Hi Claudiu:

Thank you for your reply.  I did try your suggestion to do a route add 
A.B.C.D.E 
<isp gateway> and unfortunately it did not work so well.  I lost connectivity 
to 
the branch altogether over the VPN.  At least I have console access :)  Once I 
removed the route, I regained connectivity over the vpn.  Perhaps, I can show 
you the routing tables, if that will help?

Main
Internet:
Destination        Gateway            Flags   Refs      Use   Mtu  Prio Iface
default               phnx-dsl-gw55-247. UGS       19  1629401     -     8 tun0
10.40.60/24        link#1             UC         2        0     -     4 em0
10.40.60.3         00:24:2c:07:d4:d0  UHLc       1     3217     -     4 em0
10.40.60.5         link#1             UHLc       1      847     -     4 em0
10.40.65/24        172.16.254.2       UG         0       22     -    32 gre0
phnx-dsl-gw55-247. 71-223-148-144.phn UH         1       12  1492     4 tun0
loopback           localhost          UGRS       0        0 33200     8 lo0
localhost           localhost          UH         0       60 33200     4 lo0
172.16.254.1/32    172.16.254.2       UG         0        0     -    32 gre0
172.16.254.2       172.16.254.1       UH         2      157     -     4 gre0
BASE-ADDRESS.MCAST localhost          URS        0        0 33200     8 lo0

Branch
Destination        Gateway            Flags   Refs      Use   Mtu  Prio Iface
default            206.125.169.97     UGS        3    11772     -     8 em0
10.40.60/24        172.16.254.1       UG         1       50     -    32 gre0
10.40.65/24        link#4             UC         1        0     -     4 vether0
10.40.65.1         fe:e1:ba:d0:da:7e  UHLc       0        4     -     4 lo0
loopback           localhost          UGRS       0        0 33160     8 lo0
localhost          localhost          UH         1       60 33160     4 lo0
172.16.254.1       172.16.254.2       UH         2       87     -     4 gre0
172.16.254.2/32    172.16.254.1       UG         0        0     -    32 gre0
206.125.169.96/29  link#1             UC         2        0     -     4 em0
206.125.169.97     00:0d:65:ab:c8:bf  UHLc       1        0     -     4 em0
matthew-schwartz.c 52:54:00:27:26:22  UHLc       0        0     -     4 lo0
BASE-ADDRESS.MCAST localhost          URS        0        0 33160     8 lo0

On Tue, 2011-04-12 at 19:53 -0700, Matt S wrote:
> Hello @misc:
> 
> I am up against a stumper.  I have a Site-to-Site IPSEC VPN working 
>beautifully. 
>
>  However, I would like the remote site to route all of its traffic through 
> the 

> VPN.  After googling, I seemed to come up with a suggestion to do a route 
>change 
>
> -net 0.0.0.0/0 <gateway> which didn't work well.  I think it might have to do 
> with NAT.  The main office is doing the NAT.  Perhaps I need to some sort of 
>NAT 
>
> traversal on the VPN??
> 
> Here is my setup:
> 
> --Main Office--
> cat /etc/ipsec.conf:
> me="A.B.C.D"
> mypeer="E.F.G.H"
> mypsk="mypsk"
> 
> ike passive esp from $me to $mypeer peer $mypeer \
>   main auth hmac-sha1 enc 3des group modp1024 \
>   srcid $me dstid $mypeer \
>   psk $mypsk
> 
> cat /etc/hostname.gre0:
> inet 172.16.254.1 255.255.255.252 172.16.254.2
> tunnel A.B.C.D E.F.G.H
> !route add -net 10.40.65 -netmask 255.255.255.0 172.16.254.2
> 
> cat /etc/pf.conf:
> set skip on {lo, gre0, enc0}
> 
> anchor "ftp-proxy/*"
> 
> block in log all
> pass out all
> 
> antispoof for tun0
> table <bruteforce> persist
> table <trustednets> {10.40.60.0/24, 10.40.65.0/24}
> 
> match out on tun0 from <trustednets> to any nat-to (tun0)
> 
> pass in quick proto tcp to port ftp rdr-to 127.0.0.1 port 8021
> pass in quick proto tcp from localhost to any port {http,https} rdr-to 
>127.0.0.1 
>
> port 3128
> pass quick proto {gre, esp, tcp, udp} from E.F.G.H to (tun0)
> block log quick from <bruteforce>
> pass inet proto icmp all icmp-type {echoreq, unreach}
> pass in on tun0 inet proto tcp from any to any port ssh keep state 
>(max-src-conn 
>
> 6, max-src-conn-rate 3/1, overload <bruteforce> flush global) rdr-to 
10.40.60.1
> pass on em0 from <trustednets> to any
> 
> 
> --Branch Office--
> cat /etc/ipsec.conf:
> me="E.F.G.H"
> mypeer="A.B.C.D"
> mypsk="mypsk"
> 
> ike esp from $me to $mypeer peer $mypeer \
>   main auth hmac-sha1 enc 3des group modp1024 \
>   srcid $me dstid $mypeer \
>   psk $mypsk
> 
> cat /etc/hostname.gre0:
> inet 172.16.254.2 255.255.255.252 172.16.254.1
> tunnel E.F.G.H A.B.C.D
> !route add -net 10.40.60 -netmask 255.255.255.0 172.16.254.1
> 
> Firewall disabled for now - nothing other than sshd and isakmpd are running.
> 
> Thanks,
> Matt
> 

Matt

did you put on the branch router a route like 
route add A.B.C.D <branch isp gateway> ?

beware that if you issue just route add default 172.16.254.1 then your
router will tend to also route the vpn traffic through your tunnel, so
you get a race condition.

claudiu.


-- 
Claudiu Pruna <clau...@net-go.net>

Reply via email to