Update ipsec-rw-srv-ikev1xauth.rst

pull/72/head
Michael 6 years ago committed by GitHub
parent 21947133a6
commit 46d78e96cf
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -15,7 +15,7 @@ the connection plus XAuth for authentication. This is the most secure variant fo
with the most work to do.
Hybrid RSA + XAuth: Hybrid RSA is the same as Mutual, without the need for a client certificate. Only
the server will be authenticated (like using https) to prevent man-in-the-middle attacks like with
Mutual PSK. It's more secure than PSK but does not need the complete roll-out process lie with Mutual RSA.
Mutual PSK. It is more secure than PSK but does not need the complete roll-out process lie with Mutual RSA.
We assume you have read the first part at
:doc:`how-tos/ipsec-rw`
@ -48,12 +48,12 @@ For our example will use the following settings:
IKE Extensions
--------------
========================= ================ ================================================
**Enable** checked *check to enable mobile clients*
**User Authentication** Local Database *For the example we use the Local Database*
**Group Authentication** none *Leave on none*
**Virtual Address Pool** 10.10.0.0/24 *Enter the IP range for the remote clients*
========================= ================ ================================================
========================== ================ =============================================
**Enable** checked *check to enable mobile clients*
**User Authentication** Local Database *For the example we use the Local Database*
**Group Authentication** none *Leave on none*
**Virtual Address Pool** 10.10.0.0/24 *Enter the IP range for the remote clients*
========================== ================ =============================================
You can select other options, but we will leave them all unchecked for this
example.
@ -67,37 +67,37 @@ Step 3 - Phase 1 Mobile Clients
Phase 1 General information
---------------------------
========================= ============= ================================================
**Connection method** default *default is 'Start on traffic'*
**Key Exchange version** V1 *XAuth only works on V1*
**Internet Protocol** IPv4
**Interface** WAN *choose the interface connected to the internet*
**Description** MobileIPsec *freely chosen description*
========================= ============= ================================================
========================== ============= ==================================================
**Connection method** default *default is 'Start on traffic'*
**Key Exchange version** V1 *XAuth only works on V1*
**Internet Protocol** IPv4
**Interface** WAN *choose the interface connected to the internet*
**Description** MobileIPsec *freely chosen description*
========================== ============= ==================================================
Phase 1 proposal (Authentication)
---------------------------------
=========================== ====================== =========================================================================
**Authentication method** XAuth *Choose one of the three available options*
**Negotiation mode** Main Mode *Use Main Mode here*
**My identifier** Distinguished Name *Set the FQDN you used within certificate, for PSK use "My IP address"*
**Pre-shared Key** Shared secret *For Mutual PSK + XAuth use this PSK, otherwise certificate below*
**My Certificate** Certificate *Choose the certificate from dropdown list, only valid for RSA variants*
=========================== ====================== =========================================================================
=========================== ==================== ==========================================================================
**Authentication method** XAuth *Choose one of the three available options*
**Negotiation mode** Main Mode *Use Main Mode here*
**My identifier** Distinguished Name *Set the FQDN you used within certificate, for PSK use "My IP address"*
**Pre-shared Key** Shared secret *For Mutual PSK + XAuth use this PSK, otherwise certificate below*
**My Certificate** Certificate *Choose the certificate from dropdown list, only valid for RSA variants*
=========================== ==================== ==========================================================================
Phase 1 proposal (Algorithms)
-----------------------------
========================== ============= ===========================================================
**Encryption algorithm** AES *For our example we will use AES/256 bits*
**Hash algoritm** SHA1,SHA256 *SHA1 and SHA256 for compatibility*
**DH key group** 1024,2048 bit *1024 and 2048 bit for compatibility*
**Lifetime** 28800 sec *lifetime before renegotiation*
========================== ============= ===========================================================
========================== ================ ============================================
**Encryption algorithm** AES *For our example we will use AES/256 bits*
**Hash algoritm** SHA1, SHA256 *SHA1 and SHA256 for compatibility*
**DH key group** 1024, 2048 bit *1024 and 2048 bit for compatibility*
**Lifetime** 28800 sec *lifetime before renegotiation*
========================== ================ ============================================
Advanced Options are fine by default.
**Save** your setting.
**Save** your settings.
-------------------------------
Step 3 - Phase 2 Mobile Clients
@ -116,38 +116,38 @@ Now press the *+* at the right of this list to add a Phase 2 entry.
General information
-------------------
======================= ================== =============================
**Mode** Tunnel IPv4 *Select Tunnel mode*
**Description** MobileIPsecP2 *Freely chosen description*
======================= ================== =============================
================= =============== =============================
**Mode** Tunnel IPv4 *Select Tunnel mode*
**Description** MobileIPsecP2 *Freely chosen description*
================= =============== =============================
Local Network
-------------
======================= ================== ==============================
**Local Network** LAN subnet *Route the local LAN subnet*
======================= ================== ==============================
=================== ============ ==============================
**Local Network** LAN subnet *Route the local LAN subnet*
=================== ============ ==============================
Phase 2 proposal (SA/Key Exchange)
----------------------------------
=========================== ============ ====================================================
**Protocol** ESP *Choose ESP for encryption*
**Encryption algorithms** AES / 256 *For this example we use AES 256*
**Hash algorithms** SHA1,SHA256 *Same as before, mix SHA1 and SHA256*
**PFS Key group** off *Most mobile systems do not support PFS in Phase2*
**Lifetime** 3600 sec
=========================== ============ ====================================================
=========================== ============== ====================================================
**Protocol** ESP *Choose ESP for encryption*
**Encryption algorithms** AES / 256 *For this example we use AES 256*
**Hash algorithms** SHA1, SHA256 *Same as before, mix SHA1 and SHA256*
**PFS Key group** off *Most mobile systems do not support PFS in Phase2*
**Lifetime** 3600 sec
=========================== ============== ====================================================
**Save** your setting **Enable IPsec**, Select:
**Save** your settings and **Enable IPsec**, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png
:width: 100%
.. Note::
If you already had IPsec enabled and added Road Warrior setup, it's important to
If you already had IPsec enabled and added Road Warrior setup, it is important to
restart the whole service via services widget in the upper right corner of IPSec pages
or via **System->Diagnostics->Services->Strogswan** since applying configuration only
reloads it, but a restart also loads the required modules of strongswan.
reloads it, but a restart also loads the required modules of strongSwan.
------------------------
Step 4 - Add IPsec Users
@ -175,6 +175,3 @@ Go to **System->Trust->Certificates** and create a new client certificate.
Just click **Add**, choose your CA and probably increase the lifetime. Everything else besides
the CN can be left default. Give a **Common Name** and **Save**. Download the newly created
certificate as PKCS12 and export it to you enduser device.
----------------------

Loading…
Cancel
Save