I suspect they have mislead you and the VPN is really using IPSec.

The easiest way to find out is add a block log all rule at the top.
Review the log with tcpdump and see what is being dropped.

I assume this is a typo:

> block drop in quick inet from 177.7.7..7 to any

Regards
Lloyd

Luis Mendes wrote:

> Hi,
> 
> I've a corporate laptop that uses Forticlient to establish a VPN
> connection to corporate resources.
> 
> When working at home, when this corporate laptop is connected through the ISP
> router, there's no problem connecting to the VPN server.
> 
> Now, I'm setting up my own OpenBSD 7.7 amd64 router/firewall.
> 
> Using simple NAT rules, other systems can connect fine to the Internet, also 
> the corporate
> laptop can connect fine for everything except the VPN resources.
> When I try to connect the VPN, Forticlient 2.7.8.1140 returns:
> "a network error prevented updates from being downloaded".
> 
> I asked in the community Fortinet forum about this and was told by a power 
> user that:
> (https://community.fortinet.com/t5/Support-Forum/How-to-configure-home-router-firewall-to-allow-Forticlient/m-p/411072)
> 
> """
> No special rule needed, except need to open the outgoing connection to the 
> remote SSL VPN server IP:port (usually TCP 443 or 10443).
> 
> NAT is fully supported.
> """
> 
> 
> Here's my router/firewall configuration:
> 
> # uname -a
> OpenBSD futro2.Home 7.7 GENERIC.MP#625 amd64
> 
> # sysctl -a | grep forwarding
> net.inet.ip.forwarding=1
> net.inet.ip.mforwarding=0
> net.inet6.ip6.forwarding=0
> net.inet6.ip6.mforwarding=0
> 
> # dhcpd -f
> Multiple interfaces match the same subnet: em0 ure0
> Multiple interfaces match the same shared network: em0 ure0
> Listening on ure0 (192.168.1.253).
> Can't listen on re0 - dhcpd.conf has no subnet declaration for 17.7.7.7.
> Can't listen on em1 - it has no IP address.
> Listening on em0 (192.168.1.252).
> DHCPREQUEST for 192.168.1.7 from cc:....... via ure0
> DHCPACK on 192.168.1.7 to cc:....... via ure0
> DHCPREQUEST for 192.168.1.12 from 38:........... via ure0
> DHCPACK on 192.168.1.12 to 38:.......... via ure0
> DHCPINFORM from 192.168.1.12
> DHCPACK to 192.168.1.12 (38:...........) via ure0
> 
> DHCPINFORM from 192.168.1.12
> DHCPACK to 192.168.1.12 (38:............) via ure0
> 
> The corporate laptop receives 192.168.1.12 IP.
> 
> 
> # pfctl -s rules
> match in all scrub (no-df random-id max-mss 1440)
> match out on egress inet from ! (egress:network) to any nat-to (egress:0) 
> round-robin
> block drop in quick on egress from <martians> to any
> 
> block return out quick on egress from any to <martians>
> 
> pass out all flags S/SA
> pass quick on ure0 all flags S/SA
> block drop in quick on ! egress inet from 17.7.7.0/24 to any
> block drop in quick inet from 177.7.7..7 to any
> block drop in quick on ! re0 inet from 17.7.7.0/24 to any
> pass inet proto icmp all
> anchor "ftp-proxy/" all
> pass in quick inet proto tcp from any to any port = 21 flags S/SA divert-to 
> 127.0.0.1 port 8021
> anchor "relayd/" all
> pass out on re0 inet from 192.168.1.0 to any flags S/SA nat-to (re0) 
> round-robin
> pass in log on egress proto tcp from any to (egress) port = 22 flags S/SA
> pass in on ure0 proto tcp from any to any port = 80 flags S/SA
> pass in on ure0 proto tcp from any to any port = 443 flags S/SA
> pass in log on ure0 inet proto tcp from 192.168.1.0 to any port = 5901 flags 
> S/SA
> pass in quick on ure0 inet proto tcp from 192.168.1.0 to any port = 22104 
> flags S/SA
> pass in quick on ure0 inet proto udp from any port = 67 to any port = 68
> pass in quick on ure0 proto tcp from any to any port = 853 flags S/SA
> pass in quick on ure0 proto udp from any to any port = 53
> pass in quick on re0 proto tcp from any to any port = 853 flags S/SA
> pass in quick on re0 proto udp from any to any port = 53
> block return in on ! lo0 proto tcp from any to any port 6000:6010
> 
> 
> It seems that 'pfctl -s nat' is no longer available.
> 
> 
> Can you please tell me what am I missing or doing wrong?
> 
> Thanks,
> 
> 
> Luís Mendes

Reply via email to