First, here's the general config :
Code:
LAN1 (eth0=Internal1) Firewall1 (eth1=Wan1) (RLan1) Router1 (External1) (External2) Router2 (RLan2) (eth1=Wan2) Firewall2 (eth0=Internal2) LAN2
In my case this is :
Internal1 = 192.168.1.2/24
Wan1 = 192.168.10.2/24
RLan1 = 192.168.10.1/24
External1 = 82.235.14.210/32
External2 = 193.252.219.173/32
RLan2 = 192.168.20.1/24
Wan2 = 192.168.20.254/24
Internal2 = 192.168.4.1/24
Second, what i want is : someone in LAN1 can contact someone in LAN2 simply using his internal IP. A Net2Net is what i need, isn't it ? Once my tunnels active, 192.168.1.5 will contact 192.168.4.150 with no problems ?
Third, i tried to apply the how-to, but there's something i don't get. In the how-to the "External interface of the remote firewall" is Internal1 O_o. And the "Internal network of the remote site" is External2, and even worse, it's supposed to be a network, whereas it's a public IP so i'll always have a /32 network ???
Shortly, here's my config :
Firewall1 (version 5.206)
[ QUOTE ]
- RemoteKey PSK with PreShared "myKey" (for example)
- IPSEC Connection Standard / AES_PFS
-- Endpoint : Wan1 => Internal2
-- Subnet : Internal1 => External2
[/ QUOTE ]
Firewall2 (version 6.001)
[ QUOTE ]
- RemoteKey PSK with PreShared "myKey" (for example)
- IPSEC Connection Standard / AES_PFS
-- Endpoint : Wan2 => Internal1
-- Subnet : Internal2 => External1
[/ QUOTE ]
But my route never appears...
What's wrong here ?
Here's the message displayed by "VPN Status" in Firewall1
[ QUOTE ]
000
000 "S_IGLOO__VPN_0": 192.168.1.0/24===192.168.10.2...192.168.4.1===193.252.219.173/32
000 "S_IGLOO__VPN_0": CAs: '%any'...'%any'
000 "S_IGLOO__VPN_0": ike_life: 7800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "S_IGLOO__VPN_0": policy: PSK+ENCRYPT+TUNNEL+PFS; interface: eth1; unrouted
000 "S_IGLOO__VPN_0": newest ISAKMP SA: #0; newest IPsec SA: #0; eroute owner: #0
000 "S_IGLOO__VPN_0": IKE algorithms wanted: 5_000-1-5, flags=-strict
000 "S_IGLOO__VPN_0": IKE algorithms found: 5_192-1_128-5,
000 "S_IGLOO__VPN_0": ESP algorithms wanted: 12_128-1, ; pfsgroup=5; flags=-strict
000 "S_IGLOO__VPN_0": ESP algorithms loaded: 12_128-1_128,
000
000 #2: "S_IGLOO__VPN_0" 192.168.4.1 STATE_MAIN_I1 (sent MI1, expecting MR1); EVENT_RETRANSMIT in 10s
000
[/ QUOTE ]
And the message in Firewall2 [ QUOTE ]
000
000 "S_IGLOO__VPN_0": 192.168.4.0/24===192.168.20.254...192.168.1.2===82.235.14.210/32; unrouted; eroute owner: #0
000 "S_IGLOO__VPN_0": srcip=unset; dstip=unset
000 "S_IGLOO__VPN_0": ike_life: 7800s; ipsec_life: 3600s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0
000 "S_IGLOO__VPN_0": policy: PSK+ENCRYPT+TUNNEL+PFS+UP; prio: 24,32; interface: eth0;
000 "S_IGLOO__VPN_0": dpd: (null); delay:30; timeout:120;
000 "S_IGLOO__VPN_0": newest ISAKMP SA: #0; newest IPsec SA: #0;
000 "S_IGLOO__VPN_0": IKE algorithms wanted: 7_256-1-5, flags=-strict
000 "S_IGLOO__VPN_0": IKE algorithms found: 7_256-1_128-5,
000 "S_IGLOO__VPN_0": ESP algorithms wanted: 12_128-1, ; pfsgroup=5; flags=-strict
000 "S_IGLOO__VPN_0": ESP algorithms loaded: 12_128-1, ; pfsgroup=5; flags=-strict
000
000 #8: "S_IGLOO__VPN_0":500 STATE_MAIN_I1 (sent MI1, expecting MR1); EVENT_RETRANSMIT in 14s; nodpd
000 #8: pending Phase 2 for "S_IGLOO__VPN_0" replacing #0
000
[/ QUOTE ]
All this is very dark to me [:(]
This thread was automatically locked due to age.