2
0
mirror of https://github.com/opnsense/docs synced 2024-11-05 06:00:36 +00:00
opensense-docs/source/manual/how-tos/ipsec-road.rst

343 lines
12 KiB
ReStructuredText
Raw Normal View History

========================
Setup IPsec Road-Warrior
========================
Road Warriors are remote users who need secure access to the companies infrastructure.
2018-11-09 12:52:31 +00:00
IPsec Mobile Clients offer a solution that is easy to setup with macOS (native)
and is know to work with iOS as well as many Android devices.
2018-11-09 12:52:31 +00:00
For more flexibility use SSL VPNs, OPNsense utilizes OpenVPN for this purpose.
With this example we'll show you how to configure the Mobile Client Setup in
OPNsense and give you configuration examples for:
2018-11-09 12:52:31 +00:00
* macOS
* iOS
* Android
.. Note::
For the sample we will use a private IP for our WAN connection.
This requires us to disable the default block rule on wan to allow private traffic.
To do so, go to the :menuselection:`Interfaces --> [WAN]` and uncheck "Block private networks".
*(Dont forget to save and apply)*
.. image:: images/block_private_networks.png
-----------------------------
------------
Sample Setup
------------
For the sample configuration we configure OPNsense
**Company Network with Remote Client**
.. nwdiag::
:scale: 100%
nwdiag {
span_width = 90;
node_width = 180;
Internet [shape = "cisco.cloud"];
fileserver [label="File Server",shape="cisco.fileserver",address="192.168.1.10"];
fileserver -- switchlan;
network LAN {
switchlan [label="",shape = "cisco.workgroup_switch"];
label = " LAN";
address ="192.168.1.1.x/24";
fw1 [address="192.168.1.1/24"];
}
network WAN {
label = " WAN";
fw1 [shape = "cisco.firewall", address="172.18.0.164"];
Internet;
}
network Remote {
Internet;
laptop [address="172.10.10.55 (WANIP),10.10.0.1 (IPsec)",label="Remote User",shape="cisco.laptop"];
}
}
Company Network
---------------
==================== =============================
**Hostname** fw1
**WAN IP** 172.18.0.164
**LAN IP** 192.168.1.0/24
**LAN DHCP Range** 192.168.1.100-192.168.1.200
**IPsec Clients** 10.10.0.0/24
==================== =============================
---------------------------
Firewall Rules Mobile Users
---------------------------
To allow IPsec Tunnel Connections, the following should be allowed on WAN.
* Protocol ESP
* UDP Traffic on Port 500 (ISAKMP)
* UDP Traffic on Port 4500 (NAT-T)
.. image:: images/ipsec_wan_rules.png
2018-07-31 14:51:11 +00:00
:width: 100%
To allow traffic passing to your LAN subnet you need to add a rule to the IPsec
interface.
.. image:: images/ipsec_ipsec_lan_rule.png
2018-07-31 14:51:11 +00:00
:width: 100%
-----------------------
Step 1 - Mobile Clients
-----------------------
First we will need to setup the mobile clients network and authentication methods.
Go to :menuselection:`VPN --> IPsec --> Mobile Clients`
For our example will use the following settings:
IKE Extensions
--------------
========================= ================ ================================================
**Enable** checked *check to enable mobile clients*
**User Authentication** Local Database *For the example we use the Local Database*
**Group Authentication** none *Leave on none*
**Virtual Address Pool** 10.0.0.0/24 *Enter the IP range for the remote clients*
========================= ================ ================================================
You can select other options, but we will leave them all unchecked for this
example.
**Save** your settings and select **Create Phase1** when it appears.
Then enter the Mobile Client Phase 1 setting.
-------------------------------
Step 2 - Phase 1 Mobile Clients
-------------------------------
Phase 1 General information
---------------------------
========================= ============= ================================================
**Connection method** default *default is 'Start on traffic'*
**Key Exchange version** V1 *only V1 is supported for mobile clients*
**Internet Protocol** IPv4
**Interface** WAN *choose the interface connected to the internet*
**Description** MobileIPsec *freely chosen description*
========================= ============= ================================================
Phase 1 proposal (Authentication)
---------------------------------
=========================== ====================== ======================================
**Authentication method** Mutual PSK +Xauth *Using a Pre-shared Key and Login*
**Negotiation mode** Agressive *Select Aggressive*
**My identifier** My IP address *Simple identification for fixed ip*
**Peer identifier** User distinguished *Identification for peer*
**Pre-Shared Key** At4aDMOAOub2NwT6gMHA *Random key*. **CREATE YOUR OWN!**
=========================== ====================== ======================================
Phase 1 proposal (Algorithms)
-----------------------------
========================== ============= ===========================================================
**Encryption algorithm** AES *For our sample we will Use AES/256 bits*
**Hash algoritm** SHA1 *SHA1 for compatibility, you can try a stronger hash*
**DH key group** 1024 bit *1024 bit for compatibility, you can try stronger group*
**Lifetime** 28800 sec *lifetime before renegotiation*
========================== ============= ===========================================================
Advanced Options
----------------
======================= =========== ===================================================
**Disable Rekey** Unchecked *Renegotiate when connection is about to expire*
**Disable Reauth** Unchecked *For IKEv2 only re-authenticate peer on rekeying*
**NAT Traversal** Enabled *Enable for IKEv1*
**Dead Peer Detection** Unchecked
======================= =========== ===================================================
Save your setting by pressing:
.. image:: images/btn_save.png
2019-02-28 10:22:49 +00:00
Now you should see the following screen:
.. image:: images/ipsec_road_vpn_p1a.png
2018-07-31 14:51:11 +00:00
:width: 100%
-------------------------------
Step 3 - Phase 2 Mobile Clients
-------------------------------
Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
2018-07-31 14:51:11 +00:00
:width: 100%
You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
2018-07-31 14:51:11 +00:00
:width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry.
General information
-------------------
======================= ================== =============================
**Mode** Tunnel IPv4 *Select Tunnel mode*
**Description** MobileIPsecP2 *Freely chosen description*
======================= ================== =============================
Local Network
-------------
======================= ================== ==============================
**Local Network** LAN subnet *Route the local LAN subnet*
======================= ================== ==============================
Phase 2 proposal (SA/Key Exchange)
----------------------------------
=========================== ============ ==========================================
**Protocol** ESP *Choose ESP for encryption*
**Encryption algorithms** AES / 256 *For the sample we use AES 256*
**Hash algorithms** SHA1 *You may also try stronger SHA512*
**PFS Key group** off *Enable a group fro stronger security*
**Lifetime** 3600 sec
=========================== ============ ==========================================
Save your setting by pressing:
.. image:: images/btn_save.png
2018-07-31 14:51:11 +00:00
:width: 100%
-----------------------------
Enable IPsec, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png
2018-07-31 14:51:11 +00:00
:width: 100%
Save:
.. image:: images/btn_save.png
2018-07-31 14:51:11 +00:00
:width: 100%
And Apply changes:
.. image:: images/ipsec_s2s_vpn_p1a_apply.png
2018-07-31 14:51:11 +00:00
:width: 100%
------------------
.. image:: images/ipsec_s2s_vpn_p1a_success.png
2018-07-31 14:51:11 +00:00
:width: 100%
-----------------------------
2018-10-17 05:29:10 +00:00
.. Note::
If you already had IPsec enabled and added Road Warrior setup, it's important to
restart the whole service via services widget in the upper right corner of IPSec pages
or via :menuselection:`System --> Diagnostics --> Services --> Strongswan` since applying configuration only
2018-10-17 05:29:10 +00:00
reloads it, but a restart also loads the required modules of strongswan.
------------------------
Step 4 - Add IPsec Users
------------------------
For this example we will create a new user who may access the mobile IPsec vpn.
Go to :menuselection:`System --> Access --> Users` and press the **+** sign in the lower right corner
to add a new user.
Enter the following into the form:
=============== ==========
**User Name** expert
**Password** &test!9T
=============== ==========
**Save** this user and reopen in edit mode to add privileges.
Add privilege **User - VPN - IPsec xauth Dialin** by pressing the **+** under
**Effective Privileges**.
**Save** to apply.
----------------------
-------------------------
Step 5 - Configure Client
-------------------------
2018-11-09 12:52:31 +00:00
To illustrate the client setup we will look at the configuration under macOS, including
some screenshots. The configurations for Android and iOS will be settings only.
.. Note::
2018-11-09 12:52:31 +00:00
Configuration samples listed here where created using latest macOS, iOS and
Android devices on time of publication in February 2016.
2018-11-09 12:52:31 +00:00
----------------------
Configure macOS Client
----------------------
Start with opening your network settings (:menuselection:`System Preferences --> Network)` and
Add a new network by pressing the + in the lower left corner.
Now select **VPN** and **Cisco IPSec**, give your connection a name and press **Create**.
.. image:: images/osx-ipsec-new.png
2018-07-31 14:51:11 +00:00
:width: 100%
Now enter the details for our connection:
.. image:: images/osx-ipsec-conf1.png
2018-07-31 14:51:11 +00:00
:width: 100%
Next press **Authentication Settings** to add the group name and pre-shared key.
.. image:: images/osx-ipsec-conf2.png
2018-07-31 14:51:11 +00:00
:width: 100%
Press **OK** to save these settings and then **Apply** to apply them.
Now test the connection by selecting it from the list and hit **Connect**.
.. image:: images/osx-ipsec-connected.png
2018-07-31 14:51:11 +00:00
:width: 100%
**Done**
--------------------
Configure iOS Client
--------------------
To add a VPN connection on an iOS device go to :menuselection:`Settings --> General --> VPN`.
Select **Add VPN Configuration** chose **IPsec** and use the Following Settings:
========================== ======================= ========================================
**Description** IPsec OPNsense *Freely chosen description*
**Server** 172.18.0.164 *Our server address*
**Account** expert *Username of the remote account*
**Password** &test!9T *Leave blank to be prompted every time*
**Preshared IPsec-key** At4aDMOAOub2NwT6gMHA *Our PSK*
========================== ======================= ========================================
------------------------
Configure Android Client
------------------------
To add a VPN connection on an Android device go to :menuselection:`Settings --> Connections --> more networks`,
select **VPN**. Press the **+** in the top right corner to add a new VPN connection.
Use the Following Settings:
========================== ======================= =============================
**Name** IPsec OPNsense *Freely chosen name*
**Type** IPSec Xauth PSK *As configured in OPNsense*
**Server address** 172.18.0.164 *Our server address*
**Preshared IPsec-key** At4aDMOAOub2NwT6gMHA *Our PSK*
========================== ======================= =============================
**Save** and try connecting. To connect enter Username and Password for the user
*expert* we created in this example.