Linux Systeembeheer/Servers op afstand beheren met VPN: verschil tussen versies
Geen bewerkingssamenvatting |
Geen bewerkingssamenvatting |
||
Regel 32: | Regel 32: | ||
keylife=60m<br/> |
keylife=60m<br/> |
||
conn roadwarrior-net<br/> |
conn roadwarrior-net<br/> |
||
leftsubnet=192.168.0.0/16 |
leftsubnet=192.168.0.0/16<br/> |
||
also=roadwarrior |
also=roadwarrior<br/> |
||
conn roadwarrior-all |
conn roadwarrior-all<br/> |
||
leftsubnet=0.0.0.0/0 |
leftsubnet=0.0.0.0/0<br/> |
||
also=roadwarrior |
also=roadwarrior<br/> |
||
conn roadwarrior-l2tp |
conn roadwarrior-l2tp<br/> |
||
leftprotoport=17/0 |
leftprotoport=17/0<br/> |
||
rightprotoport=17/1701 |
rightprotoport=17/1701<br/> |
||
also=roadwarrior |
also=roadwarrior<br/> |
||
conn roadwarrior-l2tp-updatedwin |
conn roadwarrior-l2tp-updatedwin<br/> |
||
leftprotoport=17/1701 |
leftprotoport=17/1701<br/> |
||
rightprotoport=17/1701 |
rightprotoport=17/1701<br/> |
||
also=roadwarrior |
also=roadwarrior<br/> |
||
conn roadwarrior |
conn roadwarrior<br/> |
||
pfs=no |
pfs=no<br/> |
||
left=150.150.150.150 |
left=150.150.150.150<br/> |
||
leftnexthop=150.150.150.1 |
leftnexthop=150.150.150.1<br/> |
||
right=%any |
right=%any<br/> |
||
rightsubnet=vhost:%no,%priv |
rightsubnet=vhost:%no,%priv<br/> |
||
auto=add |
auto=add<br/> |
||
#Disable Opportunistic Encryption |
#Disable Opportunistic Encryption<br/> |
||
include /etc/ipsec.d/examples/no_oe.conf |
include /etc/ipsec.d/examples/no_oe.conf<br/> |
||
het ip-adres “150.150.150.150” dien je te vervangen door je externe IP-adres, “150.150.150.1” vervang je door de default gateway. |
het ip-adres “150.150.150.150” dien je te vervangen door je externe IP-adres, “150.150.150.1” vervang je door de default gateway. |
||
Wijzig het bestand “/etc/ipsec.secrets” and typ het volgende: |
Wijzig het bestand “/etc/ipsec.secrets” and typ het volgende:<br/> |
||
Vi /etc/ipsec.secrets |
Vi /etc/ipsec.secrets<br/> |
||
150.150.150.150 %any: PSK "sleuteltje" |
150.150.150.150 %any: PSK "sleuteltje"<br/> |
||
Ook hier verander je “150.150.150.150.” naar je externe IP-adres. |
Ook hier verander je “150.150.150.150.” naar je externe IP-adres.<br/> |
||
L2tpd installatie + configuratie |
L2tpd installatie + configuratie<br/> |
||
Installeren van l2tpd en de patch toepassen: |
Installeren van l2tpd en de patch toepassen:<br/> |
||
cd /usr/local/src |
cd /usr/local/src<br/> |
||
tar zxf l2tpd-0.69.tar.gz |
tar zxf l2tpd-0.69.tar.gz<br/> |
||
mv l2tpd-0.69.sysv.patch l2tpd-0.69/ |
mv l2tpd-0.69.sysv.patch l2tpd-0.69/<br/> |
||
mv l2tpd /etc/rc.d/init.d/ |
mv l2tpd /etc/rc.d/init.d/<br/> |
||
cd l2tpd-0.69 |
cd l2tpd-0.69<br/> |
||
patch < l2tpd-0.69.sysv.patch |
patch < l2tpd-0.69.sysv.patch<br/> |
||
make |
make<br/> |
||
cp l2tpd /usr/sbin |
cp l2tpd /usr/sbin<br/> |
||
chmod 755 /usr/sbin/l2tpd |
chmod 755 /usr/sbin/l2tpd<br/> |
||
start configuratie in orde brengen: |
start configuratie in orde brengen:<br/> |
||
chmod 755 /etc/rc.d/init.d/l2tpd<br /> |
chmod 755 /etc/rc.d/init.d/l2tpd<br /> |
||
chkconfig --add l2tpd<br /> |
chkconfig --add l2tpd<br /> |
||
chkconfig l2tpd on |
chkconfig l2tpd on<br/> |
||
/etc/l2tpd folder aanmaken en configuratie file erin stoppen (l2tpd.conf). |
/etc/l2tpd folder aanmaken en configuratie file erin stoppen (l2tpd.conf).<br/> |
||
[global |
[global<br/> |
||
port = 1701 |
port = 1701<br/> |
||
[lns default] |
[lns default]<br/> |
||
ip range = 192.168.1.101-192.168.1.254 |
ip range = 192.168.1.101-192.168.1.254<br/> |
||
local ip = 192.168.1.100 |
local ip = 192.168.1.100<br/> |
||
require chap = yes |
require chap = yes<br/> |
||
refuse pap = yes |
refuse pap = yes<br/> |
||
require authentication = yes |
require authentication = yes<br/> |
||
name = LinuxVPN |
name = LinuxVPN<br/> |
||
ppp debug = yes |
ppp debug = yes<br/> |
||
pppoptfile = /etc/ppp/options.l2tpd |
pppoptfile = /etc/ppp/options.l2tpd<br/> |
||
length bit = yes |
length bit = yes<br/> |
||
PPP configuratie |
PPP configuratie<br/> |
||
In “/etc/ppp/options.l2tpd” |
In “/etc/ppp/options.l2tpd”<br/> |
||
ipcp-accept-local |
ipcp-accept-local<br/> |
||
ipcp-accept-remote |
ipcp-accept-remote<br/> |
||
noccp |
noccp<br/> |
||
auth |
auth<br/> |
||
crtscts |
crtscts<br/> |
||
idle 1800 |
idle 1800<br/> |
||
mtu 1410 |
mtu 1410<br/> |
||
mru 1410 |
mru 1410<br/> |
||
nodefaultroute |
nodefaultroute<br/> |
||
debug |
debug<br/> |
||
lock |
lock<br/> |
||
proxyarp |
proxyarp<br/> |
||
connect-delay 5000 |
connect-delay 5000<br/> |
||
silent |
silent<br/> |
||
“/etc/ppp/chap-secrets” wijzigen |
“/etc/ppp/chap-secrets” wijzigen<br/> |
||
(voorbeeld van invoer) |
(voorbeeld van invoer)<br/> |
||
# Secrets for authentication using CHAP |
# Secrets for authentication using CHAP |
||
# client server secret IP addresses |
# client server secret IP addresses |
||
Regel 122: | Regel 122: | ||
Nu kan je de VPN configuratie testen |
Nu kan je de VPN configuratie testen<br/> |
Versie van 19 jan 2011 14:31
Download de onderstaande bestanden
a) OpenSWAN 2.6.14 via http://www.openswan.org
b) l2tpd 0.69
c) l2tpd Legacy PTY patch
d) l2tpd SysV PTY patch
e)l2tpd startup file
Installeren OpenSwan:
cd /usr/local/src
yum install openswan
yum install openswan-doc
het voorbeeld « ipsec.conf » bestand verplaatsen om zo het origineel te behouden
mv /etc/ipsec.conf /etc/ipsec.conf.old
Pas het volgende aan in het bestand :
version 2.0
config setup
interfaces=%defaultroute
klipsdebug=none
plutodebug=none
overridemtu=1410
nat_traversal=yes
virtual_private=%v4:10.0.0.0/8,%v4:172.16.0.0/12,%v4:192.168.0.0/16
conn %default
keyingtries=3
compress=yes
disablearrivalcheck=no
authby=secret
type=tunnel
keyexchange=ike
ikelifetime=240m
keylife=60m
conn roadwarrior-net
leftsubnet=192.168.0.0/16
also=roadwarrior
conn roadwarrior-all
leftsubnet=0.0.0.0/0
also=roadwarrior
conn roadwarrior-l2tp
leftprotoport=17/0
rightprotoport=17/1701
also=roadwarrior
conn roadwarrior-l2tp-updatedwin
leftprotoport=17/1701
rightprotoport=17/1701
also=roadwarrior
conn roadwarrior
pfs=no
left=150.150.150.150
leftnexthop=150.150.150.1
right=%any
rightsubnet=vhost:%no,%priv
auto=add
- Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
het ip-adres “150.150.150.150” dien je te vervangen door je externe IP-adres, “150.150.150.1” vervang je door de default gateway.
Wijzig het bestand “/etc/ipsec.secrets” and typ het volgende:
Vi /etc/ipsec.secrets
150.150.150.150 %any: PSK "sleuteltje"
Ook hier verander je “150.150.150.150.” naar je externe IP-adres.
L2tpd installatie + configuratie
Installeren van l2tpd en de patch toepassen:
cd /usr/local/src
tar zxf l2tpd-0.69.tar.gz
mv l2tpd-0.69.sysv.patch l2tpd-0.69/
mv l2tpd /etc/rc.d/init.d/
cd l2tpd-0.69
patch < l2tpd-0.69.sysv.patch
make
cp l2tpd /usr/sbin
chmod 755 /usr/sbin/l2tpd
start configuratie in orde brengen:
chmod 755 /etc/rc.d/init.d/l2tpd
chkconfig --add l2tpd
chkconfig l2tpd on
/etc/l2tpd folder aanmaken en configuratie file erin stoppen (l2tpd.conf).
[global
port = 1701
[lns default]
ip range = 192.168.1.101-192.168.1.254
local ip = 192.168.1.100
require chap = yes
refuse pap = yes
require authentication = yes
name = LinuxVPN
ppp debug = yes
pppoptfile = /etc/ppp/options.l2tpd
length bit = yes
PPP configuratie
In “/etc/ppp/options.l2tpd”
ipcp-accept-local
ipcp-accept-remote
noccp
auth
crtscts
idle 1800
mtu 1410
mru 1410
nodefaultroute
debug
lock
proxyarp
connect-delay 5000
silent
“/etc/ppp/chap-secrets” wijzigen
(voorbeeld van invoer)
- Secrets for authentication using CHAP
- client server secret IP addresses
username * "wachtwoord" 192.168.1.0/24
- username "wachtwoord" 192.168.1.0/24
Nu kan je de VPN configuratie testen