[Openswan Users] Hub-Spoke Configuration
Nick Howitt
nick at howitts.co.uk
Tue Mar 8 03:25:29 EST 2016
Hi Leonard,
You had a similar thread a couple of weeks ago (cross-site
connectivity). Where did you get with the answers you received then?
Nick
On 2016-03-08 08:20, Jon Fox wrote:
> In retrospect, I spoke in haste, and error.
>
> You do indeed need two connections, but they may not be immediately
> apparent. Simply having two connections, e.g. Spoke A Network <->
> localnet, and Spoke B Network <-> localnet will not work, as ipsec
> does not automagically route between existing connections. This would
> constitute a VPN security violation. From what I remember, ipsec
> connection entries are also security policies, consisting basically
> of: "machine at Right IP agrees to exchange traffic with machine at
> Left IP that consists of packets sourced from Right Network to Left
> Network".
>
> Let me mention that I hate that "left" and "right" nomenclature is
> used for both host (VPN concentrator) and subnet declarations, when
> (again, if I'm remembering correctly), the left and right networks
> need not be local to the left and right hosts.
>
> So, you need one connection entry from Spoke Network A at Spoke
> Machine A to Spoke Network B at Localnet Machine, and another
> connection entry from Spoke Network B at Spoke Machine B to Spoke
> Network A at Localnet Machine, in order for the spokes to talk to each
> other via your localnet machine.
>
> If you already have functional connections from each spoke to your
> localnet (which I'm guessing is true, and the source of your original
> question), leave those in place if you want access to both spokes from
> hosts within localnet
>
> The above advice is dredging up memories from over a decade, so if my
> memory is failing me, or if this is just plain outdated advice, then I
> beg your forgiveness. Also, I made a lot of assumptions - if I'm wayy
> off base, you have my apologies.
>
> Thanks,
> -Jon
>
> On 3/8/2016 1:29 AM, Jon Fox wrote:
>
>>> I have two connection entries in the ipsec.conf
>>
>> I've done spoke-hub with ipsec in the distant past.
>>
>> IIRC, you need either one connection entry (spoke A-to-spoke B), or
>> three connection entries (spoke A-to-spoke B, spoke A to localnet,
>> and spoke B to localnet). What exactly do you have configured for
>> the left and right networks of your existing two(?) connections?
>>
>> -Jon
>>
>> On 3/7/2016 10:55 PM, Leonard Wood wrote:
>>
>> Hi Daniel,
>>
>> Thanks for responding. I have not received any replies, yet. After
>> researching this extensively, I suspect my issue may be a result of
>> using the netkey protocol (default) vs klips. I don’t think
>> netkey has the ability to route traffic between two local subnets.
>> I can run tcpdump on the local openswan (hub) instance and see ICMP
>> packets coming in from the Spokes.
>>
>> My thinking is because the entire payload and header are encrypted,
>> and without some mechanism (i.e., klips) to decipher it, the
>> datagram doesn’t know where to go once it reaches Openswan (Hub)
>>
>> But I could be wrong.
>>
>> Thanks,
>>
>> Leonard
>>
>> FROM: Daniel Cave [mailto:dan.cave at me.com]
>> SENT: Monday, March 07, 2016 12:47 PM
>> TO: Leonard Wood
>> CC: users at lists.openswan.org
>> SUBJECT: Re: [Openswan Users] Hub-Spoke Configuration
>>
>> Hello Leonard
>>
>> Did you get any replies to this?
>>
>> I suspect you may be experiencing issues with firewall/security
>> group/rules issues
>>
>> Have you tried establishing hub to spoke end connectivity on each
>> side and end to end testing by connecting using netcat?
>>
>> Sent from my iPhone
>>
>> On 2 Mar 2016, at 20:00, Leonard Wood <leonardw at ufl.edu> wrote:
>>
>> Does anyone have any documentation on setting up a ‘hub and
>> spoke’ configuration using Openswan?
>>
>> I have a scenario where I am connecting both Azure and AWS to a
>> single Openswan instance using each prospective provider’s VPN
>> gateway. The tunnels come up and everything is fine with one
>> exception. Resources deployed in Azure cannot communicate with
>> resources deployed in Aws, and vice versa. Both can communicate
>> with the Openswan instance, however. The route tables are correctly
>> setup in AWS and Azure so I am convinced its my configuration.
>>
>> I have two connection entries in the ipsec.conf
>>
>> (Spoke1) Azure = 172.16.0.0/23
>>
>> (Spoke2) AWS = 10.10.10.0/23
>>
>> Hub Network = Openswan = 192.168.1.0/24
>>
>> I am also using netkey for the protocol.
>>
>> Any help with getting nodes in spoke 1 to communicate with nodes in
>> spoke 2 would be greatly appreciated!
>>
>> _______________________________________________
>> Users at lists.openswan.org
>> https://lists.openswan.org/mailman/listinfo/users [1]
>> Micropayments:
>> https://flattr.com/thing/38387/IPsec-for-Linux-made-easy [2]
>> Building and Integrating Virtual Private Networks with Openswan:
>>
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>> [3]
>>
>> _______________________________________________
>> Users at lists.openswan.org
>> https://lists.openswan.org/mailman/listinfo/users [1]
>> Micropayments:
>> https://flattr.com/thing/38387/IPsec-for-Linux-made-easy [2]
>> Building and Integrating Virtual Private Networks with Openswan:
>>
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>> [3]
>
> _______________________________________________
> Users at lists.openswan.org
> https://lists.openswan.org/mailman/listinfo/users [1]
> Micropayments:
> https://flattr.com/thing/38387/IPsec-for-Linux-made-easy [2]
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
> [3]
>
>
>
> Links:
> ------
> [1] https://lists.openswan.org/mailman/listinfo/users
> [2] https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
> [3]
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
>
> _______________________________________________
> Users at lists.openswan.org
> https://lists.openswan.org/mailman/listinfo/users
> Micropayments: https://flattr.com/thing/38387/IPsec-for-Linux-made-easy
> Building and Integrating Virtual Private Networks with Openswan:
> http://www.amazon.com/gp/product/1904811256/104-3099591-2946327?n=283155
More information about the Users
mailing list