VPN REFERENCE GUIDE Introduction to VPN Ipsec Site‐To‐Site VPN Remote Access VPN Openvpn
Total Page:16
File Type:pdf, Size:1020Kb
VYATTA, INC. | Vyatta System VPN REFERENCE GUIDE Introduction to VPN IPsec Site‐to‐Site VPN Remote Access VPN OpenVPN Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) COPYRIGHT Copyright © 2005–2012 Vyatta, Inc. All rights reserved. Vyatta reserves the right to make changes to software, hardware, and documentation without notice. For the most recent version of documentation, visit the Vyatta web site at vyatta.com. PROPRIETARY NOTICES Vyatta is a registered trademark of Vyatta, Inc. VMware, VMware ESX, and VMware server are trademarks of VMware, Inc. XenServer, and XenCenter are trademarks of Citrix Systems, Inc. All other trademarks are the property of their respective owners. RELEASE DATE: March 2012 DOCUMENT REVISION. R6.4 v01 RELEASED WITH: R6.4.0 PART NO. A0‐0222‐10‐0014 iii Contents Quick List of Commands . x List of Examples . xv Preface . xvi Intended Audience . xvii Organization of This Guide . xvii Document Conventions . xviii Vyatta Publications . xix Chapter 1 Introduction to VPN . 1 Types of VPNs . 2 Supported Solutions . 3 Site‐to‐Site with IPsec . 3 Remote Access Using PPTP . 4 Remote Access Using L2TP and IPsec. 4 Site‐to‐Site and Remote Access Using OpenVPN . 5 Comparing VPN Solutions. 6 PPTP. 6 L2TP/IPsec. 7 Pre‐shared keys (L2TP/IPsec) . 8 X.509 certificates (L2TP/IPsec) . 8 VPNs and NAT . 8 Chapter 2IPsec Site‐to‐Site VPN. 9 IPsec Site‐to‐Site VPN Configuration . 10 IPsec Site‐to‐Site VPN Overview. 10 IPsec Architecture . 11 IPsec Phase 1 and Phase 2. 12 IKE Key Exchange . 13 Encryption Ciphers . 14 Hash Algorithms . 14 Pre‐Shared Keys . 15 Digital Signatures . 16 Diffie‐Hellman Groups . 17 IPsec Modes . 18 Perfect Forward Secrecy . 19 VPN R6.4 v01 Vyatta iv Committing VPN Configuration Changes . 19 Configuring a Basic Site‐to‐Site Connection . 20 Configure WEST . 21 Configure EAST . 27 Authenticating with RSA Digital Signatures. 32 Generate a Digital Signature on WEST . 33 Generate a Digital Signature on EAST. 33 Record EAST’s Public Key on WEST. 34 Modify WEST’s Connection to EAST . 35 Record WEST’s Public Key on EAST. 36 Modify EAST’s Connection to WEST . 37 Authenticating with X.509 Certificates . 38 Modify WEST’s Connection to EAST . 39 Modify EAST’s Connection to WEST . 41 Defining a VPN Connection to a Peer with a Dynamic IP Address. 42 Configure WEST . 43 Configure EAST . ..