[strongSwan] Single physical interface "roadwarrior" responder using DHCP/FARP
noel.kuntze+strongswan-users-ml at thermi.consulting
Wed Apr 11 19:22:55 CEST 2018
Disable sending of redirects for traffic on that interface.
The key is "net.ipv4.conf.INTERFACE.send_redirects".
On 11.04.2018 18:56, Michael .. wrote:
> I'm trying to configure a responder for use in a "roadwarrior" scenario, albeit unsuccessfully.
> -ip route
> default via 192.168.1.254 dev eth0 src 192.168.1.1 metric 202
> 192.168.1.0/24 dev eth0 proto kernel scope link src 192.168.1.1 metric 202
> Default gateway @ 192.168.1.254 provides internet access and also inbound NAT forwarding of ports 500/4500 from an internet IP.
> conn %default
> conn rw
> -ip route show table 220
> 192.168.1.50 via 192.168.1.254 dev eth0 proto static
> I am able to establish a VPN connection from the internet to the responder and the client is assigned an IP from the DHCP pool.
> The responder can ping the client's IP address assigned from DHCP - therefore 2-way communication over the tunnel. The remote internet client can also send packets over the tunnel to the rest of the 192.168.1.0/24 subnet which reach their destination (e.g. to 192.168.1.2). The responder then correctly replies to ARP on behalf of the clients address (e.g. 192.168.1.50) and the return packet arrives to the responders interface. However, the responder is replying with ICMP redirect to 192.168.1.254 to the sender and therefore the return packet does not reach the client.
> Any ideas?
More information about the Users