On Fri, May 27 2011 at 07:16, Oeschger Patrick wrote:
> *hmmm*
*hmmm*,

> i did a test using ipsec vpn colouring aka. tagging
> ipsec.conf offers the option to tag the vpn traffic for further PF filtering
> using these tags i can instruct PF to use different public NAT addresses
> (outgoing to internet) for each VPN
> but when you have overlapping subnets behind the VPNs then it it difficult to
> get the reply traffic into the right VPN
> maybe i am missing something here...
Why not using the "local" keyword of ipsec.conf for outgoing address 
instead of NAT ?

> I expected some feature so tagged traffic will be routed into the VPN carrying
> the same tag (...somehow...)
> did some tests using 'reply-to' in pf rules but that did not work... - an a
> default route will not help because i have many VPN all overlapping in worst
> case
> any ideas? an important option i missed?
Using ipsec tunnels in different rdomains to manage overlapping easily?
(Thanks to Reyk to clarify the usage of ipsec+rdomain)

Claer

Reply via email to