OPNsense site2site IPSEC: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
| (8 dazwischenliegende Versionen desselben Benutzers werden nicht angezeigt) | |||
| Zeile 18: | Zeile 18: | ||
| '''Phase 2''' || colspan="2" | AES256 – SHA256 – DH16 | | '''Phase 2''' || colspan="2" | AES256 – SHA256 – DH16 | ||
|- | |- | ||
| − | | '''IKE-LIFETIME''' || colspan="2" | 10800s | + | | '''IKE-LIFETIME (Phase 1)''' || colspan="2" | 10800s |
|- | |- | ||
| − | | '''ESP-LIFETIME''' || colspan="2" | 3600s | + | | '''ESP-LIFETIME (Phase 2)''' || colspan="2" | 3600s |
|} | |} | ||
| − | |||
==Schaubild== | ==Schaubild== | ||
| Zeile 49: | Zeile 48: | ||
|} | |} | ||
| − | =VPN: IPsec: Connections | + | =VPN: IPsec: Connections (Advanced Options einblenden)= |
| − | |||
*VPN | *VPN | ||
**IPsec | **IPsec | ||
| − | *** | + | ***Connections |
{| class="wikitable" | {| class="wikitable" | ||
! Parameter !! Wert | ! Parameter !! Wert | ||
| Zeile 101: | Zeile 99: | ||
==Enable IPsec== | ==Enable IPsec== | ||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
| − | |||
*VPN | *VPN | ||
**IPsec | **IPsec | ||
| Zeile 205: | Zeile 197: | ||
*VPN | *VPN | ||
**IPsec | **IPsec | ||
| − | ***Security Policy Database | + | ***Security Policy Database |
| − | |||
| − | |||
==Firewall== | ==Firewall== | ||
;Wir gehen davon aus, das ausgehender Verkehr freigeschaltet ist. | ;Wir gehen davon aus, das ausgehender Verkehr freigeschaltet ist. | ||
*Die Gegenseite muss zu unserer Firewall UDP Port 500 und ESP Verbindungen aufbauen können. | *Die Gegenseite muss zu unserer Firewall UDP Port 500 und ESP Verbindungen aufbauen können. | ||
| − | *Desweiteren müssen die Partnernetze zu | + | *Desweiteren müssen die Partnernetze zu unserem Netz freigeschaltet werden. |
| + | |||
== IPsec / WAN Firewall-Regeln == | == IPsec / WAN Firewall-Regeln == | ||
{| class="wikitable" | {| class="wikitable" | ||
| Zeile 218: | Zeile 209: | ||
| UDP (Port 500) || 192.168.4.214 || 192.168.4.213 || WAN || ALLOW | | UDP (Port 500) || 192.168.4.214 || 192.168.4.213 || WAN || ALLOW | ||
|- | |- | ||
| − | | ESP || 192.168.4.214 || 192.168.4. | + | | ESP || 192.168.4.214 || 192.168.4.213 || WAN || ALLOW |
|- | |- | ||
| ANY || 172.17.214.0/24 || 172.17.213.0/24 || IPSEC || ALLOW | | ANY || 172.17.214.0/24 || 172.17.213.0/24 || IPSEC || ALLOW | ||
|} | |} | ||
Aktuelle Version vom 18. Februar 2026, 07:21 Uhr
VPN Daten
Kenndaten
| Einstellung | opnsense.it213.xinmen.de | opnsense.it214.xinmen.de |
|---|---|---|
| Protokoll 2 | IKEv2 | |
| ID | 192.168.4.213 | 192.168.4.214 |
| IP Address | 192.168.4.213 | 192.168.4.214 |
| Internes Netz | 172.17.213.0/24 | 172.17.214.0/24 |
| Pre-Shared Key (PSK) | 123Start$ | |
| Phase 1 | AES256 – SHA256 – DH16 | |
| Phase 2 | AES256 – SHA256 – DH16 | |
| IKE-LIFETIME (Phase 1) | 10800s | |
| ESP-LIFETIME (Phase 2) | 3600s | |
Schaubild
IT213 Seite
- VPN
- IPsec
- Pre-Shared Keys
- IPsec
| Feld | Wert |
|---|---|
| Local Identifier | 192.168.4.213 |
| Remote Identifier | 192.168.4.214 |
| Pre-Shared Key | 123Start$ |
| Type | PSK |
| Description | - |
VPN: IPsec: Connections (Advanced Options einblenden)
- VPN
- IPsec
- Connections
- IPsec
| Parameter | Wert |
|---|---|
| Enabled | Ja |
| Proposals | aes256-sha256-modp4096 (DH16) |
| Unique | No (default) |
| Aggressive Mode | Nein |
| Version | IKEv2 |
| MOBIKE | Ja |
| Local addresses | 192.168.4.213 |
| Local port | 500 |
| Remote addresses | 192.168.4.214 |
| Remote port | 500 |
| UDP encapsulation | Nein |
| Re-auth time (s) | 10800 |
| Rekey time (s) | - |
| Over time (s) | - |
| DPD delay (s) | - |
| DPD timeout (s) | - |
| Pools | None |
| Send cert req | Ja |
| Send certificate | Default |
| Keyingtries | - |
| Description | it213-it214 |
Enable IPsec
- VPN
- IPsec
- Connections
- Enable IPSEC (x)
- Connections
- IPsec
Local Authentication
- VPN
- IPsec
- Connections
- Local Authentication
- Connections
- IPsec
| Parameter | Wert |
|---|---|
| Enabled | Ja |
| Connection | it213-it214 |
| Round | 0 |
| Authentication | Pre-Shared Key |
| ID | 192.168.4.213 |
| Certificates | None |
| Description | - |
Remote Authentication
- VPN
- IPsec
- Connections
- Remote Authentication
- Connections
- IPsec
| Parameter | Wert |
|---|---|
| Enabled | Ja |
| Connection | it213-it214 |
| Round | 0 |
| Authentication | Pre-Shared Key |
| ID | 192.168.4.214 |
| Certificates | None |
| Certificate Authorities | None |
| Description | - |
Children
- VPN
- IPsec
- Connections
- Children
- Connections
- IPsec
| Parameter | Wert |
|---|---|
| Enabled | Ja |
| Connection | it213-it214 |
| Use sha256_96 | Nein |
| Mode | Tunnel |
| Policies | Ja |
| Start action | Start |
| Close action | None |
| DPD action | Clear |
| Reqid | - |
| ESP proposals | aes256-sha256-modp4096 (DH16) |
| Local network | 172.17.213.0/24 |
| Remote network | 172.17.214.0/24 |
| Rekey time (s) | 3600 |
| Description | it213-it214-net |
VPN: Status Overview
- VPN
- IPsec:
- Status Overview
- IPsec:
VPN: IPsec: Security Policy Database
- VPN
- IPsec
- Security Policy Database
- IPsec
Firewall
- Wir gehen davon aus, das ausgehender Verkehr freigeschaltet ist.
- Die Gegenseite muss zu unserer Firewall UDP Port 500 und ESP Verbindungen aufbauen können.
- Desweiteren müssen die Partnernetze zu unserem Netz freigeschaltet werden.
IPsec / WAN Firewall-Regeln
| Protokoll | Quelle | Ziel | Interface | Aktion |
|---|---|---|---|---|
| UDP (Port 500) | 192.168.4.214 | 192.168.4.213 | WAN | ALLOW |
| ESP | 192.168.4.214 | 192.168.4.213 | WAN | ALLOW |
| ANY | 172.17.214.0/24 | 172.17.213.0/24 | IPSEC | ALLOW |
