Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| technical:strongswan-apdesk [2026/01/11 20:10] – created system | technical:strongswan-apdesk [2026/01/12 06:22] (current) – [Required Items] system | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== IKEv2+IPsec (StrongSwan) Support in APdesk and MESHdesk ====== | ====== IKEv2+IPsec (StrongSwan) Support in APdesk and MESHdesk ====== | ||
| - | ===== Introduction | + | ===== MESHdesk Firmware |
| - | * When installing | + | * The MESHdesk firmware includes support for IKEv2+IPsec since Jan 2026. |
| - | * Although it is easy once you figured it out, because | + | * When you build the firmware make sure you include: |
| - | * Even when I asked one of the AI engines for instructions it provided me with old outdated instructions. | + | * Network -> VPN -> StrongSwan |
| - | * The following instructions should work well on any of the recent versions of StrongSwan | + | * Network -> xfrm (Needed for route based IPsec) |
| + | * To make those packages appear in the available list of packages you need to insall them into the SDK | ||
| + | <code bash> | ||
| + | ./ | ||
| + | ./ | ||
| + | </ | ||
| + | |||
| + | <WRAP center round tip 100%> | ||
| + | * Note that StrongSwan | ||
| + | * Fortunately OpenWrt can also be running as a VM. | ||
| + | * In our setup we created a virtual setup in VirtualBox and ran an OpenWrt instance which are then configured using APdesk | ||
| + | </ | ||
| ----------- | ----------- | ||
| + | ===== Defining a IKEv2+IPsec per AP ===== | ||
| + | * See the screenshot below and the discussion which follows on the various items required: | ||
| + | * {{: | ||
| + | |||
| + | ------ | ||
| + | ==== Required Items ==== | ||
| + | ^ Item ^ Description | ||
| + | |Name |Descriptive name for VPN connection | ||
| + | |VPN Type |IKEv2+IPsec | ||
| + | |Server | ||
| + | |Server ID |Unique ID when server cert was generated | ||
| + | |Xfrm Id Nr |Match **if_id_*** configured on the server | ||
| + | |Endpoint IP |Client' | ||
| + | |Gateway IP |The IP Address from server prep script | ||
| + | |Client ID |Unique ID per Client when cert is created | ||
| + | |CA |CA certificate we created earlier | ||
| + | |Certificate |Client certificate we created earlier | ||
| + | |Key |Private key used to generate certificate | ||
| + | |Proposals |list of cryto proposals | ||
| + | |ESP Proposals |list of ESP proposals | ||
| + | |||
| + | ------------ | ||
| + | ===== Connection Info ===== | ||
| + | * The MESHdesk firmware records and reports the status and usage in the VPN tunnel. | ||
| + | * See screenshot below: | ||
| + | {{: | ||
| + | |||
| + | ------------ | ||
| + | ==== CLI Confirmation ==== | ||
| + | * We can use the swanctl program on OpenWrt to confirm the SA has been established: | ||
| + | <code bash> | ||
| + | root@SS-01: | ||
| + | plugin ' | ||
| + | xfrm01: #10, ESTABLISHED, | ||
| + | local ' | ||
| + | remote ' | ||
| + | AES_CBC-128/ | ||
| + | established 1243s ago, rekeying in 12771s | ||
| + | tun_xfrm01: #10, reqid 1, INSTALLED, TUNNEL-in-UDP, | ||
| + | installed 2089s ago, rekeying in 1379s, expires in 1871s | ||
| + | in c000ad9e (-|0x00000064), | ||
| + | out cb6ad2be (-|0x00000064), | ||
| + | local 0.0.0.0/0 | ||
| + | remote 0.0.0.0/0 | ||
| + | </ | ||
| + | |||
| + | |||