Date: Thu, 18 Jan 2001 08:58:15 -0500 From: The Babbler <bts@babbleon.org> To: freebsd-questions@freebsd.org Subject: Re: IPSEC tunneling Message-ID: <3A66F677.C56FD3A9@babbleon.org> References: <3A667B11.7BE15007@babbleon.org>
next in thread | previous in thread | raw e-mail | index | archive | help
I'm going to follow up on my own post, which was a bit short of details. Here's what I'm enabling in the kernel that I believe to be related: ------------------------------------------------------------------------------- # IPFIREWALL enables support for IP firewall construction, in # conjunction with the `ipfw' program. IPFIREWALL_VERBOSE sends # logged packets to the system logger. IPFIREWALL_VERBOSE_LIMIT # WARNING: IPFIREWALL defaults to a policy of "deny ip from any to any" # IPFIREWALL_DEFAULT_TO_ACCEPT causes the default rule (at boot) to options IPFIREWALL #firewall options IPFIREWALL_VERBOSE #print information about # options IPFIREWALL_FORWARD #enable transparent proxy support options IPFIREWALL_VERBOSE_LIMIT=100 #limit verbosity # options IPFIREWALL_DEFAULT_TO_ACCEPT #allow everything by default # IPDIVERT enables the divert IP sockets, used by ``ipfw divert'' options IPDIVERT #divert sockets options IPSEC #IP security options IPSEC_ESP #IP security (crypto; define w/ IPSEC) options IPSEC_DEBUG #debug for IP security ------------------------------------------------------------------------------- And here are the rules that are intended to let the relavent packets through. fwcmd is ipfw; inet/imask is the inside network; and onet/omask is the outside network. ------------------------------------------------------------------------------- ntvpn=any ${fwcmd} add divert natd log udp from ${inet}:${imask} 500 to ${ntvpn} 500 ${fwcmd} add accept log udp from ${onet}:${omask} 500 to ${ntvpn} 500 ${fwcmd} add accept log udp from ${ntvpn} 500 to ${onet}:${omask} 500 ${fwcmd} add accept log udp from ${ntvpn} 500 to ${inet}:${imask} 500 ${fwcmd} add divert natd log esp from ${inet}:${imask} 500 to ${ntvpn} 500 ${fwcmd} add accept log esp from ${onet}:${omask} 500 to ${ntvpn} 500 ${fwcmd} add accept log esp from ${ntvpn} 500 to ${onet}:${omask} 500 ------------------------------------------------------------------------------- The Babbler wrote: > > I'm trying to get my FreeBSD gateway/firewall machine set up so that > it will allow my wife's VPN access to work; this requires IPSEC packets > to get through. > > Has anybody done this? Any helpful hints? > > I turned on the IPSEC and the tunneling options in the kernel, > and I'm letting "esp" and "udp" packets through. > (For now, I'm basically letting all of 'em through.) > > FWIW, I tried this in Linux and couldn't ever get it to work; this was > a motivation for trying FreeBSD. It's still not working, but I can at > least follow the network traffic better in FreeBSD, which at least let > me fix my rules. (The rules I used under Linux were bad.) > > My gateway machine is multiplexing multiple internal-network machines > to a single cable modem connection by using the command to translate > packets. I suspect that something is going wrong there. > > [Sorry this is a little vague; for other reasons the machine isn't > currently booted into FreeBSD so I can't double-check the precise > settings at the moment.] > > -- > "Brian, the man from babble-on" bts@babbleon.org > Brian T. Schellenberger http://www.babbleon.org > Support http://www.eff.org. Support decss defendents. > Support http://www.programming-freedom.org. Boycott amazon.com. -- "Brian, the man from babble-on" bts@babbleon.org Brian T. Schellenberger http://www.babbleon.org Support http://www.eff.org. Support decss defendents. Support http://www.programming-freedom.org. Boycott amazon.com. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3A66F677.C56FD3A9>