RE: ipsec packet filtering

2004-08-01 Thread Peter Sandilands
> -Original Message- > From: Mitch (bitblock) [mailto:[EMAIL PROTECTED] > Sent: Saturday, July 31, 2004 3:35 AM > To: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: RE: ipsec packet filtering > > But by adding the following option to the kernel conf > >file you

RE: ipsec packet filtering

2004-07-30 Thread Mitch (bitblock)
> But by adding the following option to the kernel conf file you can get > the processing path I think you are asking for?? > > options IPSEC_FILTERGIF (documented in LINT) > > This then causes the decrypted packet to be passed thru IPFW again. > > Be aware this has significant conseq

RE: ipsec packet filtering

2004-07-30 Thread Peter Sandilands
> From searching the archives this looks like an old issue, but I > still can't understand something. > AFAIU, now the ipfw + ipsec interoperation looks like this: > input: encrypted packet comes to system. It is not checked against > ipfw rules. Rules are applied to decrypted payload pac

Re: ipsec packet filtering

2004-07-29 Thread Bjoern A. Zeeb
On Fri, 30 Jul 2004, Nickolay A. Kritsky wrote: > Hello freebsd-net, > > From searching the archives this looks like an old issue, but I > still can't understand something. > AFAIU, now the ipfw + ipsec interoperation looks like this: > input: encrypted packet comes to system. It is not ch

RE: ipsec packet filtering

2004-07-29 Thread Mitch (bitblock)
I don't know what the reasons are, but I know the result. After much frustrating reasearch I came to the conclusion that I can: a) use linux (not an option as far as I'm concerned) b) use openvpn I need to create a hub and spoke type of vpn arrangement - one spoke node needs to communicate with