Aller à :navigation, rechercher
Wiki





notempty
Dieser Artikel bezieht sich auf eine nicht mehr aktuelle Version!

notempty
Der Artikel für die neueste Version steht hier

notempty
Zu diesem Artikel gibt es bereits eine neuere Version, die sich allerdings auf eine Reseller-Preview bezieht
































































































De.png
En.png
Fr.png






12.5.0
  • (v12.4)
  • (v12.4)
  • (v12.4)
→ VPN →IPSecVerbindungen





1 -
[[Datei: ]]
1
  • Roadwarrior
  • Site to Site

2 -
Name: IPSec Roadwarrior [[Datei: ]]
2
|| IKEv1 - Native ||
IKEv1 - XAuth
IKEv1 - Native
IKEv2 - Native
IKEv1 - L2TP

notempty
: 12.4



– IKEv1
3 - - IKEv1
Local Gateway ID:    
[[Datei: ]]
3 - IKEv1
Pre-Shared Key
RSA
Pre-Shared Key:    
X.509 :
'
IPSec Key

'
192.168.250.0/24

– IKEv2
3 - - IKEv2
Local Gateway ID:    
[[Datei:]]
3 - IKEv2
Pre-Shared Key
RSA
EAP-TLS '
Pre-Shared Key:    
X.509 :
'
IPSec Key
192.168.250.0/24

– IKEv1
4 - - IKEv1

'
IPSec Key [[Datei: ]]
4 - IKEv1

'
192.168.22.35/24

'
Remote Gateway ID:
'
192.0.2.192

   
  

'
192.168.222.35


  • – IKEv2
    4 - - IKEv2

    '
    IPSec Key [[Datei: ]]
    4 - IKEv2
    192.168.22.35/24

    '
    EAP-MSCHAPV2
    EAP-TLS
    X.509 :
    '
    IPSec Cert

    ' || IPSec ||


    [[Datei: ]]

    [[Datei: ]]

    → Firewall →Portfilter

    [[Datei: ]]
    Name: ngrp-IPSec-Roadwarrior
       
    192.168.222.0/24
    Zone vpn-ipsec
    ||     ||
    [[Datei: ]]
    World.svg internet
    Interface.svg external-interface
    Service-group.svg ipsec
      

    Vpn-network.svg IPSec Roadwarrior
    Network.svg dmz1-network
    Service-group.svg xyz





    IKEv1

    Step-by-step.png






    notempty




























































    {{var | DH-Gruppe (PFS) | DH-Gruppe (PFS): | DH-Group (PFS):

































    De.png
    En.png
    Fr.png


    Phase 1
    → VPN →IPSec Phase 1

    [[Datei: ]]
    [[Datei: ]]
    [[Datei: ]]
    [[Datei: ]]

    Default
    Outgoing
    Incoming
    Route
    Route
    Ignore
    notempty
    v12.4

    '
  • 30Link=
  • 10Link=

    Default
    Default-Werte UTM Default-Werte NCP-Client [[Datei: ]]
    1
    [[Datei: ]]
    2
    Verschlüsselung: aes128 AES 128 Bit
    Authentifizierung: sha2_256 Hash: SHA2 256 Bit
    ecp521 IKE DH-Gruppe: DH2 (modp1024)
     :
    notempty
    v12.5
    Strict:
    3Link=
    1
    notempty
    : v12.4
    2Link=
    notempty




    ike_lifetime = 2
    ike_rekeytime = 0


    ike_lifetime = 0
    ike_rekeytime = 2

    ----


    ike_lifetime = 2
    ike_rekeytime = 1


    ike_lifetime =2
    ike_rekeytime = 1
      
      

    Phase 2
    → VPN →IPSec Phase 2

    :

    Default-Werte UTM Default-Werte NCP-Client [[Datei: ]]
    / IKEv1 / Roadwarrior
    [[Datei: ]]
    / IKEv2 / Roadwarrior
    [[Datei: ]]
    / IKEv1 / S2S
    [[Datei: ]]
    / IKEv2 / S2S
    aes128 AES 128 Bit
    sha2_256 SHA2 256 Bit
    ecp521 IKE DH-Gruppe: DH2 (modp1024)
    IKE DH-Gruppe: DH2 (modp1024)
    Schlüssel-Lebensdauer: 8
    Austausch-Modus Main Mode (nicht konfigurierbar) Aggressive Mode (IKEv1)
  • :

    notempty
    v12.5

  • [[Datei: ]]
       

       

    '



  • root@firewall:~# swanctl --list-conns

    IPSec$20S2S: IKEv2, reauthentication every 3060s, no rekeying, dpd delay 10s
     local:  %any
     remote: 192.0.2.192
     local pre-shared key authentication:
       id: 192.168.175.218
     remote pre-shared key authentication:
       id: 192.0.2.192
     IPSec$20S2S: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.218.0/24 192.168.219.0/24
       remote: 192.168.192.0/24 192.168.193.0/24
    



    root@firewall:~# swanctl --list-conns

     IPSec$20S2S: IKEv2, reauthentication every 3060s, no rekeying, dpd delay 10s
       local:  %any
       remote: 192.0.2.192
       local pre-shared key authentication:
         id: 192.168.175.218
       remote pre-shared key authentication:
         id: 192.0.2.192
       IPSec$20S2S_4: TUNNEL, rekeying every 28260s, dpd action is restart
         local:  192.168.218.0/24
         remote: 192.168.192.0/24
       IPSec$20S2S_5: TUNNEL, rekeying every 28260s, dpd action is restart
         local:  192.168.218.0/24
         remote: 192.168.193.0/24
       IPSec$20S2S_6: TUNNEL, rekeying every 28260s, dpd action is restart
         local:  192.168.219.0/24
         remote: 192.168.192.0/24
       IPSec$20S2S_7: TUNNEL, rekeying every 28260s, dpd action is restart
         local:  192.168.219.0/24
         remote: 192.168.193.0/24
    

    [[Datei: ]]
    '


    root@firewall:~# swanctl --list-conns IPSec$20S2S: IKEv2, reauthentication every 3060s, no rekeying, dpd delay 10s

     local:  %any
     remote: 192.0.2.192
     local pre-shared key authentication:
       id: 192.168.175.218
     remote pre-shared key authentication:
       id: 192.0.2.192
     IPSec$20S2S: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.218.0/24 192.168.219.0/24
       remote: 192.168.192.0/24 192.168.193.0/24
    



    root@firewall:~# swanctl --list-conns IPSec$20S2S: IKEv2, reauthentication every 3060s, no rekeying, dpd delay 10s

     local:  %any
     remote: 192.0.2.192
     local pre-shared key authentication:
       id: 192.168.175.218
     remote pre-shared key authentication:
       id: 192.0.2.192
     IPSec$20S2S_4: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.218.0/24
       remote: 192.168.192.0/24
     IPSec$20S2S_5: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.218.0/24
       remote: 192.168.193.0/24
     IPSec$20S2S_6: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.219.0/24
       remote: 192.168.192.0/24
    

    [[Datei: ]]



    IKEv2

    Step-by-step.png






    notempty




























































    {{var | DH-Gruppe (PFS) | DH-Gruppe (PFS): | DH-Group (PFS):

































    De.png
    En.png
    Fr.png


    Phase 1
    → VPN →IPSec Phase 1

    [[Datei: ]]
    [[Datei: ]]
    [[Datei: ]]
    [[Datei: ]]

    Default
    Outgoing
    Incoming
    Route
    Route
    Ignore
    notempty
    v12.4

    '
  • 30Link=
  • 10Link=

    Default
    Default-Werte UTM Default-Werte NCP-Client [[Datei: ]]
    1
    [[Datei: ]]
    2
    Verschlüsselung: aes128 AES 128 Bit
    Authentifizierung: sha2_256 Hash: SHA2 256 Bit
    ecp521 IKE DH-Gruppe: DH2 (modp1024)
     :
    notempty
    v12.5
    Strict:
    3Link=
    1
    notempty
    : v12.4
    2Link=
    notempty




    ike_lifetime = 2
    ike_rekeytime = 0


    ike_lifetime = 0
    ike_rekeytime = 2

    ----


    ike_lifetime = 2
    ike_rekeytime = 1


    ike_lifetime =2
    ike_rekeytime = 1
      
      

    Phase 2
    → VPN →IPSec Phase 2

    :

    Default-Werte UTM Default-Werte NCP-Client [[Datei: ]]
    / IKEv1 / Roadwarrior
    [[Datei: ]]
    / IKEv2 / Roadwarrior
    [[Datei: ]]
    / IKEv1 / S2S
    [[Datei: ]]
    / IKEv2 / S2S
    aes128 AES 128 Bit
    sha2_256 SHA2 256 Bit
    ecp521 IKE DH-Gruppe: DH2 (modp1024)
    IKE DH-Gruppe: DH2 (modp1024)
    Schlüssel-Lebensdauer: 8
    Austausch-Modus Main Mode (nicht konfigurierbar) Aggressive Mode (IKEv1)
  • :

    notempty
    v12.5

  • [[Datei: ]]
       

       

    '



  • root@firewall:~# swanctl --list-conns

    IPSec$20S2S: IKEv2, reauthentication every 3060s, no rekeying, dpd delay 10s
     local:  %any
     remote: 192.0.2.192
     local pre-shared key authentication:
       id: 192.168.175.218
     remote pre-shared key authentication:
       id: 192.0.2.192
     IPSec$20S2S: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.218.0/24 192.168.219.0/24
       remote: 192.168.192.0/24 192.168.193.0/24
    



    root@firewall:~# swanctl --list-conns

     IPSec$20S2S: IKEv2, reauthentication every 3060s, no rekeying, dpd delay 10s
       local:  %any
       remote: 192.0.2.192
       local pre-shared key authentication:
         id: 192.168.175.218
       remote pre-shared key authentication:
         id: 192.0.2.192
       IPSec$20S2S_4: TUNNEL, rekeying every 28260s, dpd action is restart
         local:  192.168.218.0/24
         remote: 192.168.192.0/24
       IPSec$20S2S_5: TUNNEL, rekeying every 28260s, dpd action is restart
         local:  192.168.218.0/24
         remote: 192.168.193.0/24
       IPSec$20S2S_6: TUNNEL, rekeying every 28260s, dpd action is restart
         local:  192.168.219.0/24
         remote: 192.168.192.0/24
       IPSec$20S2S_7: TUNNEL, rekeying every 28260s, dpd action is restart
         local:  192.168.219.0/24
         remote: 192.168.193.0/24
    

    [[Datei: ]]
    '


    root@firewall:~# swanctl --list-conns IPSec$20S2S: IKEv2, reauthentication every 3060s, no rekeying, dpd delay 10s

     local:  %any
     remote: 192.0.2.192
     local pre-shared key authentication:
       id: 192.168.175.218
     remote pre-shared key authentication:
       id: 192.0.2.192
     IPSec$20S2S: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.218.0/24 192.168.219.0/24
       remote: 192.168.192.0/24 192.168.193.0/24
    



    root@firewall:~# swanctl --list-conns IPSec$20S2S: IKEv2, reauthentication every 3060s, no rekeying, dpd delay 10s

     local:  %any
     remote: 192.0.2.192
     local pre-shared key authentication:
       id: 192.168.175.218
     remote pre-shared key authentication:
       id: 192.0.2.192
     IPSec$20S2S_4: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.218.0/24
       remote: 192.168.192.0/24
     IPSec$20S2S_5: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.218.0/24
       remote: 192.168.193.0/24
     IPSec$20S2S_6: TUNNEL, rekeying every 28260s, dpd action is restart
       local:  192.168.219.0/24
       remote: 192.168.192.0/24
    

    [[Datei: ]]