Vyatta-VPN 6.5R1 V01.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
VYATTA, INC. | Vyatta System VPN REFERENCE GUIDE Introduction to VPN IPsec Site‐to‐Site VPN Virtual Tunnel Interfaces Remote Access VPN OpenVPN Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) COPYRIGHT Copyright © 2005–2012 Vyatta, Inc. All rights reserved. Vyatta reserves the right to make changes to software, hardware, and documentation without notice. For the most recent version of documentation, visit the Vyatta web site at vyatta.com. PROPRIETARY NOTICES Vyatta is a registered trademark of Vyatta, Inc. Hyper‐V is a registered trademark of Microsoft Corporation. VMware, VMware ESX, and VMware server are trademarks of VMware, Inc. XenServer, and XenCenter are trademarks of Citrix Systems, Inc. All other trademarks are the property of their respective owners. RELEASE DATE: October 2012 DOCUMENT REVISION. 6.5R1 v01 RELEASED WITH: 6.5R1 PART NO. A0‐0222‐10‐0016 iii Contents Quick List of Commands . xi List of Examples . xvi Preface . xvii Intended Audience . xviii Organization of This Guide . xviii Document Conventions . xix Vyatta Publications . xx Chapter 1 Introduction to VPN . 1 Types of VPNs . 2 Supported Solutions . 3 Site‐to‐Site with IPsec . 3 Virtual Tunnel Interface. 4 Remote Access Using PPTP . 4 Remote Access Using L2TP and IPsec. 5 Site‐to‐Site and Remote Access Using OpenVPN . 5 Comparing VPN Solutions. 6 PPTP. 7 L2TP/IPsec. 7 Pre‐shared keys (L2TP/IPsec) . 8 X.509 certificates (L2TP/IPsec) . 8 VPNs and NAT . 8 Chapter 2IPsec Site‐to‐Site VPN. 9 IPsec Site‐to‐Site VPN Configuration . 10 IPsec Site‐to‐Site VPN Overview. 10 IPsec Architecture . 11 IPsec Phase 1 and Phase 2. 12 IKE Key Exchange . 13 Encryption Ciphers . 14 Hash Algorithms . 14 Pre‐Shared Keys . 15 Digital Signatures . 16 Diffie‐Hellman Groups . 17 IPsec Modes . 18 VPN 6.5R1 v01 Vyatta iv Perfect Forward Secrecy . 19 Committing VPN Configuration Changes . 19 Configuring a Basic Site‐to‐Site Connection . 20 Configure WEST . 21 Configure EAST . 28 Authenticating with RSA Digital Signatures. 33 Generate a Digital Signature on WEST . 33 Generate a Digital Signature on EAST. 34 Record EAST’s Public Key on WEST. 35 Modify WEST’s Connection to EAST . 36 Record WEST’s Public Key on EAST. 37 Modify EAST’s Connection to WEST . 38 Authenticating with X.509 Certificates . 39 Modify WEST’s Connection to EAST . 40 Modify EAST’s Connection to WEST . 42 Defining a VPN Connection to a Peer with a Dynamic IP Address. 43 Configure WEST . ..