1. Cisco VPN Client through pf-based firewall
Running OBSD 3.0 with latest patches.
System is a firewall with 3 interfaces, Internal, DMZ and External.
External and DMZ each have public addresses (x.x.x.x/29)
The firewall performs NAT, assigning all outbound traffic from the Internal
net (10.10.10.0) the address assigned to the external NIC - let's call it
200.200.200.2 (200.200.200.1 is my ISPs router)
My boss' laptop has the Cisco VPN client (not sure of the version -
relatively new, tho - it runs Win2K Professional) which he needs to connect
to an External PIX at 100.100.100.100
In order to make it work, I've had to assign an alias to my external card of
200.200.200.3 and setup a nat rule that will translate his laptops address
only where the destination is 100.100.100.100. I also had to allow :
<set appropriate variables>
block out on $ext_if all
block in on $ext_if all
block out on $dmz_if all
block in on $dmz_if all
block return-rst out on $ext_if proto tcp all
block return-rst in on $ext_if proto tcp all
block return-icmp out on $ext_if proto udp all
block return-icmp in on $ext_if proto udp all
pass in quick on lo0 all
pass out quick on lo0 all
block in quick on $ext_if from any to 255.255.255.255
block in quick on $ext_if from { 10.0.0.0/8, 172.16.0.0/12,\
192.168.0.0/16, 255.255.255.255/32 } to any
pass out quick on $ext_if inet proto icmp all icmp-type 8 code 0 keep state
pass out quick on $dmz_if inet proto icmp all icmp-type 8 code 0 keep state
pass in quick on $ext_if inet proto icmp from any to $dmz_net icmp-type 8 \
code 0 keep state
# UDP - Initiated internally - outbound using ext_if due to nat
pass out quick on $ext_if proto udp from $ext_if to any keep state
pass out quick on $dmz_if proto udp from $int_net to $dmz_net keep state
# TCP - Initiated internally - outbound using ext_if due to nat
pass out quick on $ext_if proto tcp from $ext_if to any modulate state
pass out quick on $dmz_if proto tcp from $int_net to $dmz_net modulate state
# Allow the boss' vpn
pass in quick on $ext_if proto esp from 100.100.100.100 to any keep state
pass out quick on $ext_if proto esp from any to 100.100.100.100 keep state
pass in quick on $ext_if proto udp from 100.100.100.100 to any port 500 \
keep state
# Additional pass rules snipped
For one thing, I had to set my outbound to allow from the external
interface, due to nat - is this the way it should be?
Second, is this the best way to get his vpn client working? It seems
kludgey and that there should be a better way - I'm just not seeing what it
is.
Thanks
Steve
2. HELP! setup freezes at supplemental disk
3. Linux vpn & cisco vpn client
4. How the change the sendmail.cf for sorting mails ?
5. VPN Tunnel; PIX -> Cisco VPN Client for Solaris 3.5
6. Newsreader
7. Contivity VPN client behind PF firewall/nat
8. Help with serial install on RS/6000 E30
9. VPN from Win98 Client thru IPCHAINS+IPMASQ firewall
10. Win 2K VPN client thru IPSEC Masq...
11. Help -> VPN client thru kernel 2.4.10 MASQ?
12. Newbie Help -> VPN client thru kernel 2.4.10 MASQ?
13. Cisco VPN Client