[Openswan Users]

Paul Wouters paul at xelerance.com
Fri Jan 20 18:38:14 CET 2006


On Fri, 20 Jan 2006, Joern Bredereck wrote:

> The following doesn't work:
>
> firegate is the central frees/wan router:
> kah is the ipsec-router of the 192.168.200.0/24 net
> leo is the ipsec-router of the 192.168.27.0/24 net
>
>
>
> 			"firegate"
> 			/	\
> 		ipsec1		ipsec1
> 		|		|
> 		eth1		eth1
> 		|		|
> ----------------------------------------------------------------
> 		INTERNET	INTERNET
> ----------------------------------------------------------------
> 		|		|
> 		eth2		eth0
> 		|		|
> 		ipsec0		ipsec0
> 		|		|
> 		"kah"		"leo"
> 		|		|
>  eth1 (192.168.200.0/24)	eth1 (192.168.27.0/24)
>
>
> Hosts of the 192.168.200.0/24-network cannot reach ony hosts on the
> 192.168.27.0/24-network and vice versa.
>
> The same problem with other tunnels which are connected via ipsec1.

And you do have:
a) an ipsec tunnel on "kah" to "firegate" for 192.168.200.0/24 <===> 192.168.0.0/16 (or 192.168.27.0/24)
b) an ipsec tunnel on "leo" to "firegate" for 192.168.27.0/24 <===> 192.168.0.0/16 (or 192.168.200.0/24)
c) ip_forwarding enabled and no firewalling and rp_filter disabled on firegate?
d) if firegate is a 2.6 kernel, that it is NOT sending/soliciting icmp redirect packets since it
   is receiveing / sending the packets over the same interface

You should verify:

a) kah is sending encrypted packet to firegate for the leo network (tcpdump on eth2)
b) firegate is decrypting these packets (tcpdump on ipsec1)
c) firegate is re-encrypting these packets (tcpdump on ipsec1)
d) firegate is sending encrypted packets (tcpdump on eth1)
e) leo is receiving encrypted packets (tcpdump on eth0)
f) leo is decrypting these packets (tcpdump on ipsec0)
g) leo is forwarding these packets (tcpdump on eth1)

> 4. ICMP-echo-requests come in via ipsec1 but are not being forwarded to the
> destination network via ipsec1.

This could be rp_filter or 2.6's bogus redirect packets.

Paul


More information about the Users mailing list