Michael D. Schleif wrote:
More details to come, but it's the weekend, and I'm on my way to a 10K run..."Michael D. Schleif" wrote:<snip />conn %default authby=rsasig auto=start # keyexchange=ike keyingtries=0 # keylife=8h left=%defaultroute leftfirewall=yes [EMAIL PROTECTED] leftrsasigkey=_secret_key_for_other_vpns_ ### leftsubnet=192.168.11.0/24 ### leftsubnet=192.168.8.0/21While we are here, *how* is it possible to define multiple (read, more than one) subnets at leftsubnet= ? In our case, we currently have: 192.168.11.0/24 192.168.12.0/24 192.168.13.0/24
The above problem is very simple. You have a few options:
1) You can expand the leftsubnet definition to include all your networks. In the above case, you would have to use the 192.168.8.0/21 network specification you already have entered and commented out. Note that this includes several additional /24 networks which may or may not cause a problem. As always, proper subnetting and IP allocations can make life a lot easier...
2) Create multiple tunnels, one for each subnet. You will wind up with several connection descriptions in your ipsec.conf file, which can be greatly simplified by making approppriate use of the default parameters section and possibly some of the include functionality.
3) Combine the two approaches. In your case, you could create two connection descriptions instead of three by using:
192.168.11.0/24
192.168.12.0/23
I'm still digesting your previous post, and will provide more comments later today. To clarify, it looks like your VPN link is being made with the Cisco, rather than the Dicom box [B] as I had previously thought...is this correct?
Also, it *IS* possible to do Masquerading prior to the IPSec tunnel:
http://www.freeswan.org/freeswan_trees/freeswan-1.99/doc/firewall.html#NAT
You'll probably also want to keep the IPSec packet flow in mind when planning network architecture:
http://www.sandelman.ottawa.on.ca/linux-ipsec/html/2000/12/msg00006.html
Note that packets *DO* pass through the forward chain before hitting the ipsecN interface and getting encrypted. Also note that any packets hitting an ipsecN interface that *DO NOT* match an existing SA will be silently DROPPED.
--
Charles Steinkuehler
[EMAIL PROTECTED]
-------------------------------------------------------
This sf.net email is sponsored by:ThinkGeek
Welcome to geek heaven.
http://thinkgeek.com/sf
------------------------------------------------------------------------
leaf-user mailing list: [EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/leaf-user
SR FAQ: http://leaf-project.org/pub/doc/docmanager/docid_1891.html