[Openswan Users] SNAT before IPSec, save my soul.

ted leslie tleslie at tcn.net
Fri Mar 24 16:42:54 CET 2006


Be nice to have some examples of iptable "policy match",
any resources, or any configs that can be directed to or posted?

i didnt see any at iptables.org

-tl



On Fri, 24 Mar 2006 17:13:24 +0100
"Marco Berizzi" <pupilla at hotmail.com> wrote:

> Adrian R. Sanchez wrote:
> 
> >Can you see what the problem is? I can't get 192.168.0.4 to act like
> >200.0.0.2 before getting into the IPSec tunnel through 140.0.0.2
> 
> This was a problem for linux kernel < 2.6.16rc
> 
> >Now that I have a 2.6.16 kernel + iptables 1.3.5... will a simple command 
> >like:
> >
> >iptables -t nat -A POSTROUTING -s 192.168.0.4 -d 140.0.0.2 -j SNAT --to 
> >200.0.0.2
> >
> >...actually SNAT the packets before they enter the tunnel in the same box?
> 
> Yes. Did you try?
> 
> >Or do I need to issue a more specific syntax for a rule to do this?
> 
> You could also use the new 'policy match' to match packet that are
> subject to ipsec processing. It give you the same functionality as
> ipsecX devices.
> 
> >From man iptables:
> 
> policy
>        This modules matches the policy used by IPsec for
>        handling a packet.
> 
>        --dir in|out
>               Used to select whether to match the policy
>               used for decapsulation or the policy  that
>               will  be  used  for  encapsulation.  in is
>               valid in the PREROUTING, INPUT and FORWARD
>               chains,  out  is valid in the POSTROUTING,
>               OUTPUT and FORWARD chains.
> 
>        --pol none|ipsec
>               Matches if the packet is subject to  IPsec
>               processing.
> 
>        --strict
>               Selects  whether to match the exact policy
>               or match if any rule of the policy matches
>               the given policy.
> 
>        --reqid id
>               Matches  the reqid of the policy rule. The
>               reqid  can  be  specified  with  setkey(8)
>               using unique:id as level.
> 
>        --spi spi
>               Matches the SPI of the SA.
> 
>        --proto ah|esp|ipcomp
>               Matches the encapsulation protocol.
> 
>        --mode tunnel|transport
>               Matches the encapsulation mode.
> 
>        --tunnel-src addr[/mask]
>               Matches  the source end-point address of a
> 	      tunnel mode SA.  Only  valid  with  --mode
>               tunnel.
> 
>        --tunnel-dst addr[/mask]
>               Matches  the destination end-point address
>               of a tunnel  mode  SA.   Only  valid  with
>               --mode tunnel.
> 
>        --next Start the next element in the policy spec-
>               ification. Can only be used with --strict
> 
> 
> _______________________________________________
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> Building and Integrating Virtual Private Networks with Openswan: 
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
> 


More information about the Users mailing list