On Mon, 6 Feb 2006 23:49:50 +0000 (UTC), Christian Weisgerber wrote:

>Christian Weisgerber <[EMAIL PROTECTED]> wrote:
>
>> Okay, this is as good an opportunity as any to write down what I
>> did to my wireless a while ago:
>
>Meanwhile, ipsecctl has gained support for pre-shared key authentication.
>So in 3.9, things are simpler still:
>
>Configure dhcpd on the gateway (172.16.1.1) to always give the same
>address (172.16.1.99) to my laptop, based on its MAC address.
>
>Start up "isakmpd -K" on both machines.
>No isakmpd configuration.  None.
>
>On the gateway, create a one-line /etc/ipsec.conf:
>
>ike esp from any to 172.16.1.99 psk "secretpassphrase"
>
>On the laptop, create a one-line /etc/ipsec.conf:
>
>ike esp from ral0 to any peer 172.16.1.1 psk "secretpassphrase"
>
>Run "ipsecctl -f /etc/ipsec.conf" on both machines.
>Congratulations, you have set up IPsec.
>
>Repeat the same procedure for additional wireless clients.  Wait a
>moment, you say, does that mean that two hosts on the wireless will
>talk to each other through the IPsec gateway rather than directly?
>That's right, but in infrastructure mode, i.e., if you use an access
>point, the packets already cross the air twice (host 1 -> AP ->
>host 2).  Looping them through the gateway doesn't add appreciable
>overhead.
>
>The wireless clients only need to talk ISAKMP (to authenticate and
>renegotiate keys) and ESP to the gateway.  Block everything else
>on the gateway:
>
>block return on $wlan all
>pass in  on $wlan proto esp to $wlan keep state
>pass out on $wlan proto esp from $wlan keep state
>pass in  on $wlan proto udp to $wlan port isakmp keep state
>pass out on $wlan proto udp from $wlan port isakmp keep state
>
>Actually, there is one more thing, and it's important.  With the
>setup above, you will run into MTU issues with hosts behind the
>gateway.  The symptom is that bulk data transfers _to_ the wireless
>host will be redicuously slow or stall completely.  There must be
>a better way, but in the meantime TCP MSS clamping on the gateway
>works:
>
>scrub in on enc0 all max-mss 1318
>
>As far as pf is concerned, all decoded IPsec traffic is from the
>enc0 interface.  If you use the "antispoof" directive, make sure
>to add a pass rule for traffic on enc0.
>

I see no reason why you should be able to answer this question as I
don't expect you to know about how windows does things but on the
off-chance that you or a kind lurker does know:

Is there a way to let a client using XP connect as simply as that?
Alternatively, as windows is rarely simple, a way to let XP connect to
the same setup?

Thanks,
Rod/

>-- 
>Christian "naddy" Weisgerber                          [EMAIL PROTECTED]
>
>

>From the land "down under": Australia.
Do we look <umop apisdn> from up over?

Do NOT CC me - I am subscribed to the list.
Replies to the sender address will fail except from the list-server.

Reply via email to