Template:Networking rutos configuration example l2tp over ipsec android: Difference between revisions

From Teltonika Networks Wiki
No edit summary
 
(46 intermediate revisions by one other user not shown)
Line 3: Line 3:
         <th width=325; style="border-bottom: 1px solid white;></th>
         <th width=325; style="border-bottom: 1px solid white;></th>
         <th width=820; style="border-bottom: 1px solid white;" rowspan=2;>
         <th width=820; style="border-bottom: 1px solid white;" rowspan=2;>
[[File:Networking_RUTX_VPN_between_HQ_topology_v3.png|border|class=tlt-border|750px|right]]</th>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_topology_v1.png|border|class=tlt-border|750px|right]]</th>
     </tr>
     </tr>
     <tr>
     <tr>
Line 21: Line 21:
* At least one Android device
* At least one Android device


The topology above depicts the L2TP/IPsec scheme. - The router with the Public IP address ('''''RUTX11''''') acts as the '''L2TP/IPsec server''' and the '''Android device''' acts as '''client'''. L2TP connects the networks of '''RUTX11''' and '''Android client''', IPsec provides the encryption for the L2TP tunnel. Only LAN traffic is going to go through that tunnel, any other WAN traffic won't go through it. This way the VPN tunnel will not be under a huge load and will provide greater speeds.
The topology above depicts the L2TP/IPsec scheme. The router with the Public IP address ('''RUTX''') acts as the '''L2TP/IPsec server''' and the '''Android device''' acts as '''client'''. L2TP connects the networks of '''RUTX''' and '''Android client''', IPsec provides the encryption for the L2TP tunnel. Created VPN tunnel will allow Android device to reach home network behind the RUTX router, but the rest of Android device network traffic will not be redirected through VPN. This way the VPN tunnel will not be under a huge load and will provide greater speeds.


When the scheme is realized, you will be able to reach your home internal network with all internal systems, cameras, or other IOT devices, from anywhere in the world.
When the scheme is realized, you will be able to log on to your home network from anywhere - work, hotel, car. You will have access to all of your home resources, and your data will still be secure, even if you will be using public WiFi.


==Configuring home router (RUTX)==
==Configuring home router (RUTX)==
As mentioned in the prerequisites section, the router that acts as the server must have a Public Static or Public Dynamic IP address (more information on the subject can be found here). If that is in order, we should start configuring the server.
===L2TP===
===L2TP===
----
 


<table class="nd-othertables_2">
<table class="nd-othertables_2">
     <tr>
     <tr>
         <th width=355; style="border-bottom: 1px solid white;></th>
         <th width=355; style="border-bottom: 1px solid white;></th>
         <th width=790; style="border-bottom: 1px solid white;" rowspan=2>  
         <th width=790; style="border-bottom: 1px solid white;" rowspan=2> [[File:RutOS_L2TP_IPsec_VPN_7,8_add_L2TP_Server.png|770px|right]]</th>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_1_v1.png|770px|right]]</th>
     </tr>
     </tr>
     <tr>
     <tr>
Line 41: Line 41:
     <li>Select '''Role: Server'''.</li>
     <li>Select '''Role: Server'''.</li>
     <li>Enter a '''custom configuration name'''.</li>
     <li>Enter a '''custom configuration name'''.</li>
     <li>Click the '''Add''' button.</li>
     <li>Click the '''Add''' button. You will be prompted to the configuration window</li>
    <li>Click the '''Edit''' button next to the newly created L2TP instance.</li>
</ol>
</ol>
         </td>
         </td>
Line 53: Line 52:
     <tr>
     <tr>
         <th width=355; style="border-bottom: 1px solid white;></th>
         <th width=355; style="border-bottom: 1px solid white;></th>
         <th width=790; style="border-bottom: 1px solid white;" rowspan=2>
         <th width=790; style="border-bottom: 1px solid white;" rowspan=2>[[File:RutOS_L2TP_IPsec_VPN_7,8_add_L2TP_Server_config.png|770px|right]]</th>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_2_v1.png|770px|right]]</th>
     </tr>
     </tr>
     <tr>
     <tr>
Line 60: Line 58:
<ol>
<ol>
     <li>'''Enable''' the L2TP instance.</li>
     <li>'''Enable''' the L2TP instance.</li>
    <li>Click on the '''Add''' button to add a new user</li>
     <li>Enter a '''User name''' and '''Password''' for authentication for the client.</li>
     <li>Enter a '''User name''' and '''Password''' for authentication for the client.</li>
     <li>Optionaly, set a fixed IP for this client (if left empty, client will receive first free IP from the IP range).</li>
     <li>Optionally, set a fixed IP for this client (if left empty, the client will receive the first free IP from the IP range).</li>
     <li>Don't forget to '''Save''' the changes.</li>
     <li>Don't forget to '''Save''' the changes.</li>
</ol>
</ol>
Line 74: Line 73:
     <tr>
     <tr>
         <th width=355; style="border-bottom: 1px solid white;></th>
         <th width=355; style="border-bottom: 1px solid white;></th>
         <th width=790; style="border-bottom: 1px solid white;" rowspan=2>
         <th width=790; style="border-bottom: 1px solid white;" rowspan=2>[[File:RutOS_L2TP_IPsec_VPN_7,8_add_Ipsec_Server.png|770px|right]]</th>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_3_v1.png|770px|right]]</th>
     </tr>
     </tr>
     <tr>
     <tr>
Line 82: Line 80:
<ol>     
<ol>     
       <li>Enter a custom name for the IPsec instance.</li>
       <li>Enter a custom name for the IPsec instance.</li>
       <li>Click the '''Add''' button.</li>
       <li>Click the '''Add''' button. You will be prompted to the configuration window</li>
      <li>Click the '''Edit''' button next to the newly created instance.</li>
</ol>
</ol>
         </td>
         </td>
Line 94: Line 91:
     <tr>
     <tr>
         <th width=355; style="border-bottom: 1px solid white;></th>
         <th width=355; style="border-bottom: 1px solid white;></th>
         <th width=790; style="border-bottom: 1px solid white;" rowspan=2>
         <th width=790; style="border-bottom: 1px solid white;" rowspan=2>[[File:RutOS_L2TP_IPsec_VPN_7,8_add_Ipsec_Server_config_instnace222.png|770px|right]]</th>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_4_v1.png|770px|right]]</th>
  </tr>
    </tr>
     <tr>
     <tr>
         <td style="border-bottom: 1px solid white>
         <td style="border-bottom: 1px solid white>
Line 103: Line 99:
       <li>'''Enable''' the instance.</li>
       <li>'''Enable''' the instance.</li>
       <li>Enter your '''Pre-shared key'''.</li>
       <li>Enter your '''Pre-shared key'''.</li>
      <li>Select '''Type: Transport'''.</li>
</ol>
        </td>
    </tr>
</table>
<table class="nd-othertables_2">
    <tr>
        <th width=355; style="border-bottom: 1px solid white;></th>
        <th width=790; style="border-bottom: 1px solid white;" rowspan=2>[[File:RutOS_L2TP_IPsec_VPN_7,8_add_Ipsec_Server_config_instance_connection.png|770px|right]]</th>
  </tr>
    <tr>
        <td style="border-bottom: 1px solid white>
<ol>    
'''3.''' Select '''Type: Transport'''.
<br>
Do not forget to '''Save''' changes.
</ol>
        </td>
    </tr>
</table>
----
'''Note:''' ''This is only an example of a secure configuration. Other algorithms or even combinations of them could be used. However, we strongly recommend refraining from using older encryption and hashing algorithms unless support for certain legacy systems is required.''
 
Make the following changes:
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:Networking_webui_manual_IPsec_configuration_proposal_phase1_settings_v1.png|border|class=tlt-border|671x336px|center]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# Encryption - '''''AES256;'''''
# Authentication - '''''SHA512;'''''
# DH group - '''''MODP4096;'''''
# IKE lifetime - '''86400s'''.
        </td>
    </tr>
</table>
 
----
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:Networking_webui_manual_IPsec_configuration_proposal_phase2_settings_v1.png|border|class=tlt-border|644x331px|center]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# Encryption - '''''AES256;'''''
# Authentication - '''''SHA512;'''''
# PFS group - '''''MODP4096;'''''
# Lifetime – '''''86400s;'''''
        </td>
    </tr>
</table>
 
===Firewall===
----
Now go to the '''Network → Firewall → General Settings''' page
 
----
 
<table class="nd-othertables_2">
    <tr>
        <th width=355; style="border-bottom: 1px solid white;></th>
        <th width=790; style="border-bottom: 1px solid white;" rowspan=2>
[[File:RutOS_L2TP_IPsec_android_7.8_1.png|770px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 1px solid white>
<ol>   
      <li>Set '''Forward: accept'''.</li>
       <li>'''Save''' changes.</li>
       <li>'''Save''' changes.</li>
</ol>
</ol>
Line 120: Line 185:
     <tr>
     <tr>
         <td style="border-bottom: 1px solid white>
         <td style="border-bottom: 1px solid white>
Type '''VPN settings''' in the Windows search bar:
Go to your Android device '''VPN settings''' and create a new VPN network:
         </td>
         </td>
     </tr>
     </tr>
Line 131: Line 196:
         <th width=525; style="border-bottom: 1px solid white;"></th>
         <th width=525; style="border-bottom: 1px solid white;"></th>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_6_v2.png|border|class=tlt-border|300px|center]]</th>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_6_v3.png|border|class=tlt-border|300px|center]]</th>
     </tr>
     </tr>
     <tr>
     <tr>
         <td style="border-bottom: 1px solid white>
         <td style="border-bottom: 1px solid white>
Click the '''Add a VPN connection''' button:
Apply the following configuration:
        <ol>
            <li>Select '''Type: L2TP/IPsec PSK'''.</li>
            <li>Enter the router's WAN IP address into the '''Server''' field.</li>
            <li>Enter the '''Pre-shared key''' exactly as it was specified in the router's IPsec settings.</li>
            <li>Press '''Show advanced options'''</li>
        </ol>
         </td>
         </td>
     </tr>
     </tr>
Line 146: Line 217:
         <th width=525; style="border-bottom: 1px solid white;"></th>
         <th width=525; style="border-bottom: 1px solid white;"></th>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_7_v1.png|border|class=tlt-border|300px|center]]</th>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_7_v3.png|border|class=tlt-border|300px|center]]</th>
     </tr>
     </tr>
     <tr>
     <tr>
         <td style="border-bottom: 1px solid white>
         <td style="border-bottom: 1px solid white>
Configure the following parameters:
         <ol>
         <ol>
             <li>Select '''VPN provider: Windows (built-in)'''.</li>
             <li>Write the '''DNS servers''' you are planning to use (in this example we used google DNS servers).</li>
            <li>Enter a custom '''Connection name'''.</li>
             <li>Add '''Forwarding routes''' (RUTX LAN network).</li>
            <li>Enter the router's WAN IP address into the '''Server name or address''' field.</li>
             <li>'''Save''' settings.</li>
            <li>Select '''VPN type: L2TP/IPsec with pre-shared key'''.</li>
            <li>Enter the '''Pre-shared key''' exactly as it was specified on the router.</li>
            <li>Select '''Type of sign-in info: User name and password'''.</li>
             <li>Enter the '''User name''' and '''Password''' exactly as they were specified on the router.</li>
             <li>Click '''Save'''</li>
         </ol>
         </ol>
         </td>
         </td>
Line 171: Line 236:
         <th width=525; style="border-bottom: 1px solid white;"></th>
         <th width=525; style="border-bottom: 1px solid white;"></th>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_8_v1.png|border|class=tlt-border|300px|center]]</th>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_8_v2.png|border|class=tlt-border|300px|center]]</th>
     </tr>
     </tr>
     <tr>
     <tr>
         <td style="border-bottom: 1px solid white>
         <td style="border-bottom: 1px solid white>
Type '''Network Connections''' in the Windows search bar:
Now open your newly created VPN instance and connect to it:
        <ol>
            <li>Write the '''Username''' you created in router's L2TP settings.</li>
            <li>Write the '''Password''' you created in router's L2TP settings.</li>
            <li>Press '''Connect'''.</li>
        </ol>
         </td>
         </td>
     </tr>
     </tr>
Line 186: Line 256:
         <th width=525; style="border-bottom: 1px solid white;"></th>
         <th width=525; style="border-bottom: 1px solid white;"></th>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_9_v1.png|border|class=tlt-border|300px|center]]</th>
[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_9_v2.png|border|class=tlt-border|300px|center]]</th>
     </tr>
     </tr>
     <tr>
     <tr>
         <td style="border-bottom: 1px solid white>
         <td style="border-bottom: 1px solid white>
Press right mouse click on your newly created VPN instance and select '''Properties''':
If you applied the configuration correctly, after a moment it should indicate '''Connected''':
         </td>
         </td>
     </tr>
     </tr>
Line 200: Line 270:
     <tr>
     <tr>
         <th width=525; style="border-bottom: 1px solid white;></th>
         <th width=525; style="border-bottom: 1px solid white;></th>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>[[File:Networking_rutxxx_configuration_examples_l2tp_over_ipsec_windows_10_10_v2.png|border|class=tlt-border|550px|right]]</th>
         <th width=620; style="border-bottom: 1px solid white;" rowspan=2>[[File:Networking_rutos_configuration_example_l2tp_over_ipsec_android_10_v1.png|border|class=tlt-border|300px|center]]</th>
     </tr>
     </tr>
     <tr>
     <tr>
         <td style="border-bottom: 1px solid white>
         <td style="border-bottom: 1px solid white>
Home worker should now be able to access HQ network resources.  
Now you should be able to access your home network resources.  
To verify the connection you can ping some internal HQ server and if you get a reply, you have successfully connected to HQ‘s internal network.
To verify the connection you can try accessing your router's WebUI without being connected to it in any way. If you are able to do that, you have successfully connected to your home network.


         </td>
         </td>
     </tr>
     </tr>
</table>
</table>
----
'''Disclaimer:'''
This configuration example was created by using Android version 10. The IPsec '''Phase 1''' and '''Phase 2''' settings, which were used in this configuration example, might not work with other Android versions and might require adjustment.

Latest revision as of 11:51, 22 August 2024

Configuration overview and prerequisites

Prerequisites:

  • One RUTX router of any type
  • A Public Static or Public Dynamic IP address
  • At least one Android device

The topology above depicts the L2TP/IPsec scheme. The router with the Public IP address (RUTX) acts as the L2TP/IPsec server and the Android device acts as client. L2TP connects the networks of RUTX and Android client, IPsec provides the encryption for the L2TP tunnel. Created VPN tunnel will allow Android device to reach home network behind the RUTX router, but the rest of Android device network traffic will not be redirected through VPN. This way the VPN tunnel will not be under a huge load and will provide greater speeds.

When the scheme is realized, you will be able to log on to your home network from anywhere - work, hotel, car. You will have access to all of your home resources, and your data will still be secure, even if you will be using public WiFi.

Configuring home router (RUTX)

As mentioned in the prerequisites section, the router that acts as the server must have a Public Static or Public Dynamic IP address (more information on the subject can be found here). If that is in order, we should start configuring the server.

L2TP

Login to the router's WebUI and navigate to the Services → VPN → L2TP page and do the following:

  1. Select Role: Server.
  2. Enter a custom configuration name.
  3. Click the Add button. You will be prompted to the configuration window

  1. Enable the L2TP instance.
  2. Click on the Add button to add a new user
  3. Enter a User name and Password for authentication for the client.
  4. Optionally, set a fixed IP for this client (if left empty, the client will receive the first free IP from the IP range).
  5. Don't forget to Save the changes.

IPsec


Go to the Services → VPN → IPsec page and do the following:

  1. Enter a custom name for the IPsec instance.
  2. Click the Add button. You will be prompted to the configuration window

In the IPsec Configuration page, do the following (and leave the rest as defaults, unless your specific configuration requires otherwise):

  1. Enable the instance.
  2. Enter your Pre-shared key.
    3. Select Type: Transport.
    Do not forget to Save changes.

Note: This is only an example of a secure configuration. Other algorithms or even combinations of them could be used. However, we strongly recommend refraining from using older encryption and hashing algorithms unless support for certain legacy systems is required.

Make the following changes:

  1. Encryption - AES256;
  2. Authentication - SHA512;
  3. DH group - MODP4096;
  4. IKE lifetime - 86400s.

  1. Encryption - AES256;
  2. Authentication - SHA512;
  3. PFS group - MODP4096;
  4. Lifetime – 86400s;

Firewall


Now go to the Network → Firewall → General Settings page


  1. Set Forward: accept.
  2. Save changes.

Android phone

Go to your Android device VPN settings and create a new VPN network:


Apply the following configuration:

  1. Select Type: L2TP/IPsec PSK.
  2. Enter the router's WAN IP address into the Server field.
  3. Enter the Pre-shared key exactly as it was specified in the router's IPsec settings.
  4. Press Show advanced options

  1. Write the DNS servers you are planning to use (in this example we used google DNS servers).
  2. Add Forwarding routes (RUTX LAN network).
  3. Save settings.

Now open your newly created VPN instance and connect to it:

  1. Write the Username you created in router's L2TP settings.
  2. Write the Password you created in router's L2TP settings.
  3. Press Connect.

If you applied the configuration correctly, after a moment it should indicate Connected:

Results

Now you should be able to access your home network resources. To verify the connection you can try accessing your router's WebUI without being connected to it in any way. If you are able to do that, you have successfully connected to your home network.


Disclaimer:

This configuration example was created by using Android version 10. The IPsec Phase 1 and Phase 2 settings, which were used in this configuration example, might not work with other Android versions and might require adjustment.