Date: Thu, 22 Aug 2002 21:02:52 +0200 (CEST) From: stable22aug02@oldach.net (Helge Oldach) To: maikel@ladot.com (Maikel Verheijen) Cc: stable@FreeBSD.ORG Subject: Re: Racoon ipsec to multiple VLAN's behind a cisco PIX question Message-ID: <200208221902.g7MJ2qpc027047@sep.oldach.net> In-Reply-To: <410777FC7A66D511911500B0D0783455013CF285@nlladot05.intern.ladot.com> from Maikel Verheijen at "Aug 22, 2002 1:52:38 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
Maikel Verheijen:
> I have a VPN connection running from my (home) freebsd gateway, to our
> company Cisco PIX firewall.
>
> My network setup is as following:
>
> 10.0.0.x/24 - [Freebsd] -- { inet cloud } -- [Pix] - 10.31.0.0 / 16 -
> [router] - 172.31.0.0 /16
>
> I can make a vpn connection from my freebsd box to the pix, but I can ONLY
> connect to 1 of the 2 subnets. If my connection to the 172.31.0.0/16 network
> is set up (using a policy), I cannot connect to the 10.31.0.0/16 network,
> and vice-versa. If I put in a policy for BOTH subnets, only one will become
> active, and I cannot connect to the other subnet.
I have a similar setup active, however for several remote subnets. I am
using a global policy, i.e. I am routing any destination address that
isn't local to the company. For example:
10.0.0.0/24[any] 0.0.0.0/0[any] any
out ipsec
esp/tunnel/194.5.5.5-194.4.4.4/unique#16385
spid=1 seq=0 pid=26902
refcnt=1
0.0.0.0/0[any] 10.0.0.0/24[any] any
in ipsec
esp/tunnel/194.4.4.4-194.5.5.5/unique#16386
spid=2 seq=1 pid=26902
refcnt=1
The racoon config is correspondingly:
listen
{
isakmp 194.5.5.5 [500];
}
remote 194.4.4.4
{
...
}
sainfo address 10.0.0.0/24 any address 0.0.0.0/0 any
{
...
}
This works perfectly.
> We tried using "multiple" tunnels (on both the PIX and the FreeBSD box), and
> using a route for the 172.31.0.0/16 range over the 10.31.0.0/16 vlan.
I don't understand what you mean by "multiple" tunnels. IPsec tunnels
(correctly: security associations) are unidirectional, so you already
have two of them with the global policy above (one for either
direction). You can of course further divide the policy and create
additional SAs, e.g.
10.31.0.0/16[any] 10.0.0.0/24[any] any
10.0.0.0/24[any] 10.31.0.0/16[any] any
172.31.0.0/16[any] 10.0.0.0/24[any] any
10.0.0.0/24[any] 172.31.0.0/16[any] any
I haven't tested such a setup however I am quite sure that it will work
as well.
My FreeBSD setup works against an IOS router and not against a PIX,
however the code base for IOS and PIX is very close, as is the
configuration.
If this doesn't help, can you please provide your configuration files
via private email?
Helge
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-stable" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200208221902.g7MJ2qpc027047>
