Quantcast
Channel: EdgeRouter topics
Viewing all articles
Browse latest Browse all 20028

L2TP/IPSec remote access

$
0
0

Using an ER-X as a VPN server for remote access.  I've got L2TP/IPSec setup and working but I'm trying to figure out how to change the encryption/hash defaults.  I see how to to do it for site-to-site configurations but see no way to use the esp and ike groups I've created with remote access.

 

firewall {
    all-ping enable
    broadcast-ping disable
    group {
        address-group DNAT-TCP-vpn-server {
            address 10.0.0.22
            address 10.0.0.23
            description "DNAT-TCP-vpn-server (OpenVPN)"
        }
    }
    ipv6-receive-redirects disable
    ipv6-src-route disable
    ip-src-route disable
    log-martians enable
    receive-redirects disable
    send-redirects enable
    source-validation disable
    syn-cookies enable
}
interfaces {
    ethernet eth0 {
        address 10.0.0.9/24
        duplex auto
        speed auto
    }
    ethernet eth1 {
        duplex auto
        speed auto
    }
    ethernet eth2 {
        duplex auto
        speed auto
    }
    ethernet eth3 {
        duplex auto
        speed auto
    }
    ethernet eth4 {
        duplex auto
        speed auto
    }
    loopback lo {
    }
    openvpn vtun0 {
        encryption aes256
        hash sha256
        local-host 10.0.0.9
        local-port 1194
        mode server
        openvpn-option "--push redirect-gateway def1"
        openvpn-option "--push dhcp-option DNS 10.0.0.254"
        openvpn-option --comp-lzo
        openvpn-option "--dev tun"
        openvpn-option "--max-clients 5"
        openvpn-option --persist-tun
        openvpn-option --persist-key
        openvpn-option "--verb 3"
        openvpn-option "--keepalive 10 60"
        openvpn-option "--reneg-sec 0"
        openvpn-option "--plugin /usr/lib/openvpn/openvpn-auth-pam.so login"
        openvpn-option --client-cert-not-required
        openvpn-option "--user nobody"
        openvpn-option "--group nogroup"
        openvpn-option "--tls-auth /config/auth/keys/ta.key 0"
        protocol udp
        server {
            subnet 10.71.87.0/24
        }
        tls {
            ca-cert-file /config/auth/keys/ca.crt
            cert-file /config/auth/keys/server.crt
            dh-file /config/auth/keys/dh3072.pem
            key-file /config/auth/keys/server.key
        }
    }
    openvpn vtun1 {
        encryption aes256
        hash sha256
        local-host 10.0.0.9
        local-port 8443
        mode server
        openvpn-option "--push redirect-gateway def1"
        openvpn-option "--push dhcp-option DNS 10.0.0.254"
        openvpn-option --comp-lzo
        openvpn-option "--dev tun"
        openvpn-option "--max-clients 5"
        openvpn-option --persist-tun
        openvpn-option --persist-key
        openvpn-option "--verb 3"
        openvpn-option "--keepalive 10 60"
        openvpn-option "--reneg-sec 0"
        openvpn-option "--plugin /usr/lib/openvpn/openvpn-auth-pam.so login"
        openvpn-option --client-cert-not-required
        openvpn-option "--user nobody"
        openvpn-option "--group nogroup"
        openvpn-option "--tls-auth /config/auth/keys/ta.key 0"
        protocol tcp-passive
        server {
            subnet 10.87.77.0/24
        }
        tls {
            ca-cert-file /config/auth/keys/ca.crt
            cert-file /config/auth/keys/server.crt
            dh-file /config/auth/keys/dh3072.pem
            key-file /config/auth/keys/server.key
        }
    }
    switch switch0 {
        mtu 1500
    }
}
service {
    gui {
        https-port 443
    }
    nat {
        rule 1 {
            description "DNAT TCP vpn-server (OpenVPN)"
            destination {
                port 443
            }
            inbound-interface eth0
            inside-address {
                address 10.0.0.9
                port 8443
            }
            log disable
            protocol tcp
            source {
                group {
                    address-group DNAT-TCP-vpn-server
                }
            }
            type destination
        }
        rule 5000 {
            description "UDP OpenVPN subnet to every where"
            log disable
            outbound-interface eth0
            protocol ip
            source {
                address 10.71.87.0/24
            }
            type masquerade
        }
        rule 5001 {
            description "TCP OpenVPN subnet to every where"
            log disable
            outbound-interface eth0
            protocol ip
            source {
                address 10.87.77.0/24
            }
            type masquerade
        }
    }
    ssh {
        port 22
        protocol-version v2
    }
}
system {
    gateway-address 10.0.0.254
    host-name vpn-server
    login {
        user MYNAME {
            authentication {
                encrypted-password <removed>
                plaintext-password ""
            }
            level admin
        }
    }
    name-server 10.0.0.254
    ntp {
        server 0.ubnt.pool.ntp.org {
        }
        server 1.ubnt.pool.ntp.org {
        }
        server 2.ubnt.pool.ntp.org {
        }
        server 3.ubnt.pool.ntp.org {
        }
    }
    syslog {
        global {
            facility all {
                level notice
            }
            facility protocols {
                level debug
            }
        }
    }
    time-zone America/Los_Angeles
}
vpn {
    ipsec {
        auto-firewall-nat-exclude disable
        esp-group remote_access {
            compression disable
            lifetime 3600
            mode tunnel
            pfs enable
            proposal 1 {
                encryption aes256
                hash sha1
            }
        }
        ike-group remote_access {
            ikev2-reauth no
            key-exchange ikev1
            lifetime 28800
            proposal 1 {
                dh-group 14
                encryption aes256
                hash sha1
            }
        }
        ipsec-interfaces {
            interface eth0
        }
        nat-networks {
            allowed-network 10.0.0.0/24 {
            }
        }
        nat-traversal enable
    }
    l2tp {
        remote-access {
            authentication {
                local-users {
                    username MYNAME {
                        password PASS
                    }
                }
                mode local
            }
            client-ip-pool {
                start 10.0.0.61
                stop 10.0.0.65
            }
            dns-servers {
                server-1 10.0.0.254
            }
            ipsec-settings {
                authentication {
                    mode pre-shared-secret
                    pre-shared-secret PASS
                }
                ike-lifetime 3600
            }
            outside-address 10.0.0.9
            outside-nexthop 10.0.0.254
        }
    }
}


/* Warning: Do not remove the following line. */
/* === vyatta-config-version: "config-management@1:conntrack@1:cron@1:dhcp-relay@1:dhcp-server@4:firewall@5:ipsec@5:nat@3:qos@1:quagga@2:system@4:ubnt-pptp@1:ubnt-util@1:vrrp@1:webgui@1:webproxy@1:zone-policy@1" === */
/* Release version: v1.8.0.4853089.160219.1607 */

 

Thanks,

 

->g.


Viewing all articles
Browse latest Browse all 20028

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>