<ipsec> <phase1> <ikeid>1</ikeid> <iketype>ikev1</iketype> <interface>opt1</interface> <mode>aggressive</mode> <protocol>inet</protocol> <myid_type>fqdn</myid_type> <myid_data>#sub.domain.von.OPNSense.de#</myid_data> <peerid_type>fqdn</peerid_type> <peerid_data>#sub.domain.von.FB7590.de#</peerid_data> <encryption-algorithm> <name>aes</name> <keylen>256</keylen> </encryption-algorithm> <lifetime>28800</lifetime> <pre-shared-key>#presharedkey#</pre-shared-key> <authentication_method>pre_shared_key</authentication_method> <descr>StS VPN</descr> <nat_traversal>on</nat_traversal> <auto>start</auto> <dhgroup>14</dhgroup> <hash-algorithm>sha512</hash-algorithm> <private-key/> <remote-gateway>#sub.domain.von.FB7590.de#</remote-gateway> </phase1> <phase2> <ikeid>1</ikeid> <uniqid>62dd76bf9c819</uniqid> <mode>tunnel</mode> <pfsgroup>14</pfsgroup> <lifetime>28800</lifetime> <descr>P2 StS VPN</descr> <protocol>esp</protocol> <localid> <type>network</type> <address>192.168.24.0</address> <netbits>24</netbits> </localid> <remoteid> <type>network</type> <address>192.168.178.0</address> <netbits>24</netbits> </remoteid> <encryption-algorithm-option> <name>aes256</name> </encryption-algorithm-option> <hash-algorithm-option>hmac_sha512</hash-algorithm-option> <reqid>1</reqid> </phase2> <client/> <enable>1</enable> </ipsec>
vpncfg { connections { enabled = yes; editable = yes; conn_type = conntype_lan; name = " <=> "; always_renew = no; reject_not_encrypted = no; dont_filter_netbios = yes; localip = 0.0.0.0; local_virtualip = 0.0.0.0; remoteip = 0.0.0.0; remote_virtualip = 0.0.0.0; remotehostname = "DYNDNSSENSE"; localid { fqdn = "MYFRITZ"; } remoteid { fqdn = "DYNDNSSENSE"; } mode = phase1_mode_idp; phase1ss = "dh14/aes/sha"; keytype = connkeytype_pre_shared; key = "PSK"; cert_do_server_auth = no; use_nat_t = yes; use_xauth = no; use_cfgmode = no; phase2localid { ipnet { ipaddr = 192.168.X.0; mask = 255.255.255.0; } } phase2remoteid { ipnet { ipaddr = 192.168.3.0; mask = 255.255.255.0; } } phase2ss = "esp-all-all/ah-none/comp-all/pfs"; accesslist = "permit ip any 192.168.3.0 255.255.255.0"; } ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500", "udp 0.0.0.0:4500 0.0.0.0:4500";}