On 09/04/2011 07:52 AM, Marco wrote:
Hello, I'm using the VPN client 2.1.7 under Linux to connect to a
corporate VPN, and it works perfectly. Since I'm running a couple of
virtual machines on my box, I'd like to be able to reach the remote
network from them as well.

So on the host, I enabled IP forwarding then added this iptables rule
(192.168.1.0/24 is the remote LAN):

iptables -t nat -A POSTROUTING -d 192.168.1.0/24 -j MASQUERADE

(including other variations with "-o tap0", "-s 192.168.130.0/24"
(which is my VM network) ) but nothing worked.

What I see is that packet correctly reach the remote machines (with
the source IP correctly translated to the local box's VPN IP), and
their replies reach my box, but then it seems like they're not
forwarded back to the originating VM.

I'm aware that IPsec is peculiar in how traffic flows, but is it the
case that this would break iptables' NAT too?


Hi Marco,

It looks like you're hoping to run Shrew in the host and have VM-sourced traffic that is destined for the remote LAN get redirected into the tunnel. Interesting idea - I'd guess actually pretty common request.

I'd suggest first seeing if you can make this work without the complication of the VM virtual networking. See if you can have another physical box on your LAN send traffic via your host box that is destined for the remote LAN. That will tell you if the concept works. My guess is that it should be possible.


_______________________________________________
vpn-help mailing list
[email protected]
http://lists.shrew.net/mailman/listinfo/vpn-help

Reply via email to