On 11/1/06, Tom Eastep <[EMAIL PROTECTED]> wrote:
>
> The fact that the firewall's external IP is not part of the defined Security
> Policies is often the cause of the problem originally reported. I perfer to
> define additional SPs to handle that traffic (see
> http://www.shorewall.net/IPSEC-2.6.html for an example).
>
> Disclaimer: I haven't actually tried either of the following as an 
> alternative.
>
> a) Routing Approach
>
> Suppose that SPs are defined between 192.168.100.0/24 (the local network) and
> 192.168.200.0/24 (the remote network). Furthermore suppose that the firewall's
> internet interface is eth0 and the local interface is eth1 with IP address
> 192.168.100.254.
>
> The route that is required then is:
>
>         ip route add 192.168.200.0/24 dev eth0 src 192.168.100.254
>
> Cyber Dog -- is that basically what you did?
>

Yes, that's just about exactly the setup/solution.  It works fine
really, the route can be added automatically via
/etc/network/interfaces

I asked mostly out of curiosity.

> b) Masq Approach
>
> You might also be able to finesse IPSEC with a rule in your 
> /etc/shorewall/masq
> file:
>
>         eth0:192.168.200.0/24   <external fw IP>        192.168.100.254

Also cool.

>
> -Tom
> --
> Tom Eastep    \ Nothing is foolproof to a sufficiently talented fool
> Shoreline,     \ http://shorewall.net
> Washington USA  \ [EMAIL PROTECTED]
> PGP Public Key   \ https://lists.shorewall.net/teastep.pgp.key
>
>
>

Thanks-

-------------------------------------------------------------------------
Using Tomcat but need to do more? Need to support web services, security?
Get stuff done quickly with pre-integrated technology to make your job easier
Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo
http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642
_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to