G Georgiev wrote:
> OK,
>
> Found a solution - if some is interested - assigned the near end of
> the IPSEC tunnel address to the internal interface; this way got a
> POSTROUTING chain available and did an SNAT there:
>
> ip addr add 10.253.0.2 dev eth0;
> ip route add to unicast 192.168.4.0/24 via 10.253.0.2
> iptables -t nat -A POSTROUTING -d 192.168.4.0/24 -j SNAT --to 10.253.0.2
>
> Looks to work just fine, despite being not so 'clean' - I would
> prefer
> to have a separate interface for the VPN, not to assign an alias to eth0.
> Does not work with lo instead of eth0.
A few hints:
- lo doesn't work because IPsec is disabled by default on loopback.
Check /proc/sys/net/ipv4/conf/<dev>/disable_{policy,xfrm}. If
you disable rp_filter you can even route the IPsec network to
lo and it will work (or use dummy if working with a seperate
interface makes it easier for your).
- you don't need the extra address and route, just SNAT is enough
- The policy match can be used to express something similar to
"-i ipsec0" and "-o ipsec0".
_______________________________________________
LARTC mailing list
[email protected]
http://mailman.ds9a.nl/cgi-bin/mailman/listinfo/lartc