summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorRobert Göhler <github@ghlr.de>2021-11-29 20:37:49 +0100
committerGitHub <noreply@github.com>2021-11-29 20:37:49 +0100
commitd9133703c58f229049358ad8df0618bc9134b14f (patch)
treecac497a7ce0d6b8833e1de14a27398bf1b8b2839 /docs
parent21580597cff39e01c8fc9dbbee3300f0629b78f5 (diff)
parent8f3c52096c017b96c988c2275e0cbd67c70cc84d (diff)
downloadvyos-documentation-d9133703c58f229049358ad8df0618bc9134b14f.tar.gz
vyos-documentation-d9133703c58f229049358ad8df0618bc9134b14f.zip
Merge pull request #662 from goodNETnick/master
IKE group parameters
Diffstat (limited to 'docs')
-rw-r--r--docs/configuration/vpn/ipsec.rst82
1 files changed, 82 insertions, 0 deletions
diff --git a/docs/configuration/vpn/ipsec.rst b/docs/configuration/vpn/ipsec.rst
index 50814b6e..29dc5a0e 100644
--- a/docs/configuration/vpn/ipsec.rst
+++ b/docs/configuration/vpn/ipsec.rst
@@ -29,6 +29,88 @@ for the cipher and hash. Adjust this as necessary.
.. NOTE:: VMware users should ensure that a VMXNET3 adapter is used. E1000
adapters have known issues with GRE processing.
+**************************************
+IKE (Internet Key Exchange) Attributes
+**************************************
+IKE performs mutual authentication between two parties and establishes
+an IKE security association (SA) that includes shared secret information
+that can be used to efficiently establish SAs for Encapsulating Security
+Payload (ESP) or Authentication Header (AH) and a set of cryptographic
+algorithms to be used by the SAs to protect the traffic that they carry.
+https://datatracker.ietf.org/doc/html/rfc5996
+
+In VyOS, IKE attributes are specified through IKE groups.
+Multiple proposals can be specified in a single group.
+
+VyOS IKE group has the next options:
+
+* ``close-action`` defines the action to take if the remote peer unexpectedly
+ closes a CHILD_SA:
+
+ * ``none`` set action to none (default);
+
+ * ``hold`` set action to hold;
+
+ * ``clear`` set action to clear;
+
+ * ``restart`` set action to restart;
+
+* ``dead-peer-detection`` controls the use of the Dead Peer Detection protocol
+ (DPD, RFC 3706) where R_U_THERE notification messages (IKEv1) or empty
+ INFORMATIONAL messages (IKEv2) are periodically sent in order to check the
+ liveliness of the IPsec peer:
+
+ * ``action`` keep-alive failure action:
+
+ * ``hold`` set action to hold (default)
+
+ * ``clear`` set action to clear;
+
+ * ``restart`` set action to restart;
+
+ * ``interval`` keep-alive interval in seconds <2-86400> (default 30);
+
+ * ``timeout`` keep-alive timeout in seconds <2-86400> (default 120) IKEv1 only
+
+* ``ikev2-reauth`` whether rekeying of an IKE_SA should also reauthenticate
+ the peer. In IKEv1, reauthentication is always done:
+
+ * ``yes`` enable remote host re-authentication during an IKE rekey;
+
+ * ``no`` disable remote host re-authenticaton during an IKE rekey;
+
+* ``key-exchange`` which protocol should be used to initialize the connection
+ If not set both protocols are handled and connections will use IKEv2 when
+ initiating, but accept any protocol version when responding:
+
+ * ``ikev1`` use IKEv1 for Key Exchange;
+
+ * ``ikev2`` use IKEv2 for Key Exchange;
+
+* ``lifetime`` IKE lifetime in seconds <30-86400> (default 28800);
+
+* ``mobike`` enable MOBIKE Support. MOBIKE is only available for IKEv2:
+
+ * ``enable`` enable MOBIKE (default for IKEv2);
+
+ * ``disable`` disable MOBIKE;
+
+* ``mode`` IKEv1 Phase 1 Mode Selection:
+
+ * ``main`` use Main mode for Key Exchanges in the IKEv1 Protocol
+ (Recommended Default);
+
+ * ``aggressive`` use Aggressive mode for Key Exchanges in the IKEv1 protocol
+ aggressive mode is much more insecure compared to Main mode;
+
+* ``proposal`` the list of proposals and their parameters:
+
+ * ``dh-group`` dh-group;
+
+ * ``encryption`` encryption algorithm;
+
+ * ``hash`` hash algorithm.
+
*************************
IPsec policy matching GRE
*************************