Hello,
 
I have a local_machine and testing remote_gateway/NAT with one 
remoteLAN_machine behind it. All the boxes are running OpenBSD. I can log in 
(ssh) to remoteLAN_machine through port forwarded on remote_gateway/NAT.

I'm trying to setup Site-To-Site VPN between local_machine and the remote LAN.
When I set it up (iked) the local_machine can ping (only ping) 
remoteLAN_machine through VPN tunnel. 
I CANNOT log in (ssh) to remoteLAN_machine from local_machine, both through VPN 
and from outside (on gateway's public IP and forwarded port). 
I need to have both ways access to behind_NAT services/boxes. I don't know what 
I'm doing wrong.

Could you shed some light on my problem/configs please?
Thank you!

####
local_machine# cat /etc/iked.conf | grep "^[^#;]"
remote_gw_FW70     =     "240.240.10.70"    
remote_lan_FW70    =     "10.0.100.0/24"
ikev2 quick active esp from egress to $remote_lan_FW70 \
peer $remote_gw_FW70 \
psk "aaa"


####
local_machine# cat /etc/pf.conf | grep "^[^#;]"
set skip on lo
block all
table <vpn_peers> const {240.240.10.96, 240.240.10.70 }
pass out quick on egress proto esp from (egress:0) to <vpn_peers>               
   keep state
pass out quick on egress proto udp from (egress:0) to <vpn_peers> port {500, 
4500} keep state
pass  in quick on egress proto esp from <vpn_peers> to (egress:0)               
   keep state
pass  in quick on egress proto udp from <vpn_peers> to (egress:0) port {500, 
4500} keep state
pass out quick on trust received-on enc0 keep state
pass out
block return in on ! lo0 proto tcp to port 6000:6010
block return out log proto {tcp udp} user _pbuild

####
local_machine# ipsecctl -sa
FLOWS:
flow esp in from 10.0.100.0/24 to 240.240.10.69 peer 240.240.10.70 srcid 
FQDN/desk.pk dstid FQDN/fw63 type use
flow esp out from 240.240.10.69 to 10.0.100.0/24 peer 240.240.10.70 srcid 
FQDN/desk.pk dstid FQDN/fw63 type require
flow esp out from ::/0 to ::/0 type deny

SAD:
esp tunnel from 240.240.10.69 to 240.240.10.70 spi 0x3428e2ee auth 
hmac-sha2-256 enc aes-256
esp tunnel from 240.240.10.70 to 240.240.10.69 spi 0x4b96dca8 auth 
hmac-sha2-256 enc aes-256


####
remote_gateway/NAT# cat /etc/iked.conf | grep "^[^#;]"
local_lan_FW70     =     "10.0.100.0/24"
remote_desk_RDK    =     "240.240.10.69"
ikev2 quick active esp \
from $local_lan_FW70 to $remote_desk_RDK peer $remote_desk_RDK \
psk "aaa"

####
remote_gateway/NAT# cat /etc/pf.conf | grep "^[^#;]"
sql_soe         = "10.0.100.123"
ssh_port        = "1071"
icmp_types      = "{ echoreq, unreach }"
ssh_soe_int     = "1071"
ssh_soe_ext     = "22123"
set block-policy drop           
set optimization normal 
set ruleset-optimization basic  
set skip on lo
set fingerprints "/dev/null"
antispoof quick for lo0
block all
match out log on egress from vr3:network nat-to egress:0
match in all scrub (no-df random-id)
match out all scrub (no-df random-id) 
table <vpn_peers> const {240.240.10.96, 240.240.10.69 }
pass out quick on egress proto esp from (egress:0) to <vpn_peers>               
   keep state
pass out quick on egress proto udp from (egress:0) to <vpn_peers> port {500, 
4500} keep state
pass  in quick on egress proto esp from <vpn_peers> to (egress:0)               
   keep state
pass  in quick on egress proto udp from <vpn_peers> to (egress:0) port {500, 
4500} keep state
pass out quick on trust received-on enc0 keep state
pass out log proto tcp keep state
pass log proto udp keep state
pass in log quick inet proto tcp from any to egress port $ssh_port flags S/SA 
keep state
pass in log quick on egress inet proto tcp from any to egress port $ssh_soe_ext 
rdr-to $sql_soe port $ssh_soe_int keep state
pass inet proto icmp all icmp-type $icmp_types keep state
pass log inet proto { tcp, udp, esp } from vr3:network to any keep state 
block in log on ! lo0 proto tcp to port 6000:6010

####
remote_gateway/NAT# ipsecctl -sa
FLOWS:
flow esp in from 240.240.10.69 to 10.0.100.0/24 peer 240.240.10.69 srcid 
FQDN/fw63 dstid FQDN/desk.pk type use
flow esp out from 10.0.100.0/24 to 240.240.10.69 peer 240.240.10.69 srcid 
FQDN/fw63 dstid FQDN/desk.pk type require
flow esp out from ::/0 to ::/0 type deny

SAD:
esp tunnel from 240.240.10.70 to 240.240.10.69 spi 0x09952f16 auth 
hmac-sha2-256 enc aes-256
esp tunnel from 240.240.10.70 to 240.240.10.69 spi 0x216a3871 auth 
hmac-sha2-256 enc aes-256
esp tunnel from 240.240.10.69 to 240.240.10.70 spi 0x3428e2ee auth 
hmac-sha2-256 enc aes-256
esp tunnel from 240.240.10.70 to 240.240.10.69 spi 0x4b96dca8 auth 
hmac-sha2-256 enc aes-256
esp tunnel from 240.240.10.69 to 240.240.10.70 spi 0x62c0615a auth 
hmac-sha2-256 enc aes-256
esp tunnel from 240.240.10.69 to 240.240.10.70 spi 0x97cc9e5f auth 
hmac-sha2-256 enc aes-256


####
remoteLAN_machine# cat /etc/pf.conf | grep "^[^#;]"
set skip on {lo, enc}
match in all scrub (no-df random-id)
match out all scrub (no-df random-id)
pass all




-- 
radek

Reply via email to