Site to site vpn Synology router

Synology router understøtter site to site vpn. Efter DSM er opgraderet til SRM version 1.3 er der sket ændringer på din router. Den understøtter flere netværk F.eks. Gæste netværk, Vlan.

Dette kan give nogle udfordringer når du skal oprette et site og site VPN, for under “privat undernet” kan man ikke vælge “netværk 1” som er det primære netværk

Du kan se at man kan vælge Lan på billedet : men det er oprettet manuelt under objekter

Sådan opretter du et objekt “netværk”. Gå i VPN plus server og vælg objekt. Klik på tilføj og opret et netværk som er = Netværk 1 primær netværk

Installer connector synology twingate

start med at downloade twingate

Kør guide under container

TENANT_URL
REFRESH_TOKEN
ACCESS_TOKEN

Tilføje disse variabler

Huskl at når du første har genereret token kan du ikke få dem vist igen.

Du må heller ikke genbruge tokens

Don’t reuse Connector tokens

‘Connector tokens are unique to each individual Connector and they cannot be shared between Connectors.’

Når connector er forbundet skal der laves en “resource”

en resource kan være en enhed ip adresse, en range af ipadresser 192.168.10.0/24,det kan være porte f.esk 3389

For at forbinde til twingate download du klienten her: https://www.twingate.com/download

Opsætning af DMARC

DMARC skal sikre os at vi tjekker for SPF og DKIM “digital signatur” inden vi modtager en mail på vores server i office 365.

Inde du går i gang skal du tjekke at du har adgang til kundens DNS records

Start med at oprette en e-mail shared mailbox til at opsamle fejl rapporter. F.eks. dmarc@domænenavn.dk

Til at generere vores TXT DNS record benytter vi denne side Link

v=DMARC1;p=reject;sp=reject;pct=100;rua=mailto:dmarc@uni-it.dk;ruf=mailto:dmarc@uni-it.dk;ri=86400;aspf=r;adkim=r;fo=1

Her er forklaring på en enkelte records

v (required)The version tag. The only allowed value is “DMARC1”. If it’s incorrect or the tag is missing, the DMARC record will be ignored.
p (required)The DMARC policy. Allowed values are “none”, “quarantine”, or “reject“. The default is “none,” which takes no action against non-authenticated emails. It only helps collect DMARC reports and gain insight into your current email flows and their authentication status. “quarantine” marks the failed emails as suspicious, while “reject” blocks them.
ruaAggregate report sending destination. It’s the “mailto:” URI that ESPs use to send failure reports. The tag is optional, but you won’t receive reports if you skip it.
rufForensic (Failure) report sending destination. It’s the “mailto:” URI that ESPs use to send failure reports. The tag is optional, but you won’t receive reports if you skip it.
spThe subdomain policy. The subdomain inherits the domain policy tag (p=) explained above unless specifically defined here. Like the domain policy, the allowed values are “none,” “quarantine,” or “reject.” This option isn’t widely used nowadays.
adkimThe DKIM signature alignment. This tag follows the alignment between the DKIM domain and the parent Header From domain. Allowed values are “r” (relaxed) or “s” (strict). “r” is the default and allows a partial match, while the “s” tag requires the domains to be the same.
aspfThe SPF alignment. This tag follows the alignment between the SPF domain (the sender) and the Header From domain. Allowed values are “r” (relaxed) or “s” (strict). “r” is the default, and allows a partial match, while the “s” tag requires the domains to be exactly the same.
foForensic reporting options. Allowed values are “0,” “1,” “d,” and “s.” “0” is the default value, which generates a forensic report when both SPF and DKIM fail to produce an aligned pass. If either of the protocol outcomes is something other than pass, use “1.” “d” generates a report when DKIM is invalid, while “s” does the same for SPF. Define the ruf tag to receive forensic reports.
rfThe reporting format for failure reports. Allowed values are “afrf” and “iodef”.
pctThe percentage tag. This tag works on domains with a “quarantine” or “reject” policy only. It marks the percentage of failed emails a given policy should be applied to. The rest falls under a lower policy. For example, if “pct=70,” on a domain with a “quarantine” policy, it applies only 70% of the time. The remaining 30% goes under “p=none”. Similarly, if “p=reject” and “pct=70,” “reject” applies to 70% of failed emails, and 30% go into “quarantine.”
riReporting interval. Marks the frequency of received XML reports in seconds. The default is 86400 (once a day). Regardless of the set interval, in most cases, ISPs send the reports at different intervals (usually once a day).

Opsætning af DKIM

Forberedelse: Tjek at du har adgang kundens DNS records

Trin til oprettelse af DKIM

1.Log ind på siden https://security.microsoft.com/dkimv2

2. Klik på opret DKIM -nøgler

Der genereres nu domænenøgler

Tryk nu enable DKIM

Verifices DKIM hos microsoft

https://admin.microsoft.com/AdminPortal/?searchSolutions=DKIM#/homepage

Kør nu en test og tjeck at det er sat rigtigt op.

Dobbelt tjeck hos mx toolbox. selector er = selector1

Her er resultatet