Tunnel IPSEC
U
SER
G
UIDE
245
makes the server ignore the received routes and so they will not be added to the routing table.
If the server receives an IP address, this will be associated to the output interface and the Source
NAT will be done for all the transmitted packages. In this case the command
set ipsec ignore-snat
tells to the server to ignore the Source NAT.
You can authenticate using previously generated certificates. In this case, a typical configuration is:
set ipsec phase1 PHASE_I remote-end 88.34.54.33
set ipsec phase1 PHASE_I encryption-algorithm 3des
set ipsec phase1 PHASE_I hash-algorithm md5
set ipsec phase1 PHASE_I dh-group 5
set ipsec phase1 PHASE_I authentication-method
xauth-rsa-client
set ipsec phase1 PHASE_I
ca-cert ca.pem
set ipsec phase1 PHASE_I
local-cert cert.pem cert.key
set ipsec phase1 PHASE_I my-identifier MyVPN_Client
set ipsec phase1 PHASE_I lifetime 86400 sec
set ipsec phase1 PHASE_I exchange-mode aggressive
set ipsec phase1 PHASE_I xauth-login
use-mac
set ipsec phase1 PHASE_I proposal-check obey
set ipsec phase1 PHASE_I mode-cfg
set ipsec phase2 PHASE_II match-phase1 WARRIOR
set ipsec phase2 PHASE_II encryption-algorithm 3des
set ipsec phase2 PHASE_II authentication-algorithm hmac-md5
set ipsec phase2 PHASE_II pfs-group 5
set ipsec phase2 PHASE_II lifetime 86400 sec
set ipsec phase2 PHASE_II mode tunnel
set ipsec phase2 PHASE_II security esp
set ipsec phase2 PHASE_II level unique
set ipsec pre-shared-key 88.34.54.33 tiesseadm
set ipsec pre-shared-key
use-mac use-mac
set ipsec on
where the authentication via
pre-shared key
(
xauth-psk-key
) is changed to RSA certificare (
xauth-
rsa-client
). With the following command
set ipsec phase1 PHASE_I
ca-cert ca.pem
set ipsec phase1 PHASE_I
local-cert cert.pem cert.key
you can specify the name of the certificates.
In the above example, you can notice that a
use-mac
keyword is used. This set as login and
password the MAC address of the router itself:
set ipsec phase1 PHASE_I xauth-login
use-mac
set ipsec pre-shared-key
use-mac use-mac
The RSA certificates are managed with:
ipsec-cert download <certificate> from <IP>