On Fri, Nov 10, 2006 at 02:06:42PM -0600, Albert Chin wrote:
> 
> Expanding on the config some more:
>                      (fxp0)|(internal network - 192.168.0.0/24)
>                    --------o--------
>                   |    VPN CLIENT   |
>                    --------o--------
>                            |(fxp1 - 1.2.3.4)
>                            |
>                    --------o--------
>                   |     INTERNET    |
>                    --------o--------
>                            |
>                            |(fxp1 - 1.2.3.5)
>                ------------o------------ 
>   192.168.10.1|(fxp0)                   |(dmz)
>      +--------o        FIREWALL 1       o-----
>      |        |                         |(fxp2)
>      |         -------------------------
>      |
>      |
>      |         -------------------------
>      |        |                         |
>      +--------o        FIREWALL 2       |
>   192.168.10.2|(fxp0)                   |
>                ----------------o--------
>                          (fxp1)|(internal network - 192.168.1.0/24)
> 
> [ipsec.conf config removed]
> 
> Then, from the VPN CLIENT, how would an ssh connection to 192.168.1.1,
> server A on the internal network behind FW2, work? IPsec would encrypt
> the packet between 1.2.3.4 and 1.2.3.5, where it would be unencrypted,
> but on the external, fxp1 interface. How do I get 192.168.0.0/24
> traffic to the fxp0 interface, from fxp1, when fxp1 is on a private
> network between FW1 and FW2?

According to ipsec(4):
  This implementation makes use of a virtual interface, enc0, which can be
  used in packet filters to specify those packets that have been or will be
  processed by IPsec.

So, it would seem that I should NAT the traffic from enc0 on FW1
through fxp0. But, the following never seems to be invoked on FW1:
  nat pass log on enc0 proto tcp from any to any -> fxp0

Any ideas?

-- 
albert chin ([EMAIL PROTECTED])

Reply via email to