blob: 645b4de77e63f1f35438e627c2a33f1af6726c5f [file] [log] [blame]
# Id: racoon.conf.sample-natt,v 1.5 2005/12/13 16:41:07 vanhu Exp
# Contributed by: Michal Ludvig <mludvig@suse.cz>, SUSE Labs
# This file can be used as a template for NAT-Traversal setups.
# Only NAT-T related options are explained here, refer to other
# sample files and manual pages for details about the rest.
path include "/etc/racoon";
path certificate "/etc/racoon/cert";
# Define addresses and ports where racoon will listen for an incoming
# traffic. Don't forget to open these ports on your firewall!
listen
{
# First define an address where racoon will listen
# for "normal" IKE traffic. IANA allocated port 500.
isakmp 172.16.0.1[500];
# To use NAT-T you must also open port 4500 of
# the same address so that peers can do 'Port floating'.
# The same port will also be used for the UDP-Encapsulated
# ESP traffic.
isakmp_natt 172.16.0.1[4500];
}
timer
{
# To keep the NAT-mappings on your NAT gateway, there must be
# traffic between the peers. Normally the UDP-Encap traffic
# (i.e. the real data transported over the tunnel) would be
# enough, but to be safe racoon will send a short
# "Keep-alive packet" every few seconds to every peer with
# whom it does NAT-Traversal.
# The default is 20s. Set it to 0s to disable sending completely.
natt_keepalive 10 sec;
}
# To trigger the SA negotiation there must be an appropriate
# policy in the kernel SPD. For example for traffic between
# networks 192.168.0.0/24 and 192.168.1.0/24 with gateways
# 172.16.0.1 and 172.16.1.1, where the first gateway is behind
# a NAT which translates its address to 172.16.1.3, you need the
# following rules:
# On 172.16.0.1 (e.g. behind the NAT):
# spdadd 192.168.0.0/24 192.168.1.0/24 any -P out ipsec \
# esp/tunnel/172.16.0.1-172.16.1.1/require;
# spdadd 192.168.1.0/24 192.168.0.0/24 any -P in ipsec \
# esp/tunnel/172.16.1.1-172.16.0.1/require;
# On the other side (172.16.1.1) either use a "generate_policy on"
# statement in the remote block, or in case that you know
# the translated address, use the following policy:
# spdadd 192.168.1.0/24 192.168.0.0/24 any -P out ipsec \
# esp/tunnel/172.16.1.1-172.16.1.3/require;
# spdadd 192.168.0.0/24 192.168.1.0/24 any -P in ipsec \
# esp/tunnel/172.16.1.3-172.16.1.1/require;
# Phase 1 configuration (for ISAKMP SA)
remote anonymous
{
# NAT-T is supported with all exchange_modes.
exchange_mode main,base,aggressive;
# With NAT-T you shouldn't use PSK. Let's go on with certs.
my_identifier asn1dn;
certificate_type x509 "your-host.cert.pem" "your-host.key.pem";
# This is the main switch that enables NAT-T.
# Possible values are:
# off - NAT-T support is disabled, i.e. neither offered,
# nor accepted. This is the default.
# on - normal NAT-T support, i.e. if NAT is detected
# along the way, NAT-T is used.
# force - if NAT-T is supported by both peers, it is used
# regardless of whether there is a NAT gateway between them
# or not. This is useful for traversing some firewalls.
nat_traversal on;
proposal {
authentication_method rsasig;
encryption_algorithm 3des;
hash_algorithm sha1;
dh_group 2;
}
proposal_check strict;
}
# Phase 2 proposal (for IPsec SA)
sainfo anonymous
{
pfs_group 2;
lifetime time 12 hour;
encryption_algorithm 3des, rijndael;
authentication_algorithm hmac_sha1;
compression_algorithm deflate;
}