L2TPv3 over IPsec configuration example: Difference between revisions
L2TPv3 over IPsec configuration example (view source)
Revision as of 13:57, 23 October 2024
, 23 Octoberno edit summary
PauliusRug (talk | contribs) No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
==Introduction== | ==Introduction== | ||
<span style="color: red;">The information on this page is updated in accordance with firmware version <span style="color: #0054A6;"><b>00.07. | <span style="color: red;">The information on this page is updated in accordance with firmware version <span style="color: #0054A6;"><b>00.07.10</b></span>.</span> | ||
Because of the lack of confidentiality inherent in the '''Layer 2 Networking Protocol''' ('''L2TP''') protocol, '''Internet Protocol Security''' ('''IPsec''') is often used to secure L2TP packets by providing confidentiality, authentication, and integrity. The combination of these two protocols is generally known as '''L2TP over IPsec''' (or simply '''L2TP/IPsec'''). | Because of the lack of confidentiality inherent in the '''Layer 2 Networking Protocol''' ('''L2TP''') protocol, '''Internet Protocol Security''' ('''IPsec''') is often used to secure L2TP packets by providing confidentiality, authentication, and integrity. The combination of these two protocols is generally known as '''L2TP over IPsec''' (or simply '''L2TP/IPsec'''). | ||
Line 26: | Line 26: | ||
[[File:Networking rutxxx configuration examples l2tpv3 over ipsec topology v1.png|border|class=tlt-border|1100px]] | [[File:Networking rutxxx configuration examples l2tpv3 over ipsec topology v1.png|border|class=tlt-border|1100px]] | ||
== | ==IPSec configuration== | ||
If you have familiarized yourself with the configuration schemes and have all of the devices in order, we can start configuring the routers using instructions provided in this section. | |||
We will start our configuration with RUT1. | |||
===IPsec RUT1 Config=== | |||
---- | |||
* Login to the router's WebUI and go to '''Services → VPN -> IPsec''' | |||
* Add a new instance with your desired name, in my case, I will be using '''RUT1''' | |||
[[File:RutOS_IPsec_tunnel_with_certificates_7.8_add_ipsec.png|border|center|class=tlt-border|1102px]] | |||
'''Note:''' ''Not specified fields can be left as is or changed according to your needs.'' | |||
====Instance configuration==== | |||
---- | |||
Make the following changes: | |||
# '''''Enable''''' instance; | |||
# Remote endpoint - '''''RUT2 public WAN IP;''''' | |||
# Authentication method - '''''Pre-shared key;''''' | |||
# Pre shared key - '''''Your chosen password (must match for both RUT1 & RUT2)''''' | |||
# Local identifier – '''''RUT1 LAN IP, which is 192.168.3.1 in this case;''''' | |||
# Remote identifier – '''''RUT2 LAN IP, which is 192.168.14.1 in this case;''''' | |||
[[File:RutOS_IPsec_config_ex_7.8_rut1.png|border|class=tlt-border|center]] | |||
====Connection general section configuration==== | |||
---- | |||
Make the following changes: | |||
# Mode - '''''Start;''''' | |||
# Type - '''''Tunnel;''''' | |||
# Local subnet – '''''192.168.3.0/24;''''' | |||
# Remote subnet – '''''192.168.14.0/24;''''' | |||
# Key exchange - '''''IKEv2;''''' | |||
[[File:RutOS_IPsec_tunnel_with_certificates_7.8_add_ipsec_config_connection.png|border|class=tlt-border|center]] | |||
====Proposal configuration==== | |||
'''Important:''' Both the RUT1 and RUT2 Encryptions must match in order for this configuration to work. | |||
---- | |||
'''Note:''' ''This is only an example of a secure configuration. Other algorithms or even combinations of them could be used. However, we strongly recommend refraining from using older encryption and hashing algorithms unless support for certain legacy systems is required.'' | |||
Make the following changes: | |||
<table class="nd-othertables_2"> | |||
<tr> | |||
<th width=330; style="border-bottom: 1px solid white;></th> | |||
<th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:Networking_webui_manual_IPsec_configuration_proposal_phase1_settings_v1.png|border|class=tlt-border|671x336px|center]]</th> | |||
</tr> | |||
<tr> | |||
<td style="border-bottom: 4px solid white> | |||
# Encryption - '''''AES256;''''' | |||
# Authentication - '''''SHA512;''''' | |||
# DH group - '''''MODP4096;''''' | |||
# IKE lifetime - '''86400s'''. | |||
</td> | |||
</tr> | |||
</table> | |||
---- | |||
<table class="nd-othertables_2"> | |||
<tr> | |||
<th width=330; style="border-bottom: 1px solid white;></th> | |||
<th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:Networking_webui_manual_IPsec_configuration_proposal_phase2_settings_v1.png|border|class=tlt-border|644x331px|center]]</th> | |||
</tr> | |||
<tr> | |||
<td style="border-bottom: 4px solid white> | |||
# Encryption - '''''AES256;''''' | |||
# Authentication - '''''SHA512;''''' | |||
# PFS group - '''''MODP4096;''''' | |||
# Lifetime – '''''86400s;''''' | |||
</td> | |||
</tr> | |||
</table> | |||
===IPsec RUT2 Config=== | |||
---- | ---- | ||
* Login to the router's WebUI and go to '''Services → VPN -> IPsec''' | |||
* Add a new instance with your desired name, in my case I will be using '''RUT2''' | |||
= | [[File:RutOS_IPsec_tunnel_with_certificates_7.8_add_ipsec.png|border|center|class=tlt-border|1102px]] | ||
'''Note:''' ''Not specified fields can be left as is or changed according to your needs.'' | |||
====Instance configuration==== | |||
---- | |||
Make the following changes: | |||
# '''''Enable''''' instance; | |||
# Authentication method - '''''Pre-shared key;''''' | |||
# Pre shared key - '''''Your chosen password (must match for both RUT1 & RUT2)''''' | |||
# Local identifier – '''''RUT2 LAN IP, which is 192.168.14.1 in this case;''''' | |||
# Remote identifier – '''''RUT1 LAN IP, which is 192.168.3.1 in this case;''''' | |||
[[File:RutOS_IPsec_config_ex_7.8_rut2222.png|border|class=tlt-border|center]] | |||
====Connection general section configuration==== | |||
---- | |||
Make the following changes: | |||
# Mode - '''''Start;''''' | |||
# Type - '''''Tunnel;''''' | |||
# Local subnet – '''''192.168.14.0/24;''''' | |||
# Remote subnet – '''''192.168.3.0/24;''''' | |||
# Key exchange - '''''IKEv2;''''' | |||
[[File: | [[File:RutOS_IPsec_tunnel_with_certificates_7.8_add_ipsec_config_connection_rut2_general.png|border|class=tlt-border|center]] | ||
====Proposal configuration==== | |||
'''Important:''' Both the RUT1 and RUT2 Encryptions must match in order for this configuration to work. | |||
---- | |||
'''Note:''' ''This is only an example of a secure configuration. Other algorithms or even combinations of them could be used. However, we strongly recommend refraining from using older encryption and hashing algorithms unless support for certain legacy systems is required.'' | |||
Make the following changes: | |||
<table class="nd-othertables_2"> | |||
<tr> | |||
<th width=330; style="border-bottom: 1px solid white;></th> | |||
<th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:Networking_webui_manual_IPsec_configuration_proposal_phase1_settings_v1.png|border|class=tlt-border|671x336px|center]]</th> | |||
</tr> | |||
<tr> | |||
<td style="border-bottom: 4px solid white> | |||
# Encryption - '''''AES256;''''' | |||
# Authentication - '''''SHA512;''''' | |||
# DH group - '''''MODP4096;''''' | |||
# IKE lifetime - '''86400s'''. | |||
</td> | |||
</tr> | |||
</table> | |||
---- | ---- | ||
<table class="nd-othertables_2"> | |||
<tr> | |||
<th width=330; style="border-bottom: 1px solid white;></th> | |||
<th width=800; style="border-bottom: 1px solid white;" rowspan=2>[[File:Networking_webui_manual_IPsec_configuration_proposal_phase2_settings_v1.png|border|class=tlt-border|644x331px|center]]</th> | |||
</tr> | |||
<tr> | |||
<td style="border-bottom: 4px solid white> | |||
# Encryption - '''''AES256;''''' | |||
# Authentication - '''''SHA512;''''' | |||
# PFS group - '''''MODP4096;''''' | |||
# Lifetime – '''''86400s;''''' | |||
</td> | |||
</tr> | |||
</table> | |||
===Testing IPsec connection=== | ===Testing IPsec connection=== |