Hi,
I have a fedora32 system with a libreswan IPsec server with
shorewall-5.2.3.5 and having some trouble configuring it to support
connections from a WIndows IPSec VPN. The Windows client connects
properly, but it cannot communicate with the local network.

I already have a host-to-gateway VPN using libreswan between this
server and another Linux host working properly, but the Windows client
is configured differently with libreswan so it needs to connect to a
different network.

The network looks like this:
Internet -> orion (68.195.111.42) -> internal network 1 (192.168.1.0/24)
                                                    -> internal
network 2 (192.168.6.0/24)

internal network 2 is the network used for the Windows clients. I'd
like to be able to connect these clients to the internal network 1. I
can currently ping the internal network 2 from a Windows client
connected to the libreswan server.

When trying to ping the internal network 1 from the Windows client,
there is no response, and using tcpdump appears to show no traffic.

The external interface on the server is br0 and the internal network 2
is on eth1:2. Is it necessary to add the eth1:2 interface (or just
eth1) to the hosts file for the VPN?

Also, if I start shorewall before bringing up the vpn for the client,
how are the rules for it created?

# ip route
default via 68.195.111.41 dev br0
68.195.111.40/29 dev br0 proto kernel scope link src 68.195.111.42
192.168.1.0/24 dev eth1 proto kernel scope link src 192.168.1.1
192.168.6.0/24 dev eth1 proto kernel scope link src 192.168.6.1
192.168.6.2 dev br0 scope link
192.168.122.0/24 dev virbr0 proto kernel scope link src 192.168.122.1 linkdown

/etc/shorewall/tunnels
ipsec   ext             0.0.0.0/0

# cat policy|grep vpn
vpn     vpn     ACCEPT
int     vpn     ACCEPT
vpn     int     ACCEPT
fw      vpn     ACCEPT
vpn     fw      ACCEPT
vpn     ext     ACCEPT
ext     vpn     ACCEPT

/etc/shorewall/zones
vpn     ipsec   mode=tunnel     mss=1400

/etc/shorewall/hosts
vpn             br0:0.0.0.0/0   ipsec

shorewall show ip
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN
group default qlen 1000
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
3: eth1: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP
group default qlen 1000
    altname enp5s0f1
    inet 192.168.1.1/24 brd 192.168.1.255 scope global eth1
       valid_lft forever preferred_lft forever
    inet 192.168.6.1/24 brd 192.168.6.255 scope global eth1:2
       valid_lft forever preferred_lft forever
    inet 192.168.1.2/24 brd 192.168.1.255 scope global secondary eth1:0
       valid_lft forever preferred_lft forever
    inet 192.168.1.100/24 brd 192.168.1.255 scope global secondary eth1:1
       valid_lft forever preferred_lft forever
    inet 192.168.1.101/24 brd 192.168.1.255 scope global secondary eth1:3
       valid_lft forever preferred_lft forever
4: br0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state
UP group default qlen 1000
    inet 68.195.111.42/29 brd 68.195.111.47 scope global br0
       valid_lft forever preferred_lft forever
    inet 68.195.193.44/29 brd 68.195.111.47 scope global secondary br0:0
       valid_lft forever preferred_lft forever
6: virbr0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue
state DOWN group default qlen 1000
    inet 192.168.122.1/24 brd 192.168.122.255 scope global virbr0
       valid_lft forever preferred_lft forever

shorewall show ipsec
src 192.168.6.0/24 dst 192.168.6.2/32 uid 0
        dir out action allow index 32617 priority 2084799 ptype main
share any flag  (0x00000000)
        lifetime config:
          limit: soft (INF)(bytes), hard (INF)(bytes)
          limit: soft (INF)(packets), hard (INF)(packets)
          expire add: soft 0(sec), hard 0(sec)
          expire use: soft 0(sec), hard 0(sec)
        lifetime current:
          0(bytes), 0(packets)
          add 2021-01-07 10:43:55 use 2021-01-07 10:45:13
        tmpl src 68.195.111.42 dst 172.58.238.253
                proto esp spi 0x00000000(0) reqid 16417(0x00004021) mode tunnel
                level required share any
                enc-mask ffffffff auth-mask ffffffff comp-mask ffffffff
src 192.168.6.2/32 dst 192.168.6.0/24 uid 0
        dir fwd action allow index 32610 priority 2084799 ptype main
share any flag  (0x00000000)
        lifetime config:
          limit: soft (INF)(bytes), hard (INF)(bytes)
          limit: soft (INF)(packets), hard (INF)(packets)
          expire add: soft 0(sec), hard 0(sec)
          expire use: soft 0(sec), hard 0(sec)
        lifetime current:
          0(bytes), 0(packets)
          add 2021-01-07 10:43:55 use -
        tmpl src 172.58.238.253 dst 68.195.111.42
                proto esp spi 0x00000000(0) reqid 16417(0x00004021) mode tunnel
                level required share any
                enc-mask ffffffff auth-mask ffffffff comp-mask ffffffff
src 192.168.6.2/32 dst 192.168.6.0/24 uid 0
        dir in action allow index 32600 priority 2084799 ptype main
share any flag  (0x00000000)
        lifetime config:
          limit: soft (INF)(bytes), hard (INF)(bytes)
          limit: soft (INF)(packets), hard (INF)(packets)
          expire add: soft 0(sec), hard 0(sec)
          expire use: soft 0(sec), hard 0(sec)
        lifetime current:
          0(bytes), 0(packets)
          add 2021-01-07 10:43:55 use 2021-01-07 10:45:13
        tmpl src 172.58.238.253 dst 68.195.111.42
                proto esp spi 0x00000000(0) reqid 16417(0x00004021) mode tunnel
                level required share any
                enc-mask ffffffff auth-mask ffffffff comp-mask ffffffff

src 172.58.238.253 dst 68.195.111.42
        proto esp spi 0xc1163130(3239457072) reqid 16417(0x00004021) mode tunnel
        replay-window 32 seq 0x00000000 flag af-unspec (0x00100000)
        encap type espinudp sport 27040 dport 4500 addr 0.0.0.0
        anti-replay context: seq 0x4, oseq 0x0, bitmap 0x0000000f
        lifetime config:
          limit: soft (INF)(bytes), hard (INF)(bytes)
          limit: soft (INF)(packets), hard (INF)(packets)
          expire add: soft 0(sec), hard 0(sec)
          expire use: soft 0(sec), hard 0(sec)
        lifetime current:
          240(bytes), 4(packets)
          add 2021-01-07 10:43:55 use 2021-01-07 10:45:10
        stats:
          replay-window 0 replay 0 failed 0
src 68.195.111.42 dst 172.58.238.253
        proto esp spi 0x273a4da8(658132392) reqid 16417(0x00004021) mode tunnel
        replay-window 32 seq 0x00000000 flag af-unspec (0x00100000)
        encap type espinudp sport 4500 dport 27040 addr 0.0.0.0
        anti-replay context: seq 0x0, oseq 0x4, bitmap 0x00000000
        lifetime config:
          limit: soft (INF)(bytes), hard (INF)(bytes)
          limit: soft (INF)(packets), hard (INF)(packets)
          expire add: soft 0(sec), hard 0(sec)
          expire use: soft 0(sec), hard 0(sec)
        lifetime current:
          240(bytes), 4(packets)
          add 2021-01-07 10:43:55 use 2021-01-07 10:45:10
        stats:
          replay-window 0 replay 0 failed 0


_______________________________________________
Shorewall-users mailing list
Shorewall-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/shorewall-users

Reply via email to