Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| technical:strongswan-apdesk [2026/01/11 21:23] – system | technical:strongswan-apdesk [2026/01/12 06:22] (current) – [Required Items] system | ||
|---|---|---|---|
| Line 3: | Line 3: | ||
| * The MESHdesk firmware includes support for IKEv2+IPsec since Jan 2026. | * The MESHdesk firmware includes support for IKEv2+IPsec since Jan 2026. | ||
| * When you build the firmware make sure you include: | * When you build the firmware make sure you include: | ||
| - | * Network -> VPN -> StrongSwan -> strongswan-defaul | + | * Network -> VPN -> StrongSwan -> strongswan-default |
| * Network -> xfrm (Needed for route based IPsec) | * Network -> xfrm (Needed for route based IPsec) | ||
| * To make those packages appear in the available list of packages you need to insall them into the SDK | * To make those packages appear in the available list of packages you need to insall them into the SDK | ||
| Line 10: | Line 10: | ||
| ./ | ./ | ||
| </ | </ | ||
| + | |||
| + | <WRAP center round tip 100%> | ||
| + | * Note that StrongSwan might not fit on devices with limited flash. | ||
| + | * Fortunately OpenWrt can also be running as a VM. | ||
| + | * In our setup we created a virtual setup in VirtualBox and ran an OpenWrt instance which are then configured using APdesk | ||
| + | </ | ||
| ----------- | ----------- | ||
| Line 24: | Line 30: | ||
| |Server ID |Unique ID when server cert was generated | |Server ID |Unique ID when server cert was generated | ||
| |Xfrm Id Nr |Match **if_id_*** configured on the server | |Xfrm Id Nr |Match **if_id_*** configured on the server | ||
| - | |Endpoint IP |Unique ID per Client | + | |Endpoint IP |Client's fixed IP Address |
| |Gateway IP |The IP Address from server prep script | |Gateway IP |The IP Address from server prep script | ||
| + | |Client ID |Unique ID per Client when cert is created | ||
| |CA |CA certificate we created earlier | |CA |CA certificate we created earlier | ||
| |Certificate |Client certificate we created earlier | |Certificate |Client certificate we created earlier | ||
| Line 32: | Line 39: | ||
| |ESP Proposals |list of ESP proposals | |ESP Proposals |list of ESP proposals | ||
| + | ------------ | ||
| ===== Connection Info ===== | ===== Connection Info ===== | ||
| * The MESHdesk firmware records and reports the status and usage in the VPN tunnel. | * The MESHdesk firmware records and reports the status and usage in the VPN tunnel. | ||
| * See screenshot below: | * See screenshot below: | ||
| {{: | {{: | ||
| + | |||
| + | ------------ | ||
| + | ==== CLI Confirmation ==== | ||
| + | * We can use the swanctl program on OpenWrt to confirm the SA has been established: | ||
| + | <code bash> | ||
| + | root@SS-01: | ||
| + | plugin ' | ||
| + | xfrm01: #10, ESTABLISHED, | ||
| + | local ' | ||
| + | remote ' | ||
| + | AES_CBC-128/ | ||
| + | established 1243s ago, rekeying in 12771s | ||
| + | tun_xfrm01: #10, reqid 1, INSTALLED, TUNNEL-in-UDP, | ||
| + | installed 2089s ago, rekeying in 1379s, expires in 1871s | ||
| + | in c000ad9e (-|0x00000064), | ||
| + | out cb6ad2be (-|0x00000064), | ||
| + | local 0.0.0.0/0 | ||
| + | remote 0.0.0.0/0 | ||
| + | </ | ||
| + | |||