IPIP IPsec VPN ngalande pakati pa Linux makina ndi Mikrotik kuseri kwa NAT wopereka

Linux: Ubuntu 18.04.4 LTS (GNU/Linux 4.15.0-91-generic x86_64)

  • Eth0 1.1.1.1/32 IP yakunja
  • ipip-ipsec0 192.168.0.1/30 idzakhala ngalande yathu

Miktoik: CCR 1009, RouterOS 6.46.5

  • Eth0 10.0.0.2/30 IP mkati kuchokera kwa wothandizira. NAT IP yakunja ya wothandizirayo ndi yamphamvu.
  • ipip-ipsec0 192.168.0.2/30 idzakhala ngalande yathu

Tidzapanga njira ya IPsec pamakina a Linux pogwiritsa ntchito racoon. Sindikufotokoza zambiri, pali zabwino nkhani Ρƒ vvpoloskin.

Ikani phukusi lofunikira:

sudo install racoon ipsec-tools

Timakonza racoon, ikhala ngati seva ya ipsec. Popeza mikrotik mumayendedwe akuluakulu sangathe kufalitsa chizindikiritso chowonjezera chamakasitomala, ndipo adilesi yakunja ya IP yomwe imalumikizana ndi Linux ndi yamphamvu, kugwiritsa ntchito kiyi yogawana (chilolezo chachinsinsi) sikungagwire ntchito, chifukwa mawu achinsinsi ayenera kufananizidwa ndi adilesi ya IP. cholumikizira cholumikizira, kapena ndi chizindikiritso.

Tidzagwiritsa ntchito chilolezo pogwiritsa ntchito makiyi a RSA.

Daemon ya racoon imagwiritsa ntchito makiyi amtundu wa RSA, ndipo mikrotik imagwiritsa ntchito mtundu wa PEM. Ngati mupanga makiyi pogwiritsa ntchito plainrsa-gen utility yomwe imabwera ndi racoon, ndiye kuti simungathe kusintha kiyi yapagulu ya Mikrotika kukhala mtundu wa PEM ndi chithandizo chake - imatembenuza mbali imodzi yokha: PEM kupita ku RSA. Ngakhale openssl kapena ssh-keygen samatha kuwerenga makiyi opangidwa ndi plainrsa-gen, kotero kutembenuka sikungathe kugwiritsanso ntchito.

Tidzapanga kiyi ya PEM pogwiritsa ntchito openssl ndikuisintha kukhala racoon pogwiritsa ntchito plainrsa-gen:

#  Π“Π΅Π½Π΅Ρ€ΠΈΡ€ΡƒΠ΅ΠΌ ΠΊΠ»ΡŽΡ‡
openssl genrsa -out server-name.pem 1024
# ИзвлСкаСм ΠΏΡƒΠ±Π»ΠΈΡ‡Π½Ρ‹ΠΉ ΠΊΠ»ΡŽΡ‡
openssl rsa -in server-name.pem -pubout > server-name.pub.pem
# ΠšΠΎΠ½Π²Π΅Ρ€Ρ‚ΠΈΡ€ΡƒΠ΅ΠΌ
plainrsa-gen -i server-name.pem -f server-name.privet.key
plainrsa-gen -i server-name.pub.pem -f server-name.pub.key

Tiyika makiyi omwe talandila mufoda: /etc/racoon/certs/server. Musaiwale kukhazikitsa mwiniwake wa wosuta yemwe dzina lake la racoon daemon limakhazikitsidwa (nthawi zambiri mizu) ku zilolezo 600.

Ndikufotokozerani kukhazikitsidwa kwa mikrotik mukalumikiza kudzera pa WinBox.

Kwezani kiyi ya seva-name.pub.pem ku mikrotik: Menyu "Mafayilo" - "Kwezani".

Tsegulani gawo la "IP" - "IP sec" - "Makiyi" tabu. Tsopano tikupanga makiyi - batani la "Generate Key", kenako tumizani kiyi yapagulu ya mikrotika "Expor Pub. Key", mutha kutsitsa kuchokera kugawo la "Mafayilo", dinani pomwepa pafayilo - "Koperani".

Timatumiza kiyi yapagulu ya racoon, "Import", pamndandanda wotsikira pansi wa "Fayilo dzina" timayang'ana seva-name.pub.pem yomwe tidatsitsa kale.

Kiyi yapagulu ya mikrotik iyenera kusinthidwa

plainrsa-gen -i mikrotik.pub.pem -f mikrotik.pub.key

ndikuyiyika mu /etc/racoon/certs foda, osaiwala za mwiniwake ndi ufulu.

racoon config ndi ndemanga: /etc/racoon/racoon.conf

log info; # Π£Ρ€ΠΎΠ²Π΅Π½ΡŒ логирования, ΠΏΡ€ΠΈ ΠΎΡ‚Π»Π°Π΄ΠΊΠ΅ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌ Debug ΠΈΠ»ΠΈ Debug2.

listen {

    isakmp 1.1.1.1 [500]; # АдрСс ΠΈ ΠΏΠΎΡ€Ρ‚, Π½Π° ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌ Π±ΡƒΠ΄Π΅Ρ‚ ΡΠ»ΡƒΡˆΠ°Ρ‚ΡŒ Π΄Π΅ΠΌΠΎΠ½.
    isakmp_natt 1.1.1.1 [4500]; # АдрСс ΠΈ ΠΏΠΎΡ€Ρ‚, Π½Π° ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌ Π±ΡƒΠ΄Π΅Ρ‚ ΡΠ»ΡƒΡˆΠ°Ρ‚ΡŒ Π΄Π΅ΠΌΠΎΠ½ для ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ² Π·Π° NAT.
    strict_address; # Π’Ρ‹ΠΏΠΎΠ»Π½ΡΡ‚ΡŒ ΠΎΠ±ΡΠ·Π°Ρ‚Π΅Π»ΡŒΠ½ΡƒΡŽ ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΡƒ привязки ΠΊ ΡƒΠΊΠ°Π·Π°Π½Π½Ρ‹ΠΌ Π²Ρ‹ΡˆΠ΅ IP.
}

path certificate "/etc/racoon/certs"; # ΠŸΡƒΡ‚ΡŒ Π΄ΠΎ ΠΏΠ°ΠΏΠΊΠΈ с сСртификатами.

remote anonymous { # БСкция, Π·Π°Π΄Π°ΡŽΡ‰Π°Ρ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ для Ρ€Π°Π±ΠΎΡ‚Ρ‹ Π΄Π΅ΠΌΠΎΠ½Π° с ISAKMP ΠΈ согласования Ρ€Π΅ΠΆΠΈΠΌΠΎΠ² с ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‰ΠΈΠΌΠΈΡΡ хостами. Π’Π°ΠΊ ΠΊΠ°ΠΊ IP, с ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ³ΠΎ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ Mikrotik, динамичСский, Ρ‚ΠΎ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌ anonymous, Ρ‡Ρ‚ΠΎ Ρ€Π°Π·Ρ€Π΅ΡˆΠ°Π΅Ρ‚ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ с любого адрСса. Если IP Ρƒ хостов статичСский, Ρ‚ΠΎ ΠΌΠΎΠΆΠ½ΠΎ ΡƒΠΊΠ°Π·Π°Ρ‚ΡŒ ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Ρ‹ΠΉ адрСс ΠΈ ΠΏΠΎΡ€Ρ‚.

    passive on; # Π—Π°Π΄Π°Π΅Ρ‚ "сСрвСрный" Ρ€Π΅ΠΆΠΈΠΌ Ρ€Π°Π±ΠΎΡ‚Ρ‹ Π΄Π΅ΠΌΠΎΠ½Π°, ΠΎΠ½ Π½Π΅ Π±ΡƒΠ΄Π΅Ρ‚ ΠΏΡ‹Ρ‚Π°Ρ‚ΡŒΡΡ ΠΈΠ½ΠΈΡ†ΠΈΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ.
    nat_traversal on; # Π’ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ использованиС Ρ€Π΅ΠΆΠΈΠΌΠ° NAT-T для ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ², Ссли ΠΎΠ½ΠΈ Π·Π° NAT. 
    exchange_mode main; # Π Π΅ΠΆΠΈΠΌ ΠΎΠ±ΠΌΠ΅Π½Π° ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Π°ΠΌΠΈ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ, Π² Π΄Π°Π½Π½ΠΎΠΌ случаС ---согласованиС.
    my_identifier address 1.1.1.1; # Π˜Π΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΡ†ΠΈΡ€ΡƒΠ΅ΠΌ наш linux хост ΠΏΠΎ Π΅Π³ΠΎ ip адрСсу.
    certificate_type plain_rsa "server/server-name.priv.key"; # ΠŸΡ€ΠΈΠ²Π°Ρ‚Π½Ρ‹ΠΉ ΠΊΠ»ΡŽΡ‡ сСрвСра.
    peers_certfile plain_rsa "mikrotik.pub.key"; # ΠŸΡƒΠ±Π»ΠΈΡ‡Π½Ρ‹ΠΉ ΠΊΠ»ΡŽΡ‡ Mikrotik.

    proposal_check claim; # Π Π΅ΠΆΠΈΠΌ согласования ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€ΠΎΠ² ISAKMP туннСля. Racoon Π±ΡƒΠ΄Π΅Ρ‚ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ значСния ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‰Π΅Π³ΠΎΡΡ хоста (ΠΈΠ½ΠΈΡ†ΠΈΠ°Ρ‚ΠΎΡ€Π°) для срока дСйствия сСссии                   ΠΈ Π΄Π»ΠΈΠ½Ρ‹ ΠΊΠ»ΡŽΡ‡Π°, Ссли Π΅Π³ΠΎ срок дСйствия сСссии большС, ΠΈΠ»ΠΈ Π΄Π»ΠΈΠ½Π° Π΅Π³ΠΎ ΠΊΠ»ΡŽΡ‡Π° ΠΊΠΎΡ€ΠΎΡ‡Π΅, Ρ‡Π΅ΠΌ Ρƒ ΠΈΠ½ΠΈΡ†ΠΈΠ°Ρ‚ΠΎΡ€Π°. Если срок дСйствия сСссии ΠΊΠΎΡ€ΠΎΡ‡Π΅, Ρ‡Π΅ΠΌ Ρƒ ΠΈΠ½ΠΈΡ†ΠΈΠ°Ρ‚ΠΎΡ€Π°, racoon ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ собствСнноС Π·Π½Π°Ρ‡Π΅Π½ΠΈΠ΅ срока дСйствия сСссии ΠΈ Π±ΡƒΠ΄Π΅Ρ‚ ΠΎΡ‚ΠΏΡ€Π°Π²Π»ΡΡ‚ΡŒ сообщСниС RESPONDER-LIFETIME.
    proposal { # ΠŸΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ ISAKMP туннСля.

        encryption_algorithm aes; # ΠœΠ΅Ρ‚ΠΎΠ΄ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ ISAKMP туннСля.
        hash_algorithm sha512; # Алгоритм Ρ…Π΅ΡˆΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡ, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹ΠΉ для ISAKMP туннСля.
        authentication_method rsasig; # Π Π΅ΠΆΠΈΠΌ Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ для ISAKMP туннСля - ΠΏΠΎ RSA ΠΊΠ»ΡŽΡ‡Π°ΠΌ.
        dh_group modp2048; # Π”Π»ΠΈΠ½Π° ΠΊΠ»ΡŽΡ‡Π° для Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° Π”ΠΈΡ„Ρ„ΠΈ-Π₯Π΅Π»Π»ΠΌΠ°Π½Π° ΠΏΡ€ΠΈ согласовании ISAKMP туннСля.
        lifetime time 86400 sec; ВрСмя дСйствия сСссии.
    }

    generate_policy on; # АвтоматичСскоС созданиС ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ ΠΈΠ· запроса, ΠΏΡ€ΠΈΡˆΠ΅Π΄ΡˆΠ΅Π³ΠΎ ΠΎΡ‚ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‰Π΅Π³ΠΎΡΡ хоста.
}

sainfo anonymous { # ΠŸΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ, anonymous - ΡƒΠΊΠ°Π·Π°Π½Π½Ρ‹Π΅ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ Π±ΡƒΠ΄ΡƒΡ‚ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Π½Ρ‹ ΠΊΠ°ΠΊ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ ΠΏΠΎ ΡƒΠΌΠΎΠ»Ρ‡Π°Π½ΠΈΡŽ. Для Ρ€Π°Π·Π½Ρ‹Ρ… ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ², ΠΏΠΎΡ€Ρ‚ΠΎΠ², ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»ΠΎΠ² ΠΌΠΎΠΆΠ½ΠΎ              Π·Π°Π΄Π°Π²Π°Ρ‚ΡŒ Ρ€Π°Π·Π½Ρ‹Π΅ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹, сопоставлСниС происходит ΠΏΠΎ ip адрСсам, ΠΏΠΎΡ€Ρ‚Π°ΠΌ, ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π°ΠΌ.

    pfs_group modp2048; # Π”Π»ΠΈΠ½Π° ΠΊΠ»ΡŽΡ‡Π° для Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° Π”ΠΈΡ„Ρ„ΠΈ-Π₯Π΅Π»Π»ΠΌΠ°Π½Π° для ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    lifetime time 28800 sec; # Π‘Ρ€ΠΎΠΊ дСйствия ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    encryption_algorithm aes; # ΠœΠ΅Ρ‚ΠΎΠ΄ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    authentication_algorithm hmac_sha512; # Алгоритм Ρ…Π΅ΡˆΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡ, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹ΠΉ для Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    compression_algorithm deflate; # Π‘ΠΆΠΈΠΌΠ°Ρ‚ΡŒ ΠΏΠ΅Ρ€Π΅Π΄Π°Π²Π°Π΅ΠΌΡ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅, Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌ сТатия прСдлагаСтся Ρ‚ΠΎΠ»ΡŒΠΊΠΎ ΠΎΠ΄ΠΈΠ½.
}

mikrotik config

Bwererani ku gawo la "IP" - "IPsec"

"Profaili" tabu
chizindikiro
mtengo

dzina
Mwakufuna kwanu (mwachisawawa)

Algorithm ya Hash
sha512

Algorithm ya encryption
gawo-128

DH Gulu
Chithunzi cha 2048

Proposhal_check
Funsani

Moyo wonse
1d 00:00:00

Mtengo wa NAT
zoona (onani bokosilo)

DPD
120

Kulephera kwakukulu kwa DPD
5

Peers tab
chizindikiro
mtengo

dzina
Mwakufuna kwanu (pano ndikutchedwa MyPeer)

Address
1.1.1.1 (makina a IP Linux)

Adilesi Yanu
10.0.0.2 (IP WAN mawonekedwe mikrotik)

mbiri
chosasintha

Kusinthana mumalowedwe
waukulu

Osasamala
zabodza

Tumizani INITIAL_CONTACT
koona

Tabu yamalingaliro
chizindikiro
mtengo

dzina
Mwakufuna kwanu (pano ndikutchedwa MyPeerProposal)

Auth. Algorithms
sha512

Encr. Algorithms
gawo-128-cbc

Moyo wonse
08:00:00

Gulu la PFS
Chithunzi cha 2048

"Identities" tabu
chizindikiro
mtengo

Zochita
MyPeer

Atuh. Njira
rsa kiyi

Mfungulo
mikrotik.privet.key

Kiyi Yakutali
seva-name.pub.pem

Policy Template Group
chosasintha

Zotsatira Notrack Chain
opanda kanthu

Mtundu Wanga Wa ID
galimoto

Mtundu wa ID wakutali
galimoto

Match By
id kutali

Kusintha kwa Mode
opanda kanthu

Pangani Ndondomeko
ayi

Tabu "Policies - General"
chizindikiro
mtengo

Zochita
MyPeer

mumphangayo
koona

Src. Adilesi
192.168.0.0/30

Dest. Adilesi
192.168.0.0/30

Pulogalamu
255 (onse)

Chinsinsi
zabodza

Tabu "Policies - Action"
chizindikiro
mtengo

Action
chitetezo

mlingo
wopempha

IPsec Protocol
esp

Kutsatsa
MyPeerProposal

Mwachidziwikire, monga ine, muli ndi snat/masquerade yosinthidwa pa mawonekedwe anu a WAN; lamuloli liyenera kusinthidwa kuti mapaketi a ipsec otuluka apite mumsewu wathu:
Pitani ku gawo la "IP" - "Firewall".
"NAT" tabu, tsegulani lamulo lathu la snat/masquerade.

Zapamwamba Tabu
chizindikiro
mtengo

IPsec Policy
kunja: palibe

Kuyambitsanso chiwanda cha racoon

sudo systemctl restart racoon

Ngati racoon sichiyamba pakuyambiranso, ndiye kuti pali cholakwika mu config; mu syslog, racoon imawonetsa zambiri za nambala ya mzere womwe cholakwikacho chidapezeka.

Maboti a OS akayamba, racoon daemon imayamba ma network asanachitike, ndipo tidatchula njira ya strict_address mu gawo lomvera; muyenera kuwonjezera gawo la racoon ku fayilo ya systemd.
/lib/systemd/system/racoon.service, mu gawo la [Unit], mzere After=network.target.

Tsopano ma tunnel athu a ipsec ayenera kukhala mmwamba, yang'anani zomwe zatuluka:

sudo ip xfrm policy

src 192.168.255.0/30 dst 192.168.255.0/30 
    dir out priority 2147483648 
    tmpl src 1.1.1.1 dst "IP NAT Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ mikrotik"
        proto esp reqid 0 mode tunnel
src 192.168.255.0/30 dst 192.168.255.0/30 
    dir fwd priority 2147483648 
    tmpl src "IP NAT Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ mikrotik" dst 1.1.1.1
        proto esp reqid 0 mode tunnel
src 192.168.255.0/30 dst 192.168.255.0/30 
    dir in priority 2147483648 
    tmpl src "IP NAT Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ mikrotik" dst 1.1.1.1
        proto esp reqid 0 mode tunnel

Ngati ngalandezo sizikukwera, yang'anani pa syslog, kapena journalctl -u racoon.

Tsopano muyenera kukonza mawonekedwe a L3 kuti magalimoto athe kuyendetsedwa. Pali zosankha zosiyanasiyana, tidzagwiritsa ntchito IPIP, popeza mikrotik imathandizira, ndingagwiritse ntchito vti, koma, mwatsoka, sichinayambe kugwiritsidwa ntchito mu mikrotik. Imasiyana ndi IPIP chifukwa imathanso kuyika ma multicast ndikuyika ma fwmark pamapaketi, omwe amatha kusefedwa mu iptables ndi iproute2 (njira yotengera mfundo). Ngati mukufuna magwiridwe antchito kwambiri, ndiye, mwachitsanzo, GRE. Koma musaiwale kuti timalipira ntchito zowonjezera ndi mutu waukulu.

Mutha kuwona kumasuliridwa kwa ndemanga yabwino yolumikizirana ndi tunnel apa.

Pa Linux:

# Π‘ΠΎΠ·Π΄Π°Π΅ΠΌ интСрфСйс
sudo ip tunnel add ipip-ipsec0 local 192.168.255.1 remote 192.168.255.2 mode ipip
# АктивируСм
sudo ip link set ipip-ipsec0 up
# НазначаСм адрСс
sudo ip addr add 192.168.255.1/30 dev ipip-ipsec0

Tsopano mutha kuwonjezera njira zama netiweki kuseri kwa mikrotik

sudo ip route add A.B.C.D/Prefix via 192.168.255.2

Kuti mawonekedwe athu ndi njira zikwezedwe pambuyo poyambiranso, tiyenera kufotokozera mawonekedwe mu / etc/network/interfaces ndikuwonjezera mayendedwe apo positi, kapena lembani chilichonse mufayilo imodzi, mwachitsanzo, /etc/ ipip-ipsec0.conf ndikuyikoka podutsa, musaiwale za mwiniwake wa fayilo, ufulu ndikupangitsa kuti ikwaniritsidwe.

Pansipa pali fayilo yachitsanzo

#!/bin/bash
ip tunnel add ipip-ipsec0 local 192.168.255.1 remote 192.168.255.2 mode ipip
ip link set ipip-ipsec0 up
ip addr add 192.168.255.1/30 dev ipip-ipsec0

ip route add A.B.C.D/Prefix via 192.168.255.2

Pa Mikrotik:

Gawo la "Interfaces", onjezani mawonekedwe atsopano "IP tunnel":

Tabu "IP tunnel" - "General"
chizindikiro
mtengo

dzina
Mwakufuna kwanu (pamenepa amatchedwa IPIP-IPsec0)

MTU
1480 (ngati sichinatchulidwe, mikrotik iyamba kudula munthu mpaka 68)

Adilesi Yanu
192.168.0.2

Adilesi Yakutali
192.168.0.1

Chinsinsi cha IPsec
Tsetsani gawolo (kupanda kutero Mnzanu watsopano apangidwe)

Sungani
Tsetsani gawolo (kupanda kutero mawonekedwe azimitsa nthawi zonse, popeza mikrotika ili ndi mawonekedwe ake pamaphukusiwa ndipo sagwira ntchito ndi Linux)

Zamgululi
cholowa

Osaphwanya Chidutswa
ayi

Chotsani TCP MSS
koona

Lolani Njira Yofulumira
koona

Gawo "IP" - "Maadiresi", onjezani adilesi:

chizindikiro
mtengo

Address
192.168.0.2/30

Chiyankhulo
IPIP-IPsec0

Tsopano mutha kuwonjezera njira pamaneti kuseri kwa makina a Linux; powonjezera njira, chipata chidzakhala mawonekedwe athu a IPIP-IPsec0.

PS

Popeza seva yathu ya Linux ndi yosinthika, ndizomveka kukhazikitsa gawo la Clamp TCP MSS pamipata ya ipip pamenepo:

pangani fayilo /etc/iptables.conf ndi izi:

*mangle
-A POSTROUTING -o ipip+ -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
COMMIT

ndi /etc/network/interfaces
post-up iptables-restore </etc/iptables.conf

Ndili ndi nginx yomwe ikuyenda pa netiweki kuseri kwa mikrotik (ip 10.10.10.1), ipangitseni kupezeka pa intaneti, yonjezerani ku /etc/iptables.conf:

*nat
-A PREROUTING -d 1.1.1.1/32 -p tcp -m multiport --dports 80,443 -j DNAT --to-destination 10.10.10.1
#На mikrotik, Π² Ρ‚Π°Π±Π»ΠΈΡ†Π΅ mangle, Π½Π°Π΄ΠΎ Π΄ΠΎΠ±Π°Π²ΠΈΡ‚ΡŒ ΠΏΡ€Π°Π²ΠΈΠ»ΠΎ route с Π½Π°Π·Π½Π°Ρ‡Π΅Π½ΠΈΠ΅ΠΌ 192.168.0.1 для ΠΏΠ°ΠΊΠ΅Ρ‚ΠΎΠ² с адрСсом источника 10.10.10.1 ΠΈ ΠΏΠΎΡ€Ρ‚ΠΎΠ² 80, 443.

# Π’Π°ΠΊ ΠΆΠ΅ Π½Π° linux Ρ€Π°Π±ΠΎΡ‚Π°Π΅Ρ‚ OpenVPN сСрвСр 172.16.0.1/24, для ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ² ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ ΠΊ Π½Π΅ΠΌΡƒ Π² качСствС шлюза Π΄Π°Π΅ΠΌ доступ Π² ΠΈΠ½Ρ‚Π΅Ρ€Π½Π΅Ρ‚
-A POSTROUTING -s 172.16.0.0/24 -o eth0 -j SNAT --to-source 1.1.1.1
COMMIT 

Musaiwale kuwonjezera zilolezo zoyenera ku iptables ngati muli ndi zosefera zapaketi.

Akudalitseni!

Source: www.habr.com

Kuwonjezera ndemanga