Chuck Swiger escribió:
On May 14, 2007, at 12:09 PM, Juan Sosa wrote:
There are a number of approaches: the simplest involve either adding static routes between your 10.5.1/24 subnet and your 192.168.1/24 subnet, or setting up additional VPN endpoint on the 192.168.1/24 network, or using NAT to map the jail IP onto the 10.5.1/24 netblock.

Without knowing your topology, it's hard to make more specific recommendations.

So sorry for my duplicated message.

No harm done. It's just that sometimes people get a little enthusiastic about trying to get quick responses. :-)

In my network, 192.168.1.1 xl0 is linked to other remote server through tun0 with (routed)openvpn. As I said before, I'm also running mpd4 listening on ng0, and a jail with samba services on 192.168.1.10 xl0 alias.

Openvpn link is formed by 192.168.1.1 (10.5.1.1) and the remote server (10.5.1.2). The PPTP ng0 interface has 10.5.1.201.

Maybe a ipfw ruleset on 192.168.1.1  could do the trick?

You could use ipfw+natd to map between your 192.168 and 10.5 networks, yes. However, if the only reason you have your 10.5 network around is to terminate your VPN or PPTP sessions, it sounds like it would be easier to simply move them to terminating on the 192.168 network instead.

Maybe you've got more going on with the 10.5 network, or maybe there are other reasons for the split, but you control your internal address space, so if you want everybody using the VPN to be able to talk to various 192.168 addresses, it's better to set up the VPN to go onto that, IMHO...

Ok. Thanks a lot.
_______________________________________________
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to