Hi misc,

We have what should be a simple VPN routing issue but I can't figure out what to do with the IPSec config. We have many remote office firewalls with IPSec tunnels linking to our head office (hub and spoke topology), each defining Phase 2 policies mapping the remote internal networks to the head office internal network.

Traffic flows perfectly from local LAN to remote LAN and visa-versa. But I am stuck as to how to configure the tunnels so a daemon on the remote OBSD firewalls themselves can route traffic to the head office internal LAN.

To be specific I have written a script which analyses the interface HFSC queues from 'systat queues' etc, and then 'netcats' the formatted data (throughput rates etc) to our statsd/graphite server for display. It works really well on the head office firewalls which netcat the rates etc to the internal statsd/graphite server which is on the internal LAN, however when running the same script on the remote office firewalls, I have the problem of how to get the netcat payload down the IPSec tunnel to the head office LAN.

When I try to do a ping or otherwise on the remote firewalls to the head office lan, I get a 'no route to host' error which implies that the IPSec vpn policy route which can be seen in the 'route show' is not being used as the source IP of the ping/payload is not going to have the firewalls internal LAN addres to match the policy route etc..

I was thinking about packet tagging, or doing some kind of dirty mangling of sorts, but not sure?

Thanks for your thoughts :)

Andrew Lemin

Reply via email to