Nathan,
I am trying to masquerade IPSec through the firewall.
I have a local VPN router that needs to connect to a remote peer, through my SME 5.5 server/firewall.
I did open for IP protocols 47,50,51,53 in the "forward" chain by "MASQ" in ipchains, as well as for UDP port 500 (but only from the known trusted IP to where I will connect).
The local VPN router trying to connect is complaining that the remote peer is not answering, and I suspect the firewall to block the answers from the remote peer.
I did test my "firewall punching" by ipchains -C and it tells me that the packets are masqueraded, but the router still can see them. Strange.
All ordinary packets (that is those not supposed to be IPSec tunnelled) go through the VPN router and then through the Firewall without problems (that is ping and WEB traffic). I can see my SME server through the VPN router and I can see the "wan leg" og the VPN router from my SME server and the rest of my local LAN, so that part is covered.
I guess I better go back checking the IPSec negitiation protocol and its numbers.
Michael