Grant,
In your analysis you forget that the packet delivered by the Router A to
Router B (or viceversa) is an encrypted packet. Once the packet in decrypted
in the other end the headers are the headers of the original packets. Then,
the scenary is more funny.
Jorge.
On Thu, 07 Jun 2007 13:03:54 -0500
Grant Taylor <gtaylor@xxxxxxxxxxxxxxxxx> wrote:
On 06/07/07 12:07, Grant Taylor wrote:
iptables -t nat -A PREROUTING -i $WAN -d D.E.F.x/24 -j NETMAP --to
A.B.C.x/24
iptables -t nat -A POSTROUTING -o $LAN -s A.B.C.x/24 -j NETMAP --to
D.E.F.x/24
This should cause the NETMAPing to happen at the remote end of the vpn
link and (hopefully) not confuse the router at the local end of the vpn
link.
I've done some more thinking and I think it would be better to do the SNAT
at the local end of the vpn link. Doing the SNAT on the remote end will
work, but it is not as scalable as doing it on the local end.
If you consider your situation where you have multiple networks (3 or
more) that are all the same subnet that you want to tie together, you have
to SNAT and DNAT for each network. DNATing should be done at the remove
end to change from the bogus address to the real address. If SNATing is
done at the remove end, the remote end will have to have rules for each and
every other network to know what to SNAT to. If SNATing is done at the
local end, the local router knows what to SNAT to and the remote end will
just DNAT and reply. So a slightly modified version of the above rules
would be:
iptables -t nat -A PREROUTING -i $WAN -d D.E.F.x/24 -j NETMAP --to
A.B.C.x/24
iptables -t nat -A POSTROUTING -o $WAN -d D.E.N.x/16 -j NETMAP --to
D.E.M.x/24
Where D.E.N.x/16 is the larger class B that encompasses all remote
networks. I.e. selectively SNAT only when you are going to a remote
network.
Where D.E.M.x/24 is the local bogus network.
This *SHOULD* allow you to have two rules on each system to allow all of
them to communicate with each other presuming that they have routes for the
D.E.N.x/16 (sub)network(s), be it an ethernet link, IPSec VPN, ATM WAN, or
what ever.
Grant. . . .
Jorge Isaac Davila Lopez
Nicaragua Open Source
+505 430 5462
davila@xxxxxxxxxxxxxxxxxxxxxxx