I'd submitted several requests for help on this topic. Unfortunately those who know don't say and those who advise did not know. I have gotten it to work. I've got an Astaro box located in my company's communication room with a fixed addressible external IP and another here at home sitting behind a DLink 713P wireless router. I don't think it matters much which NAT router I use, what is important is that I'm running 3.2 on both boxes and using FQDN's as VPN ID's. It is important that the NAT router know how to pass IPSec thru which dlink doc claims it does by default. You guys who work for Astaro should post something like this in a FAQ. Here's the layout:
1) Current hardware configuration:
Home:
ASL box(3.200) internal IP a.b.c.d on a.b.c.0/24
ASL box connected to DLink 713P as 192.168.0.5
Dlink internal IP address 192.168.0.1
No DMZ or port passthru on DLINK
DLink firmware level 2.57 build 3a
DLink external IP address j.k.l.m on Internet
Company box:
ASL box(3.200) internal IP w.x.y.z on w.x.y.0/24
ASL box external IP address q.r.s.t on Internet
2) Want IPSec tunnel:
left network = a.b.c.0/24
right network = w.x.y.0/24
3) ASL configs
Packet Filter on both boxes:
a.b.c.0/24 any w.x.y.0/24 allow
w.x.y.0/24 any a.b.c.0/24 allow
Home ASL config:
Local Keys
VPN ID: Hostname
Hostname: home.company.com
RSA key length: 2048
Remote Keys
Name: CoRSA
Key Type: RSA
Public Key: (local key from Company ASL)
VPN ID: FQDN
Office.company.com
VPN
Name: Home2Com
Type: Standard
IPSec policy: BLOWFISH
Local Endpoint: 192.168.0.5
Remote Endpoint: q.r.s.t
Local subnet: a.b.c.0/24
Remote subnet: w.x.y.0/24
Key: CoRSA
Office ASL config:
Local Keys
VPN ID: Hostname
Hostname: Office.company.com
RSA key length: 2048
Remote Keys
Name: HomeRSA
Key Type: RSA
Public Key: (local key from Home ASL)
VPN ID: FQDN
home.company.com
VPN
Name: Home2Com
Type: Standard
IPSec policy: BLOWFISH
Local Endpoint: q.r.s.t
Remote Endpoint: j.k.l.m
Local subnet: w.x.y.0/24
Remote subnet: a.b.c.0/24
Key: HomeRSA
This thread was automatically locked due to age.