Forums

Resolved
0 votes
I purchased the Business version of IPSec, for home use. I'd like to be able to connect to home while I'm on the road, I can fill out 1/2 of the info on the "new connection" screen for the IPSec setup, but I don't know the rest of the "remote" section since the network I'm going to be on will always be changing. Can someone help me figure out how to setup this roadwarrior setup?

Thanks,
B
Sunday, January 31 2016, 04:10 PM
Share this post:
Responses (12)
  • Accepted Answer

    Sunday, January 31 2016, 07:51 PM - #Permalink
    Resolved
    1 votes
    The three different packages available to configure IPsec all cater for LAN-LAN connections and not roadwarrior. Your best bet is OpenVPN. With IPsec (Openswan), for road warriors you need to install and configure xl2tpd as well and it will be a fully manual configuration. If the IPsec package has switched to Libreswan, then have a look on their site for how to do a roadwarrior connection. I think their example uses certificates but you can probably also do it with PSK's.

    The pain-free way is OpenVPN.
    The reply is currently minimized Show
  • Accepted Answer

    Sascha
    Sascha
    Offline
    Wednesday, September 06 2017, 07:20 PM - #Permalink
    Resolved
    0 votes
    Nick,

    thanks for clarifying this one.

    I've a similar setup, though I got a IPSec (static route) already running and stability testing through days of pining the ip. Good so far and almost a purchase for me...!

    BUT: if I have this static IPsec route running, how can I connect my 4-5 road warriors additionally onto the same server? Just install OpenVPN and keep it running with Static IPsec at the same time?

    Or is it that only one can coexist to each other?


    Thanks in advance!!!
    The reply is currently minimized Show
  • Accepted Answer

    Wednesday, September 06 2017, 07:40 PM - #Permalink
    Resolved
    0 votes
    They coexist quite happily. I use both at the same time. There is even a cute way you can configure the roadwarriors on OpenVPN to be able to connect to your remote IPsec subnet via your server. When on the road I can connect to my srrver by OpenVPN then onto my brother by IPsec.
    The reply is currently minimized Show
  • Accepted Answer

    Wednesday, September 06 2017, 07:55 PM - #Permalink
    Resolved
    0 votes
    Just to add, it is possible to configure IPsec for roadwarriors now using IKEv2 but the ClearOS interfaces do not support it. You can configure the files manually, but you'd need to look at the Libreswan website to see how.
    The reply is currently minimized Show
  • Accepted Answer

    Sascha
    Sascha
    Offline
    Wednesday, September 06 2017, 08:27 PM - #Permalink
    Resolved
    0 votes
    Nick,

    Thanks again. You wrote "There is even a cute way you can configure the roadwarriors on OpenVPN to be able to connect to your remote IPsec subnet via your server"

    This is EXACTLY what I want to achieve. Is it possible you could help me setup this scenario?

    Cheers
    Sascha
    The reply is currently minimized Show
  • Accepted Answer

    Wednesday, September 06 2017, 08:44 PM - #Permalink
    Resolved
    0 votes
    What are your local and remote LAN subnets with your IPsec tunnel?

    [edit]
    Hmm it seems I undid my set up. I'll try to remember.
    [/edit]
    The reply is currently minimized Show
  • Accepted Answer

    Sascha
    Sascha
    Offline
    Thursday, September 07 2017, 03:48 AM - #Permalink
    Resolved
    0 votes
    Nick Howitt wrote:

    What are your local and remote LAN subnets with your IPsec tunnel?

    [edit]
    Hmm it seems I undid my set up. I'll try to remember.
    [/edit]


    Local: 192.168.130.0/24
    Remote (ClearOS): 192.168.131.0/24
    The reply is currently minimized Show
  • Accepted Answer

    Thursday, September 07 2017, 07:03 AM - #Permalink
    Resolved
    0 votes
    Because your local and remote subnets are adjacent and in the same /23 subnet, you can't use my cute way. I'll post a more detailed instructions later today as I need to test one thing.
    The reply is currently minimized Show
  • Accepted Answer

    Sascha
    Sascha
    Offline
    Thursday, September 07 2017, 07:41 PM - #Permalink
    Resolved
    0 votes
    Nick Howitt wrote:

    Because your local and remote subnets are adjacent and in the same /23 subnet, you can't use my cute way. I'll post a more detailed instructions later today as I need to test one thing.


    Nick,

    I can definately still change the remote subnet to whatever would be needed. I just have to get these road warriors on board ... somehow :(

    I would post this job on guru.com if you like to help me!


    Cheers
    Sascha
    The reply is currently minimized Show
  • Accepted Answer

    Thursday, September 07 2017, 08:31 PM - #Permalink
    Resolved
    0 votes
    Just got home and tested.

    The cute/easy way is to put your OpenVPN subnet (in /etc/openvpn/clients.conf) and your LAN subnet on adjacent subnets which can then form part of a larger subnet. As an example you could switch your LAN subnet to 10.8.1.0/24. Then in IPsec your local subnet becomes 10.8.0.0/23 and your remote one stays as 192.168.131.0/24. Then in /etc/clearos/network.conf set EXTRALANS to 192.168.131.0/24. Then restart OpenVPN and everything should work. Alternatively move OpenVPN to 192.168.131.0/24 then in IPsec your local LAN becomes 192.168.130.0/23. You would then choose something else for your remote LAN and put that something else into EXTRALANS in /etc/clearos/network.conf and restart OpenVPN. Make the remote IPsec configuration match your local one. I hope you get the picture. The key thing is to get your local LAN onto an adjacent subnet to the OpenVPN LAN such that they form part of a larger subnet.

    If you don't want to change your LANs you don't have to. Unfortunately the Webconfig IPsec interface does not support multiple LANs in the local/remote subnet lines even though the underlying package, libreswan, does. You can go to a manual configuration (but it uses a slightly different syntax for multiple LANs), but you can also get round it with the webconfig. In the webconfig you have to create an identical connection to your current LAN/LAN connection, only changing the name and the local subnet which you set to your OpenVPN subnet (10.8.0.0/24). Again, mirror this at the remote end. It is essential that the PSK's of both connections are the same. As before, in /etc/clearos/network.conf set EXTRALANS to 192.168.131.0/24 and restart OpenVPN.
    The reply is currently minimized Show
  • Accepted Answer

    Friday, January 19 2018, 01:47 AM - #Permalink
    Resolved
    0 votes
    We are considering upgrading our ClearOS 6 machine to 7, and I saw this offered as a $25 addon to the subscription.
    I need to get my users onto their office desktops from home or the road. Right now we use port forwarding, which works fine but is not very secure.
    From the description in this thread, I'm guessing this is way too complicated for our needs.
    Is there any way I can give my users access using the Windows Remote Desktop app, but with better security than forwarding ports through our gateway, that doesn't require elaborate setup on their home machines?
    The reply is currently minimized Show
  • Accepted Answer

    Friday, January 19 2018, 02:17 PM - #Permalink
    Resolved
    0 votes
    Hi Greg,
    IPsec within ClearOS is only really for LAN-LAN connections. You can set up libreswan on your own for roadwarriors using IKEv2 but you can't use the ClearOS webconfig as it is missing a setting or two.

    The only real VPN alternatives are PPTP and OpenVPN. PPTP is not so secure these days but has the advantage it is built into many OS's and in Windoze can cache the password allowing an autoconnect. OpenVPN is more secure. If you need, it is very easy to unbolt the user/pass bit so it only needs certificates to connect and this is probably not much different to Windoze caching the password. If you do this, the PC can automatically connect on boot up if you set the service to start, otherwise it will automatically connect when you start connection the OpenVPN GUI without prompting for a password.
    The reply is currently minimized Show
Your Reply