<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Linux 360° &#124; Italia &#187; vpn</title>
	<atom:link href="http://www.linux360.it/tag/vpn/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.linux360.it</link>
	<description>Notizie, guide e tutorial per il mondo Linux a 360°</description>
	<lastBuildDate>Tue, 16 Dec 2014 14:03:33 +0000</lastBuildDate>
	<language>it-IT</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=3.9.40</generator>
	<item>
		<title>Mikrotik Site to Site IPsec VPN</title>
		<link>http://www.linux360.it/2014/10/20/mikrotik-site-to-site-ipsec-vpn/</link>
		<comments>http://www.linux360.it/2014/10/20/mikrotik-site-to-site-ipsec-vpn/#comments</comments>
		<pubDate>Mon, 20 Oct 2014 08:45:34 +0000</pubDate>
		<dc:creator><![CDATA[Paolo Daniele]]></dc:creator>
				<category><![CDATA[Mikrotik]]></category>
		<category><![CDATA[Wireless & Networking]]></category>
		<category><![CDATA[ipsec]]></category>
		<category><![CDATA[mikrotik]]></category>
		<category><![CDATA[networking]]></category>
		<category><![CDATA[site]]></category>
		<category><![CDATA[vpn]]></category>
		<category><![CDATA[wireless]]></category>

		<guid isPermaLink="false">http://www.paolodaniele.it/?p=2005</guid>
		<description><![CDATA[<p>Ciao Ragazzi, dopo qualche giorno di pausa si ritorna alla carica! Oggi vi spiego come mettere su una VPN tra due siti che utilizzano come punto di accesso alla rete. Una VPN (Virtual Private Network) è una rete che permette a due punti, connessi ad internet, distanti fisicamente tra loro di apparire come se fossero ...</p>
<p>L'articolo <a rel="nofollow" href="http://www.linux360.it/2014/10/20/mikrotik-site-to-site-ipsec-vpn/">Mikrotik Site to Site IPsec VPN</a> sembra essere il primo su <a rel="nofollow" href="http://www.linux360.it">Linux 360° | Italia</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>Ciao Ragazzi,</p>
<p>dopo qualche giorno di pausa si ritorna alla carica!</p>
<p>Oggi vi spiego come mettere su una VPN tra due siti che utilizzano come punto di accesso alla rete.</p>
<p><a href="http://www.paolodaniele.it/wp-content/uploads/2014/10/mikrotik_vpn.jpg"><img class="alignnone wp-image-2008" src="http://www.paolodaniele.it/wp-content/uploads/2014/10/mikrotik_vpn.jpg" alt="mikrotik_vpn" width="725" height="279" /></a></p>
<p>Una <strong>VPN</strong> (Virtual Private Network) è una rete che permette a due punti, connessi ad internet, distanti fisicamente tra loro di apparire come se fossero sulla stessa rete fisica.</p>
<p>Generalmente questo tipo di tunnel viene cifrato per evitare lo &#8220;sniffing&#8221; dei pacchetti dalla rete.</p>
<p>Esistono diversi sistemi per realizzare VPN sui dispositivi Mikrotik ognuno con vantaggi e svantaggi, ma quello più diffuso è sicuramente IPSec.</p>
<p>Nella figura sopra possiamo vedere come le due rete private abbiano indirizzi ip di classi diverse, <strong>192.168.1.0/24</strong> e <strong>192.168.2.0/24</strong> questo <strong>non è fondamentale ma è preferibile</strong> per evitare conflitti IP tra le due sedi remote.</p>
<p>Gli indirizzi 1.1.1.1 e 2.2.2.2 sono invece gli IP Pubblici con i quali le due sedi &#8220;escono&#8221; su Internet.</p>
<p>Quello che dobbiamo configurare principalmente sono 3 cose:</p>
<p>- Policy IPSec;</p>
<p>- Peers IPSec;</p>
<p>- NAT Firewall per permettere il passaggio dei pacchetti</p>
<p>Iniziamo!</p>
<p><strong> SITO 1</strong></p>
<p>IP Pubblico: 1.1.1.1</p>
<p>IP privato: 192.168.1.0/24</p>
<p>Configurazione Indirizzi IP:</p>
<div id="wpshdo_1" class="wp-synhighlighter-outer"><div id="wpshdt_1" class="wp-synhighlighter-expanded"><table border="0" width="100%"><tr><td align="left" width="80%"><a name="#codesyntax_1"></a><a id="wpshat_1" class="wp-synhighlighter-title" href="#codesyntax_1"  onClick="javascript:wpsh_toggleBlock(1)" title="Click to show/hide code block">Source code</a></td><td align="right"><a href="#codesyntax_1" onClick="javascript:wpsh_code(1)" title="Show code only"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/code.png" /></a>&nbsp;<a href="#codesyntax_1" onClick="javascript:wpsh_print(1)" title="Print code"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/printer.png" /></a>&nbsp;<a href="http://www.linux360.it/wp-content/plugins/wp-synhighlight/About.html" target="_blank" title="Show plugin information"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/info.gif" /></a>&nbsp;</td></tr></table></div><div id="wpshdi_1" class="wp-synhighlighter-inner" style="display: block;"><pre class="powershell" style="font-family:monospace;"><span class="sy0">/</span>ip address
add address<span class="sy0">=</span>192.168.1.1<span class="sy0">/</span><span class="nu0">24</span> interface<span class="sy0">=</span>ether1<span class="sy0">-</span>local network<span class="sy0">=</span>192.168.1.0</pre></div></div>
<p>Aggiungiamo le regole di NAT per permettere il traffico VPN da e verso le antenne:</p>
<div id="wpshdo_2" class="wp-synhighlighter-outer"><div id="wpshdt_2" class="wp-synhighlighter-expanded"><table border="0" width="100%"><tr><td align="left" width="80%"><a name="#codesyntax_2"></a><a id="wpshat_2" class="wp-synhighlighter-title" href="#codesyntax_2"  onClick="javascript:wpsh_toggleBlock(2)" title="Click to show/hide code block">Source code</a></td><td align="right"><a href="#codesyntax_2" onClick="javascript:wpsh_code(2)" title="Show code only"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/code.png" /></a>&nbsp;<a href="#codesyntax_2" onClick="javascript:wpsh_print(2)" title="Print code"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/printer.png" /></a>&nbsp;<a href="http://www.linux360.it/wp-content/plugins/wp-synhighlight/About.html" target="_blank" title="Show plugin information"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/info.gif" /></a>&nbsp;</td></tr></table></div><div id="wpshdi_2" class="wp-synhighlighter-inner" style="display: block;"><pre class="powershell" style="font-family:monospace;"><span class="sy0">/</span>ip firewall nat
add chain<span class="sy0">=</span>srcnat comment<span class="sy0">=</span><span class="st0">&quot;Nat Bypass VPN&quot;</span> dst<span class="sy0">-</span>address<span class="sy0">=</span>192.168.0.0<span class="sy0">/</span><span class="nu0">16</span>
add action<span class="sy0">=</span>masquerade chain<span class="sy0">=</span>srcnat out<span class="sy0">-</span>interface<span class="sy0">=</span>pppoe<span class="sy0">-</span>out1</pre></div></div>
<p>&nbsp;</p>
<p>Come avrete notato come dst-address ho usato una <strong>/16</strong> questo perchè le due subnet sono differenti, quindi così sono sicuro di inglobare entrambe.</p>
<p>Fatto questo possiamo creare il tunnell VPN con IPSec:</p>
<div id="wpshdo_3" class="wp-synhighlighter-outer"><div id="wpshdt_3" class="wp-synhighlighter-expanded"><table border="0" width="100%"><tr><td align="left" width="80%"><a name="#codesyntax_3"></a><a id="wpshat_3" class="wp-synhighlighter-title" href="#codesyntax_3"  onClick="javascript:wpsh_toggleBlock(3)" title="Click to show/hide code block">Source code</a></td><td align="right"><a href="#codesyntax_3" onClick="javascript:wpsh_code(3)" title="Show code only"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/code.png" /></a>&nbsp;<a href="#codesyntax_3" onClick="javascript:wpsh_print(3)" title="Print code"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/printer.png" /></a>&nbsp;<a href="http://www.linux360.it/wp-content/plugins/wp-synhighlight/About.html" target="_blank" title="Show plugin information"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/info.gif" /></a>&nbsp;</td></tr></table></div><div id="wpshdi_3" class="wp-synhighlighter-inner" style="display: block;"><pre class="powershell" style="font-family:monospace;"><span class="sy0">/</span>ip ipsec peer
add address<span class="sy0">=</span>2.2.2.2<span class="sy0">/</span><span class="nu0">32</span> dpd<span class="sy0">-</span>interval<span class="sy0">=</span>disable<span class="sy0">-</span>dpd enc<span class="sy0">-</span>algorithm<span class="sy0">=</span>3des hash<span class="sy0">-</span>algorithm<span class="sy0">=</span>md5 nat<span class="sy0">-</span>traversal<span class="sy0">=</span>no secret<span class="sy0">=!</span>mys3cr3t
&nbsp;
<span class="sy0">/</span>ip ipsec policy
add dst<span class="sy0">-</span>address<span class="sy0">=</span>192.168.0.0<span class="sy0">/</span><span class="nu0">16</span> sa<span class="sy0">-</span>dst<span class="sy0">-</span>address<span class="sy0">=</span>2.2.2.2 sa<span class="sy0">-</span>src<span class="sy0">-</span>address<span class="sy0">=</span>1.1.1.1 src<span class="sy0">-</span>address<span class="sy0">=</span>192.168.1.0<span class="sy0">/</span><span class="nu0">24</span> tunnel<span class="sy0">=</span>yes</pre></div></div>
<p>Per il Sito 1 abbiamo finito&#8230;passiamo al Sito 2</p>
<p><strong>SITO 2</strong></p>
<p>IP Pubblico: 2.2.2.2</p>
<p>IP privato: 192.168.2.0/24</p>
<p>Configurazione Indirizzi IP:</p>
<div id="wpshdo_4" class="wp-synhighlighter-outer"><div id="wpshdt_4" class="wp-synhighlighter-expanded"><table border="0" width="100%"><tr><td align="left" width="80%"><a name="#codesyntax_4"></a><a id="wpshat_4" class="wp-synhighlighter-title" href="#codesyntax_4"  onClick="javascript:wpsh_toggleBlock(4)" title="Click to show/hide code block">Source code</a></td><td align="right"><a href="#codesyntax_4" onClick="javascript:wpsh_code(4)" title="Show code only"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/code.png" /></a>&nbsp;<a href="#codesyntax_4" onClick="javascript:wpsh_print(4)" title="Print code"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/printer.png" /></a>&nbsp;<a href="http://www.linux360.it/wp-content/plugins/wp-synhighlight/About.html" target="_blank" title="Show plugin information"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/info.gif" /></a>&nbsp;</td></tr></table></div><div id="wpshdi_4" class="wp-synhighlighter-inner" style="display: block;"><pre class="powershell" style="font-family:monospace;"><span class="sy0">/</span>ip address
add address<span class="sy0">=</span>192.168.2.1<span class="sy0">/</span><span class="nu0">24</span> interface<span class="sy0">=</span>ether1<span class="sy0">-</span>local network<span class="sy0">=</span>192.168.2.0</pre></div></div>
<p>Aggiungiamo le regole di NAT per permettere il traffico VPN da e verso le antenne:</p>
<div id="wpshdo_5" class="wp-synhighlighter-outer"><div id="wpshdt_5" class="wp-synhighlighter-expanded"><table border="0" width="100%"><tr><td align="left" width="80%"><a name="#codesyntax_5"></a><a id="wpshat_5" class="wp-synhighlighter-title" href="#codesyntax_5"  onClick="javascript:wpsh_toggleBlock(5)" title="Click to show/hide code block">Source code</a></td><td align="right"><a href="#codesyntax_5" onClick="javascript:wpsh_code(5)" title="Show code only"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/code.png" /></a>&nbsp;<a href="#codesyntax_5" onClick="javascript:wpsh_print(5)" title="Print code"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/printer.png" /></a>&nbsp;<a href="http://www.linux360.it/wp-content/plugins/wp-synhighlight/About.html" target="_blank" title="Show plugin information"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/info.gif" /></a>&nbsp;</td></tr></table></div><div id="wpshdi_5" class="wp-synhighlighter-inner" style="display: block;"><pre class="powershell" style="font-family:monospace;"><span class="sy0">/</span>ip firewall nat
add chain<span class="sy0">=</span>srcnat comment<span class="sy0">=</span><span class="st0">&quot;Nat Bypass VPN&quot;</span> dst<span class="sy0">-</span>address<span class="sy0">=</span>192.168.0.0<span class="sy0">/</span><span class="nu0">16</span>
add action<span class="sy0">=</span>masquerade chain<span class="sy0">=</span>srcnat out<span class="sy0">-</span>interface<span class="sy0">=</span>pppoe<span class="sy0">-</span>out1</pre></div></div>
<p>Anche per il Sito 2 come dst-address ho usato una <strong>/16</strong> questo perchè le due subnet sono differenti, quindi così sono sicuro di inglobare entrambe.</p>
<p>Fatto questo possiamo creare il tunnell VPN con IPSec:</p>
<div id="wpshdo_6" class="wp-synhighlighter-outer"><div id="wpshdt_6" class="wp-synhighlighter-expanded"><table border="0" width="100%"><tr><td align="left" width="80%"><a name="#codesyntax_6"></a><a id="wpshat_6" class="wp-synhighlighter-title" href="#codesyntax_6"  onClick="javascript:wpsh_toggleBlock(6)" title="Click to show/hide code block">Source code</a></td><td align="right"><a href="#codesyntax_6" onClick="javascript:wpsh_code(6)" title="Show code only"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/code.png" /></a>&nbsp;<a href="#codesyntax_6" onClick="javascript:wpsh_print(6)" title="Print code"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/printer.png" /></a>&nbsp;<a href="http://www.linux360.it/wp-content/plugins/wp-synhighlight/About.html" target="_blank" title="Show plugin information"><img border="0" style="border: 0 none" src="http://www.linux360.it/wp-content/plugins/wp-synhighlight/themes/default/images/info.gif" /></a>&nbsp;</td></tr></table></div><div id="wpshdi_6" class="wp-synhighlighter-inner" style="display: block;"><pre class="powershell" style="font-family:monospace;"><span class="sy0">/</span>ip ipsec peer
add address<span class="sy0">=</span>1.1.1.1<span class="sy0">/</span><span class="nu0">32</span> dpd<span class="sy0">-</span>interval<span class="sy0">=</span>disable<span class="sy0">-</span>dpd enc<span class="sy0">-</span>algorithm<span class="sy0">=</span>3des hash<span class="sy0">-</span>algorithm<span class="sy0">=</span>md5 nat<span class="sy0">-</span>traversal<span class="sy0">=</span>no secret<span class="sy0">=!</span>mys3cr3t
&nbsp;
<span class="sy0">/</span>ip ipsec policy
add dst<span class="sy0">-</span>address<span class="sy0">=</span>192.168.0.0<span class="sy0">/</span><span class="nu0">16</span> sa<span class="sy0">-</span>dst<span class="sy0">-</span>address<span class="sy0">=</span>1.1.1.1 sa<span class="sy0">-</span>src<span class="sy0">-</span>address<span class="sy0">=</span>2.2.2.2 src<span class="sy0">-</span>address<span class="sy0">=</span>192.168.2.0<span class="sy0">/</span><span class="nu0">24</span> tunnel<span class="sy0">=</span>yes</pre></div></div>
<p>Il gioco è fatto!</p>
<p>Enjoy!</p>
<p>&nbsp;</p>
<p>L'articolo <a rel="nofollow" href="http://www.linux360.it/2014/10/20/mikrotik-site-to-site-ipsec-vpn/">Mikrotik Site to Site IPsec VPN</a> sembra essere il primo su <a rel="nofollow" href="http://www.linux360.it">Linux 360° | Italia</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.linux360.it/2014/10/20/mikrotik-site-to-site-ipsec-vpn/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
