Wow, quite a long setup, but after thinking thru this, it all makes sense!

Thanks for the reply
Brad

On Wednesday 07 June 2006 15:57, Holger Bauer wrote:
> You need parallel tunnels for both connections to work (explanation why at
> the bottom):
>
> At remote Site 1:
>
> Tunnel1 to corefirewall:
> local subnet: LAN
> remote subnet: LAN subnet of Corefirewall
>
> Tunnel2 to corefirewall:
> local subnet: LAN
> remote subnet: LAN of Remote Site 2 (!)
>
> -----------------------------------------------
> Same for remote Site 2:
>
> Tunnel1 to corefirewall:
> local subnet: LAN
> remote subnet: LAN subnet of Corefirewall
>
> Tunnel2 to corefirewall:
> local subnet: LAN
> remote subnet: LAN of Remote Site 1 (!)
>
> ------------------------------------------------
> Corefirewall:
>
> Tunnel1 to remote Site 1:
> local subnet: LAN
> remote subnet: LAN subnet of remote Site 1
>
> Tunnel2 to remote Site 1:
> local subnet: LAN of remote Site 2 (!)
> remote subnet: LAN of Remote Site 1
>
> Tunnel 3 to remote Site 2:
> local subnet: LAN
> remote subnet: LAN subnet of remote Site 2
>
> Tunnel4 to remote Site 2:
> local subnet: LAN of remote Site 1 (!)
> remote subnet: LAN of remote Site 2
>
> ------------------------------------------------
>
> To be able to divide the parallel Tunnels as they run between the same
> public IPs you need to work with unique Identifiers for the tunnels. Create
> a set of preshared keys for the tunnels.
>
> Btw, this doesn't work for a mobile Client setup as you can't set more than
> one local subnet at the static end.
>
> So why is it complicated like this? Traffic with destination to remote site
> 2 doesn't match the tunneldefinition you have between remote site 1 and
> corefirewall, so the traffic won't be encapsulated into the tunnel but goes
> out your real WAN. Static routes can't fix this.
>
> Will this change in an upcoming version of pfSense? I hope that but for
> version 1.0 it has to be done this way.
>
>
> Holger
>
> > -----Original Message-----
> > From: Bill Marquette [mailto:[EMAIL PROTECTED]
> > Sent: Wednesday, June 07, 2006 7:56 PM
> > To: support@pfsense.com
> > Subject: Re: [pfSense Support] IPSEC Firewall Rules
> >
> >
> > Not sure that we enable tunnel to tunnel routing.  Not sure if there's
> > an option either, but that's what I'd look for.
> >
> > --Bill
> >
> > On 6/7/06, Brad Bendy <[EMAIL PROTECTED]> wrote:
> > > Hello,
> > >
> > > I have a setup as follows:
> > >         Core-Firewall
> > >        -                     -
> > >      -                         -
> > >    -                            -
> > > Remote-Site-1           Remote-Site-2
> > >
> > > From the Core I can ping both remote sites, no problems.
> >
> > But I cannot get
> >
> > > traffic (ICMP or TCP/UDP) from remote-site-2 to remote-site-1. All 3
> > > firewalls have the default LAN rules as allow all from LAN
> >
> > subnet, to all
> >
> > > others. On the Core firewall, I also added a rule where the
> >
> > source is subnet
> >
> > > is allowed to all other subnets.
> > >
> > > Any clue what causes this, something else that I am missing?
> > >
> > > Any help would be great.
> > >
> > > Thanks!
> > > Brad
> >
> > ---------------------------------------------------------------------
> >
> > > To unsubscribe, e-mail: [EMAIL PROTECTED]
> > > For additional commands, e-mail: [EMAIL PROTECTED]
> >
> > ---------------------------------------------------------------------
> > To unsubscribe, e-mail: [EMAIL PROTECTED]
> > For additional commands, e-mail: [EMAIL PROTECTED]
>
> ____________
> Virus checked by G DATA AntiVirusKit
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to