IPSec with FreeSWan as the server and SSH Sentinel 1.31 as the windows
client

Here is a working config for road warrior:

1.) I used PSK (or Pre-Shared Secret)

2.) Suse Linux 8.0 PRo

This is my LAB IPSec setup:

Windows 2000 Pro
Ip address 192.168.0.50 or private address , I have SSH Sentinel loaded on
my Win2K


Linux Box (Suse) Freeswan 1.96 complied (two nic)
Ip address 192.168.0.45  255.255.255.0  eth0
Ip address 10.1.1.1      255.255.255.0  eth1  (10.1.1.0/255.255.255.0)


Windows 98se Computer sitting on the eth1 segment
ip address 10.1.1.2  255.255.255.0
Gateway    10.1.1.1
----------------------------------------------------------------

I had to setup routing on my Linux box, I used this

echo 1 > /proc/sys/net/ipv4/ip_forward
iptables -t nat -A POSTROUTING -o eth0  -j MASQUERADE
iptables -A FORWARD  -j ACCEPT


-------------------------------------------------------

Firewall out on my eth0 or my so called WAN interface...is also works


iptables -I INPUT -i eth0 -p udp  --sport 67      --dport 68 -j ACCEPT
iptables -I INPUT -i eth0 -p tcp  --sport 1024:   --dport 1723 -j ACCEPT
iptables -I INPUT -i eth0 -p udp  --sport 500     --dport 500 -j ACCEPT
iptables -I INPUT -i eth0 -p udp                  --dport 5050 -j ACCEPT
iptables -I INPUT -i eth0 -p esp   -j ACCEPT
iptables -I INPUT -i eth0 -p ah    -j ACCEPT
iptables -I INPUT -i eth0 -p 47    -j ACCEPT
iptables -P INPUT DROP

----------------------------------------------------------------------------
---



I was now able to ping from 10.1.1.2 to 192.168.0.50 when I brought up the
tunnel.



Here is my IPSec config


config setup
       interfaces="ipsec0=eth0"
       klipsdebug=none
       plutodebug=none
       plutoload=%search
       plutostart=%search
       uniqueids=yes

conn  %default
       keyingtries=1
       authby=secret


conn  tunnel-one
      type=tunnel
      left=192.168.0.45 ( my eth0 interface)
      leftnexthop=
      leftsubnet=10.1.1.0/255.255.255.0  (this is my eth1 segment)
      right= %any         (this is my windows 2000 pro box, with SSH
Sentinel)
      keyexchange =ike
      ikelifetime= 240m
      pfs = yes
      keylife = 1h
      #rightsubnet = /255.255.255.0
      rightnexthop =
      compress = no
      auto = add



------------------------------------------


Here is my ipsec.secrets config

192.168.0.45 %any: PSK "junk"


-------------------------------------------


Here is a map of my network


Win2KPro    -----------> Linux (Ipsec)
192.168.0.50             192.168.0.45 eth0 (left)
road warrior             10.1.1.1 eth1
(right)                  (10.1.1.0) (leftsubnet) ------> window98se
(10.1.1.2) gateway 10.1.1.1


192.168.0.50 could be a DHCP or a private address , I just use that address
in my lab.
I used a ethernet crossover cable between my W2K pro and my Linux box.
Remember that you must use
the same pre-shared key "junk" when you configure SSH Sentinel.  There is a
section at the SSH Sentinel
site that shows you how configure SSH Sentinel.



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to