Tunnel IPSEC
U
SER
G
UIDE
244
set ipsec phase1 WARRIOR encryption-algorithm 3des
set ipsec phase1 WARRIOR hash-algorithm sha1
set ipsec phase1 WARRIOR dh-group 2
set ipsec phase1 WARRIOR authentication-method xauth-psk-client
set ipsec phase1 WARRIOR exchange-mode aggressive
set ipsec phase1 WARRIOR my-identifier group EASY_VPN
set ipsec phase1 WARRIOR xauth-login user1
set ipsec phase1 WARRIOR proposal-check obey
set ipsec phase1 WARRIOR mode-cfg
set ipsec phase2 PHASE_II match-phase1 WARRIOR
set ipsec phase2 PHASE_II encryption-algorithm 3des
set ipsec phase2 PHASE_II authentication-algorithm hmac-md5
set ipsec phase2 PHASE_II pfs-group 2
set ipsec phase2 PHASE_II mode tunnel
set ipsec phase2 PHASE_II security esp
set ipsec phase2 PHASE_II level unique
set ipsec pre-shared-key 88.34.54.33 tiesseadm
set ipsec pre-shared-key user1 password1
set ipsec on
In the above example you find some commands already discussed in the previous paragraphs, but
it is worth to comment some important command lines:
set ipsec phase1 WARRIOR mode-cfg
tells to the client to adopt the
configuration
mode
, which determines a sort of auto configuration of the client, based on the arrival of
important parameters sent directly from the server at the end of a “well ended” Phase I
set ipsec phase1 WARRIOR my-identifier group EASY_VPN
mean that “
EASY_VPN
” is
the string used for the group name
set ipsec phase1 WARRIOR xauth-login user1
tells that the extended authentication
will be tried by "
user1
"
set ipsec phase1 WARRIOR authentication-method xauth-psk-client
specifies that
the Tiesse router has the client role and that the authentication mode is Xauth (Extended
Authentication). The user/password is specified with the command
set ipsec pre-
shared-key
, as shown in the above listing.
In the
mode-cfg
configuration, the router receives the routing routes and an IP address (used to
browse) from the server.
The command
set ipsec route-distance N
allows to specify the administrative distance that must be associated to the routes received by the
server, while
set ipsec route-tag N
allows to associate a tag to the routes received by the server.
The command
set ipsec ignore-routes