Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Nat

    Scheduled Pinned Locked Moved NAT
    21 Posts 3 Posters 1.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • JeGrJ
      JeGr LAYER 8 Moderator
      last edited by

      OK so now please again define what IP should show up on which side with what IP? As I only see "LAN network" I guess your local network is 172.30.20.0/24?

      Also you are using very strange and potentially unsafe IPSEC crypto settings. Using DH Groups smaller than 2k isn't recommended. Also running 3DES and SHA1 in phase 2 when you run AES-256-CBC and SHA256 on phase 1 makes no sense to me at all. 3DES and SHA1/MD5 are also considered unsafe and should be avoided. To mix in such old things with the newer ones in phase 1 is ... confusing.

      Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

      1 Reply Last reply Reply Quote 0
      • F
        felipe_antocheski
        last edited by

        Thank you for your help.
        So the intention is that my network can access the network 192.168.0.1
        and this same network, get access to mine which is 172.30.20.1

        1 Reply Last reply Reply Quote 0
        • JeGrJ
          JeGr LAYER 8 Moderator
          last edited by

          Your intention is fine, but I need config to see to help. I can't just turn on my crystal ball and read minds, you know? ;)

          So if your networks don't overlap, why do you try to NAT your IPs when connecting both networks via IPSEC? And that doesn't explain why you used such strange cipher/security settings either.

          Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

          1 Reply Last reply Reply Quote 0
          • F
            felipe_antocheski
            last edited by

            Essa configuração de segurança foi a mesma que me foi passada pela empresa, que eu to tentando liberar o acesso.
            Autenticação.png Phase1.png Network.png Fase 2.png

            I followed this model sent to me

            1 Reply Last reply Reply Quote 0
            • JeGrJ
              JeGr LAYER 8 Moderator
              last edited by JeGr

              And why was it send to you with

              a) such bad settings when there are obviously better settings available!
              b) why has the other side configured 10.15.10.0/24 as your remote network if you use 172.30.20.0/24?
              c) why do they use bad/weak encryption in phase 2 if there are better possibilities?

              It simply doesn't make sense. You shouldn't just "mimic" configuration you get sent, if it's wrong or broken, question it instead of trying to bend you configuration in ways it shouldn't.

              So I would call back and ask those 3 questions and ask for the settings to be corrected. The only thing that could be right is the "wrong" remote address subnet IF they have already 172.30.20.0/24 in use on THEIR side. Then configuring the BINAT setting in your phase 2 config is right. But unless that is confirmed, I'd reject that configuration as bad/wrong/insecure and ask why.

              PS: nothing wrong being a "beginner". Everyone has to start somewhere. But don't try to run a bad/wrong configuration if you can just ask back to correct it (if possible).

              Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

              If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

              1 Reply Last reply Reply Quote 0
              • F
                felipe_antocheski
                last edited by

                To be honest, I'm kind of a layman at ipsec, I'm studying to understand better.

                I believe the hardest I get, which is dripping 192.168.0.1

                1 Reply Last reply Reply Quote 0
                • F
                  felipe_antocheski
                  last edited by

                  I will question them, and redo this rule

                  1 Reply Last reply Reply Quote 0
                  • F
                    felipe_antocheski
                    last edited by

                    Thank you so much for your help, I will change my security and talked to them too.

                    1 Reply Last reply Reply Quote 0
                    • JeGrJ
                      JeGr LAYER 8 Moderator
                      last edited by JeGr

                      As said above, try to insist to use at least

                      • AES-256 (CBC) or AES-256-GCM (better)
                      • IKEv2 (seems available)
                      • SHA-256 or SHA-384
                      • DH Group 20 (nist ecp384)

                      and the same in phase 2. Lifetimes 28800 and 3600 are OK.

                      @jimp or @johnpoz or any other global mods: Please move that topic to IPSEC as the NAT part is pretty much nonexistent and/or subject to a IPSEC connection - so nothing to do with classical inbound or outbound NAT settings :)

                      Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                      If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                      1 Reply Last reply Reply Quote 0
                      • F
                        felipe_antocheski
                        last edited by

                        I already fixed

                        Captura de Tela 2019-09-11 às 08.31.15.png Captura de Tela 2019-09-11 às 08.31.13.png Captura de Tela 2019-09-11 às 08.30.57.png

                        1 Reply Last reply Reply Quote 0
                        • JeGrJ
                          JeGr LAYER 8 Moderator
                          last edited by JeGr

                          Remove the checkbox in front of 3DES so your connection will not simply downgrade if the other side wants to speak 3DES. Otherwise you'll still connect with that :)
                          Also many peers don't run IPSEC with AES-GCM yet (even in 2019 - a shame!) so be prepared to select AES256 (CBC) instead. Not that performant but secure nontheless.

                          Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                          If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                          1 Reply Last reply Reply Quote 0
                          • F
                            felipe_antocheski
                            last edited by

                            Thank you for your help.
                            unchecked the 3d
                            I already questioned the other side about the settings.

                            1 Reply Last reply Reply Quote 0
                            • N
                              neelsha02
                              last edited by

                              @felipe_antocheski said in Nat:

                              protocol

                              OpenVPN is fast, flexible, and secure you should give it a try.

                              1 Reply Last reply Reply Quote 0
                              • F
                                felipe_antocheski
                                last edited by

                                I already have and use the problem that when I connect with it I can't use my local network

                                1 Reply Last reply Reply Quote 0
                                • JeGrJ
                                  JeGr LAYER 8 Moderator
                                  last edited by

                                  Somehow I suspect that that answer was some spam-bot as it isn't related to anything written here. But

                                  when I connect with it I can't use my local network

                                  That would just be a simple OVPN configuration mistake. If that's still a problem - just ask in another topic and we'll deal with it then ;)

                                  Don't forget to upvote 👍 those who kindly offered their time and brainpower to help you!

                                  If you're interested, I'm available to discuss details of German-speaking paid support (for companies) if needed.

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post
                                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.