@@ -172,15 +172,15 @@ with contents
172172 # a set of traffic into the tunnel interface. Routing tables "main"
173173 # or "8" are selected by the policy set up via
174174 # "ip rules add ... lookup <table>"
175- up ip rule add from 192.168.122.1 lookup main || true
176- up ip rule add from 192.168.122.0/24 lookup 8 || true
177- up ip rule add from 10.3.4.2 lookup 8 || true
175+ up ip rule add prio 5001 from 192.168.122.1 lookup main || true
176+ up ip rule add prio 5002 from 192.168.122.0/24 lookup 8 || true
177+ up ip rule add prio 5003 from 10.3.4.2 lookup 8 || true
178178 up ip route add default via 10.3.4.1 table 8 || true
179179 up ip route add 192.168.122.0/24 via 192.168.122.1 table 8 || true
180180
181- down ip rule del from 192.168.122.1 lookup main || true
182- down ip rule del from 192.168.122.0/24 || true
183- down ip rule del from 10.3.4.2 lookup 8 || true
181+ down ip rule del prio 5001 from 192.168.122.1 lookup main || true
182+ down ip rule del prio 5002 from 192.168.122.0/24 lookup 8 || true
183+ down ip rule del prio 5003 from 10.3.4.2 lookup 8 || true
184184 down ip route flush table 8 || true
185185
186186 # End
@@ -229,17 +229,17 @@ on either system. In order to verify, try running
229229 ping 10.3.4.1 # on LOCAL
230230
231231
232- Configuring ` iptables ` on the * EXTERN* server
232+ Configuring ` nftables ` on the * EXTERN* server
233233---------------------------------------------
234234
235235As a suggestion for an ` nftables ` filter and NAT rules set on a * Linux* host
236236* EXTERN* would be
237237
238238 #! /usr/sbin/nft -f
239239
240- define wan_if = <server-interface>
240+ define wan_if = " <server-interface>"
241241 define wan_ip = <server-address>
242- define tun_if = tun0
242+ define tun_if = " tun0"
243243
244244 define gw_ip = 10.3.4.2
245245 define gw_ports = { 30600-30699, 9010-9019 }
0 commit comments