[strongSwan] How to forward Bonjour announcements in small family network
Marcus Döring
newsgroups.2016 at doerings.net
Sat Feb 27 10:49:51 CET 2016
We are struggling to get the AirPlay/ Bonjour announcements forwarded to the roadwarriors and would kindly ask for advice what is missing and preventing us from using AirPlay devices.
Roadwarrior-kids' iOS devices are managed and supervised by OS X server.
A profile with an always-on VPN setting to our StrongSwan server is pushed to all their devices.
So even within local LAN, kids' devices use VPN connection.
All http traffic from roadwarrior-kids thru VPN tunnel is forwarded to different ports on local machine to which local Squid is listening.
This is to enable logging of kids Internet traffic.
This works well.
Avahi running on StrongSwan machine to forward Bonjour announcements.
AirPlay devices are unfortunately *not* announced to roadwarriors iOS devices on VPN tunnel.
Please help. Thank you very much.
Setup:
192.168.178.1 DSL Modem Router w/ Firewall enabled
ports forwarded accordingly to StrongSwan and MacMini machines
192.168.178.10 RaspBerryPi w/ vanilla Raspian Jessie Lite running StrongSwan
only one interface eth0 involved
avahi-daemon running w/ reflector setting enabled
squid running as proxy without caching
192.168.178.3 MacMini running OS X server w/ open directory, DNS, DHCP, profile manager enabled
myserver.mydomain.net <http://myserver.mydomain.net/> resolved by MacMini to its own address 192.168.178.3 so devices on LAN don't have to go thru DSL Modem Router
192.168.178.220 VPN IP address of roadwarrior-kid1.
avahi-daemon.conf includes:
domain-name=alocal
enable-reflector=yes
ipsec.conf reads:
config setup
uniqueids = no
conn %default
keyexchange=ikev2
ike=aes128-sha1-modp1024,aes128-sha1-modp1536,aes128-sha1-modp2048,aes128-sha256-ecp256,aes1$
esp=aes128-aes256-sha1-sha256-modp2048-modp4096-modp1024,aes128-sha1,aes128-sha1-modp1024,ae$
dpdaction=clear
dpddelay=300s
authby=pubkey
left=%any
leftsubnet=0.0.0.0/0
leftcert=strongSwan-Cert.der
leftsendcert=always
leftid=myserver.mydomain.net
leftfirewall=yes
right=%any
keyexchange=ikev2
auto=add
conn roadwarrior-kid1
rightid=kid at mydomain.net
rightsourceip=192.168.178.220
rightdns=208.67.222.123,208.67.220.123
conn roadwarrior-kid2
...
conn roadwarrior-kid3
...
iptables -t nat -L
Chain PREROUTING (policy ACCEPT)
target prot opt source destination
REDIRECT tcp -- 192.168.178.220 anywhere tcp dpt:http redir ports 55220
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
Chain POSTROUTING (policy ACCEPT)
target prot opt source destination
ACCEPT all -- 192.168.178.220 anywhere policy match dir out pol ipsec
MASQUERADE all -- 192.168.178.220 anywhere
iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination
Chain FORWARD (policy ACCEPT)
target prot opt source destination
ACCEPT all -- 192.168.178.220 anywhere policy match dir in pol ipsec reqid 189 proto esp
ACCEPT all -- anywhere 192.168.178.220 policy match dir out pol ipsec reqid 189 proto esp
Chain OUTPUT (policy ACCEPT)
target prot opt source destination
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20160227/61f9152b/attachment.html>
More information about the Users
mailing list