Hi
I wanted to ask the experts here for advice on this desired setup. I
looked at all the documentation I could find and am now resorting to
asking an expert. My company requires a site to site vpn with another
company which does not want to see our internal network on their side.
They only want to see a public IP address of our VPN
10.XX.X.X <-------------------> 88.XX.XX.XX<
---------------------------------------------------> 22.XX.XX.XX<
---------------------->64.XX.XX.XX
Our Private Network          VPN Gateway                  IPSecTunnel
         Our Clients'' VPN GW                Their Server SUBNET
Normally computers on our network can see the computers on theirs
however we are required to SNAT all our connections such that they
only see this type of configuration. That is even their internal
machines must see our public IP-address only.
This is what we need to do. SNAT all requests from the internal
machines before send them through the VPN.
                     SNAT
10.XX.X.X <-------------------> 88.XX.XX.XX<
---------------------------------------------------> 22.XX.XX.XX<
---------------------->64.XX.XX.XX
Our Private Network          VPN Gateway                  IPSecTunnel
         Our Clients'' VPN GW                Their Server SUBNET
This is what they want to see... from their side
88.XX.XX.XX<-------------------------------------------->22.XX.XX.XX<----------------->64.XX.XX.XX
VPN Gateway            IPSecTunnel          Our Client''s VPN GW
Their Server SUBNET
Is this possible with Linux 2.6.XX and shorewall? We have no software
or hardware restriction on our side.
Thanks to anybody who can give some advice.
Shankhadeep
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
The indentation messed things up a bit. So i will clarify
10.XX.XX.XX - Our Network - A
88.XX.XX.XX - Our Gateway - B
22.XX.XX.XX - Their Gateway -C
64.XX.XX.XX - Their Subnet - D
Structure
10.XX.X.X <-----> 88.XX.XX.XX< --VPN---> 22.XX.XX.XX<
--->64.XX.XX.XX
What we need
                  SNAT
10.XX.X.X <------------> 88.XX.XX.XX< --VPN---> 22.XX.XX.XX<
--->64.XX.XX.XX
What they want to see from their side
88.XX.XX.XX< --VPN---> 22.XX.XX.XX< --->64.XX.XX.XX
On Jan 16, 2008 5:15 PM, Shankhadeep Shome <shank15217@gmail.com>
wrote:> Hi
>
> I wanted to ask the experts here for advice on this desired setup. I
> looked at all the documentation I could find and am now resorting to
> asking an expert. My company requires a site to site vpn with another
> company which does not want to see our internal network on their side.
> They only want to see a public IP address of our VPN
>
> 10.XX.X.X <-------------------> 88.XX.XX.XX<
> ---------------------------------------------------> 22.XX.XX.XX<
> ---------------------->64.XX.XX.XX
> Our Private Network          VPN Gateway                  IPSecTunnel
>          Our Clients'' VPN GW                Their Server SUBNET
>
> Normally computers on our network can see the computers on theirs
> however we are required to SNAT all our connections such that they
> only see this type of configuration. That is even their internal
> machines must see our public IP-address only.
>
>
> This is what we need to do. SNAT all requests from the internal
> machines before send them through the VPN.
>
>                      SNAT
> 10.XX.X.X <-------------------> 88.XX.XX.XX<
> ---------------------------------------------------> 22.XX.XX.XX<
> ---------------------->64.XX.XX.XX
> Our Private Network          VPN Gateway                  IPSecTunnel
>          Our Clients'' VPN GW                Their Server SUBNET
>
>
> This is what they want to see... from their side
>
>
88.XX.XX.XX<-------------------------------------------->22.XX.XX.XX<----------------->64.XX.XX.XX
> VPN Gateway            IPSecTunnel          Our Client''s VPN GW
> Their Server SUBNET
>
> Is this possible with Linux 2.6.XX and shorewall? We have no software
> or hardware restriction on our side.
>
> Thanks to anybody who can give some advice.
>
> Shankhadeep
>
-------------------------------------------------------------------------
This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2008.
http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
Shankhadeep Shome wrote:> The indentation messed things up a bit. So i will clarify > > 10.XX.XX.XX - Our Network - A > 88.XX.XX.XX - Our Gateway - B > 22.XX.XX.XX - Their Gateway -C > 64.XX.XX.XX - Their Subnet - D > > Structure > > 10.XX.X.X <-----> 88.XX.XX.XX< --VPN---> 22.XX.XX.XX< --->64.XX.XX.XX > > What we need > > SNAT > 10.XX.X.X <------------> 88.XX.XX.XX< --VPN---> 22.XX.XX.XX< --->64.XX.XX.XX > > What they want to see from their side > > 88.XX.XX.XX< --VPN---> 22.XX.XX.XX< --->64.XX.XX.XX >Is there no possibility to use a sane VPN solution like OpenVPN? -Tom -- Tom Eastep \ Nothing is foolproof to a sufficiently talented fool Shoreline, \ http://shorewall.net Washington USA \ teastep@shorewall.net PGP Public Key \ https://lists.shorewall.net/teastep.pgp.key ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2008. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/
Tom Eastep wrote:> Shankhadeep Shome wrote:[...]> > Is there no possibility to use a sane VPN solution like OpenVPN?haha ... Sorry couldn''t resist. But OpenVPN is indeed one of the most stable, reliable and easy to use solutions I know on the field... I even use it @ Home - as my WiFi is not able to do more than WEP 128Bit - for all system accesses ... Anything not coming out of the VPN is not routed - e.g. dropped. -- ------------------------------------------------------------------------ | Joerg Mertin : smurphy@solsys.org (Home)| | in Forchheim/Germany : smurphy@linux.de (Alt1)| | Stardust''s LiNUX System : | | Web: http://www.solsys.org | ------------------------------------------------------------------------ PGP Fingerprint: AF0F FB75 997B 025F 4538 5AD6 9888 5D97 170B 8B7A ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2008. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/