News: This forum is now permanently frozen.
Pages: [1] 2
Topic: VPN connection Ipsec behind LAN interface for clients  (Read 5848 times)
« on: July 23, 2013, 22:22:23 »
dr01 **
Posts: 79

How is this accomplished? I know this is a HUGE Monowall issue and needs to be resolved asap....why does Ipsec VPN traffic not work when a client is behind the LAN firewall subnet?

Where is the Solution to this issue?

PLEASE HELP ASAP......

Thank you to All.....
« Reply #1 on: July 23, 2013, 23:03:42 »
Fred Grayson *****
Posts: 994

You might want to read up on the following:

IPSec and NAT

NAT Traversal (NAT-T)

--
Google is your friend and Bob's your uncle.
« Reply #2 on: July 23, 2013, 23:29:10 »
dr01 **
Posts: 79

It would be easier if there is a feature or way to disable the firewall or deisable NAT feature inside monowall please....how can we perform this?  Thank you...
« Reply #3 on: July 24, 2013, 00:00:38 »
dr01 **
Posts: 79

Also why can't it be a simple GUI interface option within Monowall my IPsec VPN clients connect from behind NAT?
« Reply #4 on: July 24, 2013, 00:17:42 »
Fred Grayson *****
Posts: 994

It would be easier if there is a feature or way to disable the firewall or deisable NAT feature inside monowall please....how can we perform this?  Thank you...

If you are behind NAT you cannot disable NAT and still have an internet connection. The whole reason for NAT is to allow a single public IP address to be shared.

There are provisions in m0n0wall to provide for NAT traversal. Enabling this may help. Have you tried this?

Also, m0n0wall to m0n0wall IPSec with NATs is fully supported.

You haven't explained your setup, so what is it?
« Last Edit: July 24, 2013, 00:35:18 by Fred Grayson »

--
Google is your friend and Bob's your uncle.
« Reply #5 on: July 24, 2013, 03:39:56 »
dr01 **
Posts: 79

We have a /16 network on the LAN interface, we have opened up all the ports on the firewall rules for both WAN and LAN.....thats about it for setup....we do know the guests that try the VPN get connected outbound but no traffic inbound is seen connecting....

what are we setting up wrong?

thank you
« Reply #6 on: July 24, 2013, 03:45:49 »
Fred Grayson *****
Posts: 994

Hard to say what's wrong without seeing the complete configuration.

Have you followed the instructions found in the m0n0wall handbook?


--
Google is your friend and Bob's your uncle.
« Reply #7 on: July 24, 2013, 04:29:41 »
Lee Sharp *****
Posts: 517

This could be a NAT limiting issue.  If you have several clients behind one IP address connecting to a VPN server, many of those VPN servers can get confused.  This is not a bug, it is a known limitation of the protocol.  It is why hotels will let you have a real IP address for an extra fee.  For your situation, you have a few options.  Try and design a better VPN network, (Not possible for hotels) or give guests with this problem static IPs internally with 1 to 1 NAT so they are on different IPs when they hit the company server.

Could you describe what the actual problem is?  What VPN, EXACTLY?  True IPsec, or that "mobile client" dial-up like VPN?  (Cisco takes some serious, and very unfriendly, liberties with the IPsec standard.  They had to add special assistance to the ASA firewalls just to support some older versions of there broken client.)

FYI:  Screaming that "This is a bug that needs to be fixed" is totally non-helpful.  It may actually cause some people to abstain from assisting you.
« Reply #8 on: July 24, 2013, 12:49:45 »
dr01 **
Posts: 79

I agree, that saying a bug in the software it may not be and apologize.....I just know in our senario which is at Hotels and clients behind the LAN interface we get VPN complaints alot and other gateway solutions seem to have the VPN mastered and it works for their clients....I do know the older solution was to have a gateway router that asks a client upon login to the network if they request a VPN use and then they checked a box and the gateway at that point gave them a global IP assigned to them from the ISP direct on a bypass from the gateway. That works great....however Monowall does not do this or have this captive portal feature to ask a client if they want a bypass and a global static IP....

Maybe this final solution is to add a feature that inside aptive portal can give out a WAN IP Global static address in the pool of static IPs at a property to a VPN user thus bypassing the entire NAT LAN firewall issues???

What are the thoughts on adding that feature? Is that doable do you think?

Thanks again...
« Reply #9 on: July 24, 2013, 12:51:36 »
dr01 **
Posts: 79

Also of note if anyone wants to see our config we have no issue allowing a peek at it via a remote session....we can provide the IP and login credentials if anyone wants on our beta test gateway....
« Reply #10 on: July 24, 2013, 21:55:06 »
Lee Sharp *****
Posts: 517

I really do not miss installing Internet at hotels every day. Smiley

The fix is simple.  You need to give VPN users a 1 to 1 NAT manually.  Like this...

1) They call in with issue.
2) You ask them for their IP address, and when they are leaving.
3) You add that IP address to 1 to 1 NAT with an expiry date.
4) Ask them to try again and it works.
5) Clean up all the expired addresses no one else has cleaned up.

And yeah, this takes a boatload of staic IPs to do this, and all of them have to be in proxy arp.

And yes, this could be reasonably scripted from within CP and stuff, but it would not be trivial.
« Reply #11 on: July 25, 2013, 04:02:38 »
dr01 **
Posts: 79

So if I understand correctly, NAT 1:1 you would use the same address for external and internal? using a /32 for a single address? and the address that you insert there is the users IP address from behind the LAN port and NAT? Correct?

So like a user has 172.20.1.200 so you would use this address in NAT 1:1 external and internal? then it auto adds to proxy arp I think....

Please let me know....thank you
« Reply #12 on: July 25, 2013, 04:07:25 »
dr01 **
Posts: 79

also i forgto to ask...which interface do you apply the NAT 1:1 to?  The WAN or LAN?

thanks....


and yes I HATE Hotel IT work.....for this reason....monowall is a great router base software but it has a few items lacking that most the Hotel IT groups ask for now....like bandwidth utilization graphs...just an example....and this user interface VPN ease of use feature in CP
« Reply #13 on: July 25, 2013, 14:38:14 »
dr01 **
Posts: 79

Lee, one more question...so if we take every dhcp ip address available and add into the NAT 1:1 feature then in essance we have no Nat going on anymore for any clients behind the LAN interface as they would all be on a 1:1 relationship to the outside world and anyones VPN connection would work at that point regardless of their IP they were assigned when they arrived at a property?

Is this correct?Huh

Thank you.....
« Reply #14 on: July 25, 2013, 14:53:02 »
dr01 **
Posts: 79

I think I misunderstood the NAT 1:1 feature...you cannot nat 1:1 from an internal address to an internal address....instead its intended for an external glabal IP address in your available pool from your ISP to an internal LAN ip address inside monowall NAT pool....

as an example:  outbound: 50.45.21.107 to Internal: 172.20.1.200

then the ProxyARP is auto generated and then the guest using the .200 address can now access his/her VPN work network as they are no longer behind a NAT network anymore but rather straight out to the world using the .107 ISP Global Static IP

is this correct?Huh

So if correct then the allowed ISP Global static IP addresses to a property (lets say 20) would mean that I can only have 19 maximum VPN connections at that site as monowall WAN takes up one IP from the ISP...

Is this all correct???
 
Pages: [1] 2
 
 
Powered by SMF 1.1.20 | SMF © 2013, Simple Machines