In this example, a simple tunnel will be created between two hosts:
Host A
Host A
The configuration used by Host A is shown below.
The following tunnel context entry is defined in %ETC%\SECURITY\FWMCTX.MAN on Host A.
# Tunnel context entry defining IPSec tunnel with ID 1 192.168.2.4 # 1 - Partner's IP address 192.168.2.1 # 2 - My IP address 1 # 3 - Tunnel ID 500 # 4 - Partner's SA for ESP 501 # 5 - Partner's SA for AH 400 # 6 - My SA for ESP 401 # 7 - My SA for AH DES_CBC_8 # 8 - My encryption algorithm 8 # 9 - My encryption key length 0x08090a0b0c0d0e0f # 10 - My encryption key DES_CBC_8 # 11 - Partner's encryption algorithm 8 # 12 - Partner's encryption key length 0x0001020304050607 # 13 - Partner's encryption key KEYED_MD5 # 14 - My authentication algorithm 16 # 15 - My authentication key length 0xffeeddccbbaa99887766554433221100 # 16 - My authentication key KEYED_MD5 # 17 - Partner's authentication algorithm 16 # 18 - Partner's authentication key length 0x00112233445566778899aabbccddeeff # 19 - Partner's authentication key 0 # 20 - Start time (0 = current time) 28800 # 21 - Expiration time (in seconds) 0.0.0.0 # 22 - Reserved (must be 0.0.0.0)
The following tunnel policy is defined in %ETC%\SECURITY\POLICY on Host
A.
# Tunnel policy definition for tunnel with ID 1 # ESP=yes, AH=no, and tunnel mode is used. 192.168.2.1 192.168.2.4 1 y/n n/n n
The following packet filter rules are defined in %ETC%\SECURITY\FWFILTRS.CNF
on Host A.
# Rules for IPSec Tunnel #1 # These two rules ensure that all traffic between these two systems passes # through the IPSec tunnel with ID 1. permit 192.168.2.1 255.255.255.0 192.168.2.4 255.255.255.0 all any 0 any 0 both local both l=yes t=1 permit 192.168.2.4 255.255.255.0 192.168.2.1 255.255.255.0 all any 0 any 0 both local both l=yes t=1 # Permit by default permit 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 all any 0 any 0 both both both l=no
To activate the tunnel on Host A, the following commands should be run from
within the %ETC%\SECURITY directory:
hand_k fwmctx.man fwinsert policy cfgfilt -u
Host B
The configuration used by Host B is shown below.
The following tunnel context entry is defined in %ETC%\SECURITY\FWMCTX.MAN
on Host B.
# Tunnel context entry defining IPSec tunnel with ID 1 192.168.2.1 # 1 - Partner's IP address 192.168.2.4 # 2 - My IP address 1 # 3 - Tunnel ID 400 # 4 - Partner's SA for ESP 401 # 5 - Partner's SA for AH 500 # 6 - My SA for ESP 501 # 7 - My SA for AH DES_CBC_8 # 8 - My encryption algorithm 8 # 9 - My encryption key length 0x0001020304050607 # 10 - My encryption key DES_CBC_8 # 11 - Partner's encryption algorithm 8 # 12 - Partner's encryption key length 0x08090a0b0c0d0e0f # 13 - Partner's encryption key KEYED_MD5 # 14 - My authentication algorithm 16 # 15 - My authentication key length 0x00112233445566778899aabbccddeeff # 16 - My authentication key KEYED_MD5 # 17 - Partner's authentication algorithm 16 # 18 - Partner's authentication key length 0xffeeddccbbaa99887766554433221100 # 19 - Partner's authentication key 0 # 20 - Start time (0 = current time) 28800 # 21 - Expiration time (in seconds) 0.0.0.0 # 22 - Reserved (must be 0.0.0.0)
The following tunnel policy is defined in %ETC%\SECURITY\POLICY on Host
B.
# Tunnel policy definition for tunnel with ID 1 # ESP=yes, AH=no, and tunnel mode is used. 192.168.2.4 192.168.2.1 1 y/n n/n n
The following packet filter rules are defined in %ETC%\SECURITY\FWFILTRS.CNF
on Host B.
# Rules for IPSec Tunnel #1 # # These two rules permit ESP-encoded packets between the local system # (192.168.2.4) and the other end of our IPSec tunnel (192.168.2.1). # They are necessary because we are denying traffic by default. permit 192.168.2.1 255.255.255.0 192.168.2.4 255.255.255.0 esp any 0 any 0 both local inbound permit 192.168.2.4 255.255.255.0 192.168.2.1 255.255.255.0 esp any 0 any 0 both local outbound # These two rules ensure that all traffic between these two systems passes # through the IPSec tunnel with ID 1. permit 192.168.2.4 255.255.255.0 192.168.2.1 255.255.255.0 all any 0 any 0 both local both t=1 permit 192.168.2.1 255.255.255.0 192.168.2.4 255.255.255.0 all any 0 any 0 both local both t=1 # The default final rule (which need not be specified) is to deny everything.
To activate the tunnel on Host B, the following commands should be run from
within the %ETC%\SECURITY directory:
hand_k fwmctx.man fwinsert policy cfgfilt -u