FireBrick IPsec (Road Warrior Howto): Difference between revisions
m (→Android setup) |
m (→Windows setup) |
||
Line 8: | Line 8: | ||
== Windows setup == |
|||
The following instructions were tested on a Windows 7 system. Setup on other versions of Windows will be similar, but the |
|||
dialogs and messages seen may not be exactly as shown here. |
|||
The CA certificate needs to be installed on the Windows machine using an account with administrator privileges. |
|||
First, download the CA certificate in DER format to the Windows machine. The easiest way to do this is to |
|||
use a browser to visit your FireBrick certificate management page, and click on the Download DER link corresponding |
|||
to the CA certificate. Save it in a suitable location on the Windows machine. Do not attempt to execute it or |
|||
install it just yet. Note that you must download the certificate in DER format - windows machines do not |
|||
recognize PEM format. The file will be given the <tt>.crt</tt> extension. |
|||
===Start the Windows Certificate Manager=== |
|||
The Windows certificate manager should now be started up as follows: |
|||
# Using a command window, or the Start|Run box, execute the command <tt>mmc</tt> (and answer Yes when asked if you want to allow changes). |
|||
# Select Add/Remove Snap-in from the File menu, choose the Certificates snap-in and add it to selected snap-ins. |
|||
# A dialog will ask if you want to manage certificates for the user account, a service account or computer account. You must select <tt>Computer Account</tt> here in order to manage the system certificates. If you do not select this, or you start up the certificate manager in some other way (eg using <tt>certmgr.msc</tt>, you will not be able to install the certificate system-wide, and the Windows IPsec subsystem will not find it. |
|||
# Another dialog will ask which computer to manage. Choose <tt>Local computer</tt>. |
|||
# Finally click on <tt>OK</tt> to start the certificate manger snap-in. |
|||
===Install the CA certificate=== |
|||
To install the certificate: |
|||
# Double-click on <tt>Certificates (Local Computer)</tt> in the left pane, to open the certificate store names, and then right-click on <tt>Trusted Root Certification Authorities</tt> in the centre pane. |
|||
# Select <tt>All Tasks</tt> and then <tt>Import...</tt> |
|||
# Click <tt>Next</tt> and browse to where you saved the CA .crt file. |
|||
# Click <tt>Next</tt> and check that the certificate will be placed in the trusted root store. |
|||
# Click <tt>Next</tt> again, and then <tt>Finish</tt>. |
|||
There - wasn't that easy! Thank you Microsoft. |
|||
===Set up the VPN Network Connection=== |
|||
Now you need to set up the IPsec network connection details. |
|||
# Go to Control Panel and select <tt>Set up a new connection or network</tt>. |
|||
# Select <tt>Connect to a Network</tt> and choose <tt>Connect to a Workplace</tt>. |
|||
# Click <tt>Next</tt>, select <tt>No, create a new connecton</tt>, <tt>Next</tt> |
|||
# Choose <tt>Use my Internet connection</tt> |
|||
# Insert the server name (eg <tt>server.example.com</tt>), and choose whatever you like to name the connection (Destination name). |
|||
# Select <tt>Don't connect now; ...</tt> |
|||
# You don't need to enter User name and password as it will ask again later |
|||
# Click on <tt>Create</tt> and then <tt>Close</tt> (Don't connect yet!) |
|||
# Back at the Network and Sharing Center dialog, select <tt>Connect to a network</tt> |
|||
# Right-click the connection you have just created in the pop-up box and select <tt>Properties</tt> |
|||
# Select the <tt>Security</tt> tab, and change the Type of VPN to IKEv2. |
|||
# EAP-MSCHAPv2 should already be selected. |
|||
#Click <tt>OK</tt> |
|||
You should now be ready to connect - select <tt>Connect to a network</tt> again, click |
|||
on the connection and choose <tt>Connect</tt>. If not already saved, you'll use the username and password as set up in the EAP Identity on the FireBrick (in this example, we had set up a user of fred with a password) |
|||
You probably want to change the type of network to <tt>Work Network</tt> after the |
|||
connection establishes. |
|||
[[Category:FireBrick IPsec]] |
[[Category:FireBrick IPsec]] |
Revision as of 15:39, 30 July 2015
FireBrick Road Warrior IPsec
The FireBrick manual goes into some detail on configuring IPsec. This page contains specific examples for a simple scenario where you have one or more clients devices - iPhones iPads, Android phones/tablets or Windows machines, and a FireBrick in your home or office, and you would like to VPN (using IPsec) to the FireBrick and have an IP address on your LAN.
In this example we are assuming you can allocate some IP addresses on you LAN. You do this by picking a range of addresses and setting up a roaming-pool (see below). You need to ensure the IP range does not clash with devices on the LAN and is not in the DHCP ranges that could allocate to the LAN. You also need to set proxy-arp on the LAN interface settings to allow communications to other devices on your LAN. Alternatively you could set private IP addresses in the pool and set the nat setting. You should probably also consider firewalling rules for traffic to/from IPsec connections.