@@ -4,20 +4,20 @@ IPSec IKEv2 Remote Access VPN
44=============================
55
66Internet Key Exchange version 2 (IKEv2) is a tunneling protocol, based on IPsec,
7- that establishes a secure VPN communication between VPN devices, and defines
7+ that establishes a secure VPN communication between VPN devices, and defines
88negotiation and authentication processes for IPsec security associations (SAs).
99It is often known as IKEv2/IPSec or IPSec IKEv2 remote-access — or road-warriors
1010as others call it.
1111
1212Key exchange and payload encryption is done using IKE and ESP proposals as known
1313from IKEv1 but the connections are faster to establish, more reliable, and also
14- support roaming from IP to IP (called MOBIKE which makes sure your connection
15- does not drop when changing networks from e.g. WIFI to LTE and back).
14+ support roaming from IP to IP (called MOBIKE which makes sure your connection
15+ does not drop when changing networks from e.g. WIFI to LTE and back).
1616Authentication can be achieved with X.509 certificates.
1717
1818Setting up certificates:
1919^^^^^^^^^^^^^^^^^^^^^^^^
20- First of all, we need to create a CA root certificate and server certificate
20+ First of all, we need to create a CA root certificate and server certificate
2121on the server side.
2222
2323.. code-block :: none
@@ -70,16 +70,16 @@ on the server side.
7070 + }
7171
7272
73- Once the command is completed, it will add the certificate to the configuration
74- session, to the pki subtree. You can then review the proposed changes and
73+ Once the command is completed, it will add the certificate to the configuration
74+ session, to the pki subtree. You can then review the proposed changes and
7575commit them.
7676
7777Setting up IPSec:
7878^^^^^^^^^^^^^^^^^
7979
80- After the PKI certs are all set up we can start configuring our IPSec/IKE
80+ After the PKI certs are all set up we can start configuring our IPSec/IKE
8181proposals used for key-exchange end data encryption. The used encryption ciphers
82- and integrity algorithms vary from operating system to operating system. The
82+ and integrity algorithms vary from operating system to operating system. The
8383ones used in this example are validated to work on Windows 10.
8484
8585.. code-block :: none
@@ -125,7 +125,7 @@ Setting up tunnel:
125125 set vpn ipsec remote-access connection rw pool 'ra-rw-ipv6'
126126
127127 VyOS also supports two different modes of authentication, local and RADIUS.
128- To create a new local user named "vyos" with a password of "vyos" use the
128+ To create a new local user named "vyos" with a password of "vyos" use the
129129following commands.
130130
131131.. code-block :: none
@@ -156,12 +156,12 @@ that will connect to the "rw" connection on our VyOS server.
156156 ==== <snip> ====
157157 Add-VpnConnection -Name "VyOS IKEv2 VPN" -ServerAddress "vpn.vyos.net" -TunnelType "Ikev2"
158158
159- Set-VpnConnectionIPsecConfiguration -ConnectionName "VyOS IKEv2 VPN" -AuthenticationTransformConstants GCMAES128 -CipherTransformConstants
159+ Set-VpnConnectionIPsecConfiguration -ConnectionName "VyOS IKEv2 VPN" -AuthenticationTransformConstants GCMAES128 -CipherTransformConstants
160160 GCMAES128 -EncryptionMethod GCMAES128 -IntegrityCheckMethod SHA256128 -PfsGroup None -DHGroup "Group14" -PassThru -Force
161161 ==== </snip> ====
162162
163163 Add the commands from Snippet in the Windows side via PowerShell.
164- Also import the root CA cert to the Windows “Trusted Root Certification
164+ Also import the root CA cert to the Windows “Trusted Root Certification
165165Authorities” and establish the connection.
166166
167167Verification:
@@ -173,4 +173,3 @@ Verification:
173173 Connection ID Username Protocol State Uptime Tunnel IP Remote Host Remote ID IKE Proposal IPSec Proposal
174174 --------------- ---------- ---------- ------- -------- ----------- ------------- ----------- ------------------------------------------ ------------------
175175 5 vyos IKEv2 UP 37s 192.0.2.129 10.0.0.2 10.0.0.2 AES_GCM_16-128/PRF_HMAC_SHA2_256/MODP_2048 ESP:AES_GCM_16-128
176-
0 commit comments