Date: Thu, 12 Sep 2002 14:10:27 -0400 From: Mike Tancsa <mike@sentex.net> To: security@freebsd.org Subject: Creating an IPSEC tunnel between a netopia 910 and FreeBSD (FAQ submission) Message-ID: <5.1.1.6.0.20020912114230.01f2aba0@marble.sentex.ca>
next in thread | raw e-mail | index | archive | help
Again, I saw this question asked in my searches through google and mention
of it on the vendor website, but I had not seen the answer.
Question: How do I setup a netopia 910R router to do an IPSEC ESP tunnel to
a FreeBSD box.
An Answer:
I was a little disappointed with the throughput results, but never the less
it does work.
My setup was as follows
workstation------910R----........---FreeBSDIPSec----workstation
172.16.0.1/24 96.0.0.1 1.1.1.1 10.0.0.2/24
172.16.0.2/24 10.0.0.1/24
Note, with this setup, I was only able to get 180Kbps using DES and under
100Kbps using 3des as the netopia maxed out its little CPU. I called
netopia support and spoke with a Ben. He tried 2 units back to back and
got roughly the same numbers, so that does seem to be the limiting factor.
Anyways, the setup
On the netopia,
Go to the quick menus
Ike Phase 1 config
Add IKE profile
Call it FreeBSDIKE
Mode=main
Auth method, Shared Sec. with the key faqdemo, enc = des, Hash=md5, Group 2.
Under Advanced, Negotiation = normal, SA=Newest, Allow Dangling=Yes, Phase
1 SA Lifetime=28000,Send Initial Contact Message:Yes, Include Vendor ID
Payload:Yes,Independent Phase 2 Re-keys: Yes,Strict Port Policy:No
Back up to quick menu
Add Connection Profile
Profile name = FreeBSD
Prof enabable=Yes
Encaps= IPSEC
Go to Encaps options
Key management = IKE
IKE Phase 1 Profile, choose the one you created before (FreeBSDIKE)
Encapse = ESP
ESP Transform = DES
ESP Authtransform = HMAC-MD5-96
Up one level and down to IP Profile Params.
Remote Tunnel Endpoint: 1.1.1.1
Remote Member Format... Subnet
Remote Member Address: 10.0.0.0
Remote Member Mask: 255.255.255.0
Local Member Format... Subnet
Local Member Address: 172.16.0.0
Local Member Mask: 255.255.255.0
Address Translation Enabled: No
Filter Set... <<None>>
Remove Filter Set
NetBIOS Proxy Enabled No
On the FreeBSD side of things,
setkey -F
setkey -FP
setkey -c <<EOF
spdadd 10.0.0.0/24 172.16.0.0/24 any -P out ipsec
esp/tunnel/1.1.1.1-96.0.0.1/use ;
spdadd 172.16.0.0/24 10.0.0.0/24 any -P in ipsec
esp/tunnel/96.0.0.1-1.1.1.1/use ;
EOF
And the racoon.conf entry.
remote 96.0.0.1
{
exchange_mode main;
doi ipsec_doi;
#situation identity_only;
my_identifier address 1.1.1.1;
#generate_policy off;
nonce_size 16;
lifetime time 28000 sec; # sec,min,hour
initial_contact on;
support_mip6 on;
proposal_check obey; # obey, strict or claim
proposal {
encryption_algorithm des;
hash_algorithm md5;
authentication_method pre_shared_key ;
dh_group 2 ;
}
}
sainfo anonymous
{
pfs_group 1;
lifetime time 60 sec;
encryption_algorithm des ;
authentication_algorithm hmac_md5;
compression_algorithm deflate;
}
---Mike
--------------------------------------------------------------------
Mike Tancsa, tel +1 519 651 3400
Sentex Communications, mike@sentex.net
Providing Internet since 1994 www.sentex.net
Cambridge, Ontario Canada www.sentex.net/mike
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.1.6.0.20020912114230.01f2aba0>
