minor fixes and changes

- arrange service menu like the product
- compile error in radvd.rst
- add ipsec howt's to the index
- fix some screenshot sizes in ipsec howto's

@mimugmail I think it's safe to add your howto's, so I've added them now
pull/195/head
Ad Schellevis 5 years ago
parent 589044e7f0
commit 82f0ad9c47

@ -16,9 +16,9 @@ It can be installed using the following command on the command line:
apt install network-manager-stronswan
----------------------------
Step 1 - Download Certificte
----------------------------
------------------------------
Step 1 - Download Certificate
------------------------------
Download the Root CA from the OPNsense Firewall since it is needed for all EAP types with IKEv2.
@ -35,4 +35,3 @@ IKEv2 + EAP-MSCHAPv2 or EAP-RADIUS
.. image:: images/ipsec-rw-linux-eapmschap.PNG
:width: 60%

@ -5,23 +5,23 @@ IPsec: Setup OPNsense for IKEv2 EAP-RADIUS
.. contents:: Index
EAP-RADIUS via IKEv2 is nearly the same as EAP-MSCHAPv2, but authentication is done against a Radius instance.
We assume you have read the first part at
:doc:`how-tos/ipsec-rw`
We assume you have read the first part at
:doc:`ipsec-rw`
----------------------------
Step 1 - Create Certificates
----------------------------
For EAP-RADIUS with IKEv2 you need to create a Root CA and a server certificate for your Firewall.
For EAP-RADIUS with IKEv2 you need to create a Root CA and a server certificate for your Firewall.
Go to :menuselection:`System --> Trust --> Authorities` and click **Add**. Give it a **Descriptive Name** and as **Method**
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
matching your local values. Now go to :menuselection:`System --> Trust --> Certificates` and create a new certificate for
the Firewall itself. Important is to change the **Type** to server. The Common Name can be the hostname
of the Firewall and set as **Alternative Name** the FQDN your Firewall how it is known to the WAN side.
This is most important as your VPN will drop when the FQDN does not match the ones of the certificate.
If you already have a CA roll out a server certificate and import
If you already have a CA roll out a server certificate and import
the CA itself via :menuselection:`System --> Trust --> Authorities` and the certificate with the key in
:menuselection:`System --> Trust --> Certificates`.
@ -40,7 +40,7 @@ set a shared secret, go to OPNsense UI to :menuselection:`System --> Access -->
============================ ================ ====================================
When you do not have an own Radius instance just use the OPNsense plugin and follow this guide:
:doc:`how-tos/freeradius`
:doc:`freeradius`
-----------------------
Step 3 - Mobile Clients
@ -105,12 +105,11 @@ Step 5 - Phase 2 Mobile Clients
Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
:width: 100%
You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
:width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry.
@ -140,11 +139,10 @@ Phase 2 proposal (SA/Key Exchange)
**Save** your settings and **Enable IPsec**, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png
:width: 100%
.. Note::
If you already had IPsec enabled and added Road Warrior setup, it is important to
If you already had IPsec enabled and added Road Warrior setup, it is important to
restart the whole service via services widget in the upper right corner of IPSec pages
or via :menuselection:`System --> Diagnostics --> Services --> Strongswan` since applying configuration only
reloads it, but a restart also loads the required modules of strongSwan.
@ -155,4 +153,4 @@ Step 6 - Add IPsec Users
Go to your RADIUS management console and start adding users!
If you are using our FreeRADIUS plugin follow the official guide:
:doc:`how-tos/freeradius`
:doc:`freeradius`

@ -4,23 +4,23 @@ IPsec: Setup OPNsense for IKEv2 EAP-TLS
.. contents:: Index
EAP-TLS via IKEv2 is based on client certificate authentication.
EAP-TLS via IKEv2 is based on client certificate authentication.
Be sure to install the client certificate on your enduser device.
----------------------------
Step 1 - Create Certificates
----------------------------
For EAP-TLS with IKEv2 you need to create a Root CA and a server certificate for your Firewall.
For EAP-TLS with IKEv2 you need to create a Root CA and a server certificate for your Firewall.
Go to :menuselection:`System --> Trust --> Authorities` and click **Add**. Give it a **Descriptive Name** and as **Method**
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
matching your local values. Now go to :menuselection:`System --> Trust --> Certificates` and create a new certificate for
the Firewall itself. Important is to change the **Type** to server. The Common Name can be the hostname
of the Firewall and set as **Alternative Name** the FQDN your Firewall how it is known to the WAN side.
This is most important as your VPN will drop when the FQDN does not match the ones of the certificate.
If you already have a CA roll out a server certificate and import
If you already have a CA roll out a server certificate and import
the CA itself via :menuselection:`System --> Trust --> Authorities` and the certificate with the key in
:menuselection:`System --> Trust --> Certificates`.
@ -70,7 +70,7 @@ Phase 1 proposal (Authentication)
.. Note::
Some clients require RSA as remote like Strongswan Android App. If you encounter problem with
Some clients require RSA as remote like Strongswan Android App. If you encounter problem with
your client devices replace **Authentication method** to **RSA (local) + EAP-TLS (remote)**
Phase 1 proposal (Algorithms)
@ -92,12 +92,12 @@ Step 3 - Phase 2 Mobile Clients
Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
:width: 100%
You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
:width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry.
@ -127,11 +127,11 @@ Phase 2 proposal (SA/Key Exchange)
**Save** your settings and **Enable IPsec**, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png
:width: 100%
.. Note::
If you already had IPsec enabled and added Road Warrior setup, it's important to
If you already had IPsec enabled and added Road Warrior setup, it's important to
restart the whole service via services widget in the upper right corner of IPSec pages
or via :menuselection:`System --> Diagnostics --> Services --> Strongswan` since applying configuration only
reloads it, but a restart also loads the required modules of strongSwan.

@ -4,37 +4,37 @@ IPsec: Setup OPNsense for IKEv1 using XAuth
.. contents:: Index
XAuth was an addition to IKEv1 supporting user authentication credentials additionally to
XAuth was an addition to IKEv1 supporting user authentication credentials additionally to
pre-shared keys or certificates. There are three different types supported by OPNsense which
we will describe here.
Mutual PSK + XAuth: You define a pre-shared key which is the same for every user and after securing
the channel the user authentication via XAuth comes into play.
Mutual RSA + XAuth: Instead of using a pre-shared key, every device needs a client certificate to secure
Mutual RSA + XAuth: Instead of using a pre-shared key, every device needs a client certificate to secure
the connection plus XAuth for authentication. This is the most secure variant for IKEv1/XAuth but also
with the most work to do.
Hybrid RSA + XAuth: Hybrid RSA is the same as Mutual, without the need for a client certificate. Only
the server will be authenticated (like using HTTPS) to prevent man-in-the-middle attacks like with
Hybrid RSA + XAuth: Hybrid RSA is the same as Mutual, without the need for a client certificate. Only
the server will be authenticated (like using HTTPS) to prevent man-in-the-middle attacks like with
Mutual PSK. It is more secure than PSK but does not need the complete roll-out process like with Mutual RSA.
We assume you have read the first part at
:doc:`how-tos/ipsec-rw`
We assume you have read the first part at
:doc:`ipsec-rw`
----------------------------------------------------
Step 1 - Create Certificates (only for RSA variants)
----------------------------------------------------
For Mutual RSA + XAuth and Hybrid RSA + XAuth you need to create a Root CA and a server certificate
for your Firewall.
for your Firewall.
Go to :menuselection:`System --> Trust --> Authorities` and click **Add**. Give it a **Descriptive Name** and as **Method**
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
matching your local values. Now go to :menuselection:`System --> Trust --> Certificates` and create a new certificate for
the Firewall itself. Important is to change the **Type** to server. The Common Name can be the hostname
of the Firewall and set as **Alternative Name** the FQDN your Firewall how it is known to the WAN side.
This is most important as your VPN will drop when the FQDN does not match the ones of the certificate.
If you already have a CA roll out a server certificate and import
If you already have a CA roll out a server certificate and import
the CA itself via :menuselection:`System --> Trust --> Authorities` and the certificate with the key in
:menuselection:`System --> Trust --> Certificates`.
@ -103,12 +103,12 @@ Step 3 - Phase 2 Mobile Clients
Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
:width: 100%
You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
:width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry.
@ -138,11 +138,11 @@ Phase 2 proposal (SA/Key Exchange)
**Save** your settings and **Enable IPsec**, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png
:width: 100%
.. Note::
If you already had IPsec enabled and added Road Warrior setup, it is important to
If you already had IPsec enabled and added Road Warrior setup, it is important to
restart the whole service via services widget in the upper right corner of IPSec pages
or via :menuselection:`System --> Diagnostics --> Services --> Strongswan` since applying configuration only
reloads it, but a restart also loads the required modules of strongSwan.

@ -5,24 +5,24 @@ IPsec: Setup OPNsense for IKEv2 EAP-MSCHAPv2
.. contents:: Index
EAP-MSCHAPv2 via IKEv2 is the most compatible combination.
We assume you have read the first part at
:doc:`how-tos/ipsec-rw`
We assume you have read the first part at
:doc:`ipsec-rw`
----------------------------
Step 1 - Create Certificates
----------------------------
For EAP-MSCHAPv2 with IKEv2 you need to create a Root CA and a server certificate
for your Firewall.
for your Firewall.
Go to :menuselection:`System --> Trust --> Authorities` and click **Add**. Give it a **Descriptive Name** and as **Method**
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
matching your local values. Now go to :menuselection:`System --> Trust --> Certificates` and create a new certificate for
the Firewall itself. Important is to change the **Type** to server. The Common Name can be the hostname
of the Firewall and set as **Alternative Name** the FQDN your Firewall how it is known to the WAN side.
This is most important as your VPN will drop when the FQDN does not match the ones of the certificate.
If you already have a CA roll out a server certificate and import
If you already have a CA roll out a server certificate and import
the CA itself via :menuselection:`System --> Trust --> Authorities` and the certificate with the key in
:menuselection:`System --> Trust --> Certificates`.
@ -89,12 +89,12 @@ Step 3 - Phase 2 Mobile Clients
Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
:width: 100%
You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
:width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry.
@ -124,11 +124,11 @@ Phase 2 proposal (SA/Key Exchange)
**Save** your settings and **Enable IPsec**, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png
:width: 100%
.. Note::
If you already had IPsec enabled and added Road Warrior setup, it is important to
If you already had IPsec enabled and added Road Warrior setup, it is important to
restart the whole service via services widget in the upper right corner of IPSec pages
or via :menuselection:`System --> Diagnostics --> Services --> Strongswan` since applying configuration only
reloads it, but a restart also loads the required modules of strongSwan.

@ -13,16 +13,16 @@ Step 1 - Create Certificates
----------------------------
For Mutual RSA + MSCHAPv2 with IKEv2 you need to create a Root CA and a server certificate
for your Firewall.
for your Firewall.
Go to :menuselection:`System --> Trust --> Authorities` and click **Add**. Give it a **Descriptive Name** and as **Method**
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
choose **Create internal Certificate Authority**. Increase the **Lifetime** and fill in the fields
matching your local values. Now go to :menuselection:`System --> Trust --> Certificates` and create a new certificate for
the Firewall itself. Important is to change the **Type** to server. The Common Name can be the hostname
of the Firewall and set as **Alternative Name** the FQDN your Firewall how it is known to the WAN side.
This is most important as your VPN will drop when the FQDN does not match the ones of the certificate.
If you already have a CA roll out a server certificate and import
If you already have a CA roll out a server certificate and import
the CA itself via :menuselection:`System --> Trust --> Authorities` and the certificate with the key in
:menuselection:`System --> Trust --> Certificates`.
@ -90,12 +90,12 @@ Step 3 - Phase 2 Mobile Clients
Press the button that says '+ Show 0 Phase-2 entries'
.. image:: images/ipsec_s2s_vpn_p1a_show_p2.png
:width: 100%
You will see an empty list:
.. image:: images/ipsec_s2s_vpn_p1a_p2_empty.png
:width: 100%
Now press the *+* at the right of this list to add a Phase 2 entry.
@ -125,11 +125,11 @@ Phase 2 proposal (SA/Key Exchange)
**Save** your settings and **Enable IPsec**, Select:
.. image:: images/ipsec_s2s_vpn_p1a_enable.png
:width: 100%
.. Note::
If you already had IPsec enabled and added Road Warrior setup, it is important to
If you already had IPsec enabled and added Road Warrior setup, it is important to
restart the whole service via services widget in the upper right corner of IPSec pages
or via :menuselection:`System --> Diagnostics --> Services --> Strongswan` since applying configuration only
reloads it, but a restart also loads the required modules of strongSwan.

@ -55,7 +55,6 @@ A detailed overview of the :code:`radvd` settings determined by the mode can be
General
--------------------------------
=====================================================================================================================
==================================== ===============================================================================
Priority The preference associated with the default router,

@ -34,8 +34,10 @@ L2TP and PPTP.
VPN technologies displayed with an open lock are considered to be insecure.
.................................
Integrated VPN options
----------------------
.................................
Integrated solutions are those that are available within the GUI without installing
any additional package or plugin. These include:
@ -43,8 +45,10 @@ any additional package or plugin. These include:
* **OpenVPN (SSL VPN)**
.................................
Plugin VPN options
------------------
.................................
Via plugins additional VPN technologies are offered, including:
* **Legacy L2TP & PPTP**
@ -59,6 +63,10 @@ Configuration
-------------
Please read our how-tos for configuration examples and more detailed information.
..............
IPsec
..............
.. toctree::
:maxdepth: 2
@ -68,8 +76,39 @@ Please read our how-tos for configuration examples and more detailed information
how-tos/ipsec-s2s
how-tos/ipsec-s2s-route
how-tos/ipsec-s2s-binat
how-tos/ipsec-rw
how-tos/ipsec-rw-android
how-tos/ipsec-rw-linux
how-tos/ipsec-rw-srv-eapradius
how-tos/ipsec-rw-srv-eaptls
how-tos/ipsec-rw-srv-ikev1xauth
how-tos/ipsec-rw-srv-mschapv2
how-tos/ipsec-rw-srv-rsamschapv2
how-tos/ipsec-rw-w7
how-tos/ipsec-s2s-route-azure
..............
OpenVPN
..............
.. toctree::
:maxdepth: 2
:titlesonly:
how-tos/sslvpn_client
how-tos/sslvpn_s2s
..............
Other
..............
.. toctree::
:maxdepth: 2
:titlesonly:
how-tos/openconnect
how-tos/wireguard-s2s
how-tos/wireguard-client

@ -21,9 +21,9 @@ Your security appliance comes with quite some services to ease network operation
manual/ips
manual/monit
manual/ntpd
manual/opendns
manual/unbound
manual/proxy
manual/opendns
manual/radvd
manual/dynamic_routing

Loading…
Cancel
Save