Domnev: Difference between revisions

From Teltonika Networks Wiki
No edit summary
No edit summary
Line 1: Line 1:
<p style="color:red">The information on this page is updated in accordance with the [https://wiki.teltonika-networks.com/view/FW_%26_SDK_Downloads'''00.07.4'''] firmware version .</p>
<p style="color:red">The information on this page is updated in accordance with the [https://wiki.teltonika-networks.com/view/FW_%26_SDK_Downloads'''00.07.4'''] firmware version .</p>
==Introduction==
==Introduction==
Normally we configure IPsec for LAN-to-LAN communication which is also known as split-tunnel VPN when only specific hosts should be reachable via VPN tunnel. However, we may also take a different approach and configure VPN tunnel using full-tunnel method. This means that any non-directly connected network (i.e. lan interface) will be reachable only via IPsec tunnel and not via typical default route.
 


==Configuration overview and prerequisites==
==Configuration overview and prerequisites==
Line 16: Line 16:
==Topology==
==Topology==


[[File:IPsec TLT to TLT Topology.png|border|center|class=tlt-border|839x399px]]


'''RUT1''' - RUTX12 as a '''hub'''. A hub is a server, to which our spoke will be connecting (IPsec responder). It will be our "default gateway" for the spoke device. RUTX12 has a LAN subnet of 192.168.11.0/24 configured on it, which should be reachable by the '''spoke'''.
== See also ==
 
'''RUT2''' - RUT955 as a '''spoke'''. A spoke is a client, that will be connected to the spoke (IPsec initiator). It will be connected to a '''hub''' for basic internet access. RUT955 has a LAN subnet of 192.168.9.0/24 configured on it.
 
==RUT1 (Hub) configuration==
Start by configuring the hub (RUT1) device. Login to the WebUI, navigate to '''Services → VPN → IPsec''' and '''add a new IPsec instance'''. Configure everything as follows.
 
'''Note:''' ''Not specified fields can be left as is or changed according to your needs.''
===Instance configuration===
----
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white"; rowspan=2>[[File:IPsec HUB.png|border|class=tlt-border|755x406px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# '''''Enable''''' instance;
# Authentication method - '''''Pre-shared key;'''''
# Pre-shared key - '''''your desired password;'''''
        </td>
    </tr>
</table>
 
===Connection configuration===
----
 
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:IPsec HUB Connection.png|border|class=tlt-border|753x368px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# Mode - '''''Start;'''''
# Type - '''''Tunnel;'''''
# Local subnet - '''''0.0.0.0/.0;'''''
# Key exchange - '''''IKEv2;'''''
        </td>
    </tr>
</table>
 
----
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:IPsec HUB Connection Advanced.png|border|class=tlt-border|752x541px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# '''''Enable''''' '''''Local firewall;'''''
# Remote source IP - '''''10.20.30.0/24;'''''
# Remote DNS - '''''9.9.9.9;'''''
        </td>
    </tr>
</table>
 
===Proposal configuration===
----
 
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:IPsec Phase1.png|border|class=tlt-border|742x254px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# Encryption - '''''AES256;'''''
# Authentication - '''''SHA512;'''''
# DH group - '''''ECP521;'''''
# Force crypto proposal - '''enabled'''.
        </td>
    </tr>
</table>


----
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:IPsec Phase2.png|border|class=tlt-border|748x257px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# Encryption - '''''AES128;'''''
# Authentication - '''''SHA256;'''''
# DH group - '''''ECP521;'''''
# Force crypto proposal - '''enabled'''.
        </td>
    </tr>
</table>
'''Force crypto proposal''' option as it simplifies which algorithm suite will be used for both phases.
==RUT2 (Spoke) configuration==
Login to the RUT2 WebUI, navigate to '''Services → VPN → IPsec''' and '''add a new IPsec instance.''' Configure everything as follows.
'''Note:''' ''Not specified fields can be left as is or changed according to your needs.''
===Instance configuration===
----
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:IPsec SPOKE.png|border|class=tlt-border|742x399px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# '''''Enable''''' instance;
# Remote endpoint - '''''RUT1 public IP;'''''
# Authentication method - '''''Pre-shared key;'''''
# Pre-shared key - the '''''same password''''' you have '''''set on''''' '''''RUT1''''' when configuring '''''HUB instance;'''''
        </td>
    </tr>
</table>
===Connection configuration===
----
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:IPsec SPOKE Connection.png|border|class=tlt-border|761x280px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# Mode - '''''Start;'''''
# Type - '''''Tunnel;'''''
# '''''Enable''''' '''''default route;'''''
# Key exchange - '''''IKEv2;'''''
        </td>
    </tr>
</table>
===Proposal configuration===
----
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:IPsec Phase1.png|border|class=tlt-border|742x254px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# Encryption - '''''AES256;'''''
# Authentication - '''''SHA512;'''''
# DH group - '''''ECP521;'''''
# Force crypto proposal - '''enabled'''.
        </td>
    </tr>
</table>
----
<table class="nd-othertables_2">
    <tr>
        <th width=330; style="border-bottom: 1px solid white;></th>
        <th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:IPsec Phase2.png|border|class=tlt-border|748x257px|right]]</th>
    </tr>
    <tr>
        <td style="border-bottom: 4px solid white>
# Encryption - '''''AES128;'''''
# Authentication - '''''SHA256;'''''
# DH group - '''''ECP521;'''''
# Force crypto proposal - '''enabled'''.
        </td>
    </tr>
</table>
'''Force crypto proposal''' option as it simplifies which algorithm suite will be used for both phases.
==Testing the configuration==
If you've followed all the steps presented above, your configuration should be finished. But as with any other configuration, it is always wise to test the setup in order to make sure that it works properly.
Using the <code><span class="highlight">'''ipsec status'''</span></code> command we can see that IPsec tunnel is successfully established on both routers. The command output on a '''hub (RUT1)''' device:
[[File:IPsec_statusHUB_new.png|border|class=tlt-border|776x114px|center]]
The same command output on '''spoke (RUT2)''' device:
[[File:IPsec status SPOKE.png|border|class=tlt-border|827x158px|center]]
Also, as the hub should be reachable by spoke, we can try pinging the hub using <code><span class="highlight" >'''ping 192.168.11.1'''</span></code>:
[[File:Ping to hub.png|border|class=tlt-border|506x157px|center]]
== See also ==
[[RUTX12_VPN#IPsec|IPsec on Teltonika Networks devices]]
== External links ==
== External links ==
[https://openwrt.org/docs/guide-user/services/vpn/strongswan/basics OpenWrt IPsec basics]

Revision as of 09:32, 19 April 2023

The information on this page is updated in accordance with the 00.07.4 firmware version .

Introduction

Configuration overview and prerequisites

Before we begin, let's take a look at the configuration that we are attempting to achieve and the prerequisites that make it possible.

Prerequisites:

  • Two RUT/RUTX series routers with RUTOS firmware;
  • An end device (PC, Laptop) for configuration;

If you're having trouble finding any page or some of the parameters described here on your device's WebUI, you should turn on "Advanced WebUI" mode. You can do that by clicking the "Basic" button under "Mode," which is located at the top-right corner of the WebUI.

Topology

See also

External links