Hello all,
I am struggling here to get a working site-to-site VPN on FreeBSD 10.3-RELEASE-p24. At first I installed security/strongswanfrom ports (version 5.6.0), and it would not even load its configured connections. So I decided to manually compile security/strongswan 5.5.3 version and brought the tunnel up.
I have the following kernel configuration:
Here is ipsec.conf:
Here is my
The thing is I want to use 10.180.0.0/27 as a masquerading network. As I could not get NAT to work IPSEC and I just need one single TCP connection to work, I am trying to use net/tcpproxy to get the job done.
So my clients connect to IP X port A and net/tcpproxy connects to remote IP Y port B through the VPN. I have a similiar configuration up and running elsewhere, but its not working this time. enc0 shows no traffic at all.
I am struggling here to get a working site-to-site VPN on FreeBSD 10.3-RELEASE-p24. At first I installed security/strongswanfrom ports (version 5.6.0), and it would not even load its configured connections. So I decided to manually compile security/strongswan 5.5.3 version and brought the tunnel up.
I have the following kernel configuration:
Code:
#IPSEC VPN Support
options TCP_SIGNATURE
options IPSEC #IP security
device crypto
device enc
options IPSEC_DEBUG #debug for IP security
options IPSEC_NAT_T
Here is ipsec.conf:
Code:
config setup
conn %default
ikelifetime=86400s
lifetime=3600s
authby=psk
keyexchange=ikev1
mobike=no
keyingtries = 3
auto = route
ike = aes256-sha1-modp2048!
esp = aes256-sha1!,aes128-sha1!
conn MY_CONN
ikelifetime=3600s
lifetime=3600s
keyexchange=ikev1
leftid=200.169.26.31
left=200.169.26.31
leftsubnet=10.180.0.0/27
right=200.132.64.2
rightsubnet=200.18.76.99
compress=no
Here is my
ipsec status
relevant output:
Code:
Security Associations (1 up, 0 connecting):
MY_CONN[2]: ESTABLISHED 9 seconds ago, x.x.x.x[x.x.x.x]...y.y.y.y[y.y.y.y.y]
MY_CONN[2]: IKEv1 SPIs: 0f1a67bfb48a80cd_i* 46a823d1f888067e_r, pre-shared key reauthentication in 44 minutes
MY_CONN[2]: IKE proposal: AES_CBC_256/HMAC_SHA1_96/PRF_HMAC_SHA1/MODP_2048
The thing is I want to use 10.180.0.0/27 as a masquerading network. As I could not get NAT to work IPSEC and I just need one single TCP connection to work, I am trying to use net/tcpproxy to get the job done.
So my clients connect to IP X port A and net/tcpproxy connects to remote IP Y port B through the VPN. I have a similiar configuration up and running elsewhere, but its not working this time. enc0 shows no traffic at all.