ansible.fftdf.supernode/readme.md

79 lines
3.5 KiB
Markdown
Raw Normal View History

2022-05-09 08:18:05 +00:00
# Supernode mit direkter VPN Ausleitung
2022-05-09 10:27:42 +00:00
Ausleitung über das FFRL Backbone.
Supernode Config:
- GRE-Tunnel zum FFRL Backbone
- VPN per Wireguard
- NAT auf VPN Routern
2022-05-09 08:18:05 +00:00
2022-05-09 10:27:42 +00:00
## Adressbereiche:
2022-05-09 08:18:05 +00:00
2022-05-09 10:27:42 +00:00
Supernode: 10.255.1.1/32
2022-05-09 08:18:05 +00:00
2022-05-09 10:27:42 +00:00
VPN01: 10.255.1.2/32, Client: 10.1.0.0/16
VPN02: 10.255.1.3/32, Client: 10.2.0.0/16
VPN03: 10.255.1.4/32, Client: 10.3.0.0/16
etc.
2022-05-09 08:18:05 +00:00
2022-05-09 10:27:42 +00:00
## ER-X Stock Firmware Config:
> Vor der Installation:
> - eth0 als DHCP Client
> - eth1-4 auf den Switch
> - Switch mit DHCP Server einrichten. Adressbereich aus Tabelle beachten!
2022-05-09 08:18:05 +00:00
2022-05-09 10:27:42 +00:00
## Install Wireguard
cd /tmp
curl -OL https://github.com/WireGuard/wireguard-vyatta-ubnt/releases/download/1.0.20211208-1/e50-v2-v1.0.20211208-v1.0.20210914.deb
sudo dpkg -i e50-v2-v1.0.20211208-v1.0.20210914.deb
2022-05-09 08:18:05 +00:00
2022-05-09 10:27:42 +00:00
## Generate Keys
cd /config/auth
wg genkey | tee /config/auth/wg.key | wg pubkey > wg.public
cat wg.public
cat wg.key
2022-05-09 08:18:05 +00:00
2022-05-09 10:27:42 +00:00
## Config ER-X
configure
## Wireguard
2022-05-20 17:14:30 +00:00
set interfaces wireguard wg0 address 10.255.1.2/24
set interfaces wireguard wg0 address fd80:3ea2:e399:203a::2/64
2022-05-09 10:27:42 +00:00
set interfaces wireguard wg0 listen-port 51821
set interfaces wireguard wg0 route-allowed-ips false
set interfaces wireguard wg0 persistent-keepalive 25
set interfaces wireguard wg0 peer 5B/YTaDPVWVApUyHshJp899iXXlBy8rBqJUpYvKo+1s= endpoint 7.fftdf.de:42001
set interfaces wireguard wg0 peer 5B/YTaDPVWVApUyHshJp899iXXlBy8rBqJUpYvKo+1s= allowed-ips 0.0.0.0/0
2022-05-20 17:14:30 +00:00
set interfaces wireguard wg0 peer 5B/YTaDPVWVApUyHshJp899iXXlBy8rBqJUpYvKo+1s= allowed-ips ::0/0
2022-05-09 10:27:42 +00:00
set interfaces wireguard wg0 private-key /config/auth/wg.key
## Firewall for Wireguard
set firewall name WAN_LOCAL rule 20 action accept
set firewall name WAN_LOCAL rule 20 protocol udp
set firewall name WAN_LOCAL rule 20 description 'WireGuard'
set firewall name WAN_LOCAL rule 20 destination port 51821
set firewall group network-group LAN-VPN description 'Networks on LAN destined to go out VPN by default'
set firewall group network-group LAN-VPN network 10.1.0.0/16
2022-05-20 17:14:30 +00:00
set firewall group ipv6-network-group IPv6-VPN ipv6-network 2a03:2260:121:7001::/64
2022-05-09 10:27:42 +00:00
set firewall group network-group RFC1918 network 10.0.0.0/8
set firewall group network-group RFC1918 network 172.16.0.0/12
set firewall group network-group RFC1918 network 192.168.0.0/16
set firewall group network-group RFC1918 network 169.254.0.0/16
set protocols static table 2 route 0.0.0.0/0 next-hop 10.255.1.1
2022-05-20 17:14:30 +00:00
set protocols static table 2 route6 ::/0 next-hop fd80:3ea2:e399:203a::1
2022-05-09 10:27:42 +00:00
set firewall modify VPN_TDF7 rule 100 action modify
set firewall modify VPN_TDF7 rule 100 description 'Route traffic from group LAN-VPN through VPN-TDF7 table'
set firewall modify VPN_TDF7 rule 100 modify table 2
set firewall modify VPN_TDF7 rule 100 source group network-group LAN-VPN
2022-05-20 17:14:30 +00:00
set firewall ipv6-modify IPv6-VPN_TDF7 rule 100 action modify
set firewall ipv6-modify IPv6-VPN_TDF7 rule 100 description 'Route traffic from group IPv6-VPN through IPv6-VPN-TDF7 table'
set firewall ipv6-modify IPv6-VPN_TDF7 rule 100 modify table 2
set firewall ipv6-modify IPv6-VPN_TDF7 rule 100 source group ipv6-network-group IPv6-VPN
set interfaces switch switch0 firewall in modify VPN_TDF7
set interfaces switch switch0 firewall in modify IPv6-VPN_TDF7
2022-05-09 10:27:42 +00:00
## NAT einrichten
set service nat rule 5010 description 'masquerade for VPN'
set service nat rule 5010 outbound-interface wg0
set service nat rule 5010 type masquerade
set service nat rule 5010 protocol all
## Speichern
commit ; save