On Mon, 03 Sep 2007 20:26:14 -0400, Paolo Supino wrote:

>Hi RW
> 
>  Except for the branch VPN to the main office subnet (line# 3) I have
>the other IPSEC rules: peer to peer, 2 subnets to 1 subnet (and vice
>versa on the main office VPN peer). Why do I need to setup a tunnel
>between the branch firewall and main office subnet?
>
>
>
>
>TIA
>Paolo
>
>
>RW wrote:
>
>>On Mon, 03 Sep 2007 17:15:02 -0400, Paolo Supino wrote:
>>
>>  
>>
>>>Hi
>>>
>>> I have a firewall that also acts as a VPN peer for 2 VPNs. One of
>>>the VPNs is IPSEC that connects between the main office and a branch
>>>office. The second VPN is OpenVPN that connects windows based road
>>>warriors to the branch office. I want to enable employees that connect
>>>to the branch's OpenVPN to reach the main office servers (and filter
>>>traffic to). Both VPNs are working so the appropriate routing entries
>>>exist in the  firewall's routing table. Even if I disable all the
>>>firewall rules and just let everything pass through the firewall the
>>>OpenVPN clients still cannot reach the main office servers. What am
>>>I missing?
>>>    
>>>
>>
>>I'll bet you don't have some flows set up in ipsec.conf to handle it.
>> Here is a simple ipsec.conf from one end of an ipsec tunnel where
>>OpenVPN clients also login:
>>ike esp from 10.10.8.0/24 to 172.22.3.0/24 peer 250.101.222.1
>>ike esp from 172.22.2.0/24 to 172.22.3.0/24 peer 250.101.222.1
>>ike esp from 195.228.107.202 to 172.22.3.0/24 peer 250.101.222.1
>>ike esp from 195.228.107.202 to 250.101.222.1
>>
>>The first line adds the OpenVPN network to the mix.
>>
>>Needless to say the other end of the tunnel has an ipsec.conf that
>>makes sure that traffic can return.
>>
>>Fictional addresses used to protect the innocent...
>>
>>Does that help?
>>Please reply to the list. I am subscribed and don't need a cc, thanks.
>>
>>Rod/

I don't know your setup because you didn't explain it fully but what I
showed you works for my client.

Let's make a symbolic ipsec.conf out of what I have shown you:
ike esp from $OpenVPNlan to $HOlan peer $HOfirewall
ike esp from $Branchlan to $HOlan peer $HOfirewall
ike esp from $BranchFW to $HOlan peer $HOfirewall
ike esp from $BranchFW to $HOfirewall
You cannot use macros like that but perhaps it makes it clearer.

In our case we have servers on both office LANs and the roadies using
OpenVPN need to be able to get to both.

You will have to trim and tweak your rules to suit your own variation
but think about this.

Regular route table entries have no influence on what happens with
IPsec and do not need to.
IPsec configuration sets up flows and then the packets "know" how to
get to their target.
If they don't have a flow path, they won't "know" how and will be
routed out to the cloud via the default gateway and then get lost.

Rod/

Hint. Read this:
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
A: Top-posting.
Q: What is the most annoying thing in e-mail?


Rod/
>From the land "down under": Australia.
Do we look <umop apisdn> from up over?

Reply via email to