[Openswan Users] multiple subnets ?
Indunil Jayasooriya
indunil75 at gmail.com
Fri Jun 27 02:11:36 EDT 2008
On Thu, Jun 26, 2008 at 7:09 PM, Peter McGill <petermcgill at goco.net> wrote:
> Indunil,
>
> Did you exempt your ipsec traffic from your nat rules?
> It is a common mistake to forget this, and would cause the
> traffic to use the internet route instead of the tunnel.
>
> For example, if you have local: 192.168.1.0/24,
> remote: 192.168.2.0/24 & 192.168.3.0/24,
> and eth0 internet interface.
> Then you probably have the following NAT rule:
> iptables -t nat -A POSTROUTING -o eth0 -s 192.168.1.0/24 -j MASQUERADE
> You need the following two rules before it:
> iptables -t nat -A POSTROUTING -o eth0 -d 192.168.2.0/24 -j ACCEPT
> iptables -t nat -A POSTROUTING -o eth0 -d 192.168.3.0/24 -j ACCEPT
Hi ,
We have SNAT rules like below. Not for ALL LAN.but for about 10 ips.
one by one .
iptables -t nat -A POSTROUTING -o eth1 -s 192.168.1.2 -j SNAT
--to-source 1.2.3.4
iptables -t nat -A POSTROUTING -o eth1 -s 192.168.1.9 -j SNAT
--to-source 1.2.3.4
anyway, I put below 4 rules before those line
iptables -t nat -A POSTROUTING -o eth1 -d 196.4.49.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -o eth1 -d 196.4.51.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -o eth1 -d 10.10.99.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -o eth1 -d 10.10.250.0/24 -j ACCEPT
Still No luck.
Then, I added below 4 lines after the above 4 lines as well. Still the same.
iptables -t nat -A POSTROUTING -o eth1 -s 192.168.1.0/24 -d \!
196.4.49.0/24 -j SNAT --to-source 1.2.3.4
iptables -t nat -A POSTROUTING -o eth1 -s 192.168.1.0/24 -d \!
196.4.51.0/24 -j SNAT --to-source 1.2.3.4
iptables -t nat -A POSTROUTING -o eth1 -s 192.168.1.0/24 -d \!
10.10.99.0/24 -j SNAT --to-source 1.2.3.4
iptables -t nat -A POSTROUTING -o eth1 -s 192.168.1.0/24 -d \!
10.10.250.0/24 -j SNAT --to-source 2.2.3.4
I added below lines to sysctl.conf: as well
net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.conf.all.accept_redirects = 0
net.ipv4.conf.all.log_martians = 0
net.ipv4.conf.all.send_redirects = 0
net.ipv4.conf.default.accept_redirects = 0
net.ipv4.conf.default.log_martians = 0
net.ipv4.conf.default.send_redirects = 0
net.ipv4.ip_forward = 1
net.ipv4.conf.default.rp_filter = 0
Now, ipsec verify give below output
[root at firewall etc]# ipsec verify
Checking your system to see if IPsec got installed and started correctly:
Version check and ipsec on-path [OK]
Linux Openswan U2.4.9/K2.6.18-8.el5 (netkey)
Checking for IPsec support in kernel [OK]
NETKEY detected, testing for disabled ICMP send_redirects [OK]
NETKEY detected, testing for disabled ICMP accept_redirects [OK]
Checking for RSA private key (/etc/ipsec.secrets) [DISABLED]
ipsec showhostkey: no default key in "/etc/ipsec.secrets"
Checking that pluto is running [OK]
Two or more interfaces found, checking IP forwarding [OK]
Checking NAT and MASQUERADEing
Checking for 'ip' command [OK]
Checking for 'iptables' command [OK]
Opportunistic Encryption Support [DISABLED]
But, We can not Still ping their 4 networks.
Furthur help is needed to solve this.
Hope to hear from you.
-
Thank you
Indunil Jayasooriya
More information about the Users
mailing list