Multiple VPN tunnels

Multiple VPN tunnels

Post by Just » Wed, 15 May 2002 02:42:35



I am trying to set up my OpenBSD 2.9-stable to handle two separate
net-to-net vpn tunnels. Example: OpenBSD box currently has one
net-to-net VPN set up with a remote cisco pix firewall that works
fine. Now I need to add another net-to-net VPN between OpenBSD and
different location. I do not want the two remote locations to
communicate with each other, I just want to have my local network to
be able to communicate with either of the two remote sites.

I am having a hard time finding documentation as far as configuring
isakmpd for this. Maybe it is so simple that no one thought to add it
and I just am dense or maybe it is something isn't done usually or at
all; this is possible isn't it?

 
 
 

Multiple VPN tunnels

Post by p.. » Fri, 17 May 2002 03:52:50



> I am trying to set up my OpenBSD 2.9-stable to handle two separate
> net-to-net vpn tunnels. Example: OpenBSD box currently has one
> net-to-net VPN set up with a remote cisco pix firewall that works
> fine. Now I need to add another net-to-net VPN between OpenBSD and
> different location. I do not want the two remote locations to
> communicate with each other, I just want to have my local network to
> be able to communicate with either of the two remote sites.
> I am having a hard time finding documentation as far as configuring
> isakmpd for this. Maybe it is so simple that no one thought to add it
> and I just am dense or maybe it is something isn't done usually or at
> all; this is possible isn't it?

would :
/usr/share/ipsec/isakmpd/VPN-3way-template.conf

be of value ?

--
Peter H?kanson        
        IPSec  Sverige      ( At Gothenburg Riverside )
           Sorry about my e-mail address, but i'm trying to keep spam out,
           remove "icke-reklam" if you feel for mailing me. Thanx.

 
 
 

Multiple VPN tunnels

Post by Just » Fri, 17 May 2002 12:32:56




> > I am trying to set up my OpenBSD 2.9-stable to handle two separate
> > net-to-net vpn tunnels. Example: OpenBSD box currently has one
> > net-to-net VPN set up with a remote cisco pix firewall that works
> > fine. Now I need to add another net-to-net VPN between OpenBSD and
> > different location. I do not want the two remote locations to
> > communicate with each other, I just want to have my local network to
> > be able to communicate with either of the two remote sites.

> > I am having a hard time finding documentation as far as configuring
> > isakmpd for this. Maybe it is so simple that no one thought to add it
> > and I just am dense or maybe it is something isn't done usually or at
> > all; this is possible isn't it?

> would :
> /usr/share/ipsec/isakmpd/VPN-3way-template.conf

> be of value ?

That helps a ton! What about the policy file? I am thinking of the
line
Licensees: "passphrase:mekmitasdigoat"
What should this be?
Example.
I am controlling VPN-XXX
VPN-XXX to VPN-YYY uses passphrase of 'password' in isakmpd.conf
VPN-XXX to VPN-ZZZ uses passphrase of 'mekmitasdigoat' in isakmpd.conf
What should the "Licensees..." line passphrase be in the policy? I do
not fully understand it. The more I read the man pages the more
frustrated I am becoming.

That example config file is exactly what I was looking for BTW

 
 
 

Multiple VPN tunnels

Post by Martin Schmacht » Sun, 19 May 2002 16:35:06




>That helps a ton! What about the policy file? I am thinking of the
>VPN-XXX to VPN-YYY uses passphrase of 'password' in isakmpd.conf
>VPN-XXX to VPN-ZZZ uses passphrase of 'mekmitasdigoat' in isakmpd.conf

Use something like this:

| Authorizer: "subpolicy0"
| Comment: subpolicy for VPN-Peer YYY
| Licensees: "passphrase:password"
| Conditions: esp_present == "yes" -> "true";
|
| Authorizer: "subpolicy1"
| Comment: subpolicy for VPN-Peer YYY
| Licensees: "passphrase:password"
| Conditions: esp_present == "yes" -> "true";
|
| Authorizer: "POLICY"
| Comment: this policy may be divided in several subpolicies
| Licensees: "subpolicy0 || subpolicy1"
| Conditions: app_domain == "IPsec policy" -> "true";

It's in the keynote(5) manpage, I think. But I admit, it took me a while
to find out as well. Do all 3 peers have fixed ip addresses? Dynamic
IPs on the peers makes things even more interesting...

hope this helps
schmadde

 
 
 

Multiple VPN tunnels

Post by p.. » Sun, 19 May 2002 17:48:15





>>That helps a ton! What about the policy file? I am thinking of the
>>VPN-XXX to VPN-YYY uses passphrase of 'password' in isakmpd.conf
>>VPN-XXX to VPN-ZZZ uses passphrase of 'mekmitasdigoat' in isakmpd.conf
> Use something like this:
> | Authorizer: "subpolicy0"
> | Comment: subpolicy for VPN-Peer YYY
> | Licensees: "passphrase:password"
> | Conditions: esp_present == "yes" -> "true";
> |
> | Authorizer: "subpolicy1"
> | Comment: subpolicy for VPN-Peer YYY
> | Licensees: "passphrase:password"
> | Conditions: esp_present == "yes" -> "true";
> |
> | Authorizer: "POLICY"
> | Comment: this policy may be divided in several subpolicies
> | Licensees: "subpolicy0 || subpolicy1"
> | Conditions: app_domain == "IPsec policy" -> "true";
> It's in the keynote(5) manpage, I think. But I admit, it took me a while
> to find out as well. Do all 3 peers have fixed ip addresses? Dynamic
> IPs on the peers makes things even more interesting...

Dynamic ip's may be used in one end by using 0.0.0.0 as peer address.
It's teh passphrase that is the identification ( or certificate if
you care to set it up)

Quote:> hope this helps
> schmadde

--
Peter H?kanson        
        IPSec  Sverige      ( At Gothenburg Riverside )
           Sorry about my e-mail address, but i'm trying to keep spam out,
           remove "icke-reklam" if you feel for mailing me. Thanx.
 
 
 

1. Multiple vpn tunnels

Hello Folks,

I have the following situation:

                       VPN Tunnel 1                      VPN Tunnel 2
81.129.39.9  ============ 59.20.93.49  =============  93.48.28.27
Gateway A                             Gateway
B                               Gateway C

I need all clients coming from gateway C to be able to use the vpn
tunnel 1, so I have the following rule on Gateway B:

iptables -t nat -A POSTROUTING -s  93.48.28.27 -d 81.129.40.0/24 -o
eth0 -j MASQUERADE

But does not work, what I'm missing here?

Note: doing tcpdump host 93.48.28.27 on Gateway B and trying to ping
or telnet from Gateway C seems to work. I don't have access to Gateway
A, so I can't verify if the packets get to Gateway A.

I would really appreciate if you can help me fix this or find an other
job ;)

2. Lock screen with X-terminals

3. VPN Tunnel; PIX -> Cisco VPN Client for Solaris 3.5

4. Why is "ease of use" a dirty concept?

5. VPN Tunnels and IPSec

6. AIS 5L vs 4.3

7. ssh vpn tunnel, FAQ?

8. white screen

9. Linux VPN / Tunnel solutions

10. VPN/Tunnel

11. VPN (tunneling) question

12. configuring SSH to act as a vpn tunnel

13. VPN / Tunneling