Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    SG-3100 - routing all internet access over IPSEC tunnel

    Scheduled Pinned Locked Moved IPsec
    33 Posts 5 Posters 3.3k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stephenw10S
      stephenw10 Netgate Administrator
      last edited by

      That pfSense bug report is probably the closest thing. That is NATing over a VTI interface.

      The Opnsense bug is refering to policy based IPSec which also has NAT limitations but is when you're hitting here specifically.

      Were you able to run that test and get the pcaps?

      Steve

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by Derelict

        I worked with a guy doing exactly this. He first tried this:

        LAN <-> VTI (OB NAT) <-> VTI <-> WAN (OB NAT) <-> Internet

        He changed it to this because of this limitation on NAT on the VTI interface:

        LAN <-> VTI <-> VTI <-> WAN (OB NAT) <-> Internet

        Setting the Outbound NAT on the WAN to NAT the LAN source addresses.

        All works fine. I think he said he's getting 500Mbps or more over it.

        You just have to make sure the WAN side has a gateway and a route back to the LAN network over the VTI.

        I believe he used policy routing to send the internet traffic from certain local hosts over the VTI, not a 0.0.0.0/0 route. Both methods should work, but if I was going to try the route method I would probably adopt the OpenVPN strategy and add these instead of 0.0.0.0/0: 0.0.0.0/1 128.0.0.0/1 so your existing default route stays unmolested.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        G 1 Reply Last reply Reply Quote 1
        • stephenw10S
          stephenw10 Netgate Administrator
          last edited by

          Ah nice!

          1 Reply Last reply Reply Quote 0
          • C
            ccb056
            last edited by ccb056

            Both my laptop and my phone can ping google.com through the ipsec tunnel, packet captures below

            pings from phone.zip

            pings from laptop.zip

            Here is the traceroute from my laptop without going through the tunnel:
            traceroute.default.PNG

            Here is the traceroute from my laptop going through the tunnel, but using local dns:
            traceroute.remote routing.local dns.PNG

            And this is what it looks like going through the tunnel and using remote dns:
            traceroute.remote routing.remote dns.PNG

            Here are some photos of the configs on both routers:
            001.PNG

            002.PNG

            003.PNG

            004.PNG

            Note, the browser on the laptop seems to load the google.com webpage, but the phone cannot browse to any webpage

            What do I need to change to get this working properly?

            DerelictD 1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              None of that really gives us anything to go on.

              How are you selecting traffic to go over the tunnel? Policy routing or the routing table? How is that set up?

              How are the two devices configured for both IP routing and DNS?

              Not sure why you're showing us traceroutes and mentioning DNS. Use DNS tools to troubleshoot DNS and traceroute to troubleshoot routing.

              It looks like you are routing through the tunnel and out the charter WAN so everything including outbound NAT there is working.

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • DerelictD
                Derelict LAYER 8 Netgate @ccb056
                last edited by

                @ccb056 No idea why you're making it so complicated. Just policy route everything from hosts_tunneled out the VTI interface, get that working, then worry about whatever it is you're trying to do with DNS.

                Chattanooga, Tennessee, USA
                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                1 Reply Last reply Reply Quote 0
                • C
                  ccb056
                  last edited by

                  I am selecting traffic to go over the tunnel using this LAN rule on the local router:
                  firewall rule.redirect to remote gateway.PNG

                  Here are the routing tables on the local and remote routers:
                  route table.local router.PNG

                  route table.remote router.PNG

                  Not everything is working.
                  The laptop is very spotty when accessing webpages, it can access google right now, but not yahoo, msn, etc.

                  The phone cannot access anything.

                  1 Reply Last reply Reply Quote 0
                  • stephenw10S
                    stephenw10 Netgate Administrator
                    last edited by stephenw10

                    So you have three sites connected all connected together there? A quick diagram would be very useful.

                    Could there be some route asymmetry here?
                    Do you see blocked TCP traffic in the firewall logs at either site when you try to open a failing page?

                    There is no reply-to added to traffic from VTI interfaces so the system routing is always used.

                    Steve

                    1 Reply Last reply Reply Quote 0
                    • C
                      ccb056
                      last edited by ccb056

                      Here is a diagram of the topology:
                      network topology.png

                      And here is a youtube video showing what I'm experiencing:
                      https://www.youtube.com/watch?v=pUI7dhAYaYM

                      1 Reply Last reply Reply Quote 0
                      • stephenw10S
                        stephenw10 Netgate Administrator
                        last edited by

                        Ok, do you see any blocked TCP traffic in the logs at either site though?

                        The video stream is probably UDP and pings which you said were working are ICMP so...

                        Steve

                        1 Reply Last reply Reply Quote 0
                        • C
                          ccb056
                          last edited by

                          Here's a packet capture log from the interfaces on both the local and remote routers during an sftp transfer (tcp/22)

                          sftp file transfer packet capture.zip

                          1 Reply Last reply Reply Quote 0
                          • stephenw10S
                            stephenw10 Netgate Administrator
                            last edited by

                            Hmm, so some of those seem OK, the local VTI cap for example.

                            How exactly were those taken? Not all at the same time I assume? And did the transfer fail every time?

                            Steve

                            1 Reply Last reply Reply Quote 0
                            • C
                              ccb056
                              last edited by

                              One large download to the laptop was started over sftp.

                              Then the packet captures were taken sequentially, first on the local router, and then on the remote router, during the single file transfer.

                              After the packet captures were taken, the transfer was manually stopped.

                              What I found interesting was there was traffic on the wan side of the local router that appeared to be going directly to the sftp server. I expected this to all be inside the IPSEC tunnel.

                              1 Reply Last reply Reply Quote 0
                              • DerelictD
                                Derelict LAYER 8 Netgate
                                last edited by

                                What I found interesting was there was traffic on the wan side of the local router that appeared to be going directly to the sftp server. I expected this to all be inside the IPSEC tunnel.

                                If that is the case (I have not looked at the captures) you are not routing/policy routing the traffic into the IPsec correctly.

                                Chattanooga, Tennessee, USA
                                A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                1 Reply Last reply Reply Quote 0
                                • G
                                  gabacho4 Rebel Alliance @Derelict
                                  last edited by gabacho4

                                  @Derelict I'm having this very issue with two SG-5100s using routed IPSEC. Would you be able to explain your solution a little bit more so that I can understand what I need to do on my end.

                                  // I worked with a guy doing exactly this. He first tried this:
                                  LAN <-> VTI (OB NAT) <-> VTI <-> WAN (OB NAT) <-> Internet
                                  He changed it to this because of this limitation on NAT on the VTI interface:
                                  LAN <-> VTI <-> VTI <-> WAN (OB NAT) <-> Internet
                                  Setting the Outbound NAT on the WAN to NAT the LAN source addresses.
                                  All works fine. I think he said he's getting 500Mbps or more over it.
                                  You just have to make sure the WAN side has a gateway and a route back to the LAN network over the VTI.//

                                  I'm self taught and could use a slight hand holding on this one. Was super disappointed to encounter the issue using the routed IPSEC option but your info suggests current limitations can be overcome until the fix is made in FreeBSD. Appreciate any help you might be willing to provide.

                                  1 Reply Last reply Reply Quote 0
                                  • stephenw10S
                                    stephenw10 Netgate Administrator
                                    last edited by

                                    What exactly do you have configured now? What works? What doesn't work?

                                    The VTI interfaces have some limitations compared to other interface types, there is no reply-to feature due to where firewall rules are applied. Some NAT also cannot work because of that.
                                    As long as you avoid those it should work.

                                    Steve

                                    G 1 Reply Last reply Reply Quote 0
                                    • G
                                      gabacho4 Rebel Alliance @stephenw10
                                      last edited by gabacho4

                                      @stephenw10 appreciate the response. This thread (see link below) sums up my issues and Derelict later responded referring me back to this thread. I’m just trying to understand the solution he provides. Just looking for some explanation of the steps he outlines.

                                      Original thread I started:

                                      https://forum.netgate.com/topic/141613/can-i-route-internet-traffic-from-site-b-through-site-a-via-ipsec-vti

                                      1 Reply Last reply Reply Quote 0
                                      • DerelictD
                                        Derelict LAYER 8 Netgate
                                        last edited by Derelict

                                        Does this help?
                                        IPsec VTI.png

                                        ETA: better resolution and firewall rule box.

                                        Chattanooga, Tennessee, USA
                                        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                        Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                        G 1 Reply Last reply Reply Quote 1
                                        • G
                                          gabacho4 Rebel Alliance @Derelict
                                          last edited by

                                          @Derelict Most certainly. That's exactly how I have mine set up but am very glad to know this is how people smarter than I would do things. The biggest issue I suffer from is the 2xx ms latency due to distance between endpoints. Really do appreciate the extra help on this. Time is valuable and you let me have a little of yours.

                                          DerelictD 1 Reply Last reply Reply Quote 0
                                          • DerelictD
                                            Derelict LAYER 8 Netgate @gabacho4
                                            last edited by

                                            @ngoehring123 Yeah. Can't help you with the latency. Glad it helped.

                                            Chattanooga, Tennessee, USA
                                            A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                                            DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                                            Do Not Chat For Help! NO_WAN_EGRESS(TM)

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.