Skip to Content.
Sympa Menu

rare-users - Re: [RARE-users] [freertr] [rare-dev] Routing between wireguard tunnels

Subject: RARE user and assistance email list

List archive

Re: [RARE-users] [freertr] [rare-dev] Routing between wireguard tunnels


Chronological Thread 
  • From: Gabriel Tetzner <>
  • To: Frédéric LOUI <>
  • Cc: , , mc36 <>
  • Subject: Re: [RARE-users] [freertr] [rare-dev] Routing between wireguard tunnels
  • Date: Wed, 31 Aug 2022 10:46:08 -0300

Hi Frederic,

answering the first question, I want a tunnel wireguard from another network to reach the end of another tunnel wireguard from another network. 

A little crazy I know haha,

answering the question, with Csaba's help I chose a routing protocol and isolated the underlay and overlay with VRF, and I am using the EIGRP4 protocol for routing, I wanted to know if this is a good protocol as well, some attempts gave error, but it worked in the end.

"What is the IP of the Debian machine ? Is it the machine running freeRtr ? A machine connected to freertr-r3 ?  " ->

So it would be the machine running freeRouter, this machine is in the cloud, however I have a prometheus server on it, and it is not the prometheus agent but the server running in docker on the machine with freeRouter:

https://prometheus.io/

image.png

This machine in the topology would be the freeRtr-r3, it is in aws and its IP configuration:

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65535 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: enX0: <BROADCAST,MULTICAST,PROMISC,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000
    link/ether 02:b1:02:dc:c6:18 brd ff:ff:ff:ff:ff:ff
3: br-122d8c7c1e50: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default
    link/ether 02:42:61:21:c7:60 brd ff:ff:ff:ff:ff:ff
    inet 172.18.0.1/16 brd 172.18.255.255 scope global br-122d8c7c1e50
       valid_lft forever preferred_lft forever
4: docker0: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc noqueue state DOWN group default
    link/ether 02:42:f3:e6:60:b3 brd ff:ff:ff:ff:ff:ff
    inet 172.17.0.1/16 brd 172.17.255.255 scope global docker0
       valid_lft forever preferred_lft forever
10: tap20001: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UNKNOWN group default qlen 1000
    link/ether 00:00:4e:2c:4e:2b brd ff:ff:ff:ff:ff:ff
    inet 10.255.255.1/24 scope global tap20001
       valid_lft forever preferred_lft forever
    inet6 2001:db8:ffff:ffff:200:4eff:fe2c:4e2b/64 scope global dynamic mngtmpaddr
       valid_lft 2419189sec preferred_lft 604789sec
    inet6 fe80::200:4eff:fe2c:4e2b/64 scope link
       valid_lft forever preferred_lft forever
23381: veth4b2630d@if23380: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-122d8c7c1e50 state UP group default
    link/ether d2:6f:3c:b2:e3:63 brd ff:ff:ff:ff:ff:ff link-netnsid 0
23383: vethdad3c9c@if23382: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue master br-122d8c7c1e50 state UP group default
    link/ether 5e:d6:da:31:4a:2f brd ff:ff:ff:ff:ff:ff link-netnsid 1

"In this topology consider that there is a prometheus server running on top of freeRtr-r3 debian and I need to talk to 10.0.0.3? »
Do you mean freertr server running Prometheus agent ?

Answer: As I mentioned in the text, the prometheus agent will only be on the other end (freeeRtr-r2), the prometheus server is running in a container on the debian machine freeRtr-3.

Now the big question arises for me:

I need the debian machine where freeRtr-3 is running, to reach the ip of the other end, in my view if freeRouter reaches through a tunnel wireguard and a routing protocol, the host machine (debian) of freeRtr should recognize it too.

Or the way I set it up is also wrong, but I think there is a way, either create a tap, or connect another tunnel wireguard from inside freeRtr-r3 to inside her host vm, so there will be communication. 

I need this so that the prometheus server can reach the endpoint of the tunnel wireguard of freeRtr-r2 so that it can monitor the network interfaces of freeRtr-r2 through an agent running on top of it.

Here is a picture of the topology to help:

image.png


Background: I am working on this topology to ensure that there is monitoring with network isolation.

Honestly I am lost, I need help...

Thank you,

Att: Gabriel Tetzner





Em qua., 31 de ago. de 2022 às 06:27, Frédéric LOUI <> escreveu:
Hi Gabriel,

Good to see that you did progress thanks to Csaba’s advice.
Looking at your question, something is not clear for me, what are you trying to achieve ?
Which end to end connectivity do you want to enable here?

You mention: "debian machine in freeRtr-r3 ping the ip of the freeRtr-2 tunnel"

What is the IP of the Debian machine ? Is it the machine running freeRtr ? A machine connected to freertr-r3 ?

You also mention:
"In this topology consider that there is a prometheus server running on top of freeRtr-r3 debian and I need to talk to 10.0.0.3? »
Do you mean freertr server running Prometheus agent ?

Is it possible to share configs of r1/r2 and r3 ?

Or please elaborate.

Thanks
Frederic

> Le 26 août 2022 à 22:17, Gabriel Tetzner <> a écrit :
>
> Now I am left with a question, how do I make the debian machine in freeRtr-r3 ping the ip of the freeRtr-2 tunnel?
>
> In this topology consider that there is a prometheus server running on top of freeRtr-r3 debian and I need to talk to 10.0.0.3?




Archive powered by MHonArc 2.6.19.

Top of Page