[Openswan Users] Tunnel in tunnel question

Administrator admin at different-perspectives.com
Mon Jun 4 15:25:29 EDT 2007


> > IPCop just creates an IPSec conf file and uses that through 
> openswan.  
> > I don't think it does anything "fancy".
> > 
> > Do you know if there's a problem with using the same certificates 
> > (i.e.
> > certs for the gateway rather than the subnet) at both ends of two 
> > tunnels?
> > IPCop blocks this, and I don't know why.
> > 
> > David
> > 
> > > Just create extra tunnels.
> > > The only unknown is whether stuff built into IPCop will make this 
> > > more difficult.
> > > 
> > > Cameron.
> > > 
> > > Administrator wrote:
> > > > Hi,
> > > >  
> > > > I'm running IPCop firewall and have an openswap VPN between
> > > two sites.  
> > > > The sites have multiple subnets behind the firewalls
> > (intranet, dmz
> > > > etc.), and the VPN connects the two intranets.  I'd like
> > to provide
> > > > access across the openswan vpn to the dmzs from the other
> > > site.  What
> > > > is the best way to do this?
> > > >  
> > > > IPCop's VPNs have a policy of dropping anything which is
> > > for the "wrong" 
> > > > subnet.
> > > >  
> > > > I've tried adding eroutes / routes through the VPN 
> tunnel, which 
> > > > didn't work.  I've read the documentation, and can't 
> see anything 
> > > > which would help me.
> > > >  
> > > > Is it possible to simply create a tunnel (encrypted or
> > > non-encrypted)
> > > > within the vpn tunnel to carry the other traffic, or should
> > > I create
> > > > another tunnel (preferably using the same certificates) to
> > > carry this
> > > > other traffic?
> 
> Adding subnet's is easy, usually you use the same certificates.
> 
> Say for example your conf looks like this.
> 
> conn net-to-net
>        left=66.x.x.x
>        leftnexthop=%defaultroute
>        leftrsasigkey=%cert
>        leftcert=/etc/ipsec.d/certs/server.crt
>        leftsubnet=10.0.0.0/24
>        right=209.x.x.x
>        rightnexthop=%defaultroute
>        rightrsasigkey=%cert
>        rightcert=/etc/ipsec.d/certs/remote.crt
>        rightsubnet=10.0.2.0/24
>        authby=rsasig
>        auto=start
> 
> Change it like this.
> 
> conn net0-to-net2
>        also=net-to-net-shared
>        leftsubnet=10.0.0.0/24
>        rightsubnet=10.0.2.0/24
>        auto=start
> 
> conn net1-to-net3
>        also=net-to-net-shared
>        leftsubnet=10.0.1.0/24
>        rightsubnet=10.0.3.0/24
>        auto=start
> 
> conn net0-to-net3
>        also=net-to-net-shared
>        leftsubnet=10.0.0.0/24
>        rightsubnet=10.0.3.0/24
>        auto=start
> 
> conn net1-to-net2
>        also=net-to-net-shared
>        leftsubnet=10.0.1.0/24
>        rightsubnet=10.0.2.0/24
>        auto=start
> 
> conn net-to-net-shared
>        left=66.x.x.x
>        leftnexthop=%defaultroute
>        leftrsasigkey=%cert
>        leftcert=/etc/ipsec.d/certs/server.crt
>        right=209.x.x.x
>        rightnexthop=%defaultroute
>        rightrsasigkey=%cert
>        rightcert=/etc/ipsec.d/certs/remote.crt
>        authby=rsasig
> 
> You don't need to use a shared conn, but I think putting shared
> settings in one place makes things easier to change, read, etc...
> Note, the shared conn must come after the conn's that include it.

Thanks.  Worked a dream with manual config.  Now I just need to work out how
to automate it so it doesn't get lost on reboot / web gui edit etc.

David




More information about the Users mailing list