Strongswan-fritz-psk-dynamisch: Unterschied zwischen den Versionen
Zur Navigation springen
Zur Suche springen
Thomas (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „=fritz= <pre> </pre> conn s2f authby=secret keyexchange=ikev1 left=10.84.252.33 leftsubnet=10.83.33.0/24 rightid=@fritz.vpn.int…“) |
Thomas (Diskussion | Beiträge) (→fritz) |
||
Zeile 1: | Zeile 1: | ||
=fritz= | =fritz= | ||
<pre> | <pre> | ||
+ | vpncfg { | ||
+ | connections { | ||
+ | enabled = yes; | ||
+ | conn_type = conntype_lan; | ||
+ | name = "fritz-dyn-strongswan"; | ||
+ | always_renew = yes; | ||
+ | reject_not_encrypted = no; | ||
+ | dont_filter_netbios = yes; | ||
+ | localip = 0.0.0.0; | ||
+ | local_virtualip = 0.0.0.0; | ||
+ | remoteip = 10.84.252.33; | ||
+ | remote_virtualip = 0.0.0.0; | ||
+ | localid { | ||
+ | fqdn = "fritz.vpn.int"; | ||
+ | } | ||
+ | remoteid { | ||
+ | ipaddr = 10.84.252.33; | ||
+ | } | ||
+ | mode = phase1_mode_idp; | ||
+ | phase1ss = "alt/aes/sha"; | ||
+ | keytype = connkeytype_pre_shared; | ||
+ | key = "suxer"; | ||
+ | cert_do_server_auth = no; | ||
+ | use_nat_t = no; | ||
+ | use_xauth = no; | ||
+ | use_cfgmode = no; | ||
+ | phase2localid { | ||
+ | ipnet { | ||
+ | ipaddr = 10.83.42.0; | ||
+ | mask = 255.255.255.0; | ||
+ | } | ||
+ | } | ||
+ | phase2remoteid { | ||
+ | ipnet { | ||
+ | ipaddr = 10.83.33.0; | ||
+ | mask = 255.255.255.0; | ||
+ | } | ||
+ | } | ||
+ | phase2ss = "esp-3des-sha/ah-no/comp-no/pfs"; | ||
+ | accesslist = "permit ip any 10.83.33.0 255.255.255.0"; | ||
+ | } ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500", | ||
+ | "udp 0.0.0.0:4500 0.0.0.0:4500"; | ||
+ | } | ||
+ | ~ | ||
+ | ~ | ||
</pre> | </pre> | ||
Version vom 7. Dezember 2017, 12:02 Uhr
fritz
vpncfg { connections { enabled = yes; conn_type = conntype_lan; name = "fritz-dyn-strongswan"; always_renew = yes; reject_not_encrypted = no; dont_filter_netbios = yes; localip = 0.0.0.0; local_virtualip = 0.0.0.0; remoteip = 10.84.252.33; remote_virtualip = 0.0.0.0; localid { fqdn = "fritz.vpn.int"; } remoteid { ipaddr = 10.84.252.33; } mode = phase1_mode_idp; phase1ss = "alt/aes/sha"; keytype = connkeytype_pre_shared; key = "suxer"; cert_do_server_auth = no; use_nat_t = no; use_xauth = no; use_cfgmode = no; phase2localid { ipnet { ipaddr = 10.83.42.0; mask = 255.255.255.0; } } phase2remoteid { ipnet { ipaddr = 10.83.33.0; mask = 255.255.255.0; } } phase2ss = "esp-3des-sha/ah-no/comp-no/pfs"; accesslist = "permit ip any 10.83.33.0 255.255.255.0"; } ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500", "udp 0.0.0.0:4500 0.0.0.0:4500"; } ~ ~
conn s2f
authby=secret keyexchange=ikev1 left=10.84.252.33 leftsubnet=10.83.33.0/24 rightid=@fritz.vpn.int right=%any rightsubnet=10.83.42.0/24 ike=aes-sha1-modp1024 esp=3des-sha1-modp1024 ikelifetime=3h keylife=1h auto=add
10.84.252.33 @fritz.vpn.int : PSK "suxer"