Strongswan-fritz-psk-dynamisch: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
Thomas (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „=fritz= <pre> </pre> conn s2f authby=secret keyexchange=ikev1 left=10.84.252.33 leftsubnet=10.83.33.0/24 rightid=@fritz.vpn.int…“) |
Thomas (Diskussion | Beiträge) (→fritz) |
||
| (3 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
| Zeile 1: | Zeile 1: | ||
=fritz= | =fritz= | ||
<pre> | <pre> | ||
| + | vpncfg { | ||
| + | connections { | ||
| + | enabled = yes; | ||
| + | conn_type = conntype_lan; | ||
| + | name = "fritz-dyn-main"; | ||
| + | always_renew = yes; | ||
| + | reject_not_encrypted = no; | ||
| + | dont_filter_netbios = yes; | ||
| + | localip = 0.0.0.0; | ||
| + | local_virtualip = 0.0.0.0; | ||
| + | remoteip = 0.0.0.0; | ||
| + | remote_virtualip = 0.0.0.0; | ||
| + | remotehostname = "zee.vpn.int"; | ||
| + | localid { | ||
| + | fqdn = "fritzbox.vpn.int"; | ||
| + | } | ||
| + | remoteid { | ||
| + | fqdn = "zee.vpn.int"; | ||
| + | } | ||
| + | mode = phase1_mode_idp; | ||
| + | phase1ss = "alt/aes/sha"; | ||
| + | keytype = connkeytype_pre_shared; | ||
| + | key = "suxer"; | ||
| + | cert_do_server_auth = no; | ||
| + | use_nat_t = no; | ||
| + | use_xauth = no; | ||
| + | use_cfgmode = no; | ||
| + | phase2localid { | ||
| + | ipnet { | ||
| + | ipaddr = 10.83.42.0; | ||
| + | mask = 255.255.255.0; | ||
| + | } | ||
| + | } | ||
| + | phase2remoteid { | ||
| + | ipnet { | ||
| + | ipaddr = 10.83.31.0; | ||
| + | mask = 255.255.255.0; | ||
| + | } | ||
| + | } | ||
| + | phase2ss = "esp-3des-sha/ah-no/comp-no/pfs"; | ||
| + | accesslist = "permit ip any 10.83.31.0 255.255.255.0"; | ||
| + | } ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500", | ||
| + | "udp 0.0.0.0:4500 0.0.0.0:4500"; | ||
| + | } | ||
</pre> | </pre> | ||
| + | =Strongswan= | ||
| + | */etc/ipsec.conf | ||
| + | <pre> | ||
conn s2f | conn s2f | ||
authby=secret | authby=secret | ||
keyexchange=ikev1 | keyexchange=ikev1 | ||
| − | left= | + | left=zee.vpn.int |
| − | leftsubnet=10.83. | + | leftsubnet=10.83.31.0/24 |
| − | rightid=@ | + | rightid=@fritzbox.vpn.int |
right=%any | right=%any | ||
rightsubnet=10.83.42.0/24 | rightsubnet=10.83.42.0/24 | ||
| Zeile 17: | Zeile 64: | ||
keylife=1h | keylife=1h | ||
auto=add | auto=add | ||
| − | + | </pre> | |
| + | */etc/ipsec.secrets | ||
| + | @zee.vpn.int @fritzbox.vpn.int : PSK "suxer" | ||
Aktuelle Version vom 19. Dezember 2017, 15:08 Uhr
fritz
vpncfg {
connections {
enabled = yes;
conn_type = conntype_lan;
name = "fritz-dyn-main";
always_renew = yes;
reject_not_encrypted = no;
dont_filter_netbios = yes;
localip = 0.0.0.0;
local_virtualip = 0.0.0.0;
remoteip = 0.0.0.0;
remote_virtualip = 0.0.0.0;
remotehostname = "zee.vpn.int";
localid {
fqdn = "fritzbox.vpn.int";
}
remoteid {
fqdn = "zee.vpn.int";
}
mode = phase1_mode_idp;
phase1ss = "alt/aes/sha";
keytype = connkeytype_pre_shared;
key = "suxer";
cert_do_server_auth = no;
use_nat_t = no;
use_xauth = no;
use_cfgmode = no;
phase2localid {
ipnet {
ipaddr = 10.83.42.0;
mask = 255.255.255.0;
}
}
phase2remoteid {
ipnet {
ipaddr = 10.83.31.0;
mask = 255.255.255.0;
}
}
phase2ss = "esp-3des-sha/ah-no/comp-no/pfs";
accesslist = "permit ip any 10.83.31.0 255.255.255.0";
} ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500",
"udp 0.0.0.0:4500 0.0.0.0:4500";
}
Strongswan
- /etc/ipsec.conf
conn s2f
authby=secret
keyexchange=ikev1
left=zee.vpn.int
leftsubnet=10.83.31.0/24
rightid=@fritzbox.vpn.int
right=%any
rightsubnet=10.83.42.0/24
ike=aes-sha1-modp1024
esp=3des-sha1-modp1024
ikelifetime=3h
keylife=1h
auto=add
- /etc/ipsec.secrets
@zee.vpn.int @fritzbox.vpn.int : PSK "suxer"