Does the releases before 8/07 release of Solaris 10 support this
ipfileter feature?   

Paul Wernau wrote:
>>> I rewrote this rule as the below, but it still didn't work, and 
>>> packets originated from 192.168.1.16 had never been encapsulated via

>>> IP-IP and tunneled to 10.20.4.108.
>>> 
>>> # ipfstat -io
>>> pass out quick on bge0 to ip.tun0:10.20.4.108 from 192.168.1.16/32
to
>
>>> any empty list for ipfilter(in)
>>> 
>>
>>I actually think you want something more like this (with in):
>>
>>pass in quick on bge0 to ip.tun0:10.20.4.108 from 192.168.1.16/32 to
>any
>>
>>at least from my tests here with a one-interface host I can get the
>>packets to go out over a simple tunnel that way.
>>
>
>192.168.1.16 is a local IP, and this packet is originated from local
>host. 
>So I think it should be "out".
> 
>Could you paste your configuration? I can try it here.  
>
>>> this is my VPN configuration,
>>> 
>>
>>You're calling it a VPN configuration and/or IPsec tunnel, but it
looks
>>like a simple IP-in-IP tunnel to me.
>>
>
>Yes, I already removed encr_algs and encr_auth_algs from this IP-in-IP
>tunnel configuration.
>
>>> # ifconfig ip.tun0
>>> ip.tun0: flags=10008d1<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST,IPv4>
>mtu
>>> 1480 index 9
>>>        inet tunnel src 10.0.110.56 tunnel dst 10.20.4.16
>>>        tunnel hop limit 60 
>>>     inet 192.168.0.56 --> 10.20.4.108 netmask ffffff00
>>> 
>>
>>You should either see something about encryption algorithms on here or
>a
>>reference to see ipsecconf(1m).  Otherwise you are simply routing over
>>the tunnel in the clear and not providing any security.  Can you
>clarify
>>here?  You can create rules with ipsecconf with the "negotiate tunnel"
>>keyword and allow only packets from 192.168.1.16 to be routed over the
>>IPsec protected tunnel, with everything else being dropped.
>>
>
>Here I removed the security policy just becase I want to see the clear
>packets with ethereal, which are not encapsulated 
>in ESP.
>
>>> So my intention is to do source routing using ipf rules .
>>> 
>>> Actually I can ping 10.20.4.108 via this tunnel, which means the
>tunnel
>>> works.
>>
>>I'm a bit confused, though.  Why not just use IPsec and tunnels
>>normally?  Why the source routing?  Is it because you want to restrict
>>the tunnel to just one IP address?  Or this there something else we're
>>missing?
>>
>I just want all the packets orginating from local 10.20.4.16 will go
>through this tunnel. 
>
>>There's some examples here you might want to look at:
>>
>>http://docs.sun.com/app/docs/doc/816-4554/ipsec-mgtasks-5?l=en&a=view&;
q
>=negotiate+tunnel
>>
>
>Thanks!! 
>
>>If you created your ipsecconf(1m) rule like this:
>>
>>{ tunnel ip.tun0 negotiate tunnel laddr 192.168.1.16 } ipsec {
>>[fill-in-encryption-algorithms....] }
>>
>>and set up routing and IKE, it seems like it would accomplish your
>goal.
>> Only packets originating from 192.168.1.16 would be allowed over the
>>tunnel.
>>
>
>What you mean here is "allowed". Will all the traffic go through this
>tunnel regardless of its destination?
>_______________________________________________
>networking-discuss mailing list
>[email protected]
>
_______________________________________________
networking-discuss mailing list
[email protected]

Reply via email to