Hi Claudiu: Thank you for your reply. I did try your suggestion to do a route add A.B.C.D.E <isp gateway> and unfortunately it did not work so well. I lost connectivity to the branch altogether over the VPN. At least I have console access :) Once I removed the route, I regained connectivity over the vpn. Perhaps, I can show you the routing tables, if that will help?
Main Internet: Destination Gateway Flags Refs Use Mtu Prio Iface default phnx-dsl-gw55-247. UGS 19 1629401 - 8 tun0 10.40.60/24 link#1 UC 2 0 - 4 em0 10.40.60.3 00:24:2c:07:d4:d0 UHLc 1 3217 - 4 em0 10.40.60.5 link#1 UHLc 1 847 - 4 em0 10.40.65/24 172.16.254.2 UG 0 22 - 32 gre0 phnx-dsl-gw55-247. 71-223-148-144.phn UH 1 12 1492 4 tun0 loopback localhost UGRS 0 0 33200 8 lo0 localhost localhost UH 0 60 33200 4 lo0 172.16.254.1/32 172.16.254.2 UG 0 0 - 32 gre0 172.16.254.2 172.16.254.1 UH 2 157 - 4 gre0 BASE-ADDRESS.MCAST localhost URS 0 0 33200 8 lo0 Branch Destination Gateway Flags Refs Use Mtu Prio Iface default 206.125.169.97 UGS 3 11772 - 8 em0 10.40.60/24 172.16.254.1 UG 1 50 - 32 gre0 10.40.65/24 link#4 UC 1 0 - 4 vether0 10.40.65.1 fe:e1:ba:d0:da:7e UHLc 0 4 - 4 lo0 loopback localhost UGRS 0 0 33160 8 lo0 localhost localhost UH 1 60 33160 4 lo0 172.16.254.1 172.16.254.2 UH 2 87 - 4 gre0 172.16.254.2/32 172.16.254.1 UG 0 0 - 32 gre0 206.125.169.96/29 link#1 UC 2 0 - 4 em0 206.125.169.97 00:0d:65:ab:c8:bf UHLc 1 0 - 4 em0 matthew-schwartz.c 52:54:00:27:26:22 UHLc 0 0 - 4 lo0 BASE-ADDRESS.MCAST localhost URS 0 0 33160 8 lo0 On Tue, 2011-04-12 at 19:53 -0700, Matt S wrote: > Hello @misc: > > I am up against a stumper. I have a Site-to-Site IPSEC VPN working >beautifully. > > However, I would like the remote site to route all of its traffic through > the > VPN. After googling, I seemed to come up with a suggestion to do a route >change > > -net 0.0.0.0/0 <gateway> which didn't work well. I think it might have to do > with NAT. The main office is doing the NAT. Perhaps I need to some sort of >NAT > > traversal on the VPN?? > > Here is my setup: > > --Main Office-- > cat /etc/ipsec.conf: > me="A.B.C.D" > mypeer="E.F.G.H" > mypsk="mypsk" > > ike passive esp from $me to $mypeer peer $mypeer \ > main auth hmac-sha1 enc 3des group modp1024 \ > srcid $me dstid $mypeer \ > psk $mypsk > > cat /etc/hostname.gre0: > inet 172.16.254.1 255.255.255.252 172.16.254.2 > tunnel A.B.C.D E.F.G.H > !route add -net 10.40.65 -netmask 255.255.255.0 172.16.254.2 > > cat /etc/pf.conf: > set skip on {lo, gre0, enc0} > > anchor "ftp-proxy/*" > > block in log all > pass out all > > antispoof for tun0 > table <bruteforce> persist > table <trustednets> {10.40.60.0/24, 10.40.65.0/24} > > match out on tun0 from <trustednets> to any nat-to (tun0) > > pass in quick proto tcp to port ftp rdr-to 127.0.0.1 port 8021 > pass in quick proto tcp from localhost to any port {http,https} rdr-to >127.0.0.1 > > port 3128 > pass quick proto {gre, esp, tcp, udp} from E.F.G.H to (tun0) > block log quick from <bruteforce> > pass inet proto icmp all icmp-type {echoreq, unreach} > pass in on tun0 inet proto tcp from any to any port ssh keep state >(max-src-conn > > 6, max-src-conn-rate 3/1, overload <bruteforce> flush global) rdr-to 10.40.60.1 > pass on em0 from <trustednets> to any > > > --Branch Office-- > cat /etc/ipsec.conf: > me="E.F.G.H" > mypeer="A.B.C.D" > mypsk="mypsk" > > ike esp from $me to $mypeer peer $mypeer \ > main auth hmac-sha1 enc 3des group modp1024 \ > srcid $me dstid $mypeer \ > psk $mypsk > > cat /etc/hostname.gre0: > inet 172.16.254.2 255.255.255.252 172.16.254.1 > tunnel E.F.G.H A.B.C.D > !route add -net 10.40.60 -netmask 255.255.255.0 172.16.254.1 > > Firewall disabled for now - nothing other than sshd and isakmpd are running. > > Thanks, > Matt > Matt did you put on the branch router a route like route add A.B.C.D <branch isp gateway> ? beware that if you issue just route add default 172.16.254.1 then your router will tend to also route the vpn traffic through your tunnel, so you get a race condition. claudiu. -- Claudiu Pruna <clau...@net-go.net>