Jan 09 10 1:29 am
Jan 11 10 7:09 pm
how to allow ESP + ISA KMP protocols to pass through Wingate (I want to forward them to the Cisco)?
is it ok if I install 4 NICs (2x WAN, 1x LAN, 1x DMZ) in Wingate machine (XP SP3)?
how to provide simultaneous functioning of two Internet connections to utilize the whole bandwidth?
when having multiple ISPs, how Wingate define if one of the Internet connections becomes non-operational?
in case of above mentioned VPN, Cisco ip will also be NATed by Wingate, and I can not understand, how Wingate will do it, if it has two Internet connections (=> 2 public ips)? Each time (i.e. for each VPN session) use only one public ip or what?
Jan 11 10 9:41 pm
logan wrote:ISAKMP is done over TCP/UDP, so you can forward this through WinGate's firewall from Extended Networking.Protocol 50 (ESP) on the other hand is automatically handled by WinGate's extended networking driver, so does not need to be forwarded at all.
logan wrote:Some WinGate services have a Gateways configuration section which lets you specify how the service will utilize internet gateways available on the machine. Set the connection scheme to "Use specific connections in rotation" and add the two internet connections to the list of connections. This will make the service rotate outgoing connections around both the internet gateways.
logan wrote:WinGate actually pings one step past the gateway so that it can also test if the gateway has an internet connection or not.
logan wrote:WinGate will use the public IP that the VPN clients connected to. So if the client connected to the first internet connection, that VPN session will remain on the first internet connection. If the client connected to the second internet connection, the VPN session would remain on the second internet connection. So WinGate has no control over which internet connection is used for VPN sessions. This is entirely up to which IP the clients connect to.
Mar 22 10 1:55 am
Mar 23 10 1:19 pm
Alen wrote:Report:
Issue 1 - VPN (ESP + ISAKMP) between Cisco routers through Wingate: I realized VPN between Ciscos directly, bypassing Wingate. Simpler is better.
Alen wrote:Issue 2 - Simultaneous use of 2 ISPs: I used additional border Cisco for it, installed after Wingate, which pings one reliable Internet area server per each ISP line to check Internet availability via that ISP.
Because I wanted Wingate to control all my Internet users, including NAT users, I had to make double NAT (on Wingate, then on Cisco). 2 weeks in production - all is ok.
Still have unanswered academic questions:
1. As I understand, ESP is allowed automatically by Wingate even if firewall settings (Internet 2 LAN) are Block by default?!
Alen wrote:2. Is Wingate making NAT-T? (The question was important, because ISA KMP initially uses UDP 500, but NAT-T "removes" its port to UDP 4500. So which one has to be forwarded on Wingate?).
Alen wrote:3. nate 6.x can not use 2 ISP connections (simultaneously or even as autobackup) for NAT and SMTP proxy services. Is this correct?
Alen wrote:4. You wrote: "WinGate actually pings one step past the gateway so that it can also test if the gateway has an internet connection or not".
Can you explain in details what do you mean, and how Wingate know which one is "one step past"? Tracerouting wingate.com? ;-)
I also want you to pay attention on the fact ISP may have 2 or more "next hops" inside his network before going out...
Mar 23 10 8:15 pm
adrien wrote:I just looked through the code. I can't see anywhere where ESP packets are subjected to any checks. However, an incoming ESP packet won't be able to be forwarded unless it is part of an existing ESP "connection", since we don't create hash (connection) entries in the driver for unknown inbound traffic - except where there are redirection entries in port security, which only occurs for TCP / UDP.
adrien wrote: the packet is actually an ICMP echo request packet destined for 192.5.6.30 which is a.gtld-servers.net, a root DNS server.
Mar 23 10 11:59 pm
Alen wrote:adrien wrote:I just looked through the code. I can't see anywhere where ESP packets are subjected to any checks. However, an incoming ESP packet won't be able to be forwarded unless it is part of an existing ESP "connection", since we don't create hash (connection) entries in the driver for unknown inbound traffic - except where there are redirection entries in port security, which only occurs for TCP / UDP.
So, it was impossible to do what I wanted through Wingate!? (Because VPN connection should become up by request of both sides, not only Wingate behind one)
I am glad I did not try that variant and spent time.
Alen wrote:adrien wrote: the packet is actually an ICMP echo request packet destined for 192.5.6.30 which is a.gtld-servers.net, a root DNS server.
I made almost the same in Cisco, just choose other servers. I thought I invented a bicycle;-) (I thought a lot to whom ping to count I have\have not Internet connection, when understand: it should be a service - global and critical for the whole Internet).
P.S. IMHO, TTL=3 is too small. ISP could freely have more than 3-6 hops inside his network.
I'll tell you more: quite often one of the global ISPs (which provides connection for our ISPs) have no connection to Internet. Tracert shows we have ~ 15-20 hops before quiting the country...
Mar 24 10 12:35 am
adrien wrote:hmmm, perhaps a configurable option for TTL would be useful.
In fact in the driver code we implemented checking using several methods, ARP (only checks if next hop is responding to ARP), ICMP echo (expecting echo reply), and ICMP echo expecting TTL timeout (tracert). We also considered UDP or even TCP tracert, but these could cause issues for intermediaries.
Mar 24 10 1:45 am