====== IPSec mezi Debian OpenSwan a FortiGate 60B====== ///etc/ipsec.conf// version 2.0 config setup virtual_private=%v4:10.0.0.0/8,%v4:192.168.0.0/16,%v4:172.16.0.0/12 nat_traversal=yes protostack=netkey conn presto type=tunnel leftsubnet=192.168.204.0/24 left=192.168.1.100 leftnexthop=192.168.1.1 right=93.93.132.175 rightsubnet=192.168.5.0/24 keyexchange=ike auto=start authby=secret pfs=yes esp=aes128-sha1 ike=aes128-sha1 ///etc/ipsec.secrets// 192.168.1.100 93.93.132.175 : PSK "my_strong_password" ====== Prichazeji tezke vahy ====== {{:linux:vpn:fat_pig.gif|}} Potoze me nenapadlo jak rychle rozchodit u sebe podsit 192.168.204.x/24 - stavajici 192.168.1.x/24 jsem pouzit nemohl a nechtelo se mi lovit heslo na muj router a prenastavovat ho - udelal jsem tudle berlicku: ifconfig eth0:1 192.168.204.123 netmask 255.255.255.0 route add -net 192.168.5.0/24 gw 192.168.204.123 ====== Poznamky nakonec ====== Je nutne podotknout, ze **IPSec pri pouziti nat-traversal pomoci netkey nevytvari** novy interface //ipsec0//. Pro debug jsem krome klasickeho tail -f /var/log/auth.log tail -f /var/log/syslog pouzival jeste ipsec auto --status ip xfrm policy ip xfrm state