mirror of
https://gitlab.com/shorewall/code.git
synced 2025-06-25 04:01:45 +02:00
Update IPSEC Documentation
git-svn-id: https://shorewall.svn.sourceforge.net/svnroot/shorewall/trunk@1839 fbd18981-670d-0410-9b5c-8dc0c1a9a2bb
This commit is contained in:
parent
b6707db7f4
commit
5598015afc
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-11-18</pubdate>
|
<pubdate>2004-12-18</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -623,6 +623,10 @@
|
|||||||
<para>VPN</para>
|
<para>VPN</para>
|
||||||
|
|
||||||
<itemizedlist>
|
<itemizedlist>
|
||||||
|
<listitem>
|
||||||
|
<para><ulink url="VPNBasics.html">Basics</ulink></para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para><ulink url="IPSEC.htm">IPSEC</ulink></para>
|
<para><ulink url="IPSEC.htm">IPSEC</ulink></para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
@ -120,20 +120,24 @@
|
|||||||
|
|
||||||
<orderedlist>
|
<orderedlist>
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Local-host-to-remote-host — same as Local-host-to-local-gateway
|
<para><emphasis role="bold">Local-host-to-remote-host</emphasis> —
|
||||||
|
same as <emphasis role="bold">Local-host-to-local-gateway</emphasis>
|
||||||
above.</para>
|
above.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Local-gateway-to-remote-gateway.</para>
|
<para><emphasis
|
||||||
|
role="bold">Local-gateway-to-remote-gateway</emphasis>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Remote-gateway-to-local-gateway.</para>
|
<para><emphasis
|
||||||
|
role="bold">Remote-gateway-to-local-gateway</emphasis>.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
<listitem>
|
<listitem>
|
||||||
<para>Remote-host-to-local-host — same as Local-gateway-to-local-host
|
<para><emphasis role="bold">Remote-host-to-local-host</emphasis> —
|
||||||
|
same as <emphasis role="bold">Local-gateway-to-local-host</emphasis>
|
||||||
above.</para>
|
above.</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
</orderedlist>
|
</orderedlist>
|
||||||
@ -175,26 +179,97 @@
|
|||||||
</orderedlist>
|
</orderedlist>
|
||||||
</section>
|
</section>
|
||||||
|
|
||||||
|
<section>
|
||||||
|
<title>Defining Remote Zones</title>
|
||||||
|
|
||||||
|
<para>Most VPN types are implemented using a virtual network device such
|
||||||
|
as pppN (e.g., ppp0), tunN (e.g., tun0), etc. This means that in most
|
||||||
|
cases, remote zone definition is similar to zones that you have already
|
||||||
|
defined.</para>
|
||||||
|
|
||||||
|
<para><filename>/etc/shorewall/zones</filename>: </para>
|
||||||
|
|
||||||
|
<programlisting>#ZONE DISPLAY COMMENT
|
||||||
|
net Internet The big bad net
|
||||||
|
loc Local Local LAN
|
||||||
|
<emphasis role="bold">rem Remote Remote LAN</emphasis></programlisting>
|
||||||
|
|
||||||
|
<para><filename>/etc/shorewall/interfaces</filename>:</para>
|
||||||
|
|
||||||
|
<programlisting>#ZONE INTERFACE BROADCAST OPTION
|
||||||
|
net eth0 detect norft1918,routefilter
|
||||||
|
loc eth1 detect
|
||||||
|
<emphasis role="bold">rem tun0 192.168.10.0/24</emphasis></programlisting>
|
||||||
|
|
||||||
|
<para>The /etc/shorewall/hosts file comes into play when:</para>
|
||||||
|
|
||||||
|
<orderedlist>
|
||||||
|
<listitem>
|
||||||
|
<para>You have a number of remote networks.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>The remote networks have different firewall requirements and you
|
||||||
|
want to divide them into multiple zones.</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>There is no fixed relationship between the remote networks and
|
||||||
|
virtual network devices (for example, the VPN uses PPTP and remote
|
||||||
|
gateways connect on demand).</para>
|
||||||
|
</listitem>
|
||||||
|
</orderedlist>
|
||||||
|
|
||||||
|
<para>In this case, your configuration takes the following
|
||||||
|
approach:</para>
|
||||||
|
|
||||||
|
<para><filename>etc/shorewall/zones</filename>:</para>
|
||||||
|
|
||||||
|
<programlisting>#ZONE DISPLAY COMMENT
|
||||||
|
net Internet The big bad net
|
||||||
|
loc Local Local LAN
|
||||||
|
<emphasis role="bold">rem1 Remote1 Remote LAN 1
|
||||||
|
rem2 Remote2 Remote LAN 2</emphasis></programlisting>
|
||||||
|
|
||||||
|
<para><filename>/etc/shorewall/interfaces</filename>:</para>
|
||||||
|
|
||||||
|
<programlisting>#ZONE INTERFACE BROADCAST OPTION
|
||||||
|
net eth0 detect norft1918,routefilter
|
||||||
|
loc eth1 detect
|
||||||
|
<emphasis role="bold">- tun+ -</emphasis></programlisting>
|
||||||
|
|
||||||
|
<para>/etc/shorewall/hosts:</para>
|
||||||
|
|
||||||
|
<programlisting>#ZONE HOST(S) OPTIONS
|
||||||
|
<emphasis role="bold">rem1 tun+:10.0.0.0/24
|
||||||
|
rem2 tun+:10.0.1.0/24</emphasis></programlisting>
|
||||||
|
|
||||||
|
<para>The <filename>/etc/shorewall/hosts</filename> file is also used with
|
||||||
|
<ulink url="IPSEC-2.6.html">kernel 2.6 native IPSEC</ulink>. </para>
|
||||||
|
</section>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>Eliminating the /etc/shorewall/tunnels file</title>
|
<title>Eliminating the /etc/shorewall/tunnels file</title>
|
||||||
|
|
||||||
<para>The /etc/shorewall/tunnels file provides no functionality that could
|
<para>The <filename>/etc/shorewall/tunnels</filename> file provides no
|
||||||
not be implemented using entries in /etc/shorewall/rules and I have
|
functionality that could not be implemented using entries in
|
||||||
elimination of the /etc/shorewall/tunnels file as a long-term goal. The
|
<filename>/etc/shorewall/rules</filename> and I have elimination of the
|
||||||
following sections show how entries in /etc/shorewall/tunnels can be
|
<filename>/etc/shorewall/tunnels</filename> file as a long-term goal. The
|
||||||
replaced by rules for some common tunnel types.</para>
|
following sections show how entries in
|
||||||
|
<filename>/etc/shorewall/tunnels</filename> can be replaced by rules for
|
||||||
|
some common tunnel types.</para>
|
||||||
|
|
||||||
<section>
|
<section>
|
||||||
<title>IPSEC</title>
|
<title>IPSEC</title>
|
||||||
|
|
||||||
<para>/etc/shorewall/tunnels:</para>
|
<para>/<filename>etc/shorewall/tunnels</filename>:</para>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<programlisting>#TYPE ZONE GATEWAY GATEWAY ZONE
|
<programlisting>#TYPE ZONE GATEWAY GATEWAY ZONE
|
||||||
ipsec Z1 1.2.3.4 Z2</programlisting>
|
ipsec Z1 1.2.3.4 Z2</programlisting>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<para>/etc/shorewall/rules:</para>
|
<para><filename>/etc/shorewall/rules</filename>:</para>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<programlisting>#ACTION SOURCE DEST PROTO DEST SOURCE
|
<programlisting>#ACTION SOURCE DEST PROTO DEST SOURCE
|
||||||
@ -218,14 +293,14 @@ ACCEPT Z2:1.2.3.4 $FW udp 500</programlisting>
|
|||||||
<section>
|
<section>
|
||||||
<title>PPTP</title>
|
<title>PPTP</title>
|
||||||
|
|
||||||
<para>/etc/shorewall/tunnels:</para>
|
<para><filename>/etc/shorewall/tunnels</filename>:</para>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<programlisting>#TYPE ZONE GATEWAY GATEWAY ZONE
|
<programlisting>#TYPE ZONE GATEWAY GATEWAY ZONE
|
||||||
pptpserver Z1 1.2.3.4</programlisting>
|
pptpserver Z1 1.2.3.4</programlisting>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<para>/etc/shorewall/rules:</para>
|
<para>/<filename>etc/shorewall/rules</filename>:</para>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<programlisting>#ACTION SOURCE DEST PROTO DEST SOURCE
|
<programlisting>#ACTION SOURCE DEST PROTO DEST SOURCE
|
||||||
@ -243,14 +318,14 @@ ACCEPT Z1:1.2.3.4 $FW 47</programlisting>
|
|||||||
<section>
|
<section>
|
||||||
<title>OpenVPN</title>
|
<title>OpenVPN</title>
|
||||||
|
|
||||||
<para>/etc/shorewall/tunnels:</para>
|
<para><filename>/etc/shorewall/tunnels</filename>:</para>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<programlisting>#TYPE ZONE GATEWAY GATEWAY ZONE
|
<programlisting>#TYPE ZONE GATEWAY GATEWAY ZONE
|
||||||
openvpn:P Z1 1.2.3.4</programlisting>
|
openvpn:P Z1 1.2.3.4</programlisting>
|
||||||
</blockquote>
|
</blockquote>
|
||||||
|
|
||||||
<para>/etc/shorewall/rules:</para>
|
<para><filename>/etc/shorewall/rules</filename>:</para>
|
||||||
|
|
||||||
<blockquote>
|
<blockquote>
|
||||||
<programlisting>#ACTION SOURCE DEST PROTO DEST SOURCE
|
<programlisting>#ACTION SOURCE DEST PROTO DEST SOURCE
|
||||||
|
@ -15,7 +15,7 @@
|
|||||||
</author>
|
</author>
|
||||||
</authorgroup>
|
</authorgroup>
|
||||||
|
|
||||||
<pubdate>2004-12-16</pubdate>
|
<pubdate>2004-12-18</pubdate>
|
||||||
|
|
||||||
<copyright>
|
<copyright>
|
||||||
<year>2001-2004</year>
|
<year>2001-2004</year>
|
||||||
@ -127,6 +127,11 @@
|
|||||||
<para>The firewall system itself runs a DHCP server that serves the local
|
<para>The firewall system itself runs a DHCP server that serves the local
|
||||||
network.</para>
|
network.</para>
|
||||||
|
|
||||||
|
<para>I have one system (Roadwarrior, 206.124.146.179) outside the
|
||||||
|
firewall. This system, which runs Debian Sarge (testing) is used for
|
||||||
|
roadwarrior IPSEC testing and for checking my firewall "from the
|
||||||
|
outside".</para>
|
||||||
|
|
||||||
<para>All administration and publishing is done using ssh/scp. I have a
|
<para>All administration and publishing is done using ssh/scp. I have a
|
||||||
desktop environment installed on the firewall but I am not usually logged
|
desktop environment installed on the firewall but I am not usually logged
|
||||||
in to it. X applications tunnel through SSH to Ursa. The server also has a
|
in to it. X applications tunnel through SSH to Ursa. The server also has a
|
||||||
|
Loading…
x
Reference in New Issue
Block a user