VPN: Difference between revisions
		
		
		
		
		
		Jump to navigation
		Jump to search
		
				
		
On equipment hosting VPN 
On other sites' routers 
		
	
| Line 84: | Line 84: | ||
| === Network interfaces configuration === | === Network interfaces configuration === | ||
| {{Managed by Puppet|classes=networkg5k|note=}} | |||
| === Iptables configuration === | |||
| {{Managed by Puppet|classes=iptablesg5k|note=}} | |||
| === OpenVPN configuration === | === OpenVPN configuration === | ||
| {{Managed by Puppet|classes=openvpn,openvpng5k|note=}} | {{Managed by Puppet|classes=openvpn,openvpng5k|note=}} | ||
| == Dom0 == | == Dom0 == | ||
| {{Managed by Puppet|classes=networkg5k|note=}} | |||
| == Network Equipment == | == Network Equipment == | ||
| === On equipment hosting VPN === | === On equipment hosting VPN {{Yes}}=== | ||
|   vlan 600 name VPN by port |   vlan 600 name VPN by port | ||
| Line 194: | Line 107: | ||
|    ip address 172.20.255.254 255.255.0.0 |    ip address 172.20.255.254 255.255.0.0 | ||
| === On other sites' routers === | === On other sites' routers {{No}} === | ||
|    route add 172.20.0.0/16 gw 192.168.4.<VPN_site> |    route add 172.20.0.0/16 gw 192.168.4.<VPN_site> | ||
| Line 201: | Line 114: | ||
| == VPN Client == | == VPN Client == | ||
| {{No}} | |||
Revision as of 14:23, 8 October 2013
Présentation CT
Principe
- Connecter des hôtes/réseaux distants "comme si" ils appartiennent au même réseau local
- Chiffrer / Authentifier tout ce qui passe sur les réseaux publiques
- Intêret pour G5K
- S'affranchir de la passerelle SSH
- Accès au monde extérieur (à un serveur, à un réseau)
 
Implémentation
- OpenVPN : Interfaces virtuelles, Linux, portage Windows, SSL, flexible  
- L2 VPN   - Encapsulation de la trame Ethernet (L2) ou paquet IP (L3)
- Fonctionnement des applications non-IP
 
- Réseau VPN VLAN dédié
- Encapsulation dans
Configuration client
- addresse IP dans réseau VPN
- persistence:
- routes G5K (Golden rules !)
- Configuratiuon DNS G5K du client  
- Authentification Client
Securité
- Serveur : Idem access nationale   - Interfaces:
- interface DMZ Publique (pour connexion client VPN depuis Internet)
- interface DMZ Privée (pour administration G5K)
- interface VLAN VPN, sans adresse IP (pour acheminement sur VLAN VPN)
 
- Utilisation des classes puppet DMZ
 
- Interfaces:
L2 Ethernet Networks
Some additional VLAN is needed :
Vlan number
| VLAN number | Usage | Name | 
|---|---|---|
| 600 | VPN network | VPN | 
L3 IP Networks
Routing policy
The following table gives detail about the routing policy of each L2 VLAN :
| Network | Routed locally | Routed globally | 
|---|---|---|
| VPN network |  |   | 
Addressing plan
About VPN
| Site | VPN | 
|---|---|
| Sophia | 172.20.0.0/16 | 
Need additional route in every gw-site.  
Configuration
DomU
Network interfaces configuration
Iptables configuration
OpenVPN configuration
Dom0
Network Equipment
On equipment hosting VPN 
vlan 600 name VPN by port tagged 7/19 router-interface ve 60
interface ve 60 port-name VPN ip address 172.20.255.254 255.255.0.0
On other sites' routers 
route add 172.20.0.0/16 gw 192.168.4.<VPN_site>

