I was working through the openvpn material, and had been 
testing with the following design checklist (see bottom)

The thought is to provide a hub and spoke design for isolated
non-routable subnets at the end of the spokes, behind
otherwise properly routed outbound-only NATting (which allow 
return packets ...), where there is available a central
routable IP hub available (to allow static custom routing 
between those subnets).

I can ping, and indeed set up an SSH session, out to the hub,
which indicates that encapsulation of TCP within the OpenVPN
client is occurring -- I leave encryption off, as I am in
process diagnosing where things are falling apart --

-- after a couple minutes, it locks up tight, and I have 
to go kill the remote Hub routing, out of band.

As such, I have not gotten the second subnet set up yet.

The tracing shows packets for a while, but then the consoles 
lock (in which the tracing is occurring), and I cannot 
ctrl-C to regain control.  Network connectivity remains active 
-- I can work out of band on the Hub, the enar spoke terminus 
is local ...

Any thoughts on a theoretical reason this should not work?

-- Russ Herrold

=============================================================

Hub and Spoke Topology:

HUB x.y.z.a is a static IP, in routable space -- all other
devices are masqueraded, and not reachible from the outside,

The VPN gateway will encapsulate VPN network destination traffic into the
TUN interface, and pass the rest along to the next hop exterior NAT device

Subnets:

                         |
           10.1.1.1      |
client --- gateway ---- NAT ------ internet ----- HUB
10.1.1.2      |       10.1.1.254    0.0.0.0     x.y.z.a
              \          |
               \--- 192.168.1.2 ----------- 192.168.1.1
                         |         P-t-P
     10.1.1.x segment    |
                        /
-----------------------/



                         |
          10.10.10.1     |
client --- gateway ---- NAT ------ internet ----- HUB
10.10.10.2    |      10.10.10.254   0.0.0.0     x.y.z.a
              \          |
               \--- 192.168.10.2 ----------- 192.168.10.1
                         |          P-t-P
     10.10.10.x segment  |
                        /
-----------------------/


Routing:

on VPN gateway-10.1.1.1

( next hop: route add default gateway 10.1.1.254 )
route add -host 192.168.1.1 gateway 192.168.1.2
route add -net 10.0.0.0 gateway 192.168.1.1


on VPN gateway-10.10.10.1

( next hop: route add default gateway 10.10.10.254 )
route add -host 192.168.10.1 gateway 192.168.10.2
route add -net 10.0.0.0 gateway 192.168.10.1


on HUB -- simple reciprocal routing for each VPN'd subnet

route add -host 192.168.1.2 gateway 192.168.1.1
route add -net 10.1.1.0 gateway 192.168.1.2
route add -host 192.168.10.2 gateway 192.168.10.1
route add -net 10.10.10.0 gateway 192.168.10.2


Local gateway behind NAT

        modprobe tun
        echo 1 > /proc/sys/net/ipv4/ip_forward   
        openvpn --remote x.y.z.a --dev tun --port 5001 \
                --ifconfig 192.168.1.2 192.168.1.1 --verb 8

Local gateway behind NAT

        modprobe tun
        echo 1 > /proc/sys/net/ipv4/ip_forward   
        openvpn --remote x.y.z.a --dev tun --port 5010 \
                --ifconfig 192.168.10.2 192.168.10.1 --verb 8

Central HUB (== x.y.z.a )

        modprobe tun
        echo 1 > /proc/sys/net/ipv4/ip_forward
        openvpn --dev tun --port 5001 \
                --ifconfig 192.168.1.1 192.168.1.2 --verb 8
        openvpn --dev tun --port 5010 \
                --ifconfig 192.168.10.1 192.168.10.2 --verb 8

===================================


Reply via email to