Tom Eastep wrote:
>>You need four additional SPD entries:
>>
>>Traffic from site1->site2 use tunnel from site1 to fw
>>Traffic from site1->site2 use tunnel from fw to site2
>>Traffic from site2->site1 use tunnel from site2 to fw
>>Traffic from site2->site1 use tunnel from fw to site1
>>
>
>But not
Tom Eastep wrote:
You need four additional SPD entries:
Traffic from site1->site2 use tunnel from site1 to fw
Traffic from site1->site2 use tunnel from fw to site2
Traffic from site2->site1 use tunnel from site2 to fw
Traffic from site2->site1 use tunnel from fw to site1
But note that if yo
Alan Madill wrote:
Tom Eastep wrote:
Tom Eastep wrote:
Alan Madill wrote:
Hi,
I want to connect two satellite offices to a main office using
openswan and ipsec vpn.
SatSite1 --- Main --- SatSite2
192.168.30.0/24 --- 1.1.1.1 --- 2.2.2.2 --- 192.168.20.0/24 ---
2.2.2.2 --- 3.3.3.3 --- 1
Tom Eastep wrote:
> Tom Eastep wrote:
>> Alan Madill wrote:
>>> Hi,
>>>
>>> I want to connect two satellite offices to a main office using
>>> openswan and ipsec vpn.
>>> SatSite1 --- Main --- SatSite2
>>> 192.168.30.0/24 --- 1.1.1.1 --- 2.2.2.2 --- 192.168.20.0/24 ---
>>> 2.2.2.2 --- 3.3.3
mess-mate wrote:
Tom Eastep wrote:
mess-mate wrote:
Hi,
can anybody help me translate this iptable to a shorewall rule :
iptables -t NAT -A POSTROUTING -s GUEST_IP -j SNAT --to-source HOST_IP
Host ip = xx.xx.xx.xx, guest ip subnet is yy.yy.yy.yy/255.255.255.0
*
What problem are you tryin
Tom Eastep wrote:
> mess-mate wrote:
>> Hi,
>>
>> can anybody help me translate this iptable to a shorewall rule :
>>
>> iptables -t NAT -A POSTROUTING -s GUEST_IP -j SNAT --to-source HOST_IP
>>
>> Host ip = xx.xx.xx.xx, guest ip subnet is yy.yy.yy.yy/255.255.255.0
>> *
>
> What problem are you
Tom Eastep wrote:
Alan Madill wrote:
Hi,
I want to connect two satellite offices to a main office using
openswan and ipsec vpn.
SatSite1 --- Main --- SatSite2
192.168.30.0/24 --- 1.1.1.1 --- 2.2.2.2 --- 192.168.20.0/24 ---
2.2.2.2 --- 3.3.3.3 --- 192.168.25.0/24
Where 1.1.1.1, 2.2.2.2, a
Alan Madill wrote:
Hi,
I want to connect two satellite offices to a main office using openswan
and ipsec vpn.
SatSite1 --- Main --- SatSite2
192.168.30.0/24 --- 1.1.1.1 --- 2.2.2.2 --- 192.168.20.0/24 --- 2.2.2.2
--- 3.3.3.3 --- 192.168.25.0/24
Where 1.1.1.1, 2.2.2.2, and 3.3.3.3 are th
Hi,
I want to connect two satellite offices to a main office using openswan
and ipsec vpn.
SatSite1 --- Main --- SatSite2
192.168.30.0/24 --- 1.1.1.1 --- 2.2.2.2 --- 192.168.20.0/24 --- 2.2.2.2
--- 3.3.3.3 --- 192.168.25.0/24
Where 1.1.1.1, 2.2.2.2, and 3.3.3.3 are the public ip addresses
mess-mate wrote:
Hi,
can anybody help me translate this iptable to a shorewall rule :
iptables -t NAT -A POSTROUTING -s GUEST_IP -j SNAT --to-source HOST_IP
Host ip = xx.xx.xx.xx, guest ip subnet is yy.yy.yy.yy/255.255.255.0
*
What problem are you trying to solve? I would be surprised if y
mess-mate wrote:
> Hi,
>
> i can't solve this reject :
>
> serv kernel: Shorewall:dmz2all:REJECT:IN=eth1 OUT=
> MAC=00:e0:29:3c:34:bd:00:a0:cc:3f:48:3e:08:00 SRC=192.168.20.254
> DST=192.168.30.1 LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP
> TYPE=8 CODE=0 ID=61822 SEQ=2
>
>
> This messa
Hi,
i can't solve this reject :
serv kernel: Shorewall:dmz2all:REJECT:IN=eth1 OUT=
MAC=00:e0:29:3c:34:bd:00:a0:cc:3f:48:3e:08:00 SRC=192.168.20.254
DST=192.168.30.1 LEN=84 TOS=0x00 PREC=0x00 TTL=64 ID=0 DF PROTO=ICMP
TYPE=8 CODE=0 ID=61822 SEQ=2
This message is coming from 192.168.20. (the host
Hi,
can anybody help me translate this iptable to a shorewall rule :
iptables -t NAT -A POSTROUTING -s GUEST_IP -j SNAT --to-source HOST_IP
Host ip = xx.xx.xx.xx, guest ip subnet is yy.yy.yy.yy/255.255.255.0
*
*Thanks in advance.
*
*
--
mess-mate
13 matches
Mail list logo