I actually don't know, and I'm just citing the docs. I've never done pre-shared keys on OpenVPN, only certificates. There is a configuration that will allow multiple clients to connect using the same certificate, though, so it's possible that may also apply to the PSK configuration. OPENVPN - Shared Private Key Setup (Part 1) AUTHOR - Nic Maurel. Use static, pre-shared keys or TLS-based dynamic key exchange. This will generate a 2048bit encrypted key called key.txt, this needs to be copied over to the other OpenVPN server or client with scp or sftp.

-->

Azure S2S VPN connections provide secure, cross-premises connectivity between customer premises and Azure. This tutorial walks through IPsec S2S VPN connection life cycles such as creating and managing a S2S VPN connection. You learn how to:

  • Pre Shared Key for IPsec: Enter a pre-shared key to use with L2TP VPN. Default Virtual HUB in a case of omitting the HUB on the Username: Users must specify the Virtual Hub they are trying to connect to by using Username@TargetHubName as their username when connecting. Activate SSTP & OpenVPN.
  • Ubuntu: Setting OpenVPN Pre-Shared Static Key on Linux Tutorial :: What is Setting OpenVPN with static key are ideal for point-to-point VPNs or proof-of-concept testing.:: Installing OpenVPN Server in Ubuntu aptitude install openvpn:: Create Pre-Shared Static Key for OpenVPN openvpn –genkey.
  • Cat client.ovpn client tls-client pull dev tun proto udp remote 192.168. Resolv-retry infinite nobind dhcp-option DNS 208.67.222.222 user nobody group nogroup persist-key persist-tun key-direction 1 tls-auth ta.key 1 comp-lzo verb 3 ca ca.crt cert client.crt key client.key auth SHA512 remote-cert-tls server EOF.
  • Create an S2S VPN connection
  • Update the connection property: pre-shared key, BGP, IPsec/IKE policy
  • Add more VPN connections
  • Delete a VPN connection

The following diagram shows the topology for this tutorial:

Working with Azure Cloud Shell and Azure PowerShell

This article uses PowerShell cmdlets. To run the cmdlets, you can use Azure Cloud Shell. The Azure Cloud Shell is a free interactive shell that you can use to run the steps in this article. It has common Azure tools preinstalled and configured to use with your account.

To open the Cloud Shell, just select Try it from the upper right corner of a code block. You can also launch Cloud Shell in a separate browser tab by going to https://shell.azure.com/powershell. Select Copy to copy the blocks of code, paste it into the Cloud Shell, and press enter to run it.

Requirements

Complete the first tutorial: Create VPN gateway with Azure PowerShell to create the following resources:

  1. Resource group (TestRG1), virtual network (VNet1), and the GatewaySubnet
  2. VPN gateway (VNet1GW)

The virtual network parameter values are listed below. Note the additional values for the local network gateway which represent your on-premises network. Change the values below based on your environment and network setup, then copy and paste to set the variables for this tutorial. If your Cloud Shell session times out, or you need to use a different PowerShell window, copy and paste the variables to your new session and continue the tutorial.

Note

If you are using this to make a connection, be sure to change the values to match your on-premises network. If you are just running these steps as a tutorial, you don't need to make changes, but the connection will not work.

The workflow to create an S2S VPN connection is straightforward:

  1. Create a local network gateway to represent your on-premises network
  2. Create a connection between your Azure VPN gateway and the local network gateway

Create a local network gateway

A local network gateway represents your on-premises network. You can specify the properties of your on-premises network in the local network gateway, including:

  • Public IP address of your VPN device
  • On-premises address space
  • (Optional) BGP attributes (BGP peer IP address and AS number)

Create a local network gateway with the New-AzLocalNetworkGateway command.

Create a S2S VPN connection

Next, create a Site-to-Site VPN connection between your virtual network gateway and your VPN device with the New-AzVirtualNetworkGatewayConnection. Notice that the '-ConnectionType' for Site-to-Site VPN is IPsec.

Add the optional '-EnableBGP $True' property to enable BGP for the connection if you are using BGP. It is disabled by default. Parameter '-ConnectionProtocol' is optional with IKEv2 as default. You can create the connection with IKEv1 protocols by specifying -ConnectionProtocol IKEv1.

Openvpn key file

Update the VPN connection pre-shared key, BGP, and IPsec/IKE policy

View and update your pre-shared key

Azure S2S VPN connection uses a pre-shared key (secret) to authenticate between your on-premises VPN device and the Azure VPN gateway. You can view and update the pre-shared key for a connection with Get-AzVirtualNetworkGatewayConnectionSharedKey and Set-AzVirtualNetworkGatewayConnectionSharedKey.

Important

The pre-shared key is a string of printable ASCII characters no longer than 128 in length.

This command shows the pre-shared key for the connection:

The output will be 'Azure@!b2C3' following the example above. Use the command below to change the pre-shared key value to 'Azure@!_b2=C3':

Enable BGP on VPN connection

Azure VPN gateway supports BGP dynamic routing protocol. You can enable BGP on each individual connection, depending on whether you are using BGP in your on-premises networks and devices. Specify the following BGP properties before enabling BGP on the connection:

  • Azure VPN ASN (Autonomous System Number)
  • On-premises local network gateway ASN
  • On-premises local network gateway BGP peer IP address

If you have not configured the BGP properties, the following commands add these properties to your VPN gateway and local network gateway: Set-AzVirtualNetworkGateway and Set-AzLocalNetworkGateway.

Use the following example to configure BGP properties:

Enable BGP with Set-AzVirtualNetworkGatewayConnection.

You can disable BGP by changing the '-EnableBGP' property value to $False. Refer to BGP on Azure VPN gateways for more detailed explanations of BGP on Azure VPN gateways.

Apply a custom IPsec/IKE policy on the connection

You can apply an optional IPsec/IKE policy to specify the exact combination of IPsec/IKE cryptographic algorithms and key strengths on the connection, instead of using the default proposals. The following sample script creates a different IPsec/IKE policy with the following algorithms and parameters:

  • IKEv2: AES256, SHA256, DHGroup14
  • IPsec: AES128, SHA1, PFS14, SA Lifetime 14,400 seconds & 102,400,000 KB

Refer to IPsec/IKE policy for S2S or VNet-to-VNet connections for a complete list of algorithms and instructions.

Add another S2S VPN connection

Add an additional S2S VPN connection to the same VPN gateway, create another local network gateway, and create a new connection between the new local network gateway and the VPN gateway. Use the following examples, making sure to modify the variables to reflect your own network configuration.

There are now two S2S VPN connections to your Azure VPN gateway.

Delete a S2S VPN connection

Delete a S2S VPN connection with Remove-AzVirtualNetworkGatewayConnection.

Delete the local network gateway if you no longer need it. You cannot delete a local network gateway if there are other connections associated with it.

Clean up resources

If this configuration is part of a prototype, test, or proof-of-concept deployment, you can use the Remove-AzResourceGroup command to remove the resource group, the VPN gateway, and all related resources.

Next steps

In this tutorial, you learned about creating and managing S2S VPN connections such as how to:

  • Create an S2S VPN connection
  • Update the connection property: pre-shared key, BGP, IPsec/IKE policy
  • Add more VPN connections
  • Delete a VPN connection

Advance to the following tutorials to learn about S2S, VNet-to-VNet, and P2S connections.

PSK Generator provides a secure process to negotiate a 64-byte IPsec Pre-Shared Key (also known as a Shared Secret or PSK) through insecure means, such as email.

Note: This page uses client side javascript. It does not transmit any entered or calculated information.

Learn more about this PSK Generator.

Instructions:

You and your VPN partner will use two separate passwords to create a unique 64-byte shared secret with the help of a cryptographic hash generator. Regardless of the length of each password, the generated Shared Secret will always be 64 bytes.

1) Create a list of at least 10 randomly generated passwords. These passwords should be at least 64 characters long. Email the password list to your VPN partner, but do NOT include these instructions, this website address, or anything else in the email that reveals the process that is about to be used.

Hint: Click on the keyhole of the padlock picture above to get a list of 32 cryptographically strong random passwords.

2) Over the phone, provide your VPN partner this website address and have them pick one of the passwords from the list you emailed to them. Both of you will copy and paste the selected password to the Password Seed box.

3) Give your VPN partner a simple shorter password. I suggest a 16-digit numeric string as this would be easy to share over the phone with a reduced chance of mistakes. Both of you will enter this shorter passsword in the Key box.

4) Both of you will click the Generate button. Verify the first and last 2 or 3 bytes over the phone to ensure you've created the same Shared Secret.

5) Copy and paste the Shared Secret to your VPN configuration.

Alternate Method: Both parties use a random password generator to create a list of 10 or more long passwords and email them to each other. On the phone, decide which password from one of the lists to use as the Password Seed and which password from the other list for the Key.

Openvpn License Key

Other Password Tools

Coments are closed
Scroll to top