Sorry for the message form.
Here is better :
http://pastebin.com/dxTrasGM 

Thank you for your help. 

Or : 

        *

I'm using an OpenBSD Gateway running : 
        * 
OpenBSD vpn.area.lan 5.1
GENERIC.MP#214 i386 
        * 

        * 
So what i'm trying to build: 
        *

<10.10.0.0/24>----rl0----[obsd]----rl1----(INTERNET)----(win7 with
dynamic IP) 
        * 

        * 
IP Address (INTERNET, rl1) : AA.BB.CC.DD 
        *

Dynamic IP for win7 : RR.WW.RR.WW 
        * 

        * 
I start the ikev2 vpn (it
stop on password and user 
        * 
verification) and have this on the OBSD
gateway : 
        * 

        * 
tail -f /var/log/daemon : 
        * 
Apr 2 12:13:22 vpn
iked[19494]: ikev2_recv: IKE_SA_INIT from initiator RR.WW.RR.WW:59317 to
AA.BB.CC.DD:500 policy 'win7', 528 bytes 
        * 
Apr 2 12:13:22 vpn
iked[19494]: ikev2_msg_send: IKE_SA_INIT fromAA.BB.CC.DD:500 to
RR.WW.RR.WW:59317, 325 bytes 
        * 
Apr 2 12:13:22 vpn iked[19494]:
ikev2_recv: IKE_AUTH from initiator RR.WW.RR.WW:58268 to
AA.BB.CC.DD:4500 policy 'win7', 1164 bytes 
        * 

        * 
Any idea ? 
        *

Thank you very much. 
        * 

        * 
-- OpenBSD Gateway : 
        * 

        * 
rl0
group : lan 
        * 
rl1 group : egress 
        * 

        * 
IP Address (INTERNET,
rl1) : AA.BB.CC.DD 
        * 

        * 
iked.conf: 
        * 
user "bandit" "123456" 

        * 
ikev2 "win7" passive esp from 10.10.3.0/24 to 10.10.0.0/24 
        * 

local any peer any 
        * 
 eap "mschap-v2" 
        * 
 config address
10.10.3.7 
        * 
 config name-server 10.10.0.51 
        * 
 tag "$name-$id" 

        * 

        * 
pf.conf: 
        * 
set skip on {lo,enc0} 
        * 
set block-policy
drop 
        * 
match out on egress from lan:network to any nat-to egress 

        * 
block log all 
        * 
pass out 
        * 
pass in on egress proto esp 
        *

pass in on egress proto udp to port 500 
        * 
pass in on egress proto
udp to port 4500 
        * 
pass in on egress proto tcp to port 22 
        * 
pass
in on lan inet from lan:network to any 
        * 

        *

net.inet.ip.forwarding 
        * 
= 1 
        * 

        * 
What i have done about
certificates : 
        * 
ikectl ca vpn create 
        * 
ikectl ca vpn
certificate AA.BB.CC.DD create 
        * 
ikectl ca vpn install 
        * 
ikectl
ca vpn certificate AA.BB.CC.DD install 
        * 
ikectl ca vpn certificate
AA.BB.CC.DD export 
        * 

        * 
I put the certs exported on the win7
workstation. 
        * 
And then run iked. 
        * 

        * 
-- Win7 workstation 

        * 
Import certificate in mmc snap (Certificates/Authority) 

Reply via email to