[olug] SOHO vpn/router question

Dan Linder dan at linder.org
Mon Apr 26 17:57:01 UTC 2010


Thanks!  I am still hoping that the IT guy will work with me on this, rather
than just kill it outright because it isn't the usual host-to-site
connection.

Dan

On Mon, Apr 26, 2010 at 08:47, James Ringler <jringler at plainspower.com>wrote:

> Dan Linder wrote:
>
>> My company is taking our local office virtual so I'll be working from home
>> now.  Currently I have three workstations that each bring up their own VPN
>> into the corporate network for me to do my work.  I'd really like to setup
>> my home firewall to be the VPN concentrator for these machines so I can
>> drop
>> the independant VPN sessions.  Currently I'm running a Vyatta firewall,
>> but
>> would switch back to Astaro or other Linux distribution if needed.
>>
>> Anyone have a quick pointer on setting up the Vyatta firewall to be the
>> VPN
>> endpoint and then perform NAT for my three systems back into corporate?
>>
>> Dan
>>
>>
>>
>
>
> it depends on the vpn device on the other side...   if it's IPSec,
>
> you create an IPSec interface and set the parameters of the VPN connection
>
>
> ipsec {
>    esp-group ESPVPNtoWORK {
>        compression disable
>        proposal 1 {
>            encryption 3des
>            hash md5
>        }
>    }
>    ike-group IKEVPNtoWORK {
>        lifetime 28800
>        proposal 1 {
>            encryption aes256
>            hash md5
>        }
>    }
>    ipsec-interfaces {
>        interface eth0
>
>
> Then set up your site to site information...    the peer is your work vpn
> connector
> Local IP is obviously your IP at home..  (I think now you can use FQDN
> there for ddns)
> Local Subnet is your home inside addresses
> Remote Subnet is your destination network addresses
>
> site-to-site {
>        peer 99.99.99.99 {
>            authentication {
>                mode pre-shared-secret
>                pre-shared-secret MYPASSWORD
>            }
>            ike-group IKEVPNtoWork
>            local-ip 1.1.1.1
>            tunnel 1 {
>                allow-nat-networks disable
>                esp-group ESPVPNtoWORK
>                local-subnet 172.2.0.0/24
>                remote-subnet 10.26.16.0/24
>            }
>        }
>
>
>
> Then to bypass your outbound NAT you have to set an exclude statement..
>  this also has to be in a rule lower than your general outbound NAT
> statement.
>
>
>
> rule 1 {
>    destination {
>        address 10.26.16.0/24
>    }
>    exclude
>    outbound-interface eth0
>    type masquerade
>
>
>
> this will pass the traffic through the VPN and not out your home router..
>
>
>
>
>
>
> _______________________________________________
> OLUG mailing list
> OLUG at olug.org
> https://lists.olug.org/mailman/listinfo/olug
>



-- 
***************** ************* *********** ******* ***** *** **
"Quis custodiet ipsos custodes?"
   (Who can watch the watchmen?)
   -- from the Satires of Juvenal
"I do not fear computers, I fear the lack of them."
   -- Isaac Asimov (Author)
** *** ***** ******* *********** ************* *****************



More information about the OLUG mailing list