3

strongswan ipsec 配置 -- win

 1 year ago
source link: http://abcdxyzk.github.io/blog/2022/09/24/strongswan-conf-win/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

strongswan ipsec 配置 -- win

2022-09-24 23:01:00

server

vim /etc/strongswan/strongswan.d/charon.conf

port_nat_t = 4501

vim /etc/strongswan/swanctl/swanctl.conf

# Include config snippets
include conf.d/*.conf

connections {
	# cp www.abcxyzkk.xyz_apache/root_bundle.crt /etc/strongswan/swanctl/x509ca/
	# cp www.abcxyzkk.xyz_apache/www.abcxyzkk.xyz.crt /etc/strongswan/swanctl/x509/
	# cp www.abcxyzkk.xyz_apache/www.abcxyzkk.xyz.key /etc/strongswan/swanctl/private/
	# EAP android 客户端 https://download.strongswan.org/Android/
	# EAP android 客户端 https://raw.githubusercontent.com/abcdxyzk/abcdxyzk.github.io_files/master/tools/vpn/strongSwan-2.3.3.apk
	# EAP 服务端转发上网 iptables -t nat -A POSTROUTING -s 100.64.0.0/24 -o eth0 -j MASQUERADE
	# echo 1 > /proc/sys/net/ipv4/ip_forward
        testEAP {
                version = 2
                proposals = default
                local_addrs = 192.168.100.178
                pools = pool1
                rekey_time = 24h

                local {
                        certs = www.npcable.cn.crt
                        id = www.npcable.cn
                }
                remote {
                        auth = eap-mschapv2
                        id = %any
                }
                children {
                        testEAP_child {
                                # local_ts = 0.0.0.0/0
                                local_ts = 192.168.100.0/24
                                #remote_ts = 100.64.0.0/24
                                esp_proposals = default

                                rekey_time = 24h
                        }
                }
        }
}

secrets {
        private-www {
                file = www.npcable.cn.key
        }
        eap-user {
                id = abc
                secret = abc123
        }
        eap-user1 {
                id = abc1
                secret = abc123
        }
}

pools {
	pool1 {
		addrs = 100.64.0.0/24
	}
}
service strongswan restart

swanctl --load-all
swanctl --list-sas

https://raw.githubusercontent.com/abcdxyzk/abcdxyzk.github.io_files/master/tools/vpn/TheGreenBow_VPN_Client_6.64.3.2.exe

https://raw.githubusercontent.com/abcdxyzk/abcdxyzk.github.io_files/master/tools/vpn/tgbvpnvirtm.inf_amd64_6.1.zip

https://raw.githubusercontent.com/abcdxyzk/abcdxyzk.github.io_files/master/tools/vpn/tgbmpenum.inf_amd64_6.1.zip

先调系统时间

改到2035年左右,这样可以一直试用。时间改太大也不行?

win10

安装 6.64.3.2 就 OK

先安装 6.64.3.2 , 再调整两个驱动: 网络适配器、系统设备

调整驱动 TheGreenBow Virtual Miniport Adapter

计算机管理 –> 设备管理器 –> 点击"网络适配器", 再点击"菜单"上的"操作", 再点击"添加过时硬件(L)"

20220924-2.png
20220924-3.png
20220924-4.png
20220924-5.png
20220924-6.png
20220924-7.png

再卸载这个设备,同时勾选"删除此设备的驱动程序软件"

20220924-9.png
20220924-10.png

再添加从 6.10.14.4 那里copy来的驱动

点击"网络适配器", 再点击"菜单"上的"操作", 再点击"添加过时硬件(L)"

tgbvpnvirtm.inf_amd64_6.1.zip

20220924-11.png
20220924-12.png
20220924-13.png

调整驱动 TheGreenBow VPN Miniport Enumerator

不用先添加,可以直接卸载。同时勾选"删除此设备的驱动程序软件"

20220924-1.jpg

再添加从 6.10.14.4 那里copy来的驱动

点击"系统设备", 再点击"菜单"上的"操作", 再点击"添加过时硬件(L)"

tgbmpenum.inf_amd64_6.1.zip

20220924-14.png
20220924-15.png
20220924-16.png
20220924-17.png

rekey可能失败,改长 ike_sa, ipsec_sa 的存活时间

20220924-20.png
20220924-21.png
20220924-22.png
20220924-23.png

win7 在连接的时候有一定的失败概率

多网卡可能会失败,禁用掉其他网卡

点两下 “从网关请求设置” 好像能恢复。

20220924-30.png

似乎是这个字段,但基本无法破解

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\TgbIke.exe

sBoot32

Posted by kk

2022-09-24 23:01:00kernel, ipsec

« PHP数组占多大内存 VirtualBox虚拟机内的系统时间调整 »

wx_ok.pngali_ok.png

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK