Home
Help
Search
Login
Register
OPNsense Forum
»
Archive
»
19.1 Legacy Series
»
Site-to-Site IPsec AND IPsec Client behind NAT
« previous
next »
Print
Pages: [
1
]
Author
Topic: Site-to-Site IPsec AND IPsec Client behind NAT (Read 4003 times)
5v3n
Newbie
Posts: 7
Karma: 1
Site-to-Site IPsec AND IPsec Client behind NAT
«
on:
May 09, 2019, 10:55:10 am »
Hi,
I have a special problem I think and I hope that my be someone has an idea how to solve this.
On WAN side I have multiple public IPs and I have setup and running one IPsec Site-to-Site tunnel. Let's calls this pimary network.
Beside that there are other networks, let's call one of them guestnet for well guests.
All networks are handeled by the same OPNsense appliance. The guestnet uses a virtual public IP for outgoing traffic which is differend from the main IP used for the primary network NAT.
My wish whould be that clients on the guestnet should be able to start IPsec tunnels from their client devices behind NAT for example to connect to their home locations.
But this does not work
.
Before OPNsense I had an Cisco ASA where this kind of setup was not a problem.
My guess is that the problem is in StrongSwan. Because it binds to all ip addresses on all interfaces I guess that the IPsec answer form the remote site is not forwarded to the client behind NAT.
I tried to change "/usr/local/etc/strongswan.conf" by adding "interfaces_use = "igb0"", but it still binds to all IP addresses including the virtual IP I used for the guest net.
Is there any (easy) way to make this work with OPNsense?
Well I could setup a second OPNsense only for the guestnet ... but this looks bit too big to me.
What if I connect a second interface to the Internet an add my second WAN IP their?
Will not work until manual edit of "strongswan.conf" I guess. But is setup this desirable?
Best regards
«
Last Edit: May 09, 2019, 10:56:51 am by 5v3n
»
Logged
5v3n
Newbie
Posts: 7
Karma: 1
Re: Site-to-Site IPsec AND IPsec Client behind NAT
«
Reply #1 on:
May 24, 2019, 09:27:00 am »
Nobody another idea?
Logged
hbc
Hero Member
Posts: 501
Karma: 47
Re: Site-to-Site IPsec AND IPsec Client behind NAT
«
Reply #2 on:
May 24, 2019, 11:21:48 am »
Try:
Code:
[Select]
interfaces_use = igb0
Without quotes. That works at least in my installation.
Logged
Intel(R) Xeon(R) Silver 4116 CPU @ 2.10GHz (24 cores)
256 GB RAM, 300GB RAID1, 3x4 10G Chelsio T540-CO-SR
5v3n
Newbie
Posts: 7
Karma: 1
Re: Site-to-Site IPsec AND IPsec Client behind NAT
«
Reply #3 on:
May 28, 2019, 02:08:30 pm »
Thank you very much, but may I was a bit imprecisely.
If I set this option, StrongSwan binds only to this interface instead of all that's okay but not sufficient.
Because it still uses all ip addresses that are configured on that interface.
For my scenario, I have multiple WAN IP's on one interface (for several services using the same port) an I would like to have StrongSwan only to listen to just one of this IP's. The one I really use for IPsec.
The only workaround, that came to my mind, would to set this option and configure all WAN IP to a different physical ports. But I don't like the idea to waste one physical port for every IP address just because of the behavior of StrongSwan.
Isn't there a patch that makes StrongSwan to just listen to addresses instead of ports?
Best regards
Logged
Print
Pages: [
1
]
« previous
next »
OPNsense Forum
»
Archive
»
19.1 Legacy Series
»
Site-to-Site IPsec AND IPsec Client behind NAT