[strongSwan] Routing everything through VPN using 2 separate ethernet interfaces.
Marc Sauvé
powermarcx at gmail.com
Mon Nov 12 17:29:17 CET 2018
Hi. I’m trying to do a full tunnel setup between my remote host and central location (Both private and public internet traffic). Got my VPN setup working on the first ethernet interface (eth0), however, as soon as I’m trying to get an other device plugged in the second ethernet port of the VPN gateway (eth1), it will not work (Reports that the IP address is taken). So I cannot use any devices on the second ethernet interface. But from the central network, I can ping the remote IP address (Ping to 172.24.1.1 is successful).
However, if I remove the "rightsubnet=172.24.1.0/24” statement from the server config, I can now use devices connected to the second ethernet interface of the remote host but routing is completely dead.
Remote host is a simple OrangePi R1 with 2 ethernet interface. Primary interface is on DHCP address (and has to be deployed that way) while the second ethernet interface (that will be used for other users) is using 172.24.1.0/24 subnet. DHCP server can be activated on this host, but right now, it’s not ON.
There is no real need to access the remote network from the main network, so I would be OK doing some NAT on the remote box. But either would works perfectly. (Also tried to do NAT on the remote box, but I’m unable to NAT traffic to the VPN connection at all)
Any ideas to get this setup working reliably?
(Domain names and Public IP addresses were modified.)
Configs:
Server Host:
strictcrlpolicy=yes
uniqueids=no
cachecrls=yes
conn %default
keyexchange=ikev2
keyingtries=4
forceencaps=yes
ikelifetime=2h
lifetime=1h
conn IPSec-IKEv2-OR1
#
ike=aes128gcm16-prfsha512-prfsha256-x25519-curve25519-ecp521!
esp=chacha20poly1305-curve25519-x25519!
#
auto=add
fragmentation=yes
dpdaction=clear
dpddelay=300s
reauth=no
rekey=no
authby=secret
#
left=%any
leftid=@neo.domain.com
leftsubnet=0.0.0.0/0
fragmentation=yes
right=%any
rightid=@or1.domain.com
rightsubnet=172.24.1.0/24
rightsourceip=172.24.11.0/30
ipsec statusall
IPSec-IKEv2-OR1: %any...%any IKEv2, dpddelay=300s
IPSec-IKEv2-OR1: local: [neo.domain.com] uses pre-shared key authentication
IPSec-IKEv2-OR1: remote: [or1.domain.com] uses pre-shared key authentication
IPSec-IKEv2-OR1: child: 0.0.0.0/0 === 172.24.1.0/24 TUNNEL, dpdaction=clear
Security Associations (1 up, 0 connecting):
IPSec-IKEv2-OR1[27]: ESTABLISHED 15 hours ago, 172.22.43.25[neo.domain.com]...65.30.10.30[or1.domain.com]
IPSec-IKEv2-OR1[27]: IKEv2 SPIs: 11ab39c596594827_i b99ac8c02c1a67cb_r*, rekeying disabled
IPSec-IKEv2-OR1[27]: IKE proposal: AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_521
IPSec-IKEv2-OR1{9}: INSTALLED, TUNNEL, reqid 9, ESP in UDP SPIs: cbeb450d_i c0060d1c_o
IPSec-IKEv2-OR1{9}: CHACHA20_POLY1305, 5278 bytes_i (52 pkts, 474s ago), 15195 bytes_o (49 pkts, 474s ago), rekeying disabled
IPSec-IKEv2-OR1{9}: 0.0.0.0/0 === 172.24.1.0/24
Remote Host:
strictcrlpolicy=yes
uniqueids=no
cachecrls=yes
conn %default
keyexchange=ikev2
keyingtries=4
forceencaps=yes
ikelifetime=2h
lifetime=1h
conn IPSec-IKEv2-OR1
#
#
ike=aes128gcm16-prfsha512-prfsha256-x25519-curve25519-ecp521!
esp=chacha20poly1305-curve25519-x25519!
#
auto=start
fragmentation=yes
dpdaction=clear
dpddelay=300s
reauth=no
rekey=no
authby=secret
#
left=%any
leftid=@or1.domain.com
leftsubnet=172.24.1.0/24,172.24.11.0/30
leftsourceip=%config
leftupdown=/etc/nat_updown
#
fragmentation=yes
right=some_dynamicDNS.duckdns.org
rightid=@neo.domain.com
rightsubnet=0.0.0.0/0
ipsecc statusall:
IPSec-IKEv2-OR1: %any...some_dynamicDNS.duckdns.org IKEv2, dpddelay=300s
IPSec-IKEv2-OR1: local: [or1.domain.com] uses pre-shared key authentication
IPSec-IKEv2-OR1: remote: [neo.domain.com] uses pre-shared key authentication
IPSec-IKEv2-OR1: child: 172.24.1.0/24 172.24.11.0/30 === 0.0.0.0/0 TUNNEL, dpdaction=clear
Security Associations (1 up, 0 connecting):
IPSec-IKEv2-OR1[1]: ESTABLISHED 14 hours ago, 172.22.43.80[or1.domain.com]...65.10.20.40[neo.domain.com]
IPSec-IKEv2-OR1[1]: IKEv2 SPIs: 11ab39c596594827_i* b99ac8c02c1a67cb_r, rekeying disabled
IPSec-IKEv2-OR1[1]: IKE proposal: AES_GCM_16_128/PRF_HMAC_SHA2_512/ECP_521
IPSec-IKEv2-OR1{1}: INSTALLED, TUNNEL, reqid 1, ESP in UDP SPIs: c0060d1c_i cbeb450d_o
IPSec-IKEv2-OR1{1}: CHACHA20_POLY1305, 10881 bytes_i (46 pkts, 363s ago), 5278 bytes_o (52 pkts, 363s ago), rekeying disabled
IPSec-IKEv2-OR1{1}: 172.24.1.0/24 === 0.0.0.0/0
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.strongswan.org/pipermail/users/attachments/20181112/ce903da1/attachment-0001.html>
More information about the Users
mailing list