|Securing and Optimizing Linux: RedHat Edition -A Hands on Guide|
|Prev||Chapter 25. Linux FreeS/WAN VPN||Next|
We must edit the ipsec.conf file vi /etc/ipsec.conf and change the default values to fit our specifications for IPSEC configuration and communication. Currently there are two types of section in this file /etc/ipsec.conf:
A config section which specifies general configuration information for IPSEC,
A conn section which specifies an IPSEC connection. Its contents are not security-sensitive unless manual keying is being done, recall, manual keying is not recommended for security reasons.
The first section type, called config setup, is the only config section known to the IPSEC software containing overall setup parameters for IPSEC that apply to all connections, and information used when the software is being started.
The second type, called conn, contains a connection specification defining a network connection to be made using IPSEC. The name it is given is arbitrary, and is simply used to identify the connection to ipsec_auto(8) and ipsec_manual(8).
# /etc/ipsec.conf - FreeS/WAN IPSEC configuration file # More elaborate and more varied sample configurations can be found # in doc/examples. # basic configuration config setup interfaces="ipsec0=eth0" klipsdebug=none plutodebug=none plutoload=%search plutostart=%search # sample connection conn deep-mail left=184.108.40.206 leftsubnet=192.168.1.0/24 leftnexthop=220.127.116.11 right=18.104.22.168 rightsubnet=192.168.1.0/24 rightnexthop=22.214.171.124 keyingtries=0 auth=ah auto=start
This tells ipsec.conf file to set itself up for this particular configuration setup with:
This option specifies which appropriate virtual and physical interfaces for IPSEC to use. The default setting, interfaces=%defaultroute, will look for your default connection to the Internet, or your corporate network. Also, you can name one or more specific interfaces to be used by FreeS/WAN. For example:
Both set the eth0 interface as ipsec0. The second one, however, also supports IPSEC over a PPP interface. If the default setting interfaces=%defaultroute is not used, then the specified interfaces will be the only ones this gateway machine can use to communicate with other IPSEC gateways.
This option specifies the debugging output for KLIPS -the kernel IPSEC code. The default value none, means no debugging output and the value all means full output.
This option specifies the debugging output for the Pluto key. The default value, none, means no debugging output, and the value all means full output.
This option specifies which connections (by name) to load automatically into memory when Pluto starts. The default is none and the value %search loads all connections with auto=add or auto=start.
This option specifies which connections (by name) to automatically negotiate when Pluto starts. The default is none and the value %search starts all connections with auto=start.
This option specifies the name given to identify the connection specification to be made using IPSEC. It's a good convention to name connections by their ends to avoid mistakes. For example, the link between deep.openna.com and mail.openna.com gateways server can be named deep-mail, or the link between your Montreal and Paris offices, montreal-paris.
: Note that the names deep-mail or whatever you have chosen should be the same in the ipsec.conf file on both gateways. In other words, the only change you should make in the /etc/ipsec.conf file on the second gateway is changing the interfaces= line to match the interface the second gateway uses for IPSEC connection, if, of course, it's different from the first gateway. For example, if the interface eth0 is used on the both gateways for IPSEC communication, you don't need to change the line interfaces= on the second gateway. On the other hand, if the first gateway use eth0 and the second use eth1, you must change the line interfaces= on the second gateway to match the interface eth1.
This option specifies the IP address of the gateway's external interface used to talk to the other gateway.
This option specifies the IP network or address of the private subnet behind the gateway.
This option specifies the IP address of the first router in the appropriate direction or ISP router.
This is the same explanation as left= but for the right destination.
This is the same explanation as leftsubnet= but for the right destination.
This is the same explanation as leftnexthop= but for the right destination.
This option specifies how many attempts (an integer) should be made in (re)keying negotiations. The default value 0 (retry forever) is recommended.
This option specifies whether authentication should be done separately using AH (Authentication Header), or be included as part of the ESP -Encapsulated Security Payload service. This is preferable when the IP headers are exposed to prevent man-in-the-middle attacks.
This option specifies whether automatic startup operations should be done at IPSEC startup.
A data mismatch anywhere in this configuration ipsec.conf will cause FreeS/WAN to fail and to log various error messages.