No nā kumu he nui, pono e hoʻonohonoho i kahi pilina VPN ma waena o ka pūnaewele ma VMWare Cloud Director a me kahi mīkini ʻokoʻa ʻo Ubuntu i ke ao. ʻAʻole hoʻohālikelike ka memo i kahi wehewehe piha, he howto liʻiliʻi wale nō.
ʻO ka ʻatikala wale nō e pili ana i kēia kumuhana mai 2015 i loaʻa ma ka Pūnaewele "
ʻO ka mea pōʻino, ʻaʻole hiki ke hoʻohana pololei, no ka mea... Makemake au i ka hoʻopili pono ʻana, ʻaʻole kahi palapala hōʻoia ponoʻī, a ʻaʻole i hana ka config i wehewehe ʻia ma hope o NAT.
No laila, pono wau e noho i lalo a ʻimi i ka palapala.
Ma keʻano he kumu, ua lawe au i kahi config aʻu i hoʻohana ai no ka manawa lōʻihi, e hiki ai iaʻu ke hoʻohui mai kahi kokoke i nā OS, a hoʻohui wale i kahi ʻāpana i hiki iaʻu ke hoʻopili iā NSX Edge.
No ka mea ʻo ka hoʻokomo ʻana a me ka hoʻonohonoho piha ʻana i ka server Strongswan ma waho o ke kiko o kēia memo, e ʻae mai iaʻu e nānā i
No laila, e neʻe pololei i nā hoʻonohonoho.
ʻO kā mākou kiʻi pili e like me kēia:
со стороны VMWare внешний адрес 33.33.33.33 и внутренняя сеть 192.168.1.0/24
со стороны Linux внешний адрес 22.22.22.22 и внутренняя сеть 10.10.10.0/24
также понадобится настроить Let's encrypt сертификат для адреса vpn.linux.ext
PSK с обеих сторон: ChangeMeNow!
Hoʻonohonoho mai NSX Edge:
ʻAtikala
Enabled: yes
Enable perfect forward secrecy (PFS): yes
Name: VPN_strongswan (любое, по вашему выбору)
Local Id: 33.33.33.33
Local Endpoint: 33.33.33.33
Local Subnets: 192.168.1.0/24
Peer Id: vpn.linux.ext
Peer Endpoint: 22.22.22.22
Peer Subnets: 10.10.10.0/24
Encryption Algorithm: AES256
Authentication: PSK
Pre-Shared Key: ChangeMeNow!
Diffie-Hellman Group: 14 (2048 bit — приемлемый компромисс между скоростью и безопасностью. Но если хотите, можете поставить больше)
Digest Algorithm: SHA256
IKE Option: IKEv2
IKE Responder Only: no
Session Type: Policy Based Session
Nānāʻana
Hoʻonohonoho mai Strongswan:
ipsec.conf
# /etc/ipsec.conf
config setup
conn %default
dpdaction=clear
dpddelay=35s
dpdtimeout=300s
fragmentation=yes
rekey=no
ike=aes256gcm16-aes256gcm12-aes128gcm16-aes128gcm12-sha256-sha1-modp2048-modp4096-modp1024,aes256-aes128-sha256-sha1-modp2048-modp4096-modp1024,3des-sha1-modp1024!
esp=aes128gcm12-aes128gcm16-aes256gcm12-aes256gcm16-modp2048-modp4096-modp1024,aes128-aes256-sha1-sha256-modp2048-modp4096-modp1024,aes128-sha1-modp2048,aes128-sha1-modp1024,3des-sha1-modp1024,aes128-aes256-sha1-sha256,aes128-sha1,3des-sha1!
left=%any
leftsubnet=10.10.10.0/24
leftcert=certificate.pem
leftfirewall=yes
leftsendcert=always
right=%any
rightsourceip=192.168.1.0/24
rightdns=77.88.8.8,8.8.4.4
eap_identity=%identity
# IKEv2
conn IPSec-IKEv2
keyexchange=ikev2
auto=add
# BlackBerry, Windows, Android
conn IPSec-IKEv2-EAP
also="IPSec-IKEv2"
rightauth=eap-mschapv2
# macOS, iOS
conn IKEv2-MSCHAPv2-Apple
also="IPSec-IKEv2"
rightauth=eap-mschapv2
leftid=vpn.linux.ext
# Android IPsec Hybrid RSA
conn IKEv1-Xauth
keyexchange=ikev1
rightauth=xauth
auto=add
# VMWare IPSec VPN
conn linux-nsx-psk
authby=secret
auto=start
leftid=vpn.linux.ext
left=10.10.10.10
leftsubnet=10.10.10.0/24
rightid=33.33.33.33
right=33.33.33.33
rightsubnet=192.168.1.0/24
ikelifetime=28800
keyexchange=ikev2
lifebytes=0
lifepackets=0
lifetime=1h
ipsec.huna
# /etc/ipsec.secrets
: RSA privkey.pem
# Create VPN users accounts
# ВНИМАНИЕ! После логина сначала пробел, потом двоеточие.
user1 : EAP "stongPass1"
user2 : EAP "stongPass2"
%any 33.33.33.33 : PSK "ChangeMeNow!"
Ma hope o kēlā, heluhelu hou i ka config, e hoʻomaka i ka pilina a nānā ua hoʻokumu ʻia:
ipsec update
ipsec rereadsecrets
ipsec up linux-nsx-psk
ipsec status
Manaʻo wau he mea kōkua kēia leka liʻiliʻi a mālama i kekahi i mau hola.
Source: www.habr.com