Thank you for all of the help.  I am effectively giving up on doing it this 
way.  OpenVPN seems to have facilities to make it easier to achieve what I want 
to do.  I appreciate all of the time and effort spent.


On Wed, 2011-04-13 at 07:34 -0700, Matt S wrote:
> Hi Claudiu:
> 
> 
> Thank you for your reply.  I did try your suggestion to do a route add
> A.B.C.D.E <isp gateway> and unfortunately it did not work so well.  I
> lost connectivity to the branch altogether over the VPN.  At least I
> have console access :)  Once I removed the route, I regained
> connectivity over the vpn.  Perhaps, I can show you the routing
> tables, if that will help?
> 
> 
> Main
> Internet:
> Destination        Gateway            Flags   Refs      Use   Mtu
>  Prio Iface
> default               phnx-dsl-gw55-247. UGS       19  1629401     -
> 8 tun0
> 10.40.60/24        link#1             UC         2        0     -
> 4 em0
> 10.40.60.3         00:24:2c:07:d4:d0  UHLc       1     3217     -
> 4 em0
> 10.40.60.5         link#1             UHLc       1      847     -
> 4 em0
> 10.40.65/24        172.16.254.2       UG         0       22     -
>  32 gre0
> phnx-dsl-gw55-247. 71-223-148-144.phn UH         1       12  1492
> 4 tun0
> loopback           localhost          UGRS       0        0 33200
> 8 lo0
> localhost           localhost          UH         0       60 33200
> 4 lo0
> 172.16.254.1/32    172.16.254.2       UG         0        0     -
>  32 gre0
> 172.16.254.2       172.16.254.1       UH         2      157     -
> 4 gre0
> BASE-ADDRESS.MCAST localhost          URS        0        0 33200
> 8 lo0
> 
> 
> Branch
> Destination        Gateway            Flags   Refs      Use   Mtu
>  Prio Iface
> default            206.125.169.97     UGS        3    11772     -
> 8 em0
> 10.40.60/24        172.16.254.1       UG         1       50     -
>  32 gre0
> 10.40.65/24        link#4             UC         1        0     -
> 4 vether0
> 10.40.65.1         fe:e1:ba:d0:da:7e  UHLc       0        4     -
> 4 lo0
> loopback           localhost          UGRS       0        0 33160
> 8 lo0
> localhost          localhost          UH         1       60 33160
> 4 lo0
> 172.16.254.1       172.16.254.2       UH         2       87     -
> 4 gre0
> 172.16.254.2/32    172.16.254.1       UG         0        0     -
>  32 gre0
> 206.125.169.96/29  link#1             UC         2        0     -
> 4 em0
> 206.125.169.97     00:0d:65:ab:c8:bf  UHLc       1        0     -
> 4 em0
> matthew-schwartz.c 52:54:00:27:26:22  UHLc       0        0     -
> 4 lo0
> BASE-ADDRESS.MCAST localhost          URS        0        0 33160
> 8 lo0
> 
> 
> 
> On Tue, 2011-04-12 at 19:53 -0700, Matt S wrote:
> > Hello @misc:
> > 
> > I am up against a stumper.  I have a Site-to-Site IPSEC VPN working
> beautifully. 
> >  However, I would like the remote site to route all of its traffic
> through the 
> > VPN.  After googling, I seemed to come up with a suggestion to do a
> route change 
> > -net 0.0.0.0/0 <gateway> which didn't work well.  I think it might
> have to do 
> > with NAT.  The main office is doing the NAT.  Perhaps I need to some
> sort of NAT 
> > traversal on the VPN??
> > 
> > Here is my setup:
> > 
> > --Main Office--
> > cat /etc/ipsec.conf:
> > me="A.B.C.D"
> > mypeer="E.F.G.H"
> > mypsk="mypsk"
> > 
> > ike passive esp from $me to $mypeer peer $mypeer \
> >  main auth hmac-sha1 enc 3des group modp1024 \
> >  srcid $me dstid $mypeer \
> >  psk $mypsk
> > 
> > cat /etc/hostname.gre0:
> > inet 172.16.254.1 255.255.255.252 172.16.254.2
> > tunnel A.B.C.D E.F.G.H
> > !route add -net 10.40.65 -netmask 255.255.255.0 172.16.254.2
> > 
> > cat /etc/pf.conf:
> > set skip on {lo, gre0, enc0}
> > 
> > anchor "ftp-proxy/*"
> > 
> > block in log all
> > pass out all
> > 
> > antispoof for tun0
> > table <bruteforce> persist
> > table <trustednets> {10.40.60.0/24, 10.40.65.0/24}
> > 
> > match out on tun0 from <trustednets> to any nat-to (tun0)
> > 
> > pass in quick proto tcp to port ftp rdr-to 127.0.0.1 port 8021
> > pass in quick proto tcp from localhost to any port {http,https}
> rdr-to 127.0.0.1 
> > port 3128
> > pass quick proto {gre, esp, tcp, udp} from E.F.G.H to (tun0)
> > block log quick from <bruteforce>
> > pass inet proto icmp all icmp-type {echoreq, unreach}
> > pass in on tun0 inet proto tcp from any to any port ssh keep state
> (max-src-conn 
> > 6, max-src-conn-rate 3/1, overload <bruteforce> flush global) rdr-to
> 10.40.60.1
> > pass on em0 from <trustednets> to any
> > 
> > 
> > --Branch Office--
> > cat /etc/ipsec.conf:
> > me="E.F.G.H"
> > mypeer="A.B.C.D"
> > mypsk="mypsk"
> > 
> > ike esp from $me to $mypeer peer $mypeer \
> >  main auth hmac-sha1 enc 3des group modp1024 \
> >  srcid $me dstid $mypeer \
> >  psk $mypsk
> > 
> > cat /etc/hostname.gre0:
> > inet 172.16.254.2 255.255.255.252 172.16.254.1
> > tunnel E.F.G.H A.B.C.D
> > !route add -net 10.40.60 -netmask 255.255.255.0 172.16.254.1
> > 
> > Firewall disabled for now - nothing other than sshd and isakmpd are
> running.
> > 
> > Thanks,
> > Matt
> > 
> 
> Matt
> 
> did you put on the branch router a route like 
> route add A.B.C.D <branch isp gateway> ?
> 
> beware that if you issue just route add default 172.16.254.1 then your
> router will tend to also route the vpn traffic through your tunnel, so
> you get a race condition.
> 
> claudiu.
> 
> 
> -- 
> Claudiu Pruna
> 
> 
> 
supposing, as I understood, yhay you want to route ALL the branch's
traffic through vpn to main, and then on the internet, the route that I
was saying is: 
On branch, *not* main:

route add A.B.C.D 206.125.169.97

is it what you did ?

-- 
Claudiu Pruna 

Reply via email to