Never heard of proxy arp. Will look into it.
I added a line to iptables like this one in the FreeSwan net-2-net docu:
iptables -t nat -A POSTROUTING -o eth0 -s 10.0.0.0/24 -d \! 192.0.2.128/29 -j MASQUERADE
According to this docu (and others) behind the '-s' you provide the remote subnet. Is this correct since you want to disable masquerade from the local subnet to the remote subnet ?
I tried both these commands (*.9.0 is my local subnet,*.123.0 is the remote subnet):
iptables -t nat -A POSTROUTING -o vlan1 -s 192.168.9.0/24 -d \! 192.168.123.0/24 -j MASQUERADE
iptables -t nat -A POSTROUTING -o vlan1 -s 192.168.123.0/24 -d \! 192.168.9.0/24 -j MASQUERADE
But it didn't solve anything.
Is the POSTROUTING rule correct for OpenWRT ? Or should this be INPUT or OUTPUT or FORWARD?
My VPN network setup is :
Local subnet <====> OpenWRT <===> Livebox <===== internet =====> remove VPN router <====> remote subnet
(192.168.9.0/24) 192.168.9.3/ (internal ip)/ (remote inet ip) 192.168.123.0/24
(internal ip) (my inet ip)
Do I have to add a 'leftnexthop' to the ipsec config because I'm behind a livebox and not directly connected to the internet? I read somewhere that IPSEC traffic doesn't like to be NAT.