Hello Freebsd-net,

 I have two router like this:

[NET 10.1.0.0/24] <-> (10.1.0.1 HOST A 10.2.0.1)
  <->
(10.2.0.2 HOST B 10.10.10.1) <-> [NET 10.10.10.0/24)

 Both HOST A and HOST B tun FreeBSD, both are routers (forwrading is
 enabled), host A has "route -net 10.10.10.0/24 10.2.0.2" and host B has
 "route -net 10.1.0.0/24 10.2.0.1".

  I could pass traffic from 10.1.0.0/24 to 10.10.10.0/24 and back without
 problems.

  Now, I want to encrypt this transit traffic between routers (!) but
 without creation of tunnel.

  Is it possible to encrypt this traffic with IPsec in *transport* mode?
 I've tried to create SAs for 10.2.0.1 and 10.2.0.2 and SPDs for 10.1.0.0/24
 and 10.10.10.0/24 on A and B (not on endpoint devices) but looks like it
 doesn't work, traffic stops. It is not as encrypted traffic is sent but
 dropped on other end, no, interfaces between Host A and Host B becomes
 silent according to "tcpdump" and all forwarded/dropped/error counters in
 "nestat -s" don't change anymore, only "input packets" in "netstat -s -p ip"
 is still counting.

 My SAs and SPDs looks like this (for UDP only, for tests):

Host A:

add 10.2.0.1 10.2.0.2 esp 0x10001 -m transport -E null "";
add 10.2.0.2 10.2.0.1 esp 0x10001 -m transport -E null "";

spdadd 10.1.0.0/24 10.10.10.0/24 udp -P out ipsec esp/transport//require;
spdadd 10.10.10.0/24 10.1.0.0/24 udp -P in  ipsec esp/transport//require;

Host B:

add 10.2.0.1 10.2.0.2 esp 0x10001 -m transport -E null "";
add 10.2.0.2 10.2.0.1 esp 0x10001 -m transport -E null "";

spdadd 10.10.10.0/24 10.1.0.0/24 udp -P out ipsec esp/transport//require;
spdadd 10.1.0.0/24 10.10.10.0/24 udp -P in  ipsec esp/transport//require;



-- 
Best regards,
 Lev                          mailto:l...@freebsd.org

_______________________________________________
freebsd-net@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-net
To unsubscribe, send any mail to "freebsd-net-unsubscr...@freebsd.org"

Reply via email to