[strongSwan] Separate firewall/router and VPN systems
Christian Salway
christian.salway at naimuri.com
Fri Aug 24 10:13:47 CEST 2018
Robert,
Make sure you have ip_forward turned on
net.ipv4.ip_forward = 1
and masquarade the IP address
/sbin/iptables -t nat -D POSTROUTING -o enp3s0 -j MASQUERADE
then you need to make sure that anything that goes down the internal interface, comes back that way..
See if you can make sense of the following which is my config. eth0 is public facing, eth1 is internal facing
cat <<EOF >> /etc/network/interfaces.d/50-cloud-init.cfg
auto eth0
iface eth0 inet dhcp
auto eth1
iface eth1 inet dhcp
metric 100
EOF
ifup eth1
SN1="$(ip r | awk '/eth1/ { print $1 }' | tail -n 1)" # internal subnet
IP1="$(ip r | awk '/eth1/ { print $NF }' | tail -n 1)" # internal ip
GW1="$(echo ${SN1} | cut -d'/' -f1 | cut -d'.' -f1-3).1" # internal gateway
echo 200 eth1 >> /etc/iproute2/rt_tables
cat <<EOF >> /etc/network/interfaces.d/50-cloud-init.cfg
post-up /sbin/ip rule add from ${IP1} table eth1
pre-down /sbin/ip rule delete from ${IP1} table eth1
post-up /sbin/ip route add default via ${GW1} table eth1
pre-down /sbin/ip route delete default via ${GW1} table eth1
post-up /sbin/ip route add ${REMOTECIDR} via ${GW1}
pre-down /sbin/ip route delete ${REMOTECIDR} via ${GW1}
post-up /sbin/iptables -t nat -A POSTROUTING -o eth1 -j MASQUERADE
pre-down /sbin/iptables -t nat -D POSTROUTING -o eth1 -j MASQUERADE
EOF
ifdown eth1; ifup eth1
cat <<EOF > /etc/sysctl.d/60-strongswan.conf
net.ipv4.ip_forward = 1
EOF
sysctl -p /etc/sysctl.d/60-strongswan.conf
Kind regards,
Christian Salway
IT Consultant - Naimuri
T: +44 7463 331432
E: christian.salway at naimuri.com
A: Naimuri Ltd, Chandlers Point, Manchester M50 2UW
> On 20 Aug 2018, at 22:23, Robert Green <robert.green at wegolook.com> wrote:
>
> Hello All,
>
> I may be doing something that isn't going to work easily. I am trying to setup strongswan on a separate system than is on my firewall/router. This separate system is also directly connected to the public internet. This is to support a road warrior setup.
>
> I currently have the windows 10 client connecting via certificates. However when I connect the client I can not get traffic beyond the VPN box. I can ping the internal interface but I can not ping into the network or external clients.
>
> I see the routes in the table 220 but they don't look right to me. I do have the firewall rules turned on the config and those look to be populating correctly.
>
> /etc/ipsec.conf
> config setup
> # strictcrlpolicy=yes
> # uniqueids = no
> charondebug="cfg 2, dmn 2, ike 2, net 2"
>
> conn remote-users
> fragmentation=yes
> ike=aes256-sha1-modp1024,3des-sha1-modp1024!
> esp=aes256-sha1,3des-sha1!
> left=%any
> #leftsubnet=0.0.0.0/0 <http://0.0.0.0/0>
> leftsubnet=192.168.0.0/16 <http://192.168.0.0/16>
> leftcert=server_cert.pem
> leftfirewall=yes
> right=%any
> rightdns=1.1.1.1, 8.8.8.8
> rightsourceip=192.168.18.2-192.168.18.254
> keyexchange=ikev2
> #auto=add
> auto=route
>
> ip route show table 220
>
> 192.168.18.2 via 12.12.12.1 dev enp0s25 proto static src 192.168.1.198
>
> My interfaces are:
> enp0s25 -> 12.12.12.1 (public interface)
> enp3s0 -> 192.168.1.198 (internal interface)
>
> Primary gateway 192.168.0.1 (netmask /23)
>
> This all has been sanitized. I have been beating my head against the wall on this one. I know this is a routing issue but not sure how to properly fix it.
>
> Thank you,
> --
> Robert Green
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20180824/7bb73f82/attachment.html>
More information about the Users
mailing list