[strongSwan] StrongSwan(optware) on Asus RT-AC66U (merlin build)-can't access LAN IPs
Luka
Lukapple80 at gmail.com
Thu Nov 7 07:54:52 CET 2013
Hi.
I've successfully installed StrongSwan 5.0.4 IPsec server on my Asus
RT-AC66U Firmware:3.0.0.4.374.34_2 (Merlin build), followed tutorial on:
http://wiki.strongswan.org/projects/strongswan/wiki/IOS_(Apple)
I'm trying to achieve this(diagram):
https://dl.dropboxusercontent.com/u/2261256/forums/ipsec/IPsec_diagram.png
I can connect to vpn server with my iPhone, using Cisco IPsec, but problem
is that* I can't access any of my home LAN IPs*.
Here is strongswan log file(removed IPs):
https://dl.dropboxusercontent.com/u/2261256/forums/ipsec/strongswancharon.log
Router firewall is temporary disabled.
I probably need to add some iptables routes or something ?
Can someone tell me what should I put for left/right subnet and left/right
ip ?
Here is my config:
Ipsec.conf file:
conn ios
keyexchange=ikev1
authby=xauthrsasig
xauth=server
left=%defaultroute
#left=%any
leftfirewall=yes
leftsubnet=0.0.0.0/0
#leftsubnet=192.168.2.0/24
leftcert=server.pem
right=%any
rightsubnet=10.0.0.0/24
#rightsubnet=192.168.2.0/24
rightsourceip=10.0.0.2
#rightsourceip=%dhcp
rightcert=client.pem
#forceencaps=yes
auto=add
strongswan.conf file:
charon {
# number of worker threads in charon
threads = 16
dns1 = 192.168.2.1
plugins {
dhcp {
server = 192.168.2.1
}
}
}
ipsec statusall command:
ipsec statusall
Status of IKE charon daemon (strongSwan 5.0.4, Linux 2.6.22.19, mips):
uptime: 27 minutes, since Nov 06 22:32:15 2013
malloc: sbrk 225280, mmap 0, used 201584, free 23696
worker threads: 3 of 16 idle, 12/1/0/0 working, job queue: 0/0/0/0,
scheduled: 5
loaded plugins: charon test-vectors curl ldap mysql sqlite pkcs11
aes des blowfish sha1 sha2 md4 md5 random nonce x509 revocation
constraints pubkey pkcs1 pkcs8 pgp dnskey pem openssl gcrypt fips-prf
gmp agent xcbc cmac hmac ctr ccm gcm attr kernel-pfkey kernel-klips
kernel-netlink resolve socket-default socket-dynamic farp stroke smp
updown eap-identity eap-md5 eap-mschapv2 eap-radius xauth-generic
xauth-eap dhcp whitelist led duplicheck addrblock unity
Virtual IP pools (size/online/offline):
10.0.0.2: 1/1/0
Listening IP addresses:
<wan.ip.removed>
192.168.2.1
10.8.2.1
10.8.0.6
Connections:
ios: %any...%any IKEv1
ios: local: [C=CA,... <removed>] uses public key authentication
ios: cert: "C=CA,... <removed>"
ios: remote: [C=CA, ... <removed>] uses public key authentication
ios: cert: "C=CA,... <removed>"
ios: remote: uses XAuth authentication: any
ios: child: 0.0.0.0/0 === 10.0.0.0/24 TUNNEL
Security Associations (1 up, 0 connecting):
ios[4]: ESTABLISHED 23 seconds ago, <wan.ip.removed>[C=CA,...
<removed>]...<iphone.wan.ip.removed>[C=CA,... <removed>]
ios[4]: Remote XAuth identity: <removed>
ios[4]: IKEv1 SPIs: 884d6e82b7e59a56_i a4cea15bd0aeff20_r*,
public key reauthentication in 2 hours
ios[4]: IKE proposal: AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_1536
ios{2}: INSTALLED, TUNNEL, ESP SPIs: c5177fea_i 070a1d6b_o
ios{2}: AES_CBC_128/HMAC_SHA1_96, 0 bytes_i, 0 bytes_o,
rekeying in 45 minutes
ios{2}: 0.0.0.0/0 === 10.0.0.2/32
Some more info:
iptables -L -t nat
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere tcp dpt:1194
VSERVER all -- anywhere cpe-86-<removed>
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
MASQUERADE all -- 192.168.2.0/24 anywhere
MASQUERADE all -- !cpe-86-<removed> anywhere
MASQUERADE all -- anywhere anywhere MARK match 0xd001
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain LOCALSRV (0 references)
target prot opt source destination
Chain VSERVER (1 references)
target prot opt source destination
DNAT tcp -- anywhere anywhere tcp
dpt:1184 to:192.168.2.100:1194
DNAT udp -- anywhere anywhere udp
dpt:1184 to:192.168.2.100:1194
VUPNP all -- anywhere anywhere
Chain VUPNP (1 references)
target prot opt source destination
Chain YADNS (0 references)
target prot opt source destination
netstat -r
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window irtt Iface
10.8.0.5 * 255.255.255.255 UH 0 0 0 tun11
10.8.0.1 10.8.0.5 255.255.255.255 UGH 0 0 0 tun11
10.8.2.2 * 255.255.255.255 UH 0 0 0 tun21
86.58.119.1 * 255.255.255.255 UH 0 0 0 eth0
86.58.119.0 * 255.255.255.0 U 0 0 0 eth0
10.8.2.0 10.8.2.2 255.255.255.0 UG 0 0 0 tun21
192.168.2.0 * 255.255.255.0 U 0 0 0 br0
192.168.1.0 10.8.0.5 255.255.255.0 UG 0 0 0 tun11
127.0.0.0 * 255.0.0.0 U 0 0 0 lo
default <removed> 0.0.0.0 UG 0 0 0 eth0
(ignore that tunnel to 192.168.1.0)
What should I do to make that tunnel work ?
Regards.
Luka
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20131107/cd22b547/attachment.html>
More information about the Users
mailing list