I tried first that way you said, but it doesn't work, returned the expired ttl message in transit, when I try to run icmp from some host that is on a network outside freebsd, in my test only with the nat rule in enc0
Running tests from a host on another network, for example on the 10.7.8.0/24 network The way is this 10.7.8.243 -> 172.0.10.11 -> 10.19.12.251 -> vpn tunnel Without the nat rule on the xn0 interface, neither echo reply occurs within the vpn tunnel With the nat rule, on the xn0 interface, echo reply occurs within the enc0 interface, only the packet is returned outside 10.19.12.251 which does not occur for networks outside freebsd / 24 In the freebsd route table, the tunnel is configured in this way via strongswan 10.31.32.67/32 10.19.12.251 UGS xn0 Thanks for help = ) Em ter., 17 de mar. de 2020 às 09:54, Artem Viklenko <ar...@viklenko.net> escreveu: > > You don't need rdr > > nat on enc0 inet from 10.0.0.0/8 to 10.31.32.0/24 -> 10.19.12.251 > > > On 17.03.20 14:35, Cristian Cardoso wrote: > > I tried as follows without success: > > > > rdr on xn0 inet proto icmp from 10.31.32.67 to 10.0.0.0/8 -> 10.19.12.251 > > nat on xn0 inet proto icmp from 10.0.0.0/8 to 10.31.32.67/32 -> 10.19.12.251 > > rdr on enc0 inet proto icmp from 10.31.32.67 to 10.0.0.0/8 -> 10.19.12.251 > > nat on enc0 inet proto icmp from 10.0.0.0/8 to 10.31.32.67 -> 10.19.12.251 > > > > xn0 is my interface that goes to the internal network that is beyond > > the freebsd and enc0 of the vpn, I just put the icmp protocol for > > testing > > I checked on tcpdump on the enc0 interface, which occurs echo request > > and echo reply, but does not return to the PC that ran icmp on another > > network within 10.0.0.0/8 > > > > Any suggestion? > > > > Em ter., 17 de mar. de 2020 às 02:48, Artem Viklenko > > <ar...@viklenko.net> escreveu: > >> > >> Hi! > >> > >> PF do NAT on outbound and RDR on inbound. > >> You can try to do NAT on enc0 interface instead of lan. > >> > >> > >> On 17.03.20 04:28, Cristian Cardoso wrote: > >>> Hello > >>> I'm setting up a Freebsd server for ipsec vpn communication with > >>> strongswan and I'm having some difficulties in the operation > >>> > >>> The freebsd server's local network is 10.19.12.0/24 and can connect > >>> correctly to the network on the other side of the tunnel. > >>> > >>> I would like another network behind my server to connect to the tunnel as > >>> well. > >>> > >>> In linux I would nat the network that is arriving as follows: > >>> iptables -t nat -A POSTROUTING -s 10.0.0.0/8 -d 10.31.32.0/24 -j > >>> --SNAT --to 10.19.12.251 > >>> > >>> In FreeBSD I tried to run the rule as follows, but to no avail > >>> nat on $ LAN inet from 10.0.0.0/8 to 10.31.32.0/24 -> 10.19.12.251 > >>> > >>> Is there any other way to generate the equivalent of FreeBSD postrouting? > >>> > >>> Best Regards > >>> _______________________________________________ > >>> freebsd-pf@freebsd.org mailing list > >>> https://lists.freebsd.org/mailman/listinfo/freebsd-pf > >>> To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org" > >>> > >> > >> -- > >> Regards! > > > > -- > Regards! _______________________________________________ freebsd-pf@freebsd.org mailing list https://lists.freebsd.org/mailman/listinfo/freebsd-pf To unsubscribe, send any mail to "freebsd-pf-unsubscr...@freebsd.org"