IPIP IPsec VPN tunnel inta u dhaxaysa mishiinka Linux iyo Mikrotik gadaasha bixiyaha NAT

Linux: Ubuntu 18.04.4 LTS (GNU/Linux 4.15.0-91-guud x86_64)

  • Eth0 1.1.1.1/32 dibadda IP
  • ipip-ipsec0 192.168.0.1/30 ayaa noqon doonta tunnelkeena

Miktoik: CCR 1009, RouterOS 6.46.5

  • Eth0 10.0.0.2/30 gudaha IP ka bixiyaha. NAT IP-ga dibadda ee bixiyaha waa mid firfircoon.
  • ipip-ipsec0 192.168.0.2/30 ayaa noqon doonta tunnelkeena

Waxaan ku abuuri doonaa IPsec tunnel mashiinka Linux anagoo adeegsanayna racoon. Ma qeexi doono faahfaahinta, waxaa jira mid wanaagsan maqaal Ρƒ vvpoloskin.

Ku rakib xirmooyinka lagama maarmaanka ah:

sudo install racoon ipsec-tools

Waxaan dejineynaa racoon, waxay shuruud ahaan u shaqeyn doontaa sidii server-ka ipsec. Maaddaama mikrotik ee qaabka ugu weyn uusan gudbin karin aqoonsi macmiil oo dheeri ah, iyo cinwaanka IP-ga dibadda ee uu ku xirayo Linux waa firfircoon yahay, adeegsiga furaha horay loo wadaagay (ogolaanshaha erayga sirta ah) ma shaqeyn doono, maadaama erayga sirta ah uu la mid yahay cinwaanka IP-ga martigeliyaha isku xira, ama leh aqoonsi.

Waxaan isticmaali doonaa oggolaanshaha anagoo adeegsanayna furayaasha RSA.

Daemon-ka racoon wuxuu isticmaalaa furayaasha qaabka RSA, mikrotikna wuxuu isticmaalaa qaabka PEM. Haddii aad abuurto furayaal adoo isticmaalaya utility plainrsa-gen ee la socota racoon, markaa ma awoodi doontid inaad u beddesho furaha dadweynaha ee Mikrotika qaabka PEM iyada oo caawinteeda - waxay u beddeshaa kaliya hal jiho: PEM ilaa RSA. Openssl iyo ssh-keygen midkoodna ma akhrin karo furaha uu soo saaray plainrsa-gen, markaa beddelaaddu suurtagal ma noqon doonto iyaga oo la isticmaalo.

Waxaan soo saari doonaa furaha PEM anagoo adeegsanayna openssl ka dibna waxaan u bedeli doonaa racoon anagoo adeegsanayna plainrsa-gen:

#  Π“Π΅Π½Π΅Ρ€ΠΈΡ€ΡƒΠ΅ΠΌ ΠΊΠ»ΡŽΡ‡
openssl genrsa -out server-name.pem 1024
# ИзвлСкаСм ΠΏΡƒΠ±Π»ΠΈΡ‡Π½Ρ‹ΠΉ ΠΊΠ»ΡŽΡ‡
openssl rsa -in server-name.pem -pubout > server-name.pub.pem
# ΠšΠΎΠ½Π²Π΅Ρ€Ρ‚ΠΈΡ€ΡƒΠ΅ΠΌ
plainrsa-gen -i server-name.pem -f server-name.privet.key
plainrsa-gen -i server-name.pub.pem -f server-name.pub.key

Waxaan gelin doonaa furayaasha la helay galka: /etc/racoon/certs/server. Ha iloobin inaad dejiso milkiilaha isticmaalaha magaciisa hoostiisa racoon daemon la bilaabay (badanaa xidid) ilaa 600 ogolaansho.

Waxaan sharxi doonaa dejinta mikrotik marka la isku xiro WinBox.

U soo deji server-name.pub.pem furaha mikrotik: Menu β€œFiles” - β€œUpload”.

Fur qaybta "IP" - "IP sec" - "Furayaasha" tab. Hadda waxaan soo saareynaa furayaasha - badhanka "Samee Furaha", ka dibna dhoofin furaha dadweynaha ee mikrotika "Expor Pub. Furaha", waxaad ka soo dejisan kartaa qaybta "Files", midig-guji faylka - "Download".

Waxaan soo dejineynaa furaha dadweynaha ee racoon, "Import", liiska hoos-u-hoosaadka ee "Magaca faylka" ee goobta waxaan ka raadineynaa server-name.pub.pem aan horay u soo dejinay.

Furaha guud ee mikrotik wuxuu u baahan yahay in la beddelo

plainrsa-gen -i mikrotik.pub.pem -f mikrotik.pub.key

oo geli faylka /etc/racoon/certs, adigoon iloobin milkiilaha iyo xuquuqda.

racoon config oo leh faallooyin: /etc/racoon/racoon.conf

log info; # Π£Ρ€ΠΎΠ²Π΅Π½ΡŒ логирования, ΠΏΡ€ΠΈ ΠΎΡ‚Π»Π°Π΄ΠΊΠ΅ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌ Debug ΠΈΠ»ΠΈ Debug2.

listen {

    isakmp 1.1.1.1 [500]; # АдрСс ΠΈ ΠΏΠΎΡ€Ρ‚, Π½Π° ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌ Π±ΡƒΠ΄Π΅Ρ‚ ΡΠ»ΡƒΡˆΠ°Ρ‚ΡŒ Π΄Π΅ΠΌΠΎΠ½.
    isakmp_natt 1.1.1.1 [4500]; # АдрСс ΠΈ ΠΏΠΎΡ€Ρ‚, Π½Π° ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠΌ Π±ΡƒΠ΄Π΅Ρ‚ ΡΠ»ΡƒΡˆΠ°Ρ‚ΡŒ Π΄Π΅ΠΌΠΎΠ½ для ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ² Π·Π° NAT.
    strict_address; # Π’Ρ‹ΠΏΠΎΠ»Π½ΡΡ‚ΡŒ ΠΎΠ±ΡΠ·Π°Ρ‚Π΅Π»ΡŒΠ½ΡƒΡŽ ΠΏΡ€ΠΎΠ²Π΅Ρ€ΠΊΡƒ привязки ΠΊ ΡƒΠΊΠ°Π·Π°Π½Π½Ρ‹ΠΌ Π²Ρ‹ΡˆΠ΅ IP.
}

path certificate "/etc/racoon/certs"; # ΠŸΡƒΡ‚ΡŒ Π΄ΠΎ ΠΏΠ°ΠΏΠΊΠΈ с сСртификатами.

remote anonymous { # БСкция, Π·Π°Π΄Π°ΡŽΡ‰Π°Ρ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ для Ρ€Π°Π±ΠΎΡ‚Ρ‹ Π΄Π΅ΠΌΠΎΠ½Π° с ISAKMP ΠΈ согласования Ρ€Π΅ΠΆΠΈΠΌΠΎΠ² с ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‰ΠΈΠΌΠΈΡΡ хостами. Π’Π°ΠΊ ΠΊΠ°ΠΊ IP, с ΠΊΠΎΡ‚ΠΎΡ€ΠΎΠ³ΠΎ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ Mikrotik, динамичСский, Ρ‚ΠΎ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌ anonymous, Ρ‡Ρ‚ΠΎ Ρ€Π°Π·Ρ€Π΅ΡˆΠ°Π΅Ρ‚ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ с любого адрСса. Если IP Ρƒ хостов статичСский, Ρ‚ΠΎ ΠΌΠΎΠΆΠ½ΠΎ ΡƒΠΊΠ°Π·Π°Ρ‚ΡŒ ΠΊΠΎΠ½ΠΊΡ€Π΅Ρ‚Π½Ρ‹ΠΉ адрСс ΠΈ ΠΏΠΎΡ€Ρ‚.

    passive on; # Π—Π°Π΄Π°Π΅Ρ‚ "сСрвСрный" Ρ€Π΅ΠΆΠΈΠΌ Ρ€Π°Π±ΠΎΡ‚Ρ‹ Π΄Π΅ΠΌΠΎΠ½Π°, ΠΎΠ½ Π½Π΅ Π±ΡƒΠ΄Π΅Ρ‚ ΠΏΡ‹Ρ‚Π°Ρ‚ΡŒΡΡ ΠΈΠ½ΠΈΡ†ΠΈΠΈΡ€ΠΎΠ²Π°Ρ‚ΡŒ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ.
    nat_traversal on; # Π’ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ использованиС Ρ€Π΅ΠΆΠΈΠΌΠ° NAT-T для ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ², Ссли ΠΎΠ½ΠΈ Π·Π° NAT. 
    exchange_mode main; # Π Π΅ΠΆΠΈΠΌ ΠΎΠ±ΠΌΠ΅Π½Π° ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Π°ΠΌΠΈ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΡ, Π² Π΄Π°Π½Π½ΠΎΠΌ случаС ---согласованиС.
    my_identifier address 1.1.1.1; # Π˜Π΄Π΅Π½Ρ‚ΠΈΡ„ΠΈΡ†ΠΈΡ€ΡƒΠ΅ΠΌ наш linux хост ΠΏΠΎ Π΅Π³ΠΎ ip адрСсу.
    certificate_type plain_rsa "server/server-name.priv.key"; # ΠŸΡ€ΠΈΠ²Π°Ρ‚Π½Ρ‹ΠΉ ΠΊΠ»ΡŽΡ‡ сСрвСра.
    peers_certfile plain_rsa "mikrotik.pub.key"; # ΠŸΡƒΠ±Π»ΠΈΡ‡Π½Ρ‹ΠΉ ΠΊΠ»ΡŽΡ‡ Mikrotik.

    proposal_check claim; # Π Π΅ΠΆΠΈΠΌ согласования ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€ΠΎΠ² ISAKMP туннСля. Racoon Π±ΡƒΠ΄Π΅Ρ‚ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Ρ‚ΡŒ значСния ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‰Π΅Π³ΠΎΡΡ хоста (ΠΈΠ½ΠΈΡ†ΠΈΠ°Ρ‚ΠΎΡ€Π°) для срока дСйствия сСссии                   ΠΈ Π΄Π»ΠΈΠ½Ρ‹ ΠΊΠ»ΡŽΡ‡Π°, Ссли Π΅Π³ΠΎ срок дСйствия сСссии большС, ΠΈΠ»ΠΈ Π΄Π»ΠΈΠ½Π° Π΅Π³ΠΎ ΠΊΠ»ΡŽΡ‡Π° ΠΊΠΎΡ€ΠΎΡ‡Π΅, Ρ‡Π΅ΠΌ Ρƒ ΠΈΠ½ΠΈΡ†ΠΈΠ°Ρ‚ΠΎΡ€Π°. Если срок дСйствия сСссии ΠΊΠΎΡ€ΠΎΡ‡Π΅, Ρ‡Π΅ΠΌ Ρƒ ΠΈΠ½ΠΈΡ†ΠΈΠ°Ρ‚ΠΎΡ€Π°, racoon ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅Ρ‚ собствСнноС Π·Π½Π°Ρ‡Π΅Π½ΠΈΠ΅ срока дСйствия сСссии ΠΈ Π±ΡƒΠ΄Π΅Ρ‚ ΠΎΡ‚ΠΏΡ€Π°Π²Π»ΡΡ‚ΡŒ сообщСниС RESPONDER-LIFETIME.
    proposal { # ΠŸΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ ISAKMP туннСля.

        encryption_algorithm aes; # ΠœΠ΅Ρ‚ΠΎΠ΄ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ ISAKMP туннСля.
        hash_algorithm sha512; # Алгоритм Ρ…Π΅ΡˆΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡ, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹ΠΉ для ISAKMP туннСля.
        authentication_method rsasig; # Π Π΅ΠΆΠΈΠΌ Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ для ISAKMP туннСля - ΠΏΠΎ RSA ΠΊΠ»ΡŽΡ‡Π°ΠΌ.
        dh_group modp2048; # Π”Π»ΠΈΠ½Π° ΠΊΠ»ΡŽΡ‡Π° для Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° Π”ΠΈΡ„Ρ„ΠΈ-Π₯Π΅Π»Π»ΠΌΠ°Π½Π° ΠΏΡ€ΠΈ согласовании ISAKMP туннСля.
        lifetime time 86400 sec; ВрСмя дСйствия сСссии.
    }

    generate_policy on; # АвтоматичСскоС созданиС ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ ΠΈΠ· запроса, ΠΏΡ€ΠΈΡˆΠ΅Π΄ΡˆΠ΅Π³ΠΎ ΠΎΡ‚ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°ΡŽΡ‰Π΅Π³ΠΎΡΡ хоста.
}

sainfo anonymous { # ΠŸΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ, anonymous - ΡƒΠΊΠ°Π·Π°Π½Π½Ρ‹Π΅ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ Π±ΡƒΠ΄ΡƒΡ‚ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΠΎΠ²Π°Π½Ρ‹ ΠΊΠ°ΠΊ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹ ΠΏΠΎ ΡƒΠΌΠΎΠ»Ρ‡Π°Π½ΠΈΡŽ. Для Ρ€Π°Π·Π½Ρ‹Ρ… ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ², ΠΏΠΎΡ€Ρ‚ΠΎΠ², ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»ΠΎΠ² ΠΌΠΎΠΆΠ½ΠΎ              Π·Π°Π΄Π°Π²Π°Ρ‚ΡŒ Ρ€Π°Π·Π½Ρ‹Π΅ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ‹, сопоставлСниС происходит ΠΏΠΎ ip адрСсам, ΠΏΠΎΡ€Ρ‚Π°ΠΌ, ΠΏΡ€ΠΎΡ‚ΠΎΠΊΠΎΠ»Π°ΠΌ.

    pfs_group modp2048; # Π”Π»ΠΈΠ½Π° ΠΊΠ»ΡŽΡ‡Π° для Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠ° Π”ΠΈΡ„Ρ„ΠΈ-Π₯Π΅Π»Π»ΠΌΠ°Π½Π° для ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    lifetime time 28800 sec; # Π‘Ρ€ΠΎΠΊ дСйствия ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    encryption_algorithm aes; # ΠœΠ΅Ρ‚ΠΎΠ΄ ΡˆΠΈΡ„Ρ€ΠΎΠ²Π°Π½ΠΈΡ ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    authentication_algorithm hmac_sha512; # Алгоритм Ρ…Π΅ΡˆΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡ, ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΠ΅ΠΌΡ‹ΠΉ для Π°ΡƒΡ‚Π΅Π½Ρ‚ΠΈΡ„ΠΈΠΊΠ°Ρ†ΠΈΠΈ ESP Ρ‚ΡƒΠ½Π½Π΅Π»Π΅ΠΉ.
    compression_algorithm deflate; # Π‘ΠΆΠΈΠΌΠ°Ρ‚ΡŒ ΠΏΠ΅Ρ€Π΅Π΄Π°Π²Π°Π΅ΠΌΡ‹Π΅ Π΄Π°Π½Π½Ρ‹Π΅, Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌ сТатия прСдлагаСтся Ρ‚ΠΎΠ»ΡŒΠΊΠΎ ΠΎΠ΄ΠΈΠ½.
}

mikrotik config

Ku noqo qaybta "IP" - "IPsec"

"Profiles" tab
Xildhibaan
qiimaha

magaca
Go'aankaaga (by default default)

Hash Algorithm
sha512

Algorithm-ka sirta
aes-128

Kooxda DH-Group
modp2048

Proposhal_check
sheegasho

Lifetime
1d 00:00:00

Socdaalka NAT
run ( calaamee sanduuqa)

DPD
120

DPD fashilka ugu badan
5

Saaxiibada tab
Xildhibaan
qiimaha

magaca
Go'aankaaga (hadda kadib waxaa loo yaqaan MyPeer)

Cinwaanka
1.1.1.1 (Mashiinnada IP Linux)

Cinwaanka Maxaliga ah
10.0.0.2 (IP WAN interface mikrotik)

Profile
Default

Habka Beddelka
ugu weyn ee

dadban
been ah

Dir INITIAL_CONTACT
run

Tabaha soo jeedinta
Xildhibaan
qiimaha

magaca
Go'aankaaga (hadda kadib waxaa loo yaqaan MyPeerProposal)

Xaqiijin Algorithms
sha512

Encr. Algorithms
aes-128-cbc

Lifetime
08:00:00

Kooxda PFS
modp2048

"Aqoonsiga" tab
Xildhibaan
qiimaha

Asxaabta
MyPeer

Atuuh. Habka
rsa key

Key
mikrotik.privet.key

Furaha Fog
server-name.pub.pem

Kooxda Qaababka Siyaasadda
Default

Silsiladda Notrack
madhan

Nooca Aqoonsigayga
baabuur

Nooca Aqoonsiga fog
baabuur

Ciyaarta By
id fog

Habaynta Qaabka
madhan

Siyaasad abuur
maya

Tab "Siyaasadaha - Guud"
Xildhibaan
qiimaha

Asxaabta
MyPeer

tunnel
run

Src. Cinwaanka
192.168.0.0/30

Dest. Cinwaanka
192.168.0.0/30

Protocol
255 (dhammaan)

Template
been ah

Tab "Siyaasadaha - Tallaabo"
Xildhibaan
qiimaha

Action
qarsoodi

heerka
u baahan

IPsec Protocols
gaar ahaan

Soo jeedinta
MyPeerProposal

Waxay u badan tahay, sidayda oo kale, inaad ku dhejisay is-dhexgalka WAN-gaaga; xeerkan wuxuu u baahan yahay in la hagaajiyo si baakadaha ipsec ee baxaya ay u galaan tunnel-kayaga:
Tag qaybta "IP" - "Firewall".
"NAT" tab, fur qaanuunka snt/masquerade.

Tab horumarsan
Xildhibaan
qiimaha

Siyaasadda IPsec
baxay: midna

Dib u bilaabaya shaydaanka racoon

sudo systemctl restart racoon

Haddii racoon uusan bilaabin dib u bilaabashada, markaa waxaa jira qalad ku jira qaabeynta; syslog, racoon wuxuu soo bandhigayaa macluumaadka ku saabsan lambarka khadka ee qaladka lagu ogaaday.

Marka OS-ga kabaha la geliyo, daemon-ka racoon-ku wuxuu bilaabmaa ka hor inta aan la soo saarin is-dhexgalka shabakada, waxaanan ku qeexnay ikhtiyaarka adag_address ee qaybta dhegeysiga; waxaad u baahan tahay inaad ku darto unugga racoon faylka nidaamka
/lib/systemd/system/racoon.service, ee qaybta [Unit], line After=network.target.

Hadda tunnel-kayaga ipsec waa inuu kor u kacaa, fiiri wax soo saarka:

sudo ip xfrm policy

src 192.168.255.0/30 dst 192.168.255.0/30 
    dir out priority 2147483648 
    tmpl src 1.1.1.1 dst "IP NAT Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ mikrotik"
        proto esp reqid 0 mode tunnel
src 192.168.255.0/30 dst 192.168.255.0/30 
    dir fwd priority 2147483648 
    tmpl src "IP NAT Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ mikrotik" dst 1.1.1.1
        proto esp reqid 0 mode tunnel
src 192.168.255.0/30 dst 192.168.255.0/30 
    dir in priority 2147483648 
    tmpl src "IP NAT Ρ‡Π΅Ρ€Π΅Π· ΠΊΠΎΡ‚ΠΎΡ€Ρ‹ΠΉ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π°Π΅Ρ‚ΡΡ mikrotik" dst 1.1.1.1
        proto esp reqid 0 mode tunnel

Haddii tunneladu aysan kor u kicin, fiiri syslog, ama journalctl -u racoon.

Hadda waxaad u baahan tahay inaad habayso interfaces L3 si taraafikada loo maro. Waxaa jira xulashooyin kala duwan, waxaan isticmaali doonaa IPIP, maadaama mikrotik ay taageerto, waxaan isticmaali lahaa vti, laakiin, nasiib daro, weli laguma hirgelin mikrotik. Waxay kaga duwan tahay IPIP in ay sidoo kale koobin karto multicast oo ay ku dhejin karto fwmarks baakadaha kuwaas oo lagu sifeyn karo iptables iyo iproute2 (routing siyaasadda ku salaysan). Haddii aad u baahan tahay shaqada ugu badan, markaa, tusaale ahaan, GRE. Laakin ha iloobin in aan ku bixino shaqeyn dheeraad ah oo leh madax weyn.

Waxaad arki kartaa tarjumaadda dulmar wanaagsan oo ku saabsan is-dhexgalka tunnel-ka halkan.

On Linux:

# Π‘ΠΎΠ·Π΄Π°Π΅ΠΌ интСрфСйс
sudo ip tunnel add ipip-ipsec0 local 192.168.255.1 remote 192.168.255.2 mode ipip
# АктивируСм
sudo ip link set ipip-ipsec0 up
# НазначаСм адрСс
sudo ip addr add 192.168.255.1/30 dev ipip-ipsec0

Hadda waxaad ku dari kartaa waddooyinka shabakadaha ka dambeeya mikrotik

sudo ip route add A.B.C.D/Prefix via 192.168.255.2

Si interface-kayaga iyo dariiqaheenna kor loogu qaado ka dib dib-u-kicinta, waxaan u baahanahay inaan ku qeexno interface-ka /etc/network/interfaces oo aan ku darno dariiqyada halkaas ka dambeeya, ama wax kasta ku qor hal fayl, tusaale ahaan, / iwm/ ipip-ipsec0.conf oo u soo jiid boostada, ha ilaawin milkiilaha faylka, xuquuqaha oo ka dhig mid la fulin karo.

Hoos waxaa ku yaal fayl tusaale

#!/bin/bash
ip tunnel add ipip-ipsec0 local 192.168.255.1 remote 192.168.255.2 mode ipip
ip link set ipip-ipsec0 up
ip addr add 192.168.255.1/30 dev ipip-ipsec0

ip route add A.B.C.D/Prefix via 192.168.255.2

On Mikrotik:

Qaybta "Interfaces", ku dar interface cusub "tunnel IP":

Tabka "tunalka IP" - "Guud"
Xildhibaan
qiimaha

magaca
Adigoo go'aankaaga ah (hadda kadib waxaa loo yaqaan IPIP-IPsec0)

QOFKA
1480 (haddii aan la cayimin, mikrotik wuxuu bilaabay inuu gooyo mtu ilaa 68)

Cinwaanka Maxaliga ah
192.168.0.2

Ciwaanka Fog
192.168.0.1

IPsec Secret
Demi garoonka (hadii kale Peer cusub ayaa la abuuri doonaa)

Ilaali
Demi goobta (haddii kale interface-ku si joogto ah ayuu u dami doonaa, maadaama mikrotika uu leeyahay qaab u gaar ah xirmooyinkan oo aanu la shaqayn Linux)

DSCP
dhaxasho

Ha jajabin
maya

Ku dheji TCP MSS
run

Allow Dariiqa Dhakhso leh
run

Qaybta "IP" - "Cinwaanka", ku dar cinwaanka:

Xildhibaan
qiimaha

Cinwaanka
192.168.0.2/30

Wajahadda
IPIP-IPsec0

Hadda waxaad ku dari kartaa dariiqyada shabakadda ee ka dambeeya mishiinka Linux; markaad ku darto waddo, albaabku wuxuu noqon doonaa interface IPIP-IPsec0.

PS

Maaddaama server-keena Linux uu yahay ku-meel-gaar, waxaa macno leh in la dejiyo cabbirka Clamp TCP MSS ee is-dhexgalka ipip:

samee fayl /etc/iptables.conf oo wata waxyaabahan soo socda:

*mangle
-A POSTROUTING -o ipip+ -p tcp -m tcp --tcp-flags SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu
COMMIT

iyo gudaha /etc/network/interfaces
Dib-u-soo-celinta iptables-ka-soo-celinta </etc/iptables.conf

Waxaan haystaa nginx oo ku shaqeeya shabakada ka dambeysa mikrotik (ip 10.10.10.1), ka dhig mid laga heli karo internetka, ku dar /etc/iptables.conf:

*nat
-A PREROUTING -d 1.1.1.1/32 -p tcp -m multiport --dports 80,443 -j DNAT --to-destination 10.10.10.1
#На mikrotik, Π² Ρ‚Π°Π±Π»ΠΈΡ†Π΅ mangle, Π½Π°Π΄ΠΎ Π΄ΠΎΠ±Π°Π²ΠΈΡ‚ΡŒ ΠΏΡ€Π°Π²ΠΈΠ»ΠΎ route с Π½Π°Π·Π½Π°Ρ‡Π΅Π½ΠΈΠ΅ΠΌ 192.168.0.1 для ΠΏΠ°ΠΊΠ΅Ρ‚ΠΎΠ² с адрСсом источника 10.10.10.1 ΠΈ ΠΏΠΎΡ€Ρ‚ΠΎΠ² 80, 443.

# Π’Π°ΠΊ ΠΆΠ΅ Π½Π° linux Ρ€Π°Π±ΠΎΡ‚Π°Π΅Ρ‚ OpenVPN сСрвСр 172.16.0.1/24, для ΠΊΠ»ΠΈΠ΅Π½Ρ‚ΠΎΠ² ΠΊΠΎΡ‚ΠΎΡ€Ρ‹Π΅ ΠΈΡΠΏΠΎΠ»ΡŒΠ·ΡƒΡŽΡ‚ ΠΏΠΎΠ΄ΠΊΠ»ΡŽΡ‡Π΅Π½ΠΈΠ΅ ΠΊ Π½Π΅ΠΌΡƒ Π² качСствС шлюза Π΄Π°Π΅ΠΌ доступ Π² ΠΈΠ½Ρ‚Π΅Ρ€Π½Π΅Ρ‚
-A POSTROUTING -s 172.16.0.0/24 -o eth0 -j SNAT --to-source 1.1.1.1
COMMIT 

Ha iloobin inaad ku darto rukhsadaha ku habboon iptables haddii aad leedahay filtarrada baakadaha karti u leh.

Caafimaadkaagu ha ahaado!

Source: www.habr.com

Add a comment