IPsec VPN

From Amahi Wiki
Revision as of 09:27, 27 August 2011 by Dforbes (talk | contribs)
Jump to: navigation, search

We now have a new IPsec VPN app for your HDA.

This VPN stack has many advantages, although it still requires two ports to be forwarded from your router to your HDA. These are

 500 UDP and 4500 UDP

UDP, not TCP.

Below is how to set up clients for various client operating systems.

iOS Setup

Go to Settings > Network > VPN > IPSec, enter the settings below and click on Save.

  • Description: Amahi IPSec VPN
  • Server: YOURNICK.yourhda.com (put your Amahi dyndns address, nickname and host)
  • Account: USERNAME
  • Password: leave it as "Ask Every Time" or put one if you feel it's safe to leave it there
  • Use Certificate: leave it as OFF
  • Group Name: Amahi (with a capital A)
  • Secret: this is the 4-character you got the when you installed the IPSec VPN app in your HDA
  • Proxy: leave it as off

Below you can see how the setup area looks in a few Apple iOS devices.

iPad

It should look something like this on the iPad 2, iOS 4.x

IPSec VPN iPad 2.png

iPhone 3, iPod Touch

It should look something like this on the iPhone 3, iOS 4.x

IPSec VPN iPhone 3.png

Windows 7

Currently, Amahi only supports one IPSec VPN client for windows, a free client from Shrew Soft. (Report others that also work well please)

  • Download and install the Shrew Soft Client. (Their Windows VPN Client download page may have more recent versions.)
  • Open the client, called VPN Access Manager and click on + (Add) to add a configuration
  • Enter YOURNICK.yourhda.com. Replace YOURNICK with your actual HDA nickname, so that your DynDNS works.

IPSec VPN Win7.png

  • Go into the Authentication tab
  • Select Mutual PSK + XAuth
  • Under the Local Identity tab, select Key Identifier, enter Amahi (this is called the Group Name and acts as an extra layer of protection)

IPSec VPN Win7 Client.png

  • In the Credentials tab, the Pre Shared Key should be ready to take the VPN secret obtained in the VPN web page inside your HDA.
  • The rest of things should work as default
  • Save

IPSec VPN Win7 Client Credentials.png

  • Finally click on connect or double click on the profile for your VPN
  • Input your username and password for a user in your Amahi HDA

IPSec VPN Win7 Client Connect.png

  • If all goes well, you should be connected and you should see this welcome message:

IPSec VPN Win7 Client Connected.png

  • Press OK. To disconnect, close this window or press on Disconnect.
  • For easy use, these are the recommended settings
  • Enable it to be visible in the Tray only, so that it's less obtrusive when it connects
  • If this is a computer you trust, you may want to also set the "remember the connection username", for even easier use

IPSec VPN Win7 Client Preferences.png

Max OS X Setup

Similar to iOS.

  • Open System Preferences > Network
  • Click on the + sign to create a new service
  • For Interface select VPN. For VPN type select Cisco IPSec'. Give the service a name, like Amahi Home and click on Create
  • Once added, select it. In the Server Address put YOURNICK.yourhda.com (replace YOURNICK with your nickname).
  • In Account Name, put your username. Leave password empty unless you trust this computer.
  • Click on Authentication Settings
  • In Shared Secret, put the Group Setting from your internal IPSec VPN. In Group Name, enter Amahi. Click OK
  • You can now click on Connect to connect!
  • You can also click on "Show VPN status in menu bar" for quick access to the VPN connection
  • Click on Apply to save these settings

Advanced Topics

Note: this section requires editing files with root privileges and restarting the racoon daemon.

Changing the Pre-Shared Key

The pre-shared key is stored in the file /etc/racoon/psk.txt. If you want to customise it for any reason, simply edit the file with your favourite text editor and restart racoon. You will need to manually update all of your clients. Note that the web page at http://ipsec-vpn will not be updated.

Routing all network traffic via the VPN

By default, the VPN will only route traffic destined for your home network via the VPN. General web traffic etc, will *not* be encrypted. To change this behaviour so that all network traffic from your client is routed via your VPN, edit /etc/racoon/racoon.conf and remove the lines beginning "split_network" and "split_dns". The restart racoon.