|
| 1 | ++++ |
| 2 | +date = "2016-06-01T13:23:19-07:00" |
| 3 | +draft = true |
| 4 | +title = "openswan connections to aws vpn" |
| 5 | + |
| 6 | ++++ |
| 7 | + |
| 8 | +# hi |
| 9 | + |
| 10 | +```yaml |
| 11 | +## general configuration parameters ## |
| 12 | + |
| 13 | +config setup |
| 14 | + plutodebug=all |
| 15 | + plutostderrlog=/var/log/pluto.log |
| 16 | + protostack=netkey |
| 17 | + nat_traversal=yes |
| 18 | + virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12,!$RIGHT_SUBNET |
| 19 | + ## disable opportunistic encryption in Red Hat ## |
| 20 | + oe=off |
| 21 | + |
| 22 | +conn AWS |
| 23 | + type=tunnel |
| 24 | + authby=secret |
| 25 | + auto=start |
| 26 | + ike=aes128-sha1 |
| 27 | + ikelifetime=28800s |
| 28 | + salifetime=3600s |
| 29 | + dpddelay=10 |
| 30 | + dpdtimeout=60 |
| 31 | + dpdaction=restart_by_peer |
| 32 | + rekey=yes |
| 33 | + keyingtries=%forever |
| 34 | + ## phase 1 ## |
| 35 | + keyexchange=ike |
| 36 | + ## phase 2 ## |
| 37 | + phase2=esp |
| 38 | + phase2alg=aes128-sha1 |
| 39 | + pfs=yes |
| 40 | + left=%defaultroute |
| 41 | + leftid=52.196.123.135 # Elastic/public IP of *this* instance. Also this is specfied as the customer gateway IP address https://ap-northeast-1.console.aws.amazon.com/vpc/home?region=ap-northeast-1#cgws |
| 42 | + # This could be anything - it's a way to identify itself when looking up the PSK in the secrets file |
| 43 | + leftnexthop=%defaultroute |
| 44 | + leftsubnet=10.0.0.0/24 # Private subnet where this instance resides |
| 45 | + right=52.196.160.248 # Public IP address of the other side (AWS VPN Tunnel endpoint #1) |
| 46 | + rightsubnet=10.1.0.0/24 # Private CIDR range for the AWS Subnet |
| 47 | + #leftsourceip=10.0.0.185 # May not be necessary - need to test, but this is the private IP of this instance |
| 48 | +``` |
| 49 | + |
| 50 | +dflkj *hello* **adf** |
| 51 | + |
| 52 | +Other things to note: |
| 53 | + |
| 54 | +If deploying the VPN server on AWS: |
| 55 | + |
| 56 | + * Disable source ip check |
| 57 | + * Specify the VPN instance as the route for the foreign CIDR block in the source subnets |
| 58 | + * Make sure to open all TCP/UDP/ICMP traffic from the "local" subnet's SG to the SG of the VPN |
| 59 | + * Flow logs are your friend! |
| 60 | + |
| 61 | +1. hi |
| 62 | +2. there |
| 63 | +3. wtf |
| 64 | + |
| 65 | +https://clauseriksen.net/2011/02/02/ipsec-on-debianubuntu/ |
| 66 | +https://forums.aws.amazon.com/message.jspa?messageID=466186 |
| 67 | +https://docs.openvpn.net/how-to-tutorialsguides/administration/extending-vpn-connectivity-to-amazon-aws-vpc-using-aws-vpc-vpn-gateway-service/ |
| 68 | +http://xmodulo.com/create-site-to-site-ipsec-vpn-tunnel-openswan-linux.html |
0 commit comments