IPsec BSD to BSD
V1: ipsec tunnel
U03
sysrc cloned_interfaces=ipsec0
sysrc ifconfig_ipsec0="inet 10.8.1.2/32 10.8.1.1 tunnel 195.191.50.68 116.203.229.50"
service netif restart ipsec0
V7
sysrc cloned_interfaces=ipsec0
sysrc ifconfig_ipsec0="inet 10.8.1.1/32 10.8.1.2 tunnel 116.203.229.50 195.191.50.68"
service netif restart ipsec0
V2: gre tunnel
v7
sysrc cloned_interfaces="gre0"
sysrc ifconfig_gre0="inet 10.8.1.1 10.8.1.2 netmask 255.255.255.255 tunnel 116.203.229.50 195.191.50.68"
service netif restart gre0
u03
sysrc cloned_interfaces="gre0"
sysrc ifconfig_gre0="inet 10.8.1.2 10.8.1.1 netmask 255.255.255.255 tunnel 195.191.50.68 116.203.229.50"
service netif restart gre0
IPsec security policy
u03
- ipsec.conf
flush;
spdflush;
spdadd 195.191.50.68/32 116.203.229.50/32 gre -P out ipsec esp/transport//require;
spdadd 116.203.229.50/32 195.191.50.68/32 gre -P in ipsec esp/transport//require;
v7
- ipsec.conf
flush;
spdflush;
spdadd 116.203.229.50/32 195.191.50.68/32 gre -P out ipsec esp/transport//require;
spdadd 195.191.50.68/32 116.203.229.50/32 gre -P in ipsec esp/transport//require;
ISAKMP with racoon
- racoon.conf
path pre_shared_key "/usr/local/etc/racoon/psk.txt";
log info;
padding {
maximum_length 20;
randomize off;
strict_check off;
exclusive_tail off;
}
remote anonymous {
exchange_mode main;
lifetime time 24 hour;
proposal {
encryption_algorithm aes 256;
hash_algorithm sha1;
authentication_method pre_shared_key;
dh_group 1;
}
}
sainfo anonymous {
pfs_group 1;
lifetime time 24 hour;
encryption_algorithm aes 256;
authentication_algorithm hmac_sha1;
compression_algorithm deflate;
}
service ipsec enable
service ipsec restart
service racoon enable
service racoon restart
Sample SAD/SPD