[Openswan Users] really basic peer-to-peer setup
Alan McKay
alan.mckay at gmail.com
Sat May 4 01:36:00 UTC 2013
On Fri, May 3, 2013 at 9:18 PM, Simon Deziel <simon at xelerance.com> wrote:
> You have some options but the simplest/cleanest would be to run IPsec
> directly on 192.168.160.10. If that's not possible I see two possible
> solutions:
Eventually I want to have it running on both firewalls - I'm doing it
first on 160.11 because it is a new Ubuntu release. 160.10 is RHEL5
and I just don't want to be playing with old releases and
complications that come with them. 160.10 runs NAT as well. If
this will run fine with the RHEL5 RPMs then I can do that.
> dirty: NAT'ing when exiting solexa1 to 192.168.160.0/24
That's NAT in the wrong direction - definitely do not want to do that.
> clean: on the other machines part of 192.168.160.0/24 configure a route
> to 172.16.0.0/24 and 172.30.0.0/24 pointing to 192.168.160.11. Make sure
> to enable forwarding on solexa1.
That is pretty easy to do - good idea.
> ping 172.16.0.1 -I 192.168.160.11
Still not working :-( What the heck? :-(
root at solexa1:~# ping 172.16.0.1 -I 192.168.160.11
PING 172.16.0.1 (172.16.0.1) from 192.168.160.11 : 56(84) bytes of data.
^C
--- 172.16.0.1 ping statistics ---
10 packets transmitted, 0 received, 100% packet loss, time 9071ms
--
“Don't eat anything you've ever seen advertised on TV”
- Michael Pollan, author of "In Defense of Food"
More information about the Users
mailing list