Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Request to add default firewall rule of WAN2WAN forwarding for (strongswan) policy based vpn #10929

Closed
sunshinejnjn opened this issue Oct 8, 2022 · 3 comments

Comments

@sunshinejnjn
Copy link

Due to the default block on forwarding from the WAN zone and default installing of Virtual IP on "outbound" interface (the WAN) by strongswan IPSec VPN using swanctl, which is known as a policy-based VPN, client traffic via IPSec tunnel to the wan side would arrive from the WAN zone on the wan interface and then got blocked on forwarding by wan_forwarding chain of "inet fw4" nft table, and won't be SNATted/MASQUERADed correctly by srcnat rules at postrouting.

A default allow-wan2wan forwarding rule would solve this, something like the following in /etc/config/firewall

config rule
option name 'AllowWAN2WAN'
list proto 'all'
option src 'wan'
option dest 'wan'
option target 'ACCEPT'

@stintel
Copy link
Member

stintel commented Dec 14, 2022

I'm tempted to NAK this. If needed, the user can add this themselves.

@Spudz76
Copy link
Contributor

Spudz76 commented Dec 14, 2022

seems like it should make a virtual interface like OpenVPN does, and then that would be its own zone such as "VPN", instead of gangbanging IP addresses on the wan device and causing the problem in the first place.

@stintel
Copy link
Member

stintel commented Dec 14, 2022

Closing this. Like I said before, if it's needed, the user can configure it themselves. I'll give a hint for an alternative solution: use an xfrm interface and link that to a firewall zone.

@stintel stintel closed this as not planned Won't fix, can't repro, duplicate, stale Dec 14, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants