I mostly forgot (in terms of being sure how to do it without consulting the doc's) how to use VPN. Here is what I have of docs for PtP IPSec VPN with 2 VPN routers: http://manual.ovislinkcorp.com/8000VPN-example.pdf
All I had to do is to is set Remote and Local LAN subnets on routers web config and routing was done. LAN1 was able to ping LAN2 instantly. I mentioned routing since if that part is not done correctly you will chase your own tail around shorewall and not actual problem. In hosts file you are setting extra IP's or subnets you consider members of the "Local" network/zone. You can even use public IP's for that so you can have access to the firewall. You are not able to access private networks (192.168.0.0./16, 172.16.0.0/12, 10.0.0.0/8) via internet so hosts file helps only with access to public IP's on firewall it self or public IP's behind him. Please not that those 2 rows are just an example, do not just copy them but read docs for hosts file and set your own rules and options. Other that this warning, all that is needed are only rules like mine in hosts file and (of course) rule in policy file that allows zone you used in hosts files (it dos not *have* to be "loc") to access firewall and other zones. Here are my full interfaces, policy, zones and hosts file (from another server without bridging): /etc/shorewall/interfaces: #ZONE INTERFACE BROADCAST OPTIONS net eth0 detect routefilter,blacklist,tcpflags,logmartians,arp_ignore,optional,routeback #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS ONE -- DO NOT REMOVE /etc/shorewall/zones: #ZONE TYPE OPTIONS IN OUT # OPTIONS OPTIONS fw firewall loc ipv4 # kvm ipv4 # net ipv4 # /etc/shorewall/policy: #SOURCE DEST POLICY LOG LIMIT: CONNLIMIT: # LEVEL BURST MASK net net NONE fw net ACCEPT fw kvm ACCEPT loc all ACCEPT kvm all ACCEPT net kvm ACCEPT ## Possible security issue since my firewall's IP is on that subnet !!!!! YMMV. net all DROP info all all REJECT info Do you see "kvm" zone? /etc/shorewall/hosts: #ZONE HOST(S) OPTIONS loc eth0:192.168.200.0/24 routeback,tcpflags loc eth0:192.168.219.0/24 routeback,tcpflags kvm eth0:xxx.yyy.219.88/29 routeback,tcpflags kvm eth0:aaa.bbb.255.72/29 routeback,tcpflags #LAST LINE -- ADD YOUR ENTRIES BEFORE THIS LINE -- DO NOT REMOVE I used "kvm" zone to separate "loc" zone from public IP's of my servers from whom I want to access and then I set access rights to that zone in policy file. "net kvm ACCEPT" stayed when I copied configuration from server with br0 interface, and I am going to rearrange and further test this, possibly delete it or restrict it more, but so far www.grc.com port scanner says I am safe so I will leave it in this example with just warning about it. That is all I am able to help you with, and I think this is all you need to accomplish your goal. Ljubomir Körtvélyesi Péter wrote: > Hi! > > Thanks for your really useful reply Ljubomir! > > The situation is that I can't try these settings out as I will have an > exact weekend (out of office hours) to try out those and I have to > finish that task in time. So I'm just studying the cases now. > > I've learnt that RV082 routers can't route traffic through VPN > http://forums.linksys.com/linksys/board/message?board.id=Wired_Routers&message.id=175 > "How can we configure a static route entry on the RV042 and RV082 to > route 10.200.128.0 traffic via the tunnel that established? The static > entries for advanced routing only allows the selection of LAN or WAN. > As a bonus, it would be great if we could add static route entries to > the VPN tunnel configuration page. This bonus would only activate the > route entry if the VPN tunnel was connected." > > If VPN tunnel works between the two routers (home setup) the subnet of > Shorewall's firewall (LAN1) can't be reached from LAN1? > So what to do in that situation? Getting other types of routers? > > Or if I set a static route on them not telling anything about VPN is > good enough? I mean telling VPN2 to have a static route through VPN1 to > subnet 192.168.2.* and then telling VPN2 to have a static route to LAN1 > through Shorewall FW's net interface (192.168.2.2) to LAN1 192.168.0.* > is good enough? Then again how to set SHorewall? > > loc br0:192.168.2.0/24 routeback,tcpflags (zone between VPN1 and > Shorewall) > loc br0:192.168.1.0/24 routeback,tcpflags (VPN2's LOC2 network) > > > It does everything what I need? > > Sure I have to add a static route from FW to VPN2's LAN2 through VPN1, > and from VPN1 to VPN2's subnet, am I right? > > It is not yet clear for me that these settings provide me the ability to > be able to treat remote LAN2 connecting on net interface to Shorewal as > a local network. > > Any more detailed info is still greatly appreciated! > > Thanks very much! > Peter > > > ------------------------------------------------------------------------ > > ------------------------------------------------------------------------------ > Register Now & Save for Velocity, the Web Performance & Operations > Conference from O'Reilly Media. Velocity features a full day of > expert-led, hands-on workshops and two days of sessions from industry > leaders in dedicated Performance & Operations tracks. Use code vel09scf > and Save an extra 15% before 5/3. http://p.sf.net/sfu/velocityconf > > > ------------------------------------------------------------------------ > > _______________________________________________ > Shorewall-users mailing list > Shorewall-users@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/shorewall-users ------------------------------------------------------------------------------ Register Now & Save for Velocity, the Web Performance & Operations Conference from O'Reilly Media. Velocity features a full day of expert-led, hands-on workshops and two days of sessions from industry leaders in dedicated Performance & Operations tracks. Use code vel09scf and Save an extra 15% before 5/3. http://p.sf.net/sfu/velocityconf _______________________________________________ Shorewall-users mailing list Shorewall-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/shorewall-users