I am trying to connect our office to a client's backend system so that we can access their systems to do 'stuff'.
They have passed my a set of IPsec details which I am happy with but the one requirement they have is that our PCs accessing their systems are natted behind a specified IP address.
So in essence they want traffic to do this:
Lan (192.168.2.0/24)<-> NATed to (193.24.50.90/32) <-> IPSec endpoint <-> Internet <-> IPsec endpoint <-> Their LAN <-> Their server
The issue is that the router we are using (Netgear DGFV338) will handle the IPsec stuff but will not NAT the ipsec traffic. So all we can do is:
Lan (192.168.2.0/24) <-> IPSec endpoint <-> Internet <-> IPsec endpoint <-> Their LAN <-> Their server
They are using the 192.168.2.0/24 subnet so we can't do this any other way.
The only thing I can think of doing is to put another router in front of the main one so:
LAN (192.168.2.0/24) <-> (192.168.2.1) Netgear 1 (193.24.50.90) <-> (193.23.50.91) Netgear 2 <-> Internet
But my concern is that traffic to our other office (192.168.0.0/24) which also goes over an IPsec vpn will be messed up by this.
Anybody here have any bright ideas ?
They have passed my a set of IPsec details which I am happy with but the one requirement they have is that our PCs accessing their systems are natted behind a specified IP address.
So in essence they want traffic to do this:
Lan (192.168.2.0/24)<-> NATed to (193.24.50.90/32) <-> IPSec endpoint <-> Internet <-> IPsec endpoint <-> Their LAN <-> Their server
The issue is that the router we are using (Netgear DGFV338) will handle the IPsec stuff but will not NAT the ipsec traffic. So all we can do is:
Lan (192.168.2.0/24) <-> IPSec endpoint <-> Internet <-> IPsec endpoint <-> Their LAN <-> Their server
They are using the 192.168.2.0/24 subnet so we can't do this any other way.
The only thing I can think of doing is to put another router in front of the main one so:
LAN (192.168.2.0/24) <-> (192.168.2.1) Netgear 1 (193.24.50.90) <-> (193.23.50.91) Netgear 2 <-> Internet
But my concern is that traffic to our other office (192.168.0.0/24) which also goes over an IPsec vpn will be messed up by this.
Anybody here have any bright ideas ?