On 6/8/2022 1:11 PM, Ed Hunter wrote:
Correction for the zones
zones
tstgw:net ipv4 #TST access gateway
tsgws:tstgw ipsec mode=tunnel mss=1400 #TST VPN
tssft:net ipv4
tssfp:tssft ipsec
On 8 Jun 2022, at 14:00, Ed Hunter <[email protected]> wrote:
Hi everyone,
I have a pretty complex setup on a debian server with a lot of moving parts,
quagga, shorewall and of course strongswan. I am using it as a gateway. This
was not set up by me but I’m administering it so bear with me.
I am trying to set up NAT for a VPN since our subnets are clashing. I must be
missing something along the way since i applied the changes i am going to post
here and i lost access to a lot of things internally.
Ill try to post everything relevant so that i give as much info as possible to
determine the correct way to do this as well as to be able to figure out what
might have been causing my issues when applying the changes.
I have a VPN that is already established with strongswan. This is the config (I
am omitting public IP for obvious reasons.)
conn ld4-csc
auto=start
type=tunnel
left=X.X.X.X
leftsubnet=10.70.66.0/24
leftid=X.X.X.X
leftauth=psk
right=Y.Y.Y.Y
rightsubnet=192.168.95.0/24
rightid=Y.Y.Y.Y
rightauth=psk
# authby=psk
keyexchange=ikev2
ike=aes256-sha256-modp2048!
esp=aes256-sha256-modp2048!
mobike=no
# rekey=no
# reauth=no
keyingtries=3
# margintime=9m
ikelifetime=24h
# rekeyfuzz=100%
lifetime=8h
# pfs=yes
dpddelay=100s
dpdtimeout=300s
dpdaction=restart
The endpoint that needs to be routed from my side is a server with IP
192.168.129.195. The endpoint on the other side of the VPN is 192.168.95.10/32
The other side informed us that the 192.168.129.0/24 subnet is already in use
and clashing on their side so that we NAT the IP on our side.
Please note that i am also using the whole 192.168.0.0/19 on my side for my
VLANS. (this is where i think my issue lies since their internal subnet that is
routed is 192.168.95.0/24)
Hence, i used 10.70.66.0/24, and i was looking for the correct way to NAT.
This is the config and the relevant files i applied for shorewall.
tunnels
ipsec net Y.Y.Y.Y tstgw
# TST Peer
hosts
tstgw eth1:Y.Y.Y.Y
#TST Gateway (Child Zone of net)
tsgws eth1:Y.Y.Y.Y ipsec #TST
Gateway (Over ipsec)
tssft eth1:192.168.95.0/24 #TST internal
tssfp eth1:192.168.95.0/24 ipsec #TST internal
zones
tstgw:net ipv4 #TST access gateway
tsgws:cscgw ipsec mode=tunnel mss=1400 #TST VPN
tssft:net ipv4
tssfp:cssft ipsec
policy
tssfp all CONTINUE
rules
Ping(ACCEPT):info corzn:192.168.129.195 tssft
Ping(ACCEPT):info tssft corzn:192.168.129.195
and the way i, well thought that it would work, tried to nat
masq
eth1:192.168.95.0/24 192.168.129.195/32 10.70.66.10
Now, as i mentioned, i have the whole 192.168.0.0/19 routed through some other
site-to-site vpns i have however i dont have the subnet 192.168.95.0/24
configured as a vlan/zone anywhere.
private/interfaces
sstun:- tun11 detect
routefilter=0,sfilter=(192.168.0.0/16,224.0.0.0/8)
sstun:- tun13 detect
routefilter=0,sfilter=(192.168.0.0/16,224.0.0.0/8)
I also have the whole 192.168.0.0/19 in my OSPF areas
quagga/ospfd.conf.sav:ip prefix-list EXITAREA1 seq 5 permit 192.168.0.0/16 ge
17 le 30
quagga/ospfd.conf:ip prefix-list EXITAREA1 seq 5 permit 192.168.0.0/16 ge 17 le
30
quagga/zebra.conf.sav:ip prefix-list EXITAREA1 seq 5 permit 192.168.0.0/16 le 30
quagga/zebra.conf:ip prefix-list EXITAREA1 seq 5 permit 192.168.0.0/16 le 30
When i apply the changes, i lose access to all internal resources.
Is the way im trying to NAT in the masq file correct?
Essentially i want to NAT traffic from 192.168.129.195 to have a source address
of 10.70.66.10.
I am running shorewall v 4.5.5.3
_______________________________________________
You are running an unsupported version of Shorewall.
Please see (1).
1) https://shorewall.org/netmap.html
--
Matt Darfeuille <[email protected]>
Community: https://sourceforge.net/p/shorewall/mailman/message/37107049/
SPC: https://sourceforge.net/p/shorewall/mailman/message/36596609/
Homepage: https://shorewall.org
_______________________________________________
Shorewall-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/shorewall-users