now I want to add to to Office1 another netwrok 10.1.203.0/24 that will be on ether3
how can I do this?
I have done the same setting (like I did for the first network ) on both side but I don’t get any replay
why?
can it been done even?
what do I need to change in order to make it work?
You will have to add this network to the policies.
When you want to do this kind of thing it is not advisable to use that method of IPsec tunnel.
Instead make a GRE/IPsec tunnel or IPIP/IPsec tunnel and put a /30 network on it.
Then route the traffic either manually using static routes or use BGP or OSPF do do it automatically.
my problem is that I don’t understand your solution
I have a server in office1 and a server in office 2
i don’t think it make any sence to make tunnels for every network I have in the main office…
isn’t the all idea of IPSEC? to make 1 secure tunnel ?
The sense of IPsec is to establish a secure connection between two sites.
What is sent through that secure connection is a different story.
“plain” IPSec is definitely great for just connecting two networks. Everything more is making it really complicated as you already experienced.
So pe1chl gave you a very wise hint to use a GRE or IPIP tunnel through IPsec. With those tunnels, you have much more possibilities in routing traffic back and forth. As many newtorks as you want. Through one tunnel. This tunnel is then encrypted by IPSec.
-Chris
throw everything away that you already configured (ipsec, nat rules, etc)
make a Interfaces->GRE tunnel at each end, fill in the local and remote public IP addresses (80.250.x.x)
put the checkmark at IPsec and fill in a key
add an IP->address to the tunnel at each end like 192.168.100.1/30 and 192.168.100.2/30
at each end configure a Routing->BGP->Peer with the remote address 192.168.100.x of the other end,
remote AS number 65530, nexthop choice “force self”, TTL 1 (leave other options at default)
at each end add the networks you want to route into Routing->BGP->networks and check the “synchronize” checkmark
That is all. More networks and sites can be added easily from now. You don’t need tricky policies or NAT avoidance rules,
you can have easy firewall rules on the tunnel interface if you like.
which network shuld I need to right in each end?
now I have all 4 networks in both ends
do I need to wirte in each end the networks on the other side OR the one on my side?
In BGP networks you should only put the networks at each end that are locally connected to that router.
So in your case you put things like 10.0.2.0/24 there.
In BGP Peers you should see the number of networks that the remote end has in the Prefix Count column.
In the IP->Routes you should see the routes that are added for the remote networks with distance 200.
When it still does not work you should check the IP->Firewall rules for blockings in the forward table that
you may need to modify (only required when you had already made changes there, it should be fine with
the default entries). Similar for IP->Firewall->NAT when you have put something other than defaults there.
I have no firewall \ NAT rules.
I have look again and saw this:
in “Main Office Server” I can see in IP-Route the Store netwrok - 192.169.1.0 reachable
in “Store Server” I can see it added the 3 networks but they are all unreachable
so I guess this is the prblem…
any idea why?
where can I search the problem ?