@ditonet
How do you propose preventing the RB from passing traffic from 1.0.1.10 to 1.0.2.10 that isn’t from the ipsec tunnel? This is the point you seem to keep missing, intentionally or not, I’m not sure.
We shouldn’t legitimately ever see that traffic except from over the encrypted ipsec tunnel, thus blocking it would be a good thing, right?
And before you say, “I’ll never see that packet on the RB that isn’t from the IPSec tunnel…” realize that’s a falicy. You very easily can, and will, if someone spoof’s a packet with that source address.
The answer is, you can’t, without a rule like I want above.
And if you do get a packet on the WAN with that source address, you’ll have to pass it into the privileged LAN network, because if you don’t, your IPSec network won’t work either.
That’s the source of the problem.
[At the risk of this turning into a sandbox fight, you’re the one who simply doesn’t understand the flow of traffic.]
Perhaps you’re hoping that NAT will save you, and perhaps it will. But in a non NAT’ed network, that packet will flow right across the WAN to LAN without ever actually coming from the IPSec network.
So, the result is: Either
1)Accept spoofed packets as though they are from the IPSec tunnel and hope nothing bad comes of it, or
2) Drop the IPSec traffic, because you can’t verify that packet came from the ipsec tunnel.
Obviously, if you need your IPSec traffic to pass, you have to allow the spoofed packets. Not a good result, IMO.
Let me address another point, that you’re obviously confused on:
Traffic between clients (1.0.1.10 to 1.0.2.10) is only possible
when IPSec Security Associations between gateways (1.0.1.1 ↔ 1.0.2.1) are established.
If 1.0.1.10 and 1.0.2.10 are publicly routed addresses, than sending traffic from one host to another is just normal traffic. It doesn’t have to route via an ipsec tunnel. Unless you’re doing NAT, then it’s a simple route from one to the other. Since it’s simple routing, once the RB [or any firewall for that matter] see’s a packet with valid source and destination ip addresses, if there isn’t a default drop policy, it will simply route the packet.
Thus, a prudent practice is to drop all traffic you don’t explicitly want.
So, again, the policy I want is to drop all traffic from 1.0.1.0/24 to 1.0.2.0/24 unless I can guarantee it passed over the ipsec tunnel. And that’s the reason I want that rule above.
And it’s extremely frustrating to have you blanket claim that ROS will do everything in that linked article above when you simply REFUSE to show how that rule can be built on ROS. [It’s my assertion, it can’t. Backed up by offering you [or anyone else for that matter] $20 to provide it.]
Last thing.
Before you go write a bunch more stuff - answer this basic question.
How can you be sure you will never see a packet on the right side RB’s WAN that is from 1.0.1.10 that did NOT come over the ipsec tunnel?
If you can’t give a totally bullet-proof answer to that, then solve that problem first. The rest follows from that. If you don’t understand it, then don’t bother with anything else.
-Greg