[Openswan Users] VPN Network Structure
Peter McGill
petermcgill at goco.net
Fri Nov 21 13:09:52 EST 2008
Philip,
I think I understand what your asking, essentially to provide communication
to/from any subnet via IPSec you need to make a tunnel for that subnet.
(You cannot route traffic into a tunnel with routes.)
Since you haven't provided any subnet info, I'll use my own for an example.
I have 4 subnets (actually I have more, but 4 will provide the example.)
My London location has access to 2 subnets locally.
172.21.3.0/24 is the london lan, 172.21.11.0/24 is a subnet used for remote access.
My St. Marys location has access to 1 subnet locally.
172.21.1.0/24 is the st. marys lan.
My Highway #7 location has access to 1 subnet locally.
172.21.5.0/24 is the highway #7 lan.
St. Marys and Highway #7 are connected via direct dial-up since there
is no highspeed internet service available at the Highway #7 location.
We connect all four subnets by linking the London and St. Marys offices with openswan IPSec.
The relevant portion of my london ipsec.conf looks like this:
conn stmarys-office-net-to-london-office-net
also=london-office
leftsubnet=172.21.0.0/16
leftsourceip=172.21.3.101
alsoflip=stmarys-office
rightsubnet=172.21.1.0/24
auto=start
conn highway7-office-net-to-london-office-net
also=london-office
leftsubnet=172.21.0.0/16
leftsourceip=172.21.3.101
alsoflip=stmarys-office
rightsubnet=172.21.5.0/24
auto=start
conn london-office
left=...
leftnexthop=%defaultroute
leftid=...
leftrsasigkey=...
conn stmarys-office
left=...
leftnexthop=%defaultroute
leftid=...
leftrsasigkey=...
The relevant portion of my st. marys ipsec.conf looks like this:
conn stmarys-office-net-to-london-office-net
also=stmarys-office
leftsubnet=172.21.1.0/24
leftsourceip=172.21.1.49
alsoflip=london-office
rightsubnet=172.21.0.0/16
auto=start
conn highway7-office-net-to-london-office-net
also=stmarys-office
leftsubnet=172.21.5.0/24
alsoflip=london-office
rightsubnet=172.21.0.0/16
auto=start
conn london-office
left=...
leftnexthop=%defaultroute
leftid=...
leftrsasigkey=...
conn stmarys-office
left=...
leftnexthop=%defaultroute
leftid=...
leftrsasigkey=...
Notice I've used two different methods for subnetting.
At the london office I've used the 172.21.0.0/16 subnet for the tunnel.
Which includes 172.21.3.0/24 and 172.21.11.0/24 in a single tunnel.
This works because routing uses the most specific route available, so
172.21.1.0/24 and 172.21.5.0/24 still get sent to the correct place,
even though they are also part of 172.21.0.0/16.
At the St. Marys office, I've used specific subnets, 1 tunnel for each.
So even though St. Marys only has 172.21.1.0/24 locally, I treat
172.21.5.0/24 as if it was a local lan in the ipsec.conf to provide
the ipsec tunnel for it. Local routing then passes it's traffic between
the dial-up connection and the IPSec tunnel.
All four subnet's can now communicate with each other.
Peter McGill
IT Systems Analyst
Gra Ham Energy Limited
> -----Original Message-----
> From: users-bounces at openswan.org
> [mailto:users-bounces at openswan.org] On Behalf Of Philip Mountifield
> Sent: November 21, 2008 8:05 AM
> To: Openswan
> Subject: [Openswan Users] VPN Network Structure
>
> Hi,
>
> I am a recent user of Openswan and this is my first posts to
> the group,
> so greetings to you all.
>
> I am currently in the process of setting up an Openswan VPN server to
> link to a number of devices such as Netgear routers (FVS114
> and FVG318)
> a Chinese CDMA router (running Linux and Freeswan 1.99) and a central
> Openswan server (Openswan U2.6.14/K2.6.18-92.1.13.el5 (netkey)).
>
> These devices are connected to the Openswan server and in their own
> right communicate very well and reliably. I have also setup
> the network
> local to the server to be able to access the various subnets via the
> server. Each device is on a different class C subnet with mask
> 255.255.255.0, most are fixed external IP and the CDMA link
> is dynamic.
>
> With the setup described above I am able to access all of the subnets
> from the Openswan server and local LAN (due to some static
> routing info
> added to the router), and I am able to access the local LAN of the
> server from each of the subnets, but I am unsure how to alter
> the setup
> to allow selected subnets to communicate with each other via the
> Openswan server. Should I make the central subnet a different
> class such
> as A or B and then extrude sections of this larger subnet through the
> IPsec tunnels to the other locations or is there a way to pass
> additional routing information to the devices to let them know that
> certain other subnets are accessible through the VPN tunnel?
>
> I am also unsure about how one should control which subnets can
> communicate with one another? Can this be done by disabling ip
> forwarding and instead construction some suitable iptables rules?
>
> Any advice is appreciated.
>
> Kind regards
>
> Philip
>
> _______________________________________________
> Users at openswan.org
> http://lists.openswan.org/mailman/listinfo/users
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-294632
> 7?n=283155
More information about the Users
mailing list