CraigBox (updated 18/7/03)
There are plenty of
pages on the web that tell you how to create a IPSec VPN between Linux and a Cisco PIX 501 (entry level firewalling product), however none of them tell you enough, or why half the settings are as they are. 1?
The best example I've found so far is http://www.johnleach.co.uk/documents/freeswan-pix/freeswan-pix.html (very recent page - good work Google!). However, it only specifies configs, which in my case, weren't enough to get everything working. Go read John's page and then here are some interesting notes.
apt-get install freeswan
Here is my FreeS/WAN configuration and explanation.
config setup
interfaces=%defaultroute klipsdebug=none plutodebug=none plutoload="tunnelipsec"
conn tunnelipsec
type= tunnel left= 202.0.45.170 leftnexthop= 202.0.45.190 leftsubnet= 10.69.1.0/24 right= 203.97.9.162 rightnexthop= 203.97.9.161 rightsubnet= 10.7.3.0/24 esp= 3des-md5-96 keyexchange= ike pfs= no auto= add
The interfaces line tells ipsec to use the same IP address as the interface that the default route is on: this is similar to "ipsec0:eth0" that some configurations recommend, but this works. When setting your connection up, you might want to set klips (Kernel IP Security) and pluto (the IPSEC keying Daemon) logging to "all".
The connection is named tunnelipsec and is of type (ESP) tunnel.
Your Linux machine is the left end of a network that will eventually look like this:
10.69.1.0/24===202.0.45.170---202.0.45.190...203.97.9.161---203.97.9.162===10.7.3.0/24
You need to specify the next hop in either direction (a silly thing perhaps, but you can specify %defaultroute etc again - it doesn't hurt to fill them in though.)
esp sets the ESP parameters. This must be the same encryption and hashing algorithm you specify in your isakmp lines in the PIX config below.
keyexchange sets IKE (Internet Key Exchange) and can be set to nothing else.
pfs is PerfectForwardingSecrecy?. This needs to be set 'no' unless you specifically enable it on the PIX end2?. When ipsec starts, automatically add this connection to pluto (but this will not automatically create the tunnel.)
202.0.45.170 203.97.9.162: PSK "secret"
It contains the pre-shared secret, a password for the connection that is known at both ends.
On your external interface, enable port 500 UDP (the ISAKMP port), and protocols 50 and 51 (IPSEC ESP and AH).
Log into, enable and configuration mode.
access-list NO-NAT permit ip 10.7.3.0 255.255.255.0 10.69.1.0 255.255.255.0
access-list FREESWAN-VPN permit ip 10.7.3.0 255.255.255.0 10.69.1.0 255.255.255.0
nat (inside) 0 access-list NO-NAT
sysopt connection permit-ipsec
crypto ipsec transform-set myset esp-3des esp-md5-hmac
crypto map mymap 10 ipsec-isakmp crypto map mymap 10 match address FREESWAN-VPN crypto map mymap 10 set peer 202.0.45.170 crypto map mymap 10 set transform-set myset crypto map mymap interface outside
isakmp enable outside isakmp key secret address 202.0.45.170 netmask 255.255.255.255 no-xauth no-config-mode isakmp identity address isakmp policy 5 authentication pre-share isakmp policy 5 encryption 3des isakmp policy 5 hash md5 isakmp policy 5 group 2 isakmp policy 5 lifetime 28800
ipsec auto --up tunnelipsec route add -net 10.7.3.0 netmask 255.255.255.0 dev ipsec0
ping 10.7.3.10 -I 10.69.1.1 3?
There we go - one working FreeS/WAN to Cisco PIX. If you have any questions, contact details are on my Wiki page.
The ipsec0 interface should have the same IP address as the interface through which you contact your default gateway (possibly ppp0). This is how it's meant to be.
Turn logging on (klips/pluto to 'all'). On the PIX, set debug crypto isakmp and debug crypto ipsec. tcpdump(8) ppp0 on your Linux box, or whatever the connection you are duplicating for your ipsec0 interface. Check that traffic is going both ways.
access-list FREESWAN-VPN permit ip 10.7.3.0 255.255.255.0 10.69.1.0 255.255.255.0
will work, where
access-list FREESWAN-VPN permit ip 10.7.3.0 255.255.255.0 host 202.0.45.170
while it appears to do to the same thing, will cause problems at this point when the ISAKMP phase has finished, and the actual establishing of the tunnel begins.
(You might want to use --verbose in the ipsec auto line.)
If after all of this you get pings going out but no responses, see 3?.
Email on these issues are welcome. It took a long time to figure out and if you can get something as a result of this, I'd be happy.
-- CraigBox
1? FreeBSD users, check out http://klub.chip.pl/nolewajk/work/freebsd/FreeBSD-howto.htm
2? You do this by issuing crypto map mymap 10 set pfs group2 (with the correct map name and priority)
3? When you go to ping your tunnel from your Linux box, you will probably ping using the IP address of ipsec0. Your access-list only allowed traffic from 10.69.1/24. Use ping 10.7.3.x -I 10.69.1.x with the IP of your internal interface.
4 pages link to FreeSwanToCiscoPix:
lib/main.php:944: Notice: PageInfo: Cannot find action page