Use this one I made a single changes here......
Note:
I using the Linux:/# as the linux command prompt below
IPSec with FreeSWan as the server and SSH Sentinel 1.31 as the windows
client
Here is a working config for road warrior:
1.) I used PSK (or Pre-Shared Secret)
2.) Suse Linux 8.0 PRo
This is my LAB IPSec setup:
Windows 2000 Pro
Ip address 192.168.0.50 or private address , I have SSH Sentinel loaded on
my Win2K
Linux Box (Suse) Freeswan 1.96 complied (two nic)
Ip address 192.168.0.45 255.255.255.0 eth0
Ip address 10.1.1.1 255.255.255.0 eth1 (10.1.1.0/255.255.255.0)
Windows 98se Computer sitting on the eth1 segment
ip address 10.1.1.2 255.255.255.0
Gateway 10.1.1.1
I had to setup routing on my Linux box, I used this(note you can't have
ipchains running
at the same time as iptables, you can only run one or another)
echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
iptables -A FORWARD -j ACCEPT
-------------------------------------------------------
Firewall out on my eth0 or my so called WAN interface...is also works
iptables -I INPUT -i eth0 -p tcp --sport 1024: --dport 1723 -j ACCEPT
iptables -I INPUT -i eth0 -p udp --sport 67 --dport 68 -j ACCEPT
iptables -I INPUT -i eth0 -p udp --sport 500 --dport 500 -j ACCEPT
iptables -I INPUT -i eth0 -p udp --dport 5050 -j ACCEPT
iptables -I INPUT -i eth0 -p esp -j ACCEPT
iptables -I INPUT -i eth0 -p ah -j ACCEPT
iptables -I INPUT -i eth0 -p 47 -j ACCEPT
iptables -P INPUT DROP
----------------------------------------------------------------------------
---
I was now able to ping from 10.1.1.2 to 192.168.0.50 when I brought up the
tunnel.
----------------------------------------------------------------------------
-
Here is my IPSec config
config setup
interfaces="%defaultroute" or "ipsec0=eth0" or "ipsec0=ppp0"
klipsdebug=none
plutodebug=none
plutoload=%search
plutostart=%search
uniqueids=yes
conn %default
keyingtries=1
authby=secret
conn tunnel-one
type=tunnel
left=192.168.0.45 or "%defaultroute" ---> ( my eth0 interface)
leftnexthop=
leftsubnet=10.1.1.0/255.255.255.0 --> (this is my eth1 segment)
right= %any ---> (this is my windows 2000 pro box, with SSH Sentinel)
keyexchange =ike
ikelifetime= 240m
pfs = yes
keylife = 1h
#rightsubnet = /255.255.255.0
rightnexthop =
compress = no
auto = add
------------------------------------------
Here is my ipsec.secrets config
192.168.0.45 %any: PSK "junk"
-------------------------------------------
Here is a map of my network
Win2KPro -----------> Linux (Ipsec)
192.168.0.50 192.168.0.45 eth0 (left)
road warrior 10.1.1.1 eth1
(right) (10.1.1.0) (leftsubnet) ------> window98se
(10.1.1.2) gateway 10.1.1.1
192.168.0.50 could be a DHCP or a private address , I just use that address
in my lab.
I used a ethernet crossover cable between my W2K pro and my Linux box.
Remember that you must use
the same pre-shared key "junk" when you configure SSH Sentinel. There is a
section at the SSH Sentinel site
that shows you how configure SSH Sentinel for pre-share key.
-------------------------------------------------------------
Installing FressSWAN
I would complete these steps from Xwindows, you will need to run ,make
config (command line only)
or make xconfig (which is a gui way of selecting the kernel options)
1.) Install Kernel source code first (2.4.18)
2.) Install FreeSwan from the Suse Cd
3.) cd/usr/src/ [enter]
4.) cd kernel-modules [enter]
5.) cd zz_freeswan [enter]
6.) make menugo [enter] The screen should start scrolling with kernel info
7.) then cd into this directory, cd/usr/src/linux then run make xconfig
you should see the Liunx Kernel Configuration screen.
8.) Click under networking options
9.) Scroll to the bottom, you should see right after the Network testing all
the IPSec section,if
you don't, you will need to step back to option 5 and repeat 5,6,7.
10.)I use the default options(IPsec section) check, I would not change
anything here
11.) once everything looks good in the kernel config , then click your wany
back using the main menu button.
12.) Click save and exit button
13.)Then a box will appear Kernel build instructions and click OK
14.)The Menu box will disapear and drop you the command line.
15.)now do a, make dep [enter] (should take a few mins)
16.)now do a, make clean [enter] (should take a few seconds)
17.)now do a, make bzImage [enter] ( this could take awhile)
18.)now do a, make modules [enter] (this will take a long time,I have a 800
mhz with 512 megs of
Ram and it takes me about 1 hours)
19.)now do a, make modules_install ( few seconds )
20.)now copy the bzImage file which is in this directory
/usr/src/arch/i386/boot and copy it
to /boot
Linux:/#cd /
Linux:/#cp /usr/src/arch/i386/boot/bzImage /boot/bzImage [enter] (note the
letter I is captial and the
rest is lowercase.
21.) Please verify the bzImage image with the date of when you complied the
new kernel.
(my size kernel is about 980,000 kb, about a meg in size)
Linux:/#ls -la [enter]
22.) you will need to enter this directory /etc
Linux:/#cd / (root)
Linux:/#cd /etc
23.) from the # type in
Linux:/#pico lilo.conf [enter]
you will need to add another section at the bottom of this config.
image = /boot/bzImage
label = IPSEC
initrd = /boot/initrd.suse
then save your chages by doing a [alt][x] and say yes
24.)then you need to run one more command, lilo [enter]
Linux:/#lilo [enter]
Then re-boot and select IPSec as your kernel option.
----------------------------------------------------------------------------
----
starting IPSec:
Linux:#cd/ (change to root)
Linux:#cd/usr/lib/ipsec
Linux:# ./setup start ( to start IPSec)
Linux:# ./setup restart (to restart the sevice)
Linux:# ./setup stop (to stop ipsec)
____________________________________________________________________________
__________
Note: make sure from the # and type in ifconfig [enter]
Linux:/#ifconfig
You should see an interface called ipsec0 (tunnel) and it should have the ip
address of either the eth0
in my case or the ppp0 (DSL) interface. every case will differ.
_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list