On 2015-04-01 22:55, Rajiv Kulkarni wrote:
Hi
Maybe the attached ipsec.conf files for Hub and spokes (2 spokes)
would be useful. It worked for me nicely in my setup which is also
attached
PS: The attachment is a rar file (zipped using winrar)
thanks regards
rajiv
On Sun, Mar 29, 2015 at
Hi
Maybe the attached ipsec.conf files for Hub and spokes (2 spokes) would be
useful. It worked for me nicely in my setup which is also attached
PS: The attachment is a rar file (zipped using winrar)
thanks regards
rajiv
On Sun, Mar 29, 2015 at 2:43 AM, Noel Kuntze n...@familie-kuntze.de
On 2015-03-28 23:13, Noel Kuntze wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello Aleksey
You need to define every net-to-net tunnel manually in ipsec.conf or
swanctl.conf.
The tunneled subnets for every spoke configuration on the hub would be
leftsubnet=allOtherSpokeNetworks
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello Aleksey,
The problem of what you want to do is, that you can only
use hosts as gateway, that you can reach directly on layer two.
So you cannot do that over an IPsec tunnel.
The way to make that happen is to mark the traffic, that you want to
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Hello Aleksey
You need to define every net-to-net tunnel manually in ipsec.conf or
swanctl.conf.
The tunneled subnets for every spoke configuration on the hub would be
leftsubnet=allOtherSpokeNetworks
rightsubnet=SpokeNetwork
On the
Hi guys!
Is there a way to configure strongswan in a site-to-site hub-and-spoke
topology, so for me to have for example strongswan hub in central office
and having multiple spokes whose traffic between each other should be
routed through the central office? I haven't found a guide on the net,