mirror of
https://github.com/vyos/vyos-documentation.git
synced 2025-10-26 08:41:46 +01:00
Update site2site_ipsec.rst
To make easily understandable the Site-to-Site VPN ikev2 configuration for users (especially if the user is new to VyOS) made the following changes: - Added dummy interface to both routers for testing purposes - Added static route for both routers for dummy interface - Added this line of command: set vpn ipsec option disable-route-autoinstall Because when we write this line after the commit action we got an error like: WARNING: It's recommended to use ipsec vti with the next command - corrected this line: set vpn ipsec site-to-site peer OFFICE-B local-address '192.168.0.10' to this: set vpn ipsec site-to-site peer OFFICE-B local-address '172.18.201.10'
This commit is contained in:
parent
1ddce99cc8
commit
d3ef41c38f
@ -280,17 +280,31 @@ Imagine the following topology
|
|||||||
|
|
||||||
IPSec IKEv2 site2site VPN (source ./draw.io/vpn_s2s_ikev2.drawio)
|
IPSec IKEv2 site2site VPN (source ./draw.io/vpn_s2s_ikev2.drawio)
|
||||||
|
|
||||||
|
**LEFT:**
|
||||||
|
* WAN interface on `eth0.201`
|
||||||
|
* `eth0.201` interface IP: `172.18.201.10/24`
|
||||||
|
* `vti10` interface IP: `10.0.0.2/31`
|
||||||
|
* `dum0` interface IP: `10.0.11.1/24` (for testing purposes)
|
||||||
|
|
||||||
|
**RIGHT:**
|
||||||
|
* WAN interface on `eth0.202`
|
||||||
|
* `eth0.201` interface IP: `172.18.202.10/24`
|
||||||
|
* `vti10` interface IP: `10.0.0.3/31`
|
||||||
|
* `dum0` interface IP: `10.0.12.1/24` (for testing purposes)
|
||||||
|
|
||||||
.. note:: Don't get confused about the used /31 tunnel subnet. :rfc:`3021`
|
.. note:: Don't get confused about the used /31 tunnel subnet. :rfc:`3021`
|
||||||
gives you additional information for using /31 subnets on point-to-point
|
gives you additional information for using /31 subnets on point-to-point
|
||||||
links.
|
links.
|
||||||
|
|
||||||
**left**
|
**LEFT**
|
||||||
|
|
||||||
.. code-block:: none
|
.. code-block:: none
|
||||||
|
|
||||||
|
set interfaces ethernet eth0 vif 201 address '172.18.201.10/24'
|
||||||
|
set interfaces dummy dum0 address '10.0.11.1/24'
|
||||||
set interfaces vti vti10 address '10.0.0.2/31'
|
set interfaces vti vti10 address '10.0.0.2/31'
|
||||||
|
|
||||||
|
set vpn ipsec option disable-route-autoinstall
|
||||||
set vpn ipsec authentication psk OFFICE-B id '172.18.201.10'
|
set vpn ipsec authentication psk OFFICE-B id '172.18.201.10'
|
||||||
set vpn ipsec authentication psk OFFICE-B id '172.18.202.10'
|
set vpn ipsec authentication psk OFFICE-B id '172.18.202.10'
|
||||||
set vpn ipsec authentication psk OFFICE-B secret 'secretkey'
|
set vpn ipsec authentication psk OFFICE-B secret 'secretkey'
|
||||||
@ -311,17 +325,22 @@ Imagine the following topology
|
|||||||
set vpn ipsec site-to-site peer OFFICE-B authentication remote-id '172.18.202.10'
|
set vpn ipsec site-to-site peer OFFICE-B authentication remote-id '172.18.202.10'
|
||||||
set vpn ipsec site-to-site peer OFFICE-B connection-type 'respond'
|
set vpn ipsec site-to-site peer OFFICE-B connection-type 'respond'
|
||||||
set vpn ipsec site-to-site peer OFFICE-B ike-group 'IKEv2_DEFAULT'
|
set vpn ipsec site-to-site peer OFFICE-B ike-group 'IKEv2_DEFAULT'
|
||||||
set vpn ipsec site-to-site peer OFFICE-B local-address '192.168.0.10'
|
set vpn ipsec site-to-site peer OFFICE-B local-address '172.18.201.10'
|
||||||
set vpn ipsec site-to-site peer OFFICE-B remote-address '172.18.202.10'
|
set vpn ipsec site-to-site peer OFFICE-B remote-address '172.18.202.10'
|
||||||
set vpn ipsec site-to-site peer OFFICE-B vti bind 'vti10'
|
set vpn ipsec site-to-site peer OFFICE-B vti bind 'vti10'
|
||||||
set vpn ipsec site-to-site peer OFFICE-B vti esp-group 'ESP_DEFAULT'
|
set vpn ipsec site-to-site peer OFFICE-B vti esp-group 'ESP_DEFAULT'
|
||||||
|
|
||||||
**right**
|
set protocols static interface-route 10.0.12.0/24 next-hop-interface vti10
|
||||||
|
|
||||||
|
**RIGHT**
|
||||||
|
|
||||||
.. code-block:: none
|
.. code-block:: none
|
||||||
|
|
||||||
|
set interfaces ethernet eth0 vif 202 address '172.18.202.10/24'
|
||||||
|
set interfaces dummy dum0 address '10.0.12.1/24'
|
||||||
set interfaces vti vti10 address '10.0.0.3/31'
|
set interfaces vti vti10 address '10.0.0.3/31'
|
||||||
|
|
||||||
|
set vpn ipsec option disable-route-autoinstall
|
||||||
set vpn ipsec authentication psk OFFICE-A id '172.18.201.10'
|
set vpn ipsec authentication psk OFFICE-A id '172.18.201.10'
|
||||||
set vpn ipsec authentication psk OFFICE-A id '172.18.202.10'
|
set vpn ipsec authentication psk OFFICE-A id '172.18.202.10'
|
||||||
set vpn ipsec authentication psk OFFICE-A secret 'secretkey'
|
set vpn ipsec authentication psk OFFICE-A secret 'secretkey'
|
||||||
@ -350,6 +369,8 @@ Imagine the following topology
|
|||||||
set vpn ipsec site-to-site peer OFFICE-A vti bind 'vti10'
|
set vpn ipsec site-to-site peer OFFICE-A vti bind 'vti10'
|
||||||
set vpn ipsec site-to-site peer OFFICE-A vti esp-group 'ESP_DEFAULT'
|
set vpn ipsec site-to-site peer OFFICE-A vti esp-group 'ESP_DEFAULT'
|
||||||
|
|
||||||
|
set protocols static interface-route 10.0.11.0/24 next-hop-interface vti10
|
||||||
|
|
||||||
Key Parameters:
|
Key Parameters:
|
||||||
|
|
||||||
* ``authentication local-id/remote-id`` - IKE identification is used for
|
* ``authentication local-id/remote-id`` - IKE identification is used for
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user