[strongSwan] Hub-and-Spoke for road-warrior to tunnel
Noel Kuntze
noel.kuntze+strongswan-users-ml at thermi.consulting
Mon Mar 16 08:32:05 CET 2020
Hello Markus,
Please provide all the information listed on the HelpRequests page[1] the way it is shown next to the specific information
and explain the meaning of these IP addresses and subnets.
It is necessary in order to give you sensible advice.
Kind regards
Noel
[1] https://wiki.strongswan.org/projects/strongswan/wiki/HelpRequests
Am 16.03.20 um 08:24 schrieb /M:
> Hi,
>
> I'm currently trying to setup a strongswan-based VPN-network between one office network and some road-warriors.
> Unfortunately the core router of the office does not provide VPN-support yet and forwarding ESP/IKE to an internal host will only be possible in a couple of weeks.
> In the meantime I'd like to provide an temporary solution for mobile access to some parts of our network.
> A quick and dirty idea was to have a secondary gateway in the office (sun) connect to an external server with a public ip (moon) with a tunnel setup.
> The road-warriors (alice) will connect to moon using an ip-pool based setup.
> So far all of the point-to-point connections are working:
> alice -> moon, moon -> alice, (alice -> moon -> INTERNET)
> sun -> moon, moon -> sun
>
> Right now I'm stuck with figuring out the necessary rules to route packages alice -> sun via moon.
> Maybe just some iptables/xfrm entries, but maybe something else.
>
> Could you please help?
>
> Thanks and best regards
>
> Markus
>
> ---------------------------------------------------------------
> moon:
> # ipsec.conf - strongSwan IPsec configuration file
>
> # basic configuration
>
> config setup
> strictcrlpolicy=no
>
> conn office-vpn
> keyexchange=ikev2
> esp=aes256-sha1
> ike=aes256-sha256-modp2048
> type=tunnel
> compress=no
> authby=secret
> keyingtries=1
> ikelifetime=30m
> keylife=10m
> rekeymargin=3m
> mobike=no
> left=<PUBIP_OF_MOON>
> leftsubnet=172.16.99.0/30
> leftid=@moon
> leftfirewall=yes
> rightsubnet=172.16.20.0/23
> rightid=@sun
> auto=route
>
> conn client-vpn
> keyexchange=ikev2
> dpdaction=clear
> dpddelay=60s
> left=<PUBIP_OF_MOON>
> leftid="C=<CERT-DATA>"
> leftsubnet=0.0.0.0/0
> leftcert=/etc/ipsec.d/certs/moon.crt
> leftsendcert=always
> leftfirewall=yes
> right=%any
> rightsourceip=192.168.200.1/27
> rightauth=pubkey
> auto=add
>
> # iptables -L -n
> Chain INPUT (policy ACCEPT)
> target prot opt source destination
>
> Chain FORWARD (policy ACCEPT)
> target prot opt source destination
> ACCEPT all -- 192.168.200.1 0.0.0.0/0 policy match dir in pol ipsec reqid 2 proto 50
> ACCEPT all -- 0.0.0.0/0 192.168.200.1 policy match dir out pol ipsec reqid 2 proto 50
> ACCEPT all -- 172.16.20.0/23 172.16.99.0/30 policy match dir in pol ipsec reqid 1 proto 50
> ACCEPT all -- 172.16.99.0/30 172.16.20.0/23 policy match dir out pol ipsec reqid 1 proto 50
>
> Chain OUTPUT (policy ACCEPT)
> target prot opt source destination
>
> # iptables -t nat -L -n
> Chain PREROUTING (policy ACCEPT)
> target prot opt source destination
>
> Chain INPUT (policy ACCEPT)
> target prot opt source destination
>
> Chain OUTPUT (policy ACCEPT)
> target prot opt source destination
>
> Chain POSTROUTING (policy ACCEPT)
> target prot opt source destination
> ACCEPT all -- 0.0.0.0/0 0.0.0.0/0 policy match dir out pol ipsec
> ACCEPT all -- 192.168.200.0/27 0.0.0.0/0 policy match dir out pol ipsec
> MASQUERADE all -- 192.168.200.0/27 0.0.0.0/0
>
> ------------------------------------------
>
> ------------------------------------------
> sun
> ipsec.conf
> conn office-vpn
> keyexchange=ikev2
> esp=aes256-sha1
> ike=aes256-sha256-modp2048
> type=tunnel
> compress=no
> authby=secret
> keyingtries=1
> ikelifetime=30m
> keylife=10m
> rekeymargin=3m
> mobike=no
> left=%defaultroute
> leftsubnet=172.16.20.0/23
> leftid=@sun
> leftfirewall=yes
> right=<PUBIP_OF_MOON>
> rightsubnet=172.16.99.0/30,192.168.200.0/27
> rightid=@moon
> auto=start
> ------------------------------------------
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://lists.strongswan.org/pipermail/users/attachments/20200316/7798e09e/attachment.sig>
More information about the Users
mailing list