Ich habe den Draytek Router 2500WE welcher VPN unterstützt. Dies würde ich gerne nutzen um den WLAN-Traffic per ipsec zu verschlüsseln. Hierzu habe ich openswan installiert.
Der WLAN-Client hat die IP 192.168.1.100, kernel ist 2.6.10
der Router, der gleichzeitig VPN-Server 192.168.1.1
Die VPN Verbindung wird auch aufgebaut wie es scheint
Code: Alles auswählen
# ipsec auto --up vigor
104 "vigor" #1: STATE_MAIN_I1: initiate
106 "vigor" #1: STATE_MAIN_I2: sent MI2, expecting MR2
108 "vigor" #1: STATE_MAIN_I3: sent MI3, expecting MR3
004 "vigor" #1: STATE_MAIN_I4: ISAKMP SA established
112 "vigor" #2: STATE_QUICK_I1: initiate
004 "vigor" #2: STATE_QUICK_I2: sent QI2, IPsec SA established {ESP=>0xf1e3c68e <0x3742c626}
Code: Alles auswählen
0.000000 192.168.1.100 -> 192.168.1.1 ESP ESP (SPI=0xf1e3c68c)
0.277618 192.168.1.1 -> 192.168.1.100 ESP ESP (SPI=0x04c5c7ba)
0.277618 194.97.173.124 -> 192.168.1.100 DNS Standard query response A 193.99.144.80
0.279000 192.168.1.100 -> 192.168.1.1 ESP ESP (SPI=0xf1e3c68c)
0.447755 192.168.1.1 -> 192.168.1.100 ESP ESP (SPI=0x04c5c7ba)
0.447755 193.99.144.80 -> 192.168.1.100 ICMP Echo (ping) reply
1.281605 192.168.1.100 -> 192.168.1.1 ESP ESP (SPI=0xf1e3c68c)
1.474634 192.168.1.1 -> 192.168.1.100 ESP ESP (SPI=0x04c5c7ba)
1.474634 193.99.144.80 -> 192.168.1.100 ICMP Echo (ping) reply
Code: Alles auswählen
0.000000 192.168.1.100 -> 194.97.173.124 DNS Standard query A heise.de
0.079021 194.97.173.124 -> 192.168.1.100 DNS Standard query response A 193.99.144.80
0.079328 192.168.1.100 -> 193.99.144.80 ICMP Echo (ping) request
0.219661 193.99.144.80 -> 192.168.1.100 ICMP Echo (ping) reply
1.080098 192.168.1.100 -> 193.99.144.80 ICMP Echo (ping) request
1.169700 193.99.144.80 -> 192.168.1.100 ICMP Echo (ping) reply
2.080925 192.168.1.100 -> 193.99.144.80 ICMP Echo (ping) request
2.174185 193.99.144.80 -> 192.168.1.100 ICMP Echo (ping) reply
Hier noch etwas seltsame routing-tabelle nach dem start von ipsec.
Code: Alles auswählen
192.168.1.0 * 255.255.255.0 U 0 0 0 wlan0
default 192.168.1.1 128.0.0.0 UG 0 0 0 wlan0
128.0.0.0 192.168.1.1 128.0.0.0 UG 0 0 0 wlan0
default 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
Code: Alles auswählen
# /etc/ipsec.conf - Openswan IPsec configuration file
# RCSID $Id: ipsec.conf.in,v 1.13 2004/03/24 04:14:39 ken Exp $
# This file: /usr/share/doc/openswan/ipsec.conf-sample
#
# Manual: ipsec.conf.5
version 2.0 # conforms to second version of ipsec.conf specification
# basic configuration
config setup
# Debug-logging controls: "none" for (almost) none, "all" for lots.
klipsdebug=none
plutodebug=none #"control parsing"
interfaces="ipsec0=wlan0"
myid=@xxx
# Add connections here
conn vigor
left=192.168.1.100 # Local vitals
right=192.168.1.1 # Remote vitals
rightsubnet=0.0.0.0/0 #
auto=add
pfs=no
authby=secret
#Disable Opportunistic Encryption
include /etc/ipsec.d/examples/no_oe.conf
Code: Alles auswählen
0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 wlan0
Gruß[/code]