1045 ExecStart=/usr/libexec/iptables/iptables.init start (code=exited, status=1/FAILURE)
Main PID: 1045 (code=exited, status=1/FAILURE)
feb 05 05:51:33 vpn2 systemd[1]: Starting IPv4 firewall with iptables...
feb 05 05:51:33 vpn2 iptables.init[1045]: iptables: Applying firewall rules: iptables-restore: line 14 failed
feb 05 05:51:33 vpn2 iptables.init[1045]: [FAILED]
feb 05 05:51:33 vpn2 systemd[1]: iptables.service: main process exited, code=exited, status=1/FAILURE
feb 05 05:51:33 vpn2 systemd[1]: Failed to start IPv4 firewall with iptables.
feb 05 05:51:33 vpn2 systemd[1]: Unit iptables.service entered failed state.
Mar daar staat dus COMMIT, wat dus eigenlijk goed is. Google bied ook geen oplossing. Weet iemand hoe ik mijn iptables service gestart krijg onder centOS 7?# sample configuration for iptables service
# you can edit this manually or use system-config-firewall
# please do not ask us to add additional ports/services to this default configuration
*filter
:INPUT ACCEPT [0:0]
:FORWARD ACCEPT [0:0]
:OUTPUT ACCEPT [0:0]
-A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT
-A INPUT -p icmp -j ACCEPT
-A INPUT -i lo -j ACCEPT
-A INPUT -p tcp -m state --state NEW -m tcp --dport 22 -j ACCEPT
-A INPUT -j REJECT --reject-with icmp-host-prohibited
-A FORWARD -j REJECT --reject-with icmp-host-prohibited
COMMIT