You don’t have to configure /etc/hostname.enc0, I think. How about remove it 
and then check if this happen again?

> On Jul 6, 2019, at 3:40 AM, David Anthony <[email protected]> wrote:
> 
> Hello,
> 
> I have an IKEv2 VPN server setup with OpenBSD + IKED + PF. Everything is 
> working properly - a single client device will properly route all traffic 
> through the VPN and exit from the VPN server via PF + NAT.
> 
> However, I experience errors with two clients simultaneously connecting. Both 
> clients appear to successfully connect, but I believe NAT issues are 
> preventing traffic from leaving the box, or confusing the two client traffic 
> streams during NAT. I’m looking for any clues / suggestions which may help 
> achieve my use case.
> 
> The internet suggests using unique “from CLIENTIPADDR” clauses for each 
> potential client in /etc/iked.conf - but I can’t tell ahead of time which 
> CIDR ranges my devices will be connecting from (Especially roaming cell 
> phones). Also, in some cases I may have two devices connecting from the same 
> CIDR range. I’m not even sure it’s an IKED issue, rather NAT.
> 
> Respectfully,
> David Anthony
> 
> /etc/pf.conf
>       set skip on lo
>       block return
>       match out on vio0 from 10.0.0.0/24 to any nat-to vio0
>       pass
>       block return in on ! lo0 proto tcp to port 6000:6010
>       block return out log proto {tcp udp} user _pbuild
> 
> /etc/iked.conf
>       ikev2 “inet” esp \
>               from 0.0.0.0/0 to 10.0.0.0/24 \
>               peer any \
>               psk “foobar” \
>               config address 10.0.0.64/27 \
>               config name-server 10.0.0.1 \
>               config protected-subnet 0.0.0.0/0
> 
> /etc/hostname.enc0
>       inet 10.0.0.1 255.255.255.0 10.0.0.255
>       up
> 
> /etc/rc.conf.local
>       iked_flags=
>       unbound_flags=
> 
> /etc/sysctl.conf
>       net.inet.ip.forwarding=1
>       net.inet.esp.enable=1
>       net.inet.ah.enable=1
>       net.inet.ipcomp.enable=1

Reply via email to