On 8/23/07, Christoph Leser <[EMAIL PROTECTED]> wrote:
> Hello,
>
> I tried ( and failed ) to set up an IPSEC Tunnel to a LANCOM VPN Router in a
> somewhat special constellation:
>
> main mode is ok
>
> quick mode negotiated successfully and established the following flow:
>
> # ipsecctl -s flow
> flow esp in from 172.17.0.0/16 to 172.17.7.50 peer a.b.c.d srcid
> [EMAIL PROTECTED] dstid [EMAIL PROTECTED] type use
> flow esp out from 172.17.7.50 to 172.17.0.0/16 peer a.b.c.d srcid [EMAIL 
> PROTECTED]
> dstid [EMAIL PROTECTED] type require
>
> here 172.17.0.0/16 is the private net at the remote site, a.b.c.d is the
> remote internet address, the ID parmeters of main mode are of type user_fqdn.
>
> What is special in the above configuration is that I was asked to use an
> address from the remote private net range ( 172.17.7.50 ) as my local id
> parameter in quick mode ( instead of my own local address or local net ).
>
> This looks like a typical dial-in setup, where the dial in client is given an
> address in the remte target network, and the remote router acts as proxy for
> this address. I do not know whether this is a valid setup for IPSEC, but the
> person on the remote site told me that he uses this setup for his ( windows )
> road worrier clients.
>
> If this is valid and can be done on openBSD, what is needed to complete this
> setup?
>
> As shown above, the flow gets established, but ping 172.17.0.1 fails with 'no
> route to host'.

Did you try "ping -I 172.17.7.50 172.17.0.1" ?

Without specifying the outgoing interface with -I, you'll end up
trying to reach 172.17.0.1 through the default route.

>
> It seems that I'm lacking basic understand of the relationship between 'ipsec
> flows' and routing.

I guess you can add more flows to have the 172.17/16 network reachable
from your normal interface. I would try to add the following flow:
ike esp from egress to 172.17/16 peer a.b.c.d srcid ...

HTH
    -martin

Reply via email to