Tom,
I am still a newbie here and I wanted to make sure that I understood what
you meant so here is where I am at on this.
What you suggested was this [1]:
ACCEPT net loc:<local endpoint ip> udp 500 - all
ACCEPT net loc:<local endpoint ip> 50 - - all
I decided not to include the endpoint ip address because I wanted be able to
use any machine on my local network. So... I did this [2]:
ACCEPT net loc udp 500
ACCEPT net loc 50 all
Following your suggestion of how I can identify the difference I used the
command "shorewall show net2loc". Below was my process:
ReBOOT with Rule [1] in place.
make ipsec connection
break ipsec connection
run "shorewall show net2loc"
record results (see [1] below)
modify shorewall config to use Rule [2]
backup config
ReBOOT with Rule [2] in place
make ipsec connection
break ipsec connection
run "shorewall show net2loc"
record results (see [2] below)
results from [1] this connection was only up for a couple of minutes.
# shorewall show net2loc
Shorewall-1.2.8 Chain net2loc at firewall - Thu May 2 15:42:01 UTC 2002
Chain net2loc (1 references)
pkts bytes target prot opt in out source
destination
27 4277 ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0
192.168.1.10 state NEW udp dpt:500
1 88 ACCEPT esp -- * * 0.0.0.0/0
192.168.1.10 state NEW
0 0 net2all all -- * * 0.0.0.0/0
0.0.0.0/0
results from [2] this connection was up for 25 minutes.
# shorewall show net2loc
Shorewall-1.2.8 Chain net2loc at firewall - Thu May 2 16:12:20 UTC 2002
Chain net2loc (1 references)
pkts bytes target prot opt in out source
destination
1331 156K ACCEPT all -- * * 0.0.0.0/0
0.0.0.0/0 state RELATED,ESTABLISHED
0 0 ACCEPT udp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW udp dpt:500
0 0 ACCEPT esp -- * * 0.0.0.0/0
0.0.0.0/0 state NEW
0 0 net2all all -- * * 0.0.0.0/0
0.0.0.0/0
The only difference here are the esp (protocol: 50) packets that were
logged. Is this the difference that you were expecting me to find. I am not
in control of the other end. Would you typically expect that a rekeying
attempt would have been made in the 25 minutes that I had left the tunnel
up?
Thanks for your assistance thus far.
/Eric
-----Original Message-----
From: Tom Eastep [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, May 01, 2002 11:24 AM
To: Eric B Kiser
Cc: [EMAIL PROTECTED]
Subject: RE: [leaf-user] Testing IPsec pass-through
On Wed, 1 May 2002, Eric B Kiser wrote:
> Since installing Bering 1.0-rc1 the only thing that I have changed in my
> shorewall config is adding the lines below. My understanding is that this
is
> not static since it is my single publicly routable address on one side and
I
> have three workstations using 192.168.1.x on the other side. Is static NAT
> the same as a 1:1 mapping?
>
Yes -- in that case, I doubt that the rules that you posted have any
effect. Most people using IPSEC have found that they also need incoming
rules that forward UDP 500 and protocol 50 to the endpoint (as I
recommended in a previous post). Without such rules, the tunnel will
eventually die during a re-keying attempt.
Look at the output of "shorewall show net2loc" -- I'm betting that the
packet counts for those rules are zero.
-Tom
--
Tom Eastep \ Shorewall - iptables made easy
AIM: tmeastep \ http://www.shorewall.net
ICQ: #60745924 \ [EMAIL PROTECTED]
_______________________________________________________________
Have big pipes? SourceForge.net is looking for download mirrors. We supply
the hardware. You get the recognition. Email Us: [EMAIL PROTECTED]
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html