Date: Tue, 17 Mar 2020 07:47:54 +0200 From: Artem Viklenko <artem@viklenko.net> To: Cristian Cardoso <cristian.cardoso11@gmail.com>, freebsd-pf@freebsd.org Subject: Re: PF + IPsec Message-ID: <4c936163-f77b-3fe1-56be-8f6967add0ef@viklenko.net> In-Reply-To: <CAKeEC-LqP-dAFCeSkCnMLU-Qw-j0KxOXLQSmQzX2poLTKZ2W0Q@mail.gmail.com> References: <CAKeEC-LqP-dAFCeSkCnMLU-Qw-j0KxOXLQSmQzX2poLTKZ2W0Q@mail.gmail.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi! PF do NAT on outbound and RDR on inbound. You can try to do NAT on enc0 interface instead of lan. On 17.03.20 04:28, Cristian Cardoso wrote: > Hello > I'm setting up a Freebsd server for ipsec vpn communication with > strongswan and I'm having some difficulties in the operation > > The freebsd server's local network is 10.19.12.0/24 and can connect > correctly to the network on the other side of the tunnel. > > I would like another network behind my server to connect to the tunnel as well. > > In linux I would nat the network that is arriving as follows: > iptables -t nat -A POSTROUTING -s 10.0.0.0/8 -d 10.31.32.0/24 -j > --SNAT --to 10.19.12.251 > > In FreeBSD I tried to run the rule as follows, but to no avail > nat on $ LAN inet from 10.0.0.0/8 to 10.31.32.0/24 -> 10.19.12.251 > > Is there any other way to generate the equivalent of FreeBSD postrouting? > > Best Regards > _______________________________________________ > freebsd-pf@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-pf > To unsubscribe, send any mail to "freebsd-pf-unsubscribe@freebsd.org" > -- Regards!
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4c936163-f77b-3fe1-56be-8f6967add0ef>