[Openswan Users] Routing problem with tunnel established
webmaster at elnportal.it
webmaster at elnportal.it
Sat Jan 14 01:26:16 CET 2006
I'm wondering about recompiling the kernel installing klips support, I
suppose that I have sources but I'm not able to do that,
I've downloaded three files on openswan.org
klips patch.gz
natt patch.gz
openswan.tar.gz
all for the same version....
And now ?
TY
----- Original Message -----
From: "Paul Wouters" <paul at xelerance.com>
To: <webmaster at elnportal.it>
Cc: <users at openswan.org>
Sent: Friday, January 13, 2006 5:10 PM
Subject: Re: [Openswan Users] Routing problem with tunnel established
> On Fri, 13 Jan 2006, webmaster at elnportal.it wrote:
>
>> Hi to all, I've a problem on my net to net vpn tunnel.
>>
>> I can ping the subnet's each other except for one AS400 server and 2
>> CISCO
>> routers. I think that for routers the problem is the ACL .... so i'm
>> trying to
>> SNAT the packet before.
>>
>> Let's make it clear.
>>
>> REMOTE CISCO ACL 10.0.2.0/24 CISCO IP 10.0.2.1
>> LOCAL SUBNET TRYING TO CONNECT TO CISCO DEVICE 10.0.1.0/24
>>
>> 10.0.1.0/24 -- OPENSWAN GATEWAY1 ==== OPENSWAN GATEWAY2 -- 10.0.2.0/24
>> (here
>> CISCO 10.0.2.1)
>>
>> when I try to ping 10.0.2.1 from 10.0.1.0/24 subnet I can't receive any
>> response.
>>
>> tcpdumping the internet LAN of vpn end terminal phisically connected to
>> 10.0.2.1
>> I see that ESP packets flow from 10.0.1.0/24 subnet to 10.0.2.1 but
>> 10.0.2.1
>> doesn't reply.
>>
>> I would like to change source IP from 10.0.1.0/24 to a dummy ip accepted
>> by the
>> CISCO ACL (a reserved IP on 10.0.2.0/24 subnet) using SNAT.
>>
>> I've tried
>> iptables -t nat -A POSTROUTING -d 10.0.2.1 -j SNAT --to 10.0.2.254
>> on Openswan Gateway connected to 10.0.1.0/24 but it doesn't seems to
>> work.
>>
>> Tried too
>> iptables -t nat -A POSTROUTING -d 10.0.2.1 -j SNAT --to 10.0.2.254
>> on Openswan Gateway connected to 10.0.2.0/24 subnet but it still doesn't
>> work.
>>
>> I think that firewall decision are taken before vpn packets information
>> extraction.
>>
>> What can I do ? Can I operate some modification on mangle table to
>> achieve my
>> goal ?
>
> If you can SNAT on the incoming local ethX interface, then it should work.
> SNAT'ing the linux machine's one IP to something else is very tricky in
> combination with ipsec. It might work with KLIPS, and for NETKEY you would
> have to try bleeding edge netfilter patch-o-matic patches.
>
> Paul
>
More information about the Users
mailing list