134
Network
Road Warriors
The prototypical Road Warrior is a traveler connecting to the Console Server from a
laptop machine. For purposes of this document:
•
Anyone with a dynamic IP address is a Road Warrior.
•
Any machine doing IPsec processing is a gateway. Think of the single-user Road
Warrior machine as a gateway with a degenerate subnet (one machine: itself)
behind it.
These require a somewhat different setup than VPN gateways with static addresses and
with client systems behind them, but are basically not problematic. There are some
difficulties which appear for some Road Warrior connections:
•
Road Warriors who get their addresses via DHCP may have a problem. Openswan
can quite happily build and use a tunnel to such an address, but when the DHCP
lease expires, Openswan does not know that. The tunnel fails, and the only
recovery method is to tear it down and rebuild it.
•
If Network Address Translation (NAT) is applied between the two IPsec
Gateways, this breaks IPsec. IPsec authenticates packets on an end-to-end basis, to
ensure they are not altered en route. NAT rewrites packets as they go by.
In most situations, however, Openswan supports Road Warrior connections just fine.
Before you start
This is a quick guide to set up two common configurations: VPN and Road Warrior.
There are two examples: a Road Warrior using RSA signature and a VPN using RSA
signature. When listing the configuration of the remote side (the equipment the ACS will
create a tunnel with) these examples will assume the other end is also running the
Openswan. If it is not your case, make the appropriate conversions for your IPsec
software.
Setup and test networking.
Before trying to get Openswan working, you should
configure and test IP networking on the Console Server and on the other end. IPsec can
not function without a working IP network beneath it. Many reported Openswan
problems turn out to actually be problems with routing or firewalling. If any actual IPsec
problems turn up, you often cannot even recognize them (much less debug them) unless
the underlying network is right.
Enabling IPsec on your ACS.
The IPsec is disabled by default in the Console Server
family. To enable it you must edit the file
/etc/daemon.d/ipsec.sh
change
“ENABLE=NO” to “ENABLE=YES” and run the “
saveconf
” command. To start
IPSEC, type “
daemon.sh restart IPSEC
” <enter>. IPSEC will start automatically during
subsequent reboots if you have saved
/etc/daemon.d/ipsec.sh
with “
saveconf
”.
Содержание AlterPath ACS
Страница 16: ...xvi Table of Contents...
Страница 29: ...13 This page has been left intentionally blank...
Страница 30: ...14 Preface...
Страница 68: ...52 Device Access...
Страница 86: ...70 Authentication Step 5 Saving changes To save the configuration run the command saveconf...
Страница 96: ...80 Authentication Save the configuration to flash 2 cli config savetoflash...
Страница 114: ...98 Authentication...
Страница 204: ...188 Administration To exit the CLI mode and return to ACS s shell issue the command cli quit...
Страница 268: ...252 Power Management with AlterPath PM Integration...
Страница 304: ...288 PCMCIA Cards Integration...
Страница 338: ...322 Profile Configuration...
Страница 364: ...348 Additional Features and Applications...
Страница 376: ...360 Appendix A New User Background Information...
Страница 406: ...390 Appendix C Cabling and Hardware Information This page has been left intentionally blank...
Страница 418: ...402 List of Tables...
Страница 420: ...404 List of Figures...