diff --git a/docs/IPSEC-2.6.xml b/docs/IPSEC-2.6.xml index 723d4e79f..de27fb398 100644 --- a/docs/IPSEC-2.6.xml +++ b/docs/IPSEC-2.6.xml @@ -59,59 +59,14 @@ (most notably SUSE 9.1 through 10.0). - - You must have BOTH the - Netfilter+ipsec patches and the policy match patch. One without the other will not work. - - Here's a combination of components that I know works: - - - - Kernel 2.6.11 from kernel.org. Patched with: - - - - The five patches in http://shorewall.net/pub/shorewall/contrib/IPSEC/2.6.11 - - - - The "policy match" extension from the Patch-o-matic-ng CVS - snapshot from 2005-May-04 (be sure to NOT try to apply the - ipsec-NN patches from patch-o-matic-ng). - - - - - - iptables 1.3.1 patched with the "policy match" extension from - the Patch-o-matic-ng CVS snapshot from 2005-May-04. - - - - ipsec-tools 0.5.2 compiled from source. I've also had success - with: - - - - ipsec-tools 0.5.2 and racoon 0.5.2 from Debian - Sarge/testing - - - - The ipsec-tools 0.5 rpm from SUSE - 9.3. - - - - - - As of this writing, the Netfilter+ipsec and policy match support are broken when used with a bridge device. The problem has been reported to - the responsible Netfilter developer who has confirmed the problem. + the responsible Netfilter developer who has confirmed the problem. The + problem was presumably corrected in Kernel 2.6.20 as a result of the + removal of defered FORWARD/OUTPUT processing of traffic destined for a + bridge. See the "Bridging without + using physdev match support" article.
@@ -365,6 +320,27 @@ loc vpn ACCEPT vpn loc ACCEPT + If you need access from each firewall to hosts in the other network, + then you could add: + +
+ #SOURCE DESTINATION POLICY LEVEL BURST:LIMIT +$FW vpn ACCEPT +
+ + If you need access between the firewall's, you should describe the + access in your /etc/shorewall/rules file. For example, to allow SSH access + from System B, add this rule on system A: + +
+ #ACTION SOURCE DESTINATION PROTO POLICY +ACCEPT vpn:134.28.54.2 $FW +
+ + Note that your Security Policies must also be set up to send traffic + between 134.28.54.2 and 206.162.148.9 through the tunnel (see + below). + Once you have these entries in place, restart Shorewall (type shorewall restart); you are now ready to configure IPSEC. @@ -857,4 +833,4 @@ all all REJECT info ipsec-tools source tree. It has a wide variety of sample racoon configuration files.
- + \ No newline at end of file