[Openswan Users] Openswan to Fortigate 60B - VPN
Ing. Rodrigo Fernandez
rfernandez_net at yahoo.com.mx
Mon Sep 6 09:58:01 EDT 2010
Ok i had the same problem (i have once more but ill open a new thread for
that) i got my fortigate 60B working with my openswan server in "tunnel
mode", here is the configuration:
OPENSWAN
conn netcafe
auth=esp
authby=secret
auto=start
esp=3des-md5!
ikelifetime=1800s
keyingtries=10
keylife=28800s
left=mydyndns1(openswan)
leftid=192.9.201.254
leftnexthop=192.9.201.254
leftsubnet=192.9.201.0/24
right=mydyndns2(fortigate)
rightid=%any
rightnexthop=10.0.254.254
rightsubnet=10.0.254.0/24
ike=3des-md5!
keyexchange=ike
dpddelay=30
dpdtimeout=120
dpdaction=restart
then in my ipsec.secrets i have:
: PSK "mypassword"
in my ipsec.conf i have:
# Do not set debug options to debug configuration issues!
# plutodebug / klipsdebug = "all", "none" or a combation from below:
# "raw crypt parsing emitting control klips pfkey natt x509 dpd
private"
# eg:
# plutodebug="control parsing"
#
# enable to get logs per-peer
# plutoopts="--perpeerlog"
#
# Again: only enable plutodebug or klipsdebug when asked by a
developer
#
# NAT-TRAVERSAL support, see README.NAT-Traversal
nat_traversal=yes
#forceencaps=yes
# exclude networks used on server side by adding %v4:!a.b.c.0/24
virtual_private=%v4:192.9.201.0/24,%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4
:172.16.0.0/12
# OE is now off by default. Uncomment and change to on, to enable.
oe=off
# which IPsec stack to use. netkey,klips,mast,auto or none
protostack=netkey
plutodebug=all
# Add connections here
include /etc/ipsec.d/*.conf <------------------- (as you see at this point i
use "conf scripts in ipsec.d)
FORTIGATE SIDE:
Phase 1
Remote gateway:dyndns
local interface : wan1
mode: main (id)
auth method: preshared key
encrypt: 3des - md5
DH group = 2
keylife 28800
nat transversal = enable
keep alive frequency : 10
dpd detection = yes
Phase 2
encrypt : 3des - md5
enable pfs
dh group = 2
seconds = 1800
autokey keepalive = yes
quickmode selector =
src: 10.0.254.0/24
port: 0
dst: 192.9.201.0/24
port = 0
protocol = 0
then you need to enable the tunnel in the fortigate firewall as is:
policy::
(FROM INTERNAL TO EXTERNAL)
network-local (10.0.254.0/24) ---------------------------> network openswan
(192.9.201.0/24) -------> encrypt (tunnel: the name of your tunnel)
-----------------> Accept
and wow! you're done and you have your vpn up!
Ing. Rodrigo Fernndez Rodrguez
Field Application Engineer
Tels: 1204-4795
1204-4796
1204-4797 ext. 101
01800-1302233
Cel: 04455-1388-9354
Web: http://www.netcafe-solutions.net <http://www.netcafe-solutions.net/>
Mail: rfernandez at netcafe-solutions.net
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.openswan.org/pipermail/users/attachments/20100906/0623c3a9/attachment.html
More information about the Users
mailing list