Привет! Я пытался настроить VPN для удалённых пользователей и ничего не вышло. WAN у меня настроен через PPPOE с фиксированным IP-адресом. Вот команды, которые я использовал:
set vpn ipsec auto-firewall-nat-exclude disable
set vpn ipsec esp-group default compression disable
set vpn ipsec esp-group default lifetime 3600
set vpn ipsec esp-group default mode transport
set vpn ipsec esp-group default pfs dh-group21
set vpn ipsec esp-group default proposal 1 encryption aes256
set vpn ipsec esp-group default proposal 1 hash sha1
set vpn ipsec ike-group default dead-peer-detection action clear
set vpn ipsec ike-group default dead-peer-detection interval 30
set vpn ipsec ike-group default dead-peer-detection timeout 60
set vpn ipsec ike-group default lifetime 3600
set vpn ipsec ike-group default proposal 1 dh-group 21
set vpn ipsec ike-group default proposal 1 encryption aes256
set vpn ipsec ike-group default proposal 1 hash sha1
set vpn ipsec ipsec-interfaces interface eth0
set vpn ipsec nat-networks allowed-network 0.0.0.0/0
set vpn ipsec nat-traversal enable
set vpn l2tp remote-access authentication local-users username MYUSER password MYPASS
set vpn l2tp remote-access authentication mode local
set vpn l2tp remote-access client-ip-pool start 192.168.254.1
set vpn l2tp remote-access client-ip-pool stop 192.168.254.200
set vpn l2tp remote-access outside-address MY-PUBLIC-IP
set vpn l2tp remote-access dns-servers server-1 8.8.8.8
set vpn l2tp remote-access dns-servers server-2 8.8.4.4
set vpn l2tp remote-access ipsec-settings authentication mode pre-shared-secret
set vpn l2tp remote-access ipsec-settings authentication pre-shared-secret MYSECRET
set vpn l2tp remote-access ipsec-settings ike-lifetime 3600
set vpn l2tp remote-access mtu 1500
set service nat rule 5010 description 'MASQ l2tp remote user vpn to WAN'
set service nat rule 5010 log disable
set service nat rule 5010 outbound-interface eth0
set service nat rule 5010 protocol all
set service nat rule 5010 source address 192.168.254.0/24
set service nat rule 5010 type masquerade
set service dns forwarding options listen-address=192.168.1.254
set firewall name WAN_LOCAL rule 100 action accept
set firewall name WAN_LOCAL rule 100 description 'allow IKE, L2TP, NAT-T for remote vpn'
set firewall name WAN_LOCAL rule 100 destination port 500,1701,4500
set firewall name WAN_LOCAL rule 100 protocol udp
set firewall name WAN_LOCAL rule 101 action accept
set firewall name WAN_LOCAL rule 101 description 'allow ESP for remote vpn'
set firewall name WAN_LOCAL rule 101 log enable
set firewall name WAN_LOCAL rule 101 protocol esp
ПРИМЕЧАНИЕ: в конфигурации я поменял своё имя пользователя, пароль и публичный IP.
Когда я смотрел логи через tail -f /var/log/messages, получил ошибку:
но никакое соединение не было авторизовано с policy=PSK.
Проверял с iPhone — и просто не подключается. Буду признателен за любую помощь.
И, пожалуйста, если можете, дайте команды, а не JSON 😀
Спасибо!
Kash
set vpn ipsec auto-firewall-nat-exclude disable
set vpn ipsec esp-group default compression disable
set vpn ipsec esp-group default lifetime 3600
set vpn ipsec esp-group default mode transport
set vpn ipsec esp-group default pfs dh-group21
set vpn ipsec esp-group default proposal 1 encryption aes256
set vpn ipsec esp-group default proposal 1 hash sha1
set vpn ipsec ike-group default dead-peer-detection action clear
set vpn ipsec ike-group default dead-peer-detection interval 30
set vpn ipsec ike-group default dead-peer-detection timeout 60
set vpn ipsec ike-group default lifetime 3600
set vpn ipsec ike-group default proposal 1 dh-group 21
set vpn ipsec ike-group default proposal 1 encryption aes256
set vpn ipsec ike-group default proposal 1 hash sha1
set vpn ipsec ipsec-interfaces interface eth0
set vpn ipsec nat-networks allowed-network 0.0.0.0/0
set vpn ipsec nat-traversal enable
set vpn l2tp remote-access authentication local-users username MYUSER password MYPASS
set vpn l2tp remote-access authentication mode local
set vpn l2tp remote-access client-ip-pool start 192.168.254.1
set vpn l2tp remote-access client-ip-pool stop 192.168.254.200
set vpn l2tp remote-access outside-address MY-PUBLIC-IP
set vpn l2tp remote-access dns-servers server-1 8.8.8.8
set vpn l2tp remote-access dns-servers server-2 8.8.4.4
set vpn l2tp remote-access ipsec-settings authentication mode pre-shared-secret
set vpn l2tp remote-access ipsec-settings authentication pre-shared-secret MYSECRET
set vpn l2tp remote-access ipsec-settings ike-lifetime 3600
set vpn l2tp remote-access mtu 1500
set service nat rule 5010 description 'MASQ l2tp remote user vpn to WAN'
set service nat rule 5010 log disable
set service nat rule 5010 outbound-interface eth0
set service nat rule 5010 protocol all
set service nat rule 5010 source address 192.168.254.0/24
set service nat rule 5010 type masquerade
set service dns forwarding options listen-address=192.168.1.254
set firewall name WAN_LOCAL rule 100 action accept
set firewall name WAN_LOCAL rule 100 description 'allow IKE, L2TP, NAT-T for remote vpn'
set firewall name WAN_LOCAL rule 100 destination port 500,1701,4500
set firewall name WAN_LOCAL rule 100 protocol udp
set firewall name WAN_LOCAL rule 101 action accept
set firewall name WAN_LOCAL rule 101 description 'allow ESP for remote vpn'
set firewall name WAN_LOCAL rule 101 log enable
set firewall name WAN_LOCAL rule 101 protocol esp
ПРИМЕЧАНИЕ: в конфигурации я поменял своё имя пользователя, пароль и публичный IP.
Когда я смотрел логи через tail -f /var/log/messages, получил ошибку:
но никакое соединение не было авторизовано с policy=PSK.
Проверял с iPhone — и просто не подключается. Буду признателен за любую помощь.
И, пожалуйста, если можете, дайте команды, а не JSON 😀
Спасибо!
Kash
