2
0
mirror of https://github.com/opnsense/docs synced 2024-11-05 06:00:36 +00:00
opensense-docs/source/manual/how-tos/ipsec-s2s.rst

526 lines
17 KiB
ReStructuredText
Raw Normal View History

================================
Setup IPsec site to site tunnel
================================
2018-11-09 12:52:31 +00:00
Site to site VPNs connect two locations with static public IP addresses and allow
traffic to be routed between the two networks. This is most commonly used to
connect an organization's branch offices back to its main office, so branch users
can access network resources in the main office.
----------------
Before you start
----------------
Before starting with the configuration of an IPsec tunnel you need to have a
working OPNsense installation wit a unique LAN IP subnet for each side of your
connection (you local network need to different than that of the remote network).
.. Note::
For the sample we will use a private IP for our WAN connection.
This requires us to disable the default block rule on wan to allow private traffic.
To do so, go to :menuselection:`Interfaces --> [WAN]` and uncheck “Block private networks”.
*(Dont forget to save and apply)*
.. image:: images/block_private_networks.png
-----------------------------
------------
Sample Setup
------------
For the sample configuration we use two OPNsense boxes to simulate a site to site
tunnel, with the following configuration:
.. sidebar:: Network Site A
.. nwdiag::
:scale: 100%
nwdiag {
span_width = 90;
node_width = 180;
Internet [shape = "cisco.cloud"];
pclana [label="PC Site A",shape="cisco.pc"];
pclana -- switchlana;
network LANA {
switchlana [label="",shape = "cisco.workgroup_switch"];
label = " LAN Site A";
address ="192.168.1.1.x/24";
fw1 [address="192.168.1.1/24"];
tunnel [label=" IPsec Tunnel",shape = cisco.cloud];
}
network WANA {
label = " WAN Site A";
fw1 [shape = "cisco.firewall", address="172.10.1.1/24"];
Internet;
}
}
Site A
------
==================== =============================
**Hostname** fw1
**WAN IP** 172.10.1.1/24
**LAN IP** 192.168.1.1/24
**LAN DHCP Range** 192.168.1.100-192.168.1.200
==================== =============================
|
|
|
|
-----------------------------
.. sidebar:: Network Site B
.. nwdiag::
:scale: 100%
nwdiag {
span_width = 90;
node_width = 180;
Internet [shape = "cisco.cloud"];
pclanb [label="PC Site B",shape="cisco.pc"];
pclanb -- switchlanb;
network LANB {
label = " LAN Site B";
address ="192.168.2.1.x/24";
fw2 [address="192.168.2.1/24"];
tunnel [label=" IPsec Tunnel",shape = cisco.cloud];
switchlanb [label="",shape = "cisco.workgroup_switch"];
}
network WANB {
label = " WAN Site B";
fw2 [shape = "cisco.firewall", address="172.10.2.1/24"];
Internet;
}
}
Site B
------
==================== =============================
**Hostname** fw2
**WAN IP** 172.10.2.1/24
**LAN Net** 192.168.2.0/24
**LAN DHCP Range** 192.168.2.100-192.168.2.200
==================== =============================
|
|
|
|
-----------------------------
Full Network Diagram Including IPsec Tunnel
-------------------------------------------
.. nwdiag::
:scale: 100%
:caption: IPsec Site-to-Site tunnel network
nwdiag {
span_width = 90;
node_width = 180;
Internet [shape = "cisco.cloud"];
pclana [label="PC Site A",shape="cisco.pc"];
pclana -- switchlana;
network LANA {
switchlana [label="",shape = "cisco.workgroup_switch"];
label = " LAN Site A";
address ="192.168.1.1.x/24";
fw1 [address="192.168.1.1/24"];
tunnel [label=" IPsec Tunnel",shape = cisco.cloud];
}
network WANA {
label = " WAN Site A";
fw1 [shape = "cisco.firewall", address="172.10.1.1/24"];
Internet;
}
network WANB {
label = " WAN Site B";
fw2 [shape = "cisco.firewall", address="172.10.2.1/24"];
Internet;
}
network LANB {
label = " LAN Site B";
address ="192.168.2.1.x/24";
fw2 [address="192.168.2.1/24"];
tunnel;
switchlanb [label="",shape = "cisco.workgroup_switch"];
}
pclanb [label="PC Site B",shape="cisco.pc"];
pclanb -- switchlanb;
}
---------------------------------------
Firewall Rules Site A & Site B (part 1)
---------------------------------------
To allow IPsec Tunnel Connections, the following should be allowed on WAN for on
sites (under :menuselection:`Firewall --> Rules --> WAN`):
* Protocol ESP
* UDP Traffic on Port 500 (ISAKMP)
* UDP Traffic on Port 4500 (NAT-T)
.. image:: images/ipsec_wan_rules.png
2018-07-31 14:51:11 +00:00
:width: 100%
.. Note::
You can further limit the traffic by the source IP of the remote host.
-----------------------
Step 1 - Phase 1 Site A
-----------------------
(Under :menuselection:`VPN --> IPsec --> Tunnel Settings` Press **+**)
We will use the following settings:
General information
-------------------
========================= ============= ================================================
**Connection method** default *default is 'Start on traffic'*
**Key Exchange version** V2
**Internet Protocol** IPv4
**Interface** WAN *choose the interface connected to the internet*
**Remote gateway** 172.10.2.1 *the public IP address of your remote OPNsense*
**Description** Site B *freely chosen description*
========================= ============= ================================================
Phase 1 proposal (Authentication)
---------------------------------
=========================== ====================== ======================================
**Authentication method** Mutual PSK *Using a Pre-shared Key*
**My identifier** My IP address *Simple identification for fixed ip*
**Peer identifier** Peer IP address *Simple identification for fixed ip*
**Pre-Shared Key** At4aDMOAOub2NwT6gMHA *Random key*. **CREATE YOUR OWN!**
=========================== ====================== ======================================
Phase 1 proposal (Algorithms)
-----------------------------
========================== =============== ===========================================
**Encryption algorithm** AES *For our sample we will Use AES/256 bits*
**Hash algoritm** SHA512 *Use a strong hash like SHA512*
**DH key group** 14 (2048 bit) *2048 bit should be sufficient*
**Lifetime** 28800 sec *lifetime before renegotiation*
========================== =============== ===========================================
Advanced Options
----------------
======================= =========== ===================================================
**Disable Rekey** Unchecked *Renegotiate when connection is about to expire*
**Disable Reauth** Unchecked *For IKEv2 only re-authenticate peer on rekeying*
**NAT Traversal** Disabled *For IKEv2 NAT traversal is always enabled*
**Dead Peer Detection** Unchecked
======================= =========== ===================================================
Save your setting by pressing:
.. image:: images/btn_save.png
Now you should see the following screen:
.. image:: images/ipsec_s2s_vpn_p1a_4.png
2018-07-31 14:51:11 +00:00
:width: 100%
-----------------------
Step 2 - Phase 2 Site A
-----------------------
Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
2018-07-31 14:51:11 +00:00
:width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry.
General information
-------------------
======================= ================== =============================
**Mode** Tunnel IPv4 *Select Tunnel mode*
**Description** Local LAN Site B *Freely chosen description*
======================= ================== =============================
Local Network
-------------
======================= ================== ==============================
**Local Network** LAN subnet *Route the local LAN subnet*
======================= ================== ==============================
Remote Network
--------------
============== =============== ==========================
**Type** Network *Route a remote network*
**Address** 192.168.2.1/24 *The remote LAN subnet*
============== =============== ==========================
Phase 2 proposal (SA/Key Exchange)
----------------------------------
=========================== =============== =======================================
**Protocol** ESP *Choose ESP for encryption*
**Encryption algorithms** AES / 256 *For the sample we use AES 256*
**Hash algortihms** SHA512 *Choose a strong hash like SHA512*
**PFS Key group** 14 (2048 bit) *Not required but enhanced security*
**Lifetime** 3600 sec
=========================== =============== =======================================
Save your setting by pressing:
.. image:: images/btn_save.png
-----------------------------
Enable IPsec for Site A, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png
Save:
.. image:: images/btn_save.png
And Apply changes:
.. image:: images/ipsec_s2s_vpn_p1a_apply.png
2018-07-31 14:51:11 +00:00
:width: 100%
------------------
.. image:: images/ipsec_s2s_vpn_p1a_success.png
2018-07-31 14:51:11 +00:00
:width: 100%
**You are almost done configuring Site A (only some firewall settings remain, which we'll address later).**
2018-11-09 11:18:28 +00:00
**We will now proceed setting up Site B.**
-----------------------------
-----------------------
Step 3 - Phase 1 Site B
-----------------------
(Under :menuselection:`VPN --> IPsec --> Tunnel Settings` Press **+**)
We will use the following settings:
General information
-------------------
========================= ============= ================================================
**Connection method** default *default is 'Start on traffic'*
**Key Exchange version** V2
**Internet Protocol** IPv4
**Interface** WAN *choose the interface connected to the internet*
**Remote gateway** 172.10.1.1 *the public IP address of your remote OPNsense*
**Description** Site A *freely chosen description*
========================= ============= ================================================
Phase 1 proposal (Authentication)
---------------------------------
=========================== ====================== ======================================
**Authentication method** Mutual PSK *Using a Pre-shared Key*
**My identifier** My IP address *Simple identification for fixed ip*
**Peer identifier** Peer IP address *Simple identification for fixed ip*
**Pre-Shared Key** At4aDMOAOub2NwT6gMHA *Random key*. **CREATE YOUR OWN!**
=========================== ====================== ======================================
Phase 1 proposal (Algorithms)
-----------------------------
========================== =============== ===========================================
**Encryption algorithm** AES *For our sample we will Use AES/256 bits*
**Hash algoritm** SHA512 *Use a strong hash like SHA512*
**DH key group** 14 (2048 bit) *2048 bit should be sufficient*
**Lifetime** 28800 sec *lifetime before renegotiation*
========================== =============== ===========================================
Advanced Options
----------------
======================= =========== ===================================================
**Disable Rekey** Unchecked *Renegotiate when connection is about to expired*
**Disable Reauth** Unchecked *For IKEv2 only re-authenticate peer on rekeying*
**NAT Traversal** Disable *For IKEv2 NAT traversal is always enabled*
**Dead Peer Detection** Unchecked
======================= =========== ===================================================
Save your setting by pressing:
.. image:: images/btn_save.png
Now you should see the following screen:
.. image:: images/ipsec_s2s_vpn_p1b_4.png
2018-07-31 14:51:11 +00:00
:width: 100%
-----------------------
Step 4 - Phase 2 Site B
-----------------------
Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
2018-07-31 14:51:11 +00:00
:width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry.
General information
-------------------
======================= ================== =============================
**Mode** Tunnel IPv4 *Select Tunnel mode*
**Description** Local LAN Site A *Freely chosen description*
======================= ================== =============================
Local Network
-------------
======================= ================== ==============================
**Local Network** LAN subnet *Route the local LAN subnet*
======================= ================== ==============================
Remote Network
--------------
============== =============== ==========================
**Type** Network *Route a remote network*
**Address** 192.168.1.1/24 *The remote LAN subnet*
============== =============== ==========================
Phase 2 proposal (SA/Key Exchange)
----------------------------------
=========================== =============== =======================================
**Protocol** ESP *Choose ESP for encryption*
**Encryption algorithms** AES / 256 *For the sample we use AES 256*
**Hash algortihms** SHA512 *Choose a strong hash like SHA512*
**PFS Key group** 14 (2048 bit) *Not required but enhanced security*
**Lifetime** 3600 sec
=========================== =============== =======================================
Save your setting by pressing:
.. image:: images/btn_save.png
-----------------------------
Enable IPsec for Site B, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png
2018-07-31 14:51:11 +00:00
:width: 100%
Save:
.. image:: images/btn_save.png
And Apply changes:
.. image:: images/ipsec_s2s_vpn_p1a_apply.png
2018-07-31 14:51:11 +00:00
:width: 100%
-----------------------------
.. image:: images/ipsec_s2s_vpn_p1a_success.png
2018-07-31 14:51:11 +00:00
:width: 100%
---------------------------------------
Firewall Rules Site A & Site B (part 2)
---------------------------------------
To allow traffic passing to your LAN subnet you need to add a rule to the IPsec
interface (under :menuselection:`Firewall --> Rules --> IPsec`).
.. image:: images/ipsec_ipsec_lan_rule.png
:width: 100%
------------------
IPsec Tunnel Ready
------------------
The tunnel should now be up and routing the both networks.
Go to :menuselection:`VPN --> IPsec --> Status Overview` to see current status.
Press on the **(i)** to see the details of the phase 2 tunnel(s), like this:
.. image:: images/ipsec_status.png
2018-07-31 14:51:11 +00:00
:width: 100%
.. Note::
If the tunnel did not come up, try to restart the service on both ends.
--------------------
Sample configuration
--------------------
For test purposes we used two OPNsense boxes integrated into one unit and a
cross-cable between the WAN ports.
.. image:: images/OPN20322R_870px.png
:target: https://www.deciso.com/product-catalog/opn20322r/
2018-07-31 14:51:11 +00:00
:width: 100%
To route traffic the WAN interfaces have been configured to use a /16 segment and
they are each others default gateway. Other than that the sample is equal to this
how-to.
Configuration Site A
:download:`Config.xml Site A <resources/config-OPNsense-ipsec-Site-A.xml>`
Configuration Site B
:download:`Config.xml Site B <resources/config-OPNsense-ipsec-Site-B.xml>`
----------------
Trouble shooting
----------------
Phase 1 won't come up
---------------------
That is a difficult one. First check you firewall rules to see if you allow the
right ports and protocols (ESP, UDP 500 & UDP 4500) for the WAN interface.
Check your ipsec log to see if that reviels a possible cause.
Common issues are unequal settings. Both ends must use the
same PSK and encryption standard.
Phase 1 works but no phase 2 tunnels are connected
---------------------------------------------------
Did you set the correct local and remote networks. A common mistake is to fill in
2018-11-09 12:52:31 +00:00
the IP address of the remote host instead of its network ending with **x.x.x.0**
Common issues are unequal settings. Both ends must use the same encryption standard.
.. Note::
If you are testing locally with your pc connected to one of the two test boxes
as in the sample configuration, then make sure you have no other network
connections (Wi-Fi, for example).