Libreswan示例配置

OS: debian9.5
libreswan 4.6

一、基于ikev1配置

1、服务端配置

配置模式 ikev1

/etc/ipsec.d/server.conf

conn roadwarriors
    authby=secret
    encapsulation=yes
    type=tunnel
    left=10.32.18.192
    leftsubnet=192.168.5.0/24
    right=%any
    rightsubnet=0.0.0.0/0
    # aggrmode=yes
    auto=start
    ikev2=never
    # ikev2=insist
    # ike=3des-md5
    ike=aes256-sha2
    ikelifetime=86400
    #
    phase2=esp
    # phase2alg=3des-md5
    phase2alg=aes256-sha2

2、客户端配置

/etc/ipsec.d/client.conf

conn to-vpn-server
    authby=secret
    encapsulation=yes
    type=tunnel
    left=%defaultroute
    leftsubnet=192.168.110.0/24
    right=10.32.18.192
    rightsubnet=192.168.5.0/24
    # aggrmode=yes
    auto=start
    # 
    ikev2=never
    # ikev2=insist
    # ike=3des-md5
    ike=aes256-sha2
    ikelifetime=86400
    # 
    phase2=esp
    # phase2alg=3des-md5
    phase2alg=aes256-sha2

二、基于ikev2配置

1、服务端配置

conn roadwarriors
    authby=secret
    # encapsulation=yes
    type=tunnel
    left=172.16.0.10
    leftsubnet=192.168.5.1/32
    right=%any
    rightsubnet=192.168.110.1/32
    # rightsubnet=0.0.0.0/0
    auto=start
    ikev2=insist
    ike=aes256-sha2
    ikelifetime=86400
    #
    phase2=esp
    phase2alg=aes256-sha2

2、客户端配置

conn to-vpn-server
    authby=secret
    # encapsulation=yes
    type=tunnel
    left=172.20.0.12
    leftsubnet=192.168.110.1/32
    right=172.16.0.10
    rightsubnet=192.168.5.1/32
    auto=start
    # 
    ikev2=insist
    ike=aes256-sha2
    ikelifetime=86400
    # 
    phase2=esp
    phase2alg=aes256-sha2

4、注意

  • leftsubnet与rightsubnet 网段要保持一致

三、基于证书配置

服务端配置

conn totest3
    # 证书认证方式,证书名称为nss数据库中的证书名称
    authby=rsasig
    # 
    leftcert=vpn.example.com
    leftsendcert=always
    leftrsasigkey=%cert
    leftid=@vpn.example.com
    #
    rightca=%same
    rightrsasigkey=%cert
    rightid="CN=client3.example.com, O=Example"
    # 
    encapsulation=yes
    type=tunnel
    #
    left=192.168.31.100
    leftsubnet=192.168.5.1/32
    #
    right=%any
    rightsubnet=192.168.10.1/32
    #
    auto=start
    ikev2=insist
    ike=aes256-sha2
    ikelifetime=86400
    #
    phase2=esp
    phase2alg=aes_gcm128-null
    mark=20/0xffffffff
    vti-interface=ipsec_vti1
    vti-shared=yes
    vti-routing=yes
    dpddelay=2
    dpdtimeout=5
    dpdaction=clear
    retransmit-timeout=5

客户端配置

conn to-vpn-server2
    leftcert=client3.example.com
    leftsendcert=always
    leftrsasigkey=%cert
    #
    rightca=%same
    rightrsasigkey=%cert
    # 
    authby=rsasig
    encapsulation=yes
    type=tunnel
    #
    left=%defaultroute
    right=192.168.31.100
    leftsubnet=192.168.10.1/32
    rightsubnet=192.168.5.1/32
    #
    leftid=%fromcert
    rightid=@vpn.example.com
    #
    auto=start
    #
    ikev2=insist
    ike=aes256-sha2
    ikelifetime=86400
    #
    phase2=esp
    phase2alg=aes_gcm128-null
    #
    mark=20/0xffffffff
    vti-interface=ipsec0
    vti-shared=yes
    vti-routing=yes
    dpddelay=2
    dpdtimeout=5
    dpdaction=restart
    retransmit-timeout=5
上一篇
下一篇