Strongswan (v5.0.4) is running on my gateway.  Tcpdump is clearly showing the 
packets making their way to the client (on my wan and lan), though I do not see 
anything coming back in return.  I don't think the packets are being filtered 
on the way to the client device or back; I connected the device to my wifi 
network and experience the same issues.  I currently have the following 
firewall rules enabled:

iptables -I INPUT -p udp --dport 500 -j ACCEPT
iptables -I INPUT -p udp --dport 4500 -j ACCEPT

when the tunnel comes up, two more entries are added:

ACCEPT     all  --  10.10.10.1           67.215.65.0/24      policy match dir 
in pol ipsec reqid 1 proto ipv6-crypt
ACCEPT     all  --  67.215.65.0/24       10.10.10.1          policy match dir 
out pol ipsec reqid 1 proto ipv6-crypt


Why did strongswan insert these rules and what do they mean?  Neither my client 
device or my strongswan server are on the 67.215.65.0/24 ip range.  I have no 
idea where strongswan is getting this 67.xxx network range.  Is this correct?   

> Subject: Re: [strongSwan] FW:  ikev2 vpn using PKI auth with a Blackberry Z10
> From: mar...@strongswan.org
> To: gawd0...@hotmail.com
> CC: users@lists.strongswan.org
> Date: Mon, 16 Sep 2013 09:46:05 +0200
> 
> Hi,
> 
> > client device (24.114.94.100) connect to the server (99.234.220.200,
> > LAN ip-192.168.16.50) via public key authentication, and to have access
> > to the LAN (192.168.16.0/24) behind the server.  [...] I cannot ping
> > between the host and client, or reach the subnet behind the host. 
> > There are no errors when connecting, and I am issued a virtual ip
> > (10.10.10.1):
> 
> I assume that the VPN client has a route to the host you ping. But does
> the host in your LAN has a route to the client, i.e. does it know where
> 10.10.10.1 is?
> 
> If the IPsec gateway is not your default gateway, you'll have to install
> a route on each LAN host for the 10.10.10.0/24 subnet.
> 
> Alternatively you might consider assigning unused addresses from
> 192.168.16.0/24 to the clients, statically or using the dhcp plugin.
> Then the farp plugin on your IPsec gateway could take care of responding
> to ARP responses on behalf of the IPsec clients.
> 
> If that all does not help, you should run a network sniffer to see where
> your pings gets lost. Also, make sure IP forwarding is enabled on the
> IPsec gateway.
> 
> Regards
> Martin
> 
> [1]http://wiki.strongswan.org/projects/strongswan/wiki/FARPPlugin
> 
                                          
_______________________________________________
Users mailing list
Users@lists.strongswan.org
https://lists.strongswan.org/mailman/listinfo/users

Reply via email to