[Openswan Users] L2TP/IPsec doesn't work
Paul Wouters
paul at xelerance.com
Thu Nov 2 15:50:20 EST 2006
On Thu, 2 Nov 2006, Turbo Fredriksson wrote:
>
> Turbo> virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
> Jacco> Your internal subnet needs to be excluded here.
> Turbo> So remove ',%v4:192.168.0.0/16' then?
>
> Jacco> No, you add ,%v4:!192.168.x.0/24
>
> What exactly does 'virtual_private' do? It's not in any of the manuals...
It is in 2.4.7rc3 :) If I don't hear reports on unexpected problems,
openswan 2.4.7 will be released tomorrow or saturday.
> Since I'm using 192.168.1.0/24 at work and 192.168.2.0/24 at home
so on the server, exclude 192.168.1.0/24 and include 192.168.2.0/24.
> (actually only on the Win2k machine I'm using for testing - I actually
> use 192.168.1.0/24 at home as well! - will that be a problem?),
only if you want to connect to it.
> wouldn't it be better if I just removed the '%v4:192.168.0.0/16'?
Not if you want to go elsewhere, eg at some other person's network
who used 192.168.100.0/24 and still be able to connect to work.
> Or does the virtual_private need to know the 'client' network?
from the new man page:
virtual_private
contains the networks that are allowed as subnet= for the remote
client. In other words, the address ranges that may live behind
a NAT router through which a client connects. This value is usu-
ally set to all the RFC-1918 address space, excluding the space
used in the local subnet behind the NAT (An IP address cannot
live at two places at once). IPv4 address ranges are denoted as
%v4:a.b.c.d/mm and IPv6 is denoted as
%v6:aaaa::bbbb:cccc:dddd/mm. One can exclude subnets by using
the !. For example, if the VPN server is giving access to
192.168.1.0/24, this option should be set to: virtual_pri-
vate=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%4:172.16.0.0/12,%v4:!192.168.1.0/24.
This parameter is only needed on the server side and not on the
client side that resides behind the NAT router, as the client
will just use its IP address for the inner IP setting. This
parameter may eventually become per-connection.
> I'll install that then. Do I need the NAT-T patch on my home firewall?
only the IPsec hosts that are themselves doing IPsec behind or to a peer
behind a NAT, need the patch.
Paul
--
Building and integrating Virtual Private Networks with Openswan:
http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
More information about the Users
mailing list