CentOS 6.3下Strongswan搭建IPSec VPN
时间:2015-08-14 19:17 来源:blog.51cto.com 作者:小水滴Linux
# cp -r cacert.pem /etc/ipsec.d/cacerts/
# cp -r server.crt /etc/ipsec.d/certs/
# cp -r server.key /etc/ipsec.d/private/
# cp -r client.crt /etc/ipsec.d/certs/
# cp -r client.key /etc/ipsec.d/private/
config setup
uniqueids=never
conn iOS_cert
keyexchange=ikev1
fragmentation=yes
left=%defaultroute
leftauth=pubkey
leftsubnet=0.0.0.0/0
leftcert=server.crt
right=%any
rightauth=pubkey
rightauth2=xauth
rightsourceip=10.31.2.0/24
rightcert=client.crt
auto=add
conn android_xauth_psk
keyexchange=ikev1
left=%defaultroute
leftauth=psk
leftsubnet=0.0.0.0/0
right=%any
rightauth=psk
rightauth2=xauth
rightsourceip=10.31.2.0/24
auto=add
conn networkmanager-strongswan
keyexchange=ikev2
left=%defaultroute
leftauth=pubkey
leftsubnet=0.0.0.0/0
leftcert=server.cert.pem
right=%any
rightauth=pubkey
rightsourceip=10.31.2.0/24
rightcert=client.crt
auto=add
: RSA server.pem
: PSK "myPSKkey"
: XAUTH "myXAUTHPass"
[用户名] %any : EAP "[密码]"
charon {
load_modular = yes
duplicheck.enable = no
compress = yes
plugins {
include strongswan.d/charon/*.conf
}
dns1 = 114.114.114.114
nbns1 = 114.114.114.114
}
include strongswan.d/*.conf
iOS
-
服务器,都是 IP 或都是 URL
-
账户和密码写 ipsec.secrets 里 XAUTH 前后的那两个
-
如果要使用证书,证书选刚才的那个。否则可以不使用证书,输入 ipsec.secrets 里设置的 PSK 密码。
Android
IPSec Xauth PSK
-
服务器,都是 IP 或都是 URL
-
IPSec 预共享密钥:写 ipsec.secrets 里 PSK 后面的那个密码。
"strongSwan VPN Client" for Android 4.0 (ICS)+
-
Gateway 就是服务器,同上
-
Type 选 IKEv2 Certificate
-
User certificate 选你刚才导入的
-
取消自动选择 CA 证书,然后在用户证书里选你刚才从 pk12 导入的
iOS 调试
log debug;
path logfile "/var/log/racoon.log";
Android 调试
-
strongSwan 官方客户端提供了日志查看功能。
-
android 自带的 VPN 调试方法如下:
cd /storage/sdcard0
logcat -f ./log.txt
(责任编辑:IT)
iOS
AndroidIPSec Xauth PSK
"strongSwan VPN Client" for Android 4.0 (ICS)+
iOS 调试log debug; path logfile "/var/log/racoon.log"; Android 调试
cd /storage/sdcard0 logcat -f ./log.txt(责任编辑:IT) |
