[Openswan Users] Openswan peer-to-site with virtual IP on client side
Richy Müller
richy at strikegun.de
Tue May 12 09:29:55 EDT 2015
Hello,
I hope someone can help me with my issue.
I am trying to run a openswan ipsec on a raspberry pi 2 towards a ipsec server.
The tunnel is up and running, but I need to access to the rpi2 from the host site over an virtual IP.
For example:
The rpi2 has the local IP: 192.16.4.84/24 and his gateway is 192.168.4.1. The WAN IP is dynamic.
The rpi2 is starting the tunnel towards the server x.x.x.180
It also added the virtual IP to the interface eth0
But I can't reach anything over the connected vpn.
Without the virutal ip, so just the physical IP the vpn works.
It seems that the rpi doesn't know how it can reach the tunnel over virtual ip.
Here is the ipsec.conf
config setup
# uniqueids=no
virtual_private=%v4:172.17.0.0/28,%v4:172.17.201.253/32
protostack=netkey
nat_traversal=yes
keep_alive=30
plutodebug=none
klipsdebug=none
plutoopts="--perpeerlog"
plutostderrlog=/tmp/pluto.logconn tunnelipsec-Stanley
type= tunnel
auto= start
## This side ##
left=%defaultroute
leftsubnet=172.17.201.253/32
leftsourceip=172.17.201.253
leftid=172.17.201.253
## peer side ##
right=x.x.x.180 # remote peer hostname or IP address
rightsubnet=172.17.0.0/28 # network behind the head end
rightid=x.x.x.180 # this makes setting the PSK much easier
## phase 1 ##
keyexchange= ike
ike=3des-md5;modp1024 # This is the phase 1 policy.
ikelifetime=86400s
aggrmode=yes
authby= secret
rekey=yes
## phase 2 ##
phase2=esp
phase2alg=3des-md5;modp1024pfs= yes
Thanks
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openswan.org/pipermail/users/attachments/20150512/d3385c5e/attachment.html>
More information about the Users
mailing list