Configuring the 96xx VPN enabled phone with Juniper SSG-20 for IPSec Based authentication mechanism Issue th October 2009 ABSTRACT

Size: px
Start display at page:

Download "Configuring the 96xx VPN enabled phone with Juniper SSG-20 for IPSec Based authentication mechanism Issue 1.0. 10th October 2009 ABSTRACT"

Transcription

1 Avaya CAD-SV Configuring the 96xx VPN enabled phone with Juniper SSG-20 for IPSec Based authentication mechanism Issue th October 2009 ABSTRACT These Application Notes describe the steps for configuring the Juniper Secure Services Gateway 20 Security Platform with a policy-based IPSec VPN and XAuth enhanced authentication to support the Avaya 96xx VPN enabled Phone. The sample configuration presented in these Application Notes utilizes a shared IKE Group ID to streamline the VPN configuration and management, IP Network Region segmentation to logically group and administer 96xx VPN enabled Phones and NAT-T for IPSec traversal of Network Address Translation devices. Page: 1 11/18/2009

2 TABLE OF CONTENTS 1. NETWORK TOPOLOGY EQUIPMENT AND SOFTWARE VALIDATED Juniper SSG-20 CONFIGURATION Access SSG Configure Juniper SSG Ethernet Interfaces IP Address Pool Routes Configure Default Route Configure Route to IP Pool Address range Local User Configuration XAuth Users Local User Group Configuration IKE User Group Xauth User Group VPN AutoKey IKE Gateway Configuration - Phase AutoKey IKE VPN Tunnel Configuration - Phase XAuth Configuration XAuth Server Defaults Enable XAuth Authentication for AutoKey IKE gateway H.323 ALG Security Policies Avaya 96xx VPN Enabled IP Phone CONFIGURATION xx series IP Phone Firmware Configuring Avaya 96xx series IP Phone xxsettings.txt File TROUBLE SHOOTING IKE Phase 1 no response Incorrect IKE Phase Invalid Username, password: Invalid IKEID and PSK: Phone displaying connecting Page: 2 11/18/2009

3 5.6 No gateway address: CONCLUSION REFERENCES Page: 3 11/18/2009

4 Introduction. The Avaya 96xx VPN enabled Phone is software based Virtual Private Network (VPN) client integrated into the firmware of an Avaya 96xx release 3.1 IP Telephone. This enhancement allows the Avaya IP Telephone to be plugged in and used seamlessly over a secure VPN from any broadband Internet connection. Avaya IP Telephone models 9620, 9620C, 9620L, 9630, 9640, 9650, 9650C, 9670 support VPN feature. Avaya 96xx VPN enabled Phone extends the support of head-end VPN gateways to include Juniper security platforms. The configuration steps described in these Application Notes utilize a Juniper Secure Services Gateway (SSG) model 20. However, these configuration steps can be applied to Juniper Netscreen and ISG platforms using the ScreenOS version specified in Section 3. The sample network provided in these Application Notes implements the following features of the Juniper SSG 20 and Avaya 96xx VPN enabled Phone: Policy-Based IPSec VPN The policy-based VPN feature of the Juniper SSG allows a VPN Tunnel to be directly associated with a security policy as opposed to a route-based VPN being bound to a logical VPN Tunnel interface. Because no network exists beyond a VPN client end-point, policy-based VPN tunnels are a good choice for VPN end-point configurations such as with the Avaya 96xx VPN enabled Phone. XAuth User Authentication The XAuth protocol enables the Juniper SSG to authenticate the individual users of the 96xx VPN enabled Phone. The XAuth user authentication is in addition to the IKE IPSec VPN authentication. The IKE and XAuth authentication steps of the Avaya 96xx VPN enabled Phone is as follows: Step 1. Step 2. Step 3. Phase 1 negotiations: the Juniper SSG authenticates the Avaya 96xx VPN enabled Phone by matching the IKE ID (Group Name) and Pre-Shared key (Group password) sent by the Avaya 96xx VPN enabled Phone. If there is a match, the Juniper SSG XAuth process begins. XAuth: the Juniper SSG XAuth server prompts the Avaya 96xx VPN enabled Phone for user credentials (Username and Password). If the Avaya 96xx VPN enabled Phone is configured to store user credentials in flash memory, the Avaya 96xx VPN Phone responds to the Juniper SSG with the stored credentials without user involvement. Otherwise the Avaya 96xx Phone displays a prompt for username and password to be manually entered. Phase 2 negotiations: Once the XAuth user authentication is successful, Phase 2 negotiations begin. Page: 4 11/18/2009

5 XAuth Dynamic IP Address Assignment The XAuth protocol enables the Juniper SSG appliance to dynamically assign IP addresses from a configured IP Address pool range. The assignment of IP address ranges to Avaya 96xx VPN enabled Phones enables Avaya Communication Manager to map the Avaya 96xx VPN enabled Phones into IP Network Regions. Shared IKE Group ID The shared IKE ID feature of the Juniper SSG appliance facilitates the deployment of a large number of dialup IPSec VPN users. With this feature, the security device authenticates multiple dialup VPN users using a single group IKE ID and Preshared key. Thus, it provides IPSec protection for large remote user groups through a common VPN configuration. XAuth user authentication must be used when implementing Shared IKE Group ID. IP-Network-Region Segmentation A common deployment for the Avaya 96xx VPN enabled Phones is in a home network environment with limited bandwidth. The G.729 codec with 30 ms is recommended for such bandwidth constrained environments. Avaya Communication Manager IP Network Regions allow IP endpoints to be logically grouped together to apply unique configuration settings, including the assignment of specific codecs. Page: 5 11/18/2009

6 1. NETWORK TOPOLOGY Fig 1: The sample Test Network diagram for configuring 96xx VPN enabled phones with Juniper SSG20 for Secure IPSec based authentication. The sample network implemented for these Application Notes is shown in Figure 1. The Corporate/Trusted IP Network location contains the Juniper SSG-20 VPN Router functioning as perimeter security device and VPN head-end. The Avaya S8730 Server and Avaya G700 Media Gateway are also located at the Corporate Page: 6 11/18/2009

7 IP Network. The Avaya 96xx series VPN Enabled IP Phones are located in the Home/Untrusted network and configured to establish an IPSec tunnel to the Public IP address of the Juniper VPN Router. The Juniper VPN Router will assign IP addresses to the 96xx series VPN enabled IP Phones. The assigned IP addresses, also known as the inner addresses, will be used by the 96xx series IP Phones when communicating inside the IPSec tunnel and in the private corporate network to Avaya Communication Manager. Page: 7 11/18/2009

8 2. EQUIPMENT AND SOFTWARE VALIDATED Table 1 lists the equipment and software/firmware versions used in the sample configuration provided. Equipment Software Version Avaya G700 Media Gateway with S8300. Avaya Communication Manager 3.1 Build 4.0 and above. Avaya 96xx Telephone Release 3.1 Juniper SSG r5.0 (Firewall + VPN). Table 1 Equipment Version Information Page: 8 11/18/2009

9 3. Juniper SSG-20 CONFIGURATION Juniper SSG 20 are included in the sample configuration as described in Section 2. The primary difference in the configuration between these Juniper SSG 20s is IP address assignment and IP Pool address range. The configuration steps utilize the Web User Interface (WebUI) of the Juniper SSG Access SSG From a serial connection to the Console port of the Juniper SSG, log in and access the Command Line Interface using a Terminal Emulation application such as Windows HyperTerm. Execute the following commands to configure the Juniper SSG Ethernet interface 0/0. This enables access to the Juniper SSG WebUI. SSG20-> set interface ethernet0/0 ip /24 SSG20-> set interface ethernet0/0 ip manageable 1 From a web browser, enter the URL of the Juniper SSG WebUI management interface, address of the SSG>, and the following login screen appears. Log in using a user name with administrative privileges. 2 The Juniper SSG WebUI administration home page appears upon successful login. Note the ScreenOS Firmware Version in the Device Information section. Page: 9 11/18/2009

10 3.2 Configure Juniper SSG Ethernet Interfaces The Juniper SSG 20 has four build-in Ethernet interfaces, Ethernet 0/0 Ethernet 0/3. The steps below configured Ethernet 0/0 to a Trust security zone facing the internal corporate network and Ethernet 0/1 to an Untrust security zone facing the public internet. The Avaya 96xx VPN enabled Phone will interact with Ethernet 0/1 when establishing an IPSec Tunnel Configure Ethernet 0/0: 1 From the left navigation menu, select Network > Interfaces. The Network Interfaces List screen appears. The IP address is already populated for Ethernet0/0 from the basic configuration of Section 4.1. Select Edit for Ethernet 0/0 2 From the Ethernet 0/0 properties page, configure the highlighted fields shown below. All remaining fields can be left as default. Select OK to save. Ethernet 0/0 connects to the private corporate network making it a trusted interface. It is placed in the Trust security zone of the Juniper SSG. The Service Options selected and enabling Manageability are related to the interface being in the Trust zone. Page: 10 11/18/2009

11 3.2.2 Configure Ethernet 0/1 Interface: 1 From the Network Interfaces List screen, select Edit for Ethernet 0/1 2 From the Ethernet 0/1 properties page, configure the highlighted fields shown below. All remaining fields can be left as default. Select OK to save. Page: 11 11/18/2009

12 Because Ethernet0/1 is in the Untrust zone and not configured as manageable, all service options are disabled. Page: 12 11/18/2009

13 3.3 IP Address Pool The XAuth protocol enables the Juniper SSG to dynamically assign IP addresses from a configured IP Address pool range to IPSec clients such as the Avaya 96xx VPN enabled Phone. The following steps create the IP Address Pool: 1 From the left navigation menu, select Objects > IP Pools. On the IP Pools list page, select New. 2 From the IP Pools Edit page, populate the highlighted fields shown below then select OK to save. The IP Pool Name is a descriptive name for this IP Pool. Once configured, this name will appear in the IP Pool Name drop-down menu of Section 4.8. Ensure the IP address range does not conflict with addresses used throughout the corporate trusted network. 3. The IP Pools list page displays the new address pool entry. 3.4 Routes The sample configuration requires two new route entries be added to the Juniper SSG routing table, one specifying the default route and one specifying the network address range entered for the IP Address Pool in Section 4.3. Although several routing options exist in the Juniper SSG platform, static routes are used for this sample configuration. 3.5 Configure Default Route Page: 13 11/18/2009

14 1 From the left navigation menu, select Network > Routing > Destination The Route Entries screen similar to the one below appears. 2 Configure the highlighted fields shown below. All remaining fields can be left as default. Select OK to save. Select trust-vr from drop down menu then New The /0 network indicates the default route when no other matches existing in the routing table. The route is going to the next hop out interface Ethernet 0/2 to the public internet. Page: 14 11/18/2009

15 3.6 Configure Route to IP Pool Address range 1 From the Route Entries screen, select trust-vr from the drop down menu then select New. 2 Configure the highlighted fields shown below. All remaining fields can be left as default. Select OK to save. The IP Address / Netmask is the network used for the IP Address Pool in Section 4.3. The Gateway IP Address specifies the next hop route of the trusted corporate network. 3.7 Local User Configuration The sample configuration includes two different user types; IKE users and XAuth users. IKE users are typically associated with a device such as the Avaya VPN enabled Phone and are used to authenticate the actual device during the establishment of the IPSec tunnel. XAuth users are remotely authenticated users who access a head-end security gateway via an AutoKey IKE VPN tunnel. Whereas the authentication of IKE users is actually the authentication of an individual s device, Avaya VPN enabled Phone, the authentication of XAuth users is the authentication of the individual Page: 15 11/18/2009

16 themselves IKE User The following steps create an IKE user to be used by Avaya VPN enabled Phones for IKE authentication. 1. From the left navigation menu, select Objects > User > Local > New. Configure the highlighted fields shown below. All remaining fields can be left as default. Select OK to save. The Number of Multiple Logins with Same ID parameter specifies the number of end-points that can concurrently establish IPSec tunnels using this identity. This number must equal or exceed the number of Avaya VPN enabled Phones accessing this Juniper SSG. IKE Identity, combined with a Pre-Shared Key, is used to identify the end-point when an initial IKE Phase one dialog begins. The format of the IKE Identity used is of an address. As described in Section 5.2, the Group Name field of the Avaya VPN enabled Phone must match this IKE Identity string. ssg20@avaya.com is used in these Application Notes however any address string can be used. 2. The local Users list page displays the new IKE user: Page: 16 11/18/2009

17 3.8 XAuth Users Three XAuth user accounts, wasim, ganesh, kdas etc are created in the sample configuration for users of the Avaya 96xx VPN enabled Phones. The following steps create a user account for wasim. Follow the same steps to create accounts for ganesh, kdas etc. The XAuth server of the Juniper SSG provides the authentication of these users. The users of the Avaya 96xx VPN enabled Phone will need to be supplied with their user name and password. Users will be prompted on the phone display to enter this information as the Avaya 96xx VPN enabled Phone establishes the IPSec tunnel or the password can be stored the 96xx VPN enabled Phones flash memory, see Section 5.2 for additional detail. 1. From the left navigation menu, select Objects > User > Local > New. Configure the highlighted fields shown below. All remaining fields can be left as default. Select OK to save. Follow the same steps for each additional user. Page: 17 11/18/2009

18 2. The local Users list page displays the new XAuth users: 3.9 Local User Group Configuration User groups have the benefit of being able to create one policy for the user group and that policy automatically applies to all members of a group. This eliminates the need to create polices for each Page: 18 11/18/2009

19 individual user. The sample configuration includes two different types of User Groups: IKE and XAuth. The IKE users and XAuth users created in Section 4.5 must now be added to an IKE Group and an XAuth Group respectfully IKE User Group 1. From the left navigation menu, select Objects > User > Local Groups > New. Enter a descriptive Group Name. Select the vpnphone-ike user name from the Available Members column on the right. Select the << icon to move the user name to the Group Members column on the left. Select OK to save. 2. The Local Groups list page displays the new IKE group: Xauth User Group 1 From the left navigation menu, select Objects > User > Local Groups > New. Enter a descriptive Group Name. Select the wasim, ganesh and kdas user names from the Available Members column on the Page: 19 11/18/2009

20 right. Select the << icon to move the user name to the Group Members column on the left. Select OK to save. 2 The Local Groups list page displays the new XAuth group: VPN Setting up the VPN tunnel encryption and authentication is a two-phase process. Phase 1 covers how the Avaya 96xx VPN enabled Phone and the Juniper SSG will securely negotiate and handle the building of the tunnel. Phase 2 sets up how the data passing through the tunnel will be encrypted at one end and decrypted at the other. This process is carried out on both sides of the tunnel. Table 3 provides the IKE Proposals used in the sample configuration including the proposal name used by the Juniper SSG. Page: 20 11/18/2009

21 Phase Encryption/ Authentication Method Diffie- Hellman Group Encryption Algorithm Hash Algorithm Life Time (sec) SSG Proposal Name P1 Pre-Shared Key 2 3DES MD pre-g2-3des-md5 P2 ESP 2 AES128 SHA g2-esp-aes128-sha Table 3 IKE P1 /P2 Proposals AutoKey IKE Gateway Configuration - Phase 1 1. From the left navigation menu, select VPNs > AutoKey Advanced > Gateway. Select New. Configure the highlighted fields shown below. All remaining fields can be left as default. Provide a descriptive Gateway Name. Selecting Custom Security Level provides access to a more complete list of proposals available on this Juniper SSG. Selecting Dialup User Group associates the Group ssg20-grp created in Section 4.6 to this IKE gateway. Enter an ASCII text string for a Preshared Key that will match the text entered on the Avaya 96xx VPN enabled Phone. Outgoing Interface is the interface which terminates the VPN tunnel. Select Advanced to access additional configuration options. 2. Configure the highlighted fields shown on the next page. All remaining fields can be left as default. Page: 21 11/18/2009

22 Select Return to complete the advanced configuration, and then OK to save. Select Security Level of Custom and the appropriate Phase 1 Proposal from the drop down menu. Refer to Table 3 IKE P1 / P2 Proposals. Aggressive Mode must be used for end-point negotiation such as the Avaya 96xx VPN enabled Phone. Enable NAT-Traversal allows IPSec traffic after Phase 2 negotiations are complete to traverse a Network Address Translation (NAT) device The Juniper SSG first checks if a NAT device is present in the path between itself and the Avaya 96xx VPN enabled Phone. If a NAT device is detected, the Juniper SSG uses UDP to encapsulate each IPSec packet. Page: 22 11/18/2009

23 1 Because the IKE group was selected in Step 1 above, a pop-up window similar to the one below is displayed as a reminder to enable the XAuth server. Section 4.8 provides the XAuth server configuration. Select OK. 2 The AutoKey Advanced > Gateway list page displays the new gateway AutoKey IKE VPN Tunnel Configuration - Phase 2 1. From the left navigation menu, select VPNs > AutoKey IKE. Select New. Configure the highlighted fields shown below. All remaining fields can be left as default. Provide a descriptive VPN Name. Selecting Custom Security Level provides access to a more complete list of proposals available on the Juniper SSG. Select Predefined for Remote Gateway and the select the Remote Gateway name entered in Section 4.7.1, vpnphone-gw, from the drop-down menu. Select Advanced to access additional configuration options. Page: 23 11/18/2009

24 2. Configure the highlighted fields shown below. All remaining fields can be left as default. Select Return to complete the advanced configuration, and then OK to save. Select Security Level of Custom and the appropriate Phase 2 Proposal from the drop down menu. Refer to Table 3 IKE P1 / P2 Proposals. Replay Protection protects the encrypted IPSec traffic from man-in-the-middle replay attacks by including a sequence number with each IKE negotiation between the IKE endpoints. Bind to None uses the outgoing interface, Ethernet 0/2, for all VPN tunnel traffic. Page: 24 11/18/2009

25 3. The AutoKey IKE list page displays the new IKE VPN: Page: 25 11/18/2009

26 3.11 XAuth Configuration The Juniper SSG has a local XAuth server integrated within the ScreenOS operating system. Alternatively, an external Radius server can be used. These Application Notes implement the local ScreenOS XAuth server. The following steps configure the default and IKE gateway specific settings of the local XAuth server XAuth Server Defaults 1. From the left navigation menu, select VPNs > AutoKey Advanced > XAuth Settings. Configure the highlighted fields shown below. All remaining fields can be left as default. Select Apply when complete. Select the IP Pool Name created in Section 4.3 from the drop down menu. This defines the IP Address range used when IP addresses are dynamically assigned to the Avaya VPN enabled Phone by the XAuth server during IKE setup. DNS and WINS IP addresses are also dynamically assigned by the XAuth server. Page: 26 11/18/2009

27 Enable XAuth Authentication for AutoKey IKE gateway 1. From the left navigation menu, select VPNs > AutoKey Advanced > Gateway. The list page displays the IKE gateway created in Section as shown below. Select Xauth under the Configure column for the vpnphone-gw IKE gateway. 2 Configure the highlighted fields shown below. All remaining fields can be left as default. Select OK when complete to save settings. Page: 27 11/18/2009

28 3.12 H.323 ALG 1. From the left navigation menu, select Configuration > Advanced > ALG > Configure. Uncheck the H323 check box to globally disable the H.323 Application Layer Gateway Security Policies 1. From the left navigation menu select Policies. Any currently configured security policies are displayed. Create a security policy for traffic flowing from the Untrust zone to the Trust zone. On the top of the Policies page select Untrust on the From drop-down menu and Trust on the To drop-down menu. Select the New button on top right corner of page to create the new security policy. 2 Configure the highlighted fields shown below. All remaining fields can be left as default. Select OK when complete to save settings. Enter a descriptive policy Name to easily identify this policy in the policy list and logs. Page: 28 11/18/2009

29 Selecting Dial-Up VPN from the Source Address drop down menu and Any from the Destination Address defines the VPN tunnel as the traffic originator. Selecting Tunnel from the Action field drop down menu indicates the action the SSG will take against traffic that matches the first three criteria of the policy: Source Address, Destination Address, and Service. All matching traffic will be associated with a particular VPN Tunnel specified in the Tunnel field. Selecting vpnphone-vpn from the Tunnel VPN drop down menu associates the VPN enabled Phone VPN tunnel to the Action. Check the Modify matching bidirectional VPN policy to have the SSG create a matching VPN policy for traffic flowing in the opposite direction. Page: 29 11/18/2009

30 4. The Policies list page displays the new Dial-Up VPN policy: Page: 30 11/18/2009

31 4. Avaya 96xx VPN Enabled IP Phone CONFIGURATION xx series IP Phone Firmware The Avaya 96xx series (3.1) VPN-Enabled IP Phone firmware must be installed on the phone prior to the phone being deployed in the remote location. The firmware version of Avaya IP telephones can be identified by viewing the version displayed on the phone upon boot up or when the phone is operational by selecting the Options hard button View IP Settings soft button Miscellaneous soft button Right arrow hard button. The Application file name displayed denotes the installed firmware version. As displayed in Table 1, 96xx series IP Phone firmware includes 3_1 in the name. This allows for easy identification of firmware versions incorporating VPN capabilities. 4.2 Configuring Avaya 96xx series IP Phone The Avaya 96xx series IP Phone configuration can be administered centrally from an HTTP server through 46xxsettings.txt file (mentioned in section 5.3) or locally on the phone. These Application Notes utilize the local phone configuration method. Refer to [1] and [2] for details on a centralized configuration. 1. There are two methods available to access the VPN Configuration Options menu from the 96xx series IP Phone. [A]. During Telephone Boot: - During the 96xx series IP Phone boot up, * key can be used to enter the Configuration mode is displayed on the telephone screen as shown below. 100 Mbps Ethernet * to program (Please note that the * key can also be used to enter the configuration mode till tunnel building procedures is not complete). When the * key is pressed, it will ask for Enter Code: we need to Press Mute Button + PROCPSWD (default 27238) (Mute #) and then press # to Enter into the phone configuration mode. Go to ADDR (Address Procedures) and update it with the below details. Page: 31 11/18/2009

32 Phones IP Address Call Servers IP Address Router IP Address Subnet Mask Http Server Https Server IP Address 802.1Q Auto VLAN ID 0 VLAN Test 60 Press Exit to come out of the ADDR procedures (Will be assigned from the IP pool configured on the VPN gateway or by the Internal DHCP server if the VPN gateway is configured as DHCP Relay) (Avaya Communication manager IP address) (Will be assigned by the VPN gateway or by the Internal DHCP server if the VPN gateway is configured as DHCP Relay) (Will be assigned by the VPN gateway or by the Internal DHCP server if the VPN gateway is configured as DHCP Relay). A.B.C.D (Internal HTTP server IP address in dotted decimal format from the network which contains the Avaya Communication Manager). A.B.C.D (Internal HTTPS server IP address in dotted decimal format from the network which contains the Avaya Communication Manager). 2. Scroll down to the last option VPN. Note that the VPN configuration parameters will not be edited until the value of VPNPROC parameter is set to 2. (To do this open the upload directory of file server, open the file 46xxsettings.txt file and append it with SET VPNPROC 2 and upload this new 46xxsettings.txt file into the avaya 96xx IP phone). It is recommended to set the value of VPNPROC to 2 while uploading the VPN enabled binary into the phone. Use Right Navigation key to go to the next screen options. (Note that the values will not be saved until Right-Navigation key is pressed even if Save button is pressed ). The External addresses will be reflected only after rebooting the phone. The configuration values of one of the 96xx series IP Phones used in the sample configurations are shown in Table 2 below. No. Option Value 1 VPN : Enabled 2 VPN Vendor: Cisco 3 Gateway Address: 4 External Router: (Outside/Untrust interface IP address of VPN gateway) (Or provided by dhcp from home Network). 5 External Phone IP Address: (Or Same as Page: 32 11/18/2009

33 6 External Subnet Mask: 7 External DNS Server: above) (Or Same as above). (Provided by Service provider). 8 Encapsulation : Copy TOS: No 10 Auth. Type: PSK with XAUTH 11 VPN User Type: 1 User 12 VPN User: (VPN username i.e. ganesh as per our notes) 13 Password Type: Save in Flash 14 User Password: 15 IKE ID (Group Name): ********* (I.e. Remote password i.e. ganesh as per our notes). (Group name i.e. ssg20@avaya.com as per our notes). 16 IKE ID Type: User_FQDN 17 IKE Xchg Mode: Aggressive. 18 IKE DH Group: 2 19 IKE Encryption Alg: Any 20 IKE Auth. Alg. : Any 21 IKE Config. Mode: Enabled 22 IPsec PFS DH Group: 2 23 IPsec Encryption Alg: Any 24 IPsec Auth. Alg.: Any 25 Protected Network: /0 26 IKE Over TCP: Never [B] While phone is operational in VPN enabled Mode. Page: 33 11/18/2009

34 Press Mute button + procpswd + # to enter the craft procedures and follow the above steps to program the VPN enabled phone xxsettings.txt File The 46xxsetting.txt file contains variable values used by the 96xx phone during the setup of the IPSec VPN tunnel. The variables specific Nortel for Local credentials authentication are listed below. Descriptions of each variable and the values used in the sample configuration are shown. ## VPN Mode ## 0: Disabled, 1: Enabled. SET NVVPNMODE 1 ## Vendor. ## 1: Juniper/Netscreen, 2. Cisco ## 3: Checkpoint/ Nokia 4: Other ## 5: Nortel. SET NVVPNSVENDOR 1 ## Encapsulation Type. ## 0: , 1: Disabled ## 2: , ## 4: RFC ( ) SET NVVPNENCAPS 0 ## Copy TOS. ## 1: Yes, 2: No SET NVVPNCOPYTOS 2 ## Authentication Type. ## ## [For Cisco/Juniper/Checkpoint/Other] ## 3: PSK, 4: PSK with Xauth ## 5: RSA signatures with Xauth, 6: Hybrid Xauth ## 7: RSA signatures. ## ## [Nortel Authentication Type] ## 1: Local credentials, 2: Radius Credentials. ## 3: Radius SecureID, 4: Radius Axent. SET NVVPNAUTHTYPE 1 ## VPN User Type. ## 1: Any, 2: User SET NVVPNUSERTYPE 2 Page: 34 11/18/2009

35 ## VPN User name. SET NVVPNUSER ganesh ## Password Type. ## 1: Save in Flash, 2: Erase on reset ## 3: Numeric OTP, 4: Alpha-Numeric OTP ## 5: Erase on VPN termination. SET NVVPNPSWDTYPE 1 ## User Password. SET NVVPNPSWD ganesh ## IKE ID (Group Name). SET NVIKEID ssg20@avaya.com ## Preshared Key (Group Password). SET NVIKEPSK avaya123 ## IKE ID Type. ## 1: IPv4_ADDR, 2: FQDN ## 3: USER_FQDN, 9: DER_ASN1_DN ## 11: Key ID SET NVIKEIDTYPE 3 ## IKE Xchg Mode. ## 1: Aggressive, 2: Identity Protect. SET NVIKEXCHGMODE 1 ## IKE DH Group. SET NVIKEDHGRP 2 ## IKE Encryption Algo. ## 1: AES-128, 2: 3DES ## 3: DEs 4: AEs-192 ## 5: AES-256 0: Any SET NVIKEP1ENCALG 0 ## IKE Auth algo. ## 0: Any, 1: MD5 ## 2: SHA-1 SET NVIKEP1AUTHALG 0 ## IKE Config Mode. ## 0: Enabled, 1: Disabled. Page: 35 11/18/2009

36 SET NVIKECONFIGMODE 0 ## IPsec PFS DH group. SET NVPFSDHGRP 2 ## IPsec Encryption Algo. ## 1: AES-128, 2: 3DES ## 3: DES 4: AEs-192 ## 5: AES-256 6: None ## 0: Any SET NVIKEP2ENCALG 0 ## IPsec Authentication Algo. ## 0: Any, 1: MD5 ## 2: SHA-1 SET NVIKEP2AUTHALG 0 ## Protected Network. SET NVIPSECSUBNET /24 ## IKE Over TCP. ## 0: Never, 1: Auto ## 2: Always SET NVIKEOVERTCP 0 ## Craft access ## 0: Enabled, 1: only view option is available? SET PROCSTAT 0 ## VPN craft access ## 0: disabled, 1: view only ## 2: View and edit. SET VPNPROC 2 ## Call Server address ##SET MCIPADD ## Craft code SET PROCPSWD ## VPN craft access code SET NVVPNCODE 876 ## SNMP String Page: 36 11/18/2009

37 ##SET SNMPSTRING public Page: 37 11/18/2009

38 5. TROUBLE SHOOTING This section offers some common configuration mismatches between the 96xx series IP Phone and the Juniper VPN Router to assist in troubleshooting. The key events of the logs are highlighted in bold. Juniper VPN Router log messages can be access through REPORTS -- > SYSTEM LOG -- > EVENT from the main web management interface. 5.1 IKE Phase 1 no response. If we given user name are incorrect we will get VPN Tunnel Failure Message. VPN tunnel failure Retry Details Sleep If we press Retry Soft key again it will retry to establish the tunnel. If we press Details Soft key. We can see IKE Phase 1 no response IKE Phase 1 no response Restart Program Back Press Program soft key it will redirect to Craft Code Screen Enter Code: # = OK Give Craft Code and it will redirect to Craft Procedures Screen here select VPN and press Start soft key. Press forward soft key on the phone and check the IKE Exchange mode, Check IKE Phase1 parameters on VPN gateway and phone is correct or not, Check the IP pool is configured properly and also same pool name it is mentioned in Profiles -- >Groups -- > Base -- > Edit -- > Connectivity -- > Address pool. Page: 38 11/18/2009

39 5.2 Incorrect IKE Phase 2 If we given incorrect IKE Phase 2 Settings then we will get VPN Tunnel Failure Message VPN tunnel failure Retry Details Sleep If we press Retry soft key again it will retry to establish the tunnel. If we press Details soft key we can see Invalid configuration screen. Invalid configuration Restart Program Back Press Program soft key it will redirect to Craft Code Screen Enter Code: # = OK Give procpswd and it will redirect to local configuration Procedures Screen here select VPN and press Start soft key Press forward soft key on the phone and it will go to IKE Phase 2 Screen, here check the IKE Phase 2 Screen Settings is correct or not. 5.3 Invalid Username, password: Re-enter the correct VPN Username (as configured in the user database) and correct VPN user password. 5.4 Invalid IKEID and PSK: Goto the local procedure configuration page (using details Softkey -- > program -- > procpswd) on the phone and re-enter the correct (configured on the VPN gateway) group name and group password. Group name should be of the form user@xyz.com. Check the Group password. 5.5 Phone displaying connecting This issue can be resolved by the administrators who have access to the Avaya Communication manager and Nortel VPN Gateway. Open the web interface of the Nortel VPN gateway. Check the entered routes are Page: 39 11/18/2009

40 correct. Check that the phone requests are able to reach the ACM and also phone gets response from the ACM (Trace using any sniffing software e.g. Ethereal/Wireshark). Open up the 46xxsettings.txt file and enter SET VPNTTS 0. Reboot the phone with the correct file server IP address. 5.6 No gateway address: Goto to the local procedures configuration page (using details Softkey -- > program -- > procpswd) -- > ADDR -- > Enter the valid Gateway (Avaya Communication Manager) address. Page: 40 11/18/2009

41 6. CONCLUSION The Avaya 96xx series IP Phone combined with Juniper SSG VPN Gateway security appliance provides a secure solution for remote worker telephony over any broadband Internet connection. These Application Notes demonstrate the interoperability of the Avaya 96xx Phone with the Juniper VPN Gateway using Secure IPSec method. Page: 41 11/18/2009

42 7. REFERENCES [1] Avaya solutions and Interoperability Test labs. Application Notes for Configuring Avaya VPN enabled Phone with Juniper Secure Services Gateway using Policy-Based IPSec VPN and XAuth Enhanced Authentication Issue 1.0 [2] Juniper Networks: Concepts & Examples ScreenOS Reference Guide; Volume 5: Virtual Private Networks Release 5.4.0, Rev. A [3] Secure Services Gateway (SSG) 500 Series Hardware Installation and Configuration Guide ScreenOS Version [4] Cameron R., Cantrell C., Killion D., Russell K., Tam K. (2005) Configuring NetScreen Firewalls. Rockland: Syngress Publishing, Inc. [5] Avaya VPN enabled Phone documentation and software download [6] Additional Avaya Application Notes and Resources are available, Avaya Inc. All Rights Reserved. Avaya and the Avaya Logo are trademarks of Avaya Inc. All trademarks identified by and are registered trademarks or trademarks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners. The information provided in these Application Notes is subject to change without notice. The configurations, technical data, and recommendations provided in these Application Notes are believed to be accurate and dependable, but are presented without express or implied warranty. Users are responsible for their application of any products specified in these Application Notes. Page: 42 11/18/2009

Configuring the Juniper SSG as an IPSec VPN Head-end to Support the Avaya VPNremote Phone and Avaya Phone Manager Pro with Avaya IP Office Issue 1.

Configuring the Juniper SSG as an IPSec VPN Head-end to Support the Avaya VPNremote Phone and Avaya Phone Manager Pro with Avaya IP Office Issue 1. Avaya Solution & Interoperability Test Lab Configuring the Juniper SSG as an IPSec VPN Head-end to Support the Avaya VPNremote Phone and Avaya Phone Manager Pro with Avaya IP Office Issue 1.0 Abstract

More information

Configuring the Juniper NetScreen Firewall Security Policies to support Avaya IP Telephony Issue 1.0

Configuring the Juniper NetScreen Firewall Security Policies to support Avaya IP Telephony Issue 1.0 Avaya Solution & Interoperability Test Lab Configuring the Juniper NetScreen Firewall Security Policies to support Avaya IP Telephony Issue 1.0 Abstract These Application Notes describes a procedure for

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Configuring Microsoft Windows Server 2008 R2 Certificate Authority and Network Device Enrollment Service with Simple Certificate Enrollment Protocol for use with

More information

VPN Setup Guide for 9600 Series IP Telephones Release 3.1

VPN Setup Guide for 9600 Series IP Telephones Release 3.1 VPN Setup Guide for 9600 Series IP Telephones Release 3.1 16-602968 Issue 1 November 2009 2009 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in

More information

Configuring the Juniper Networks SSG Security Platform and Steel-Belted Radius Authentication Server to Support Avaya VPNremote Phones Issue 1.

Configuring the Juniper Networks SSG Security Platform and Steel-Belted Radius Authentication Server to Support Avaya VPNremote Phones Issue 1. Avaya Solution & Interoperability Test Lab Configuring the Juniper Networks SSG Security Platform and Steel-Belted Radius Authentication Server to Support Avaya VPNremote Phones Issue 1.0 Abstract These

More information

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing

More information

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel This document describes the procedures required to configure an IPSec VPN tunnel between a WatchGuard SOHO or SOHO tc and a Check Point FireWall-1.

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip no: 186 Release Date: August 14, 2007 Region: GLOBAL Configuring a VPN Remote IP Phone with an Adtran Netvanta 3305 VPN Router The following document assumes that the user/installer

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip No: 221 Release Date: 9 October 2009 Region: GLOBAL Configuring VPNremote Telephones with Cisco Adaptive Security Appliance (ASA) 5510 using the Adaptive Security Device Manager

More information

How to Configure the Juniper NetScreen 5GT to Support Avaya H.323 IP Telephony Issue 1.0

How to Configure the Juniper NetScreen 5GT to Support Avaya H.323 IP Telephony Issue 1.0 Avaya Solution and Interoperability Test Lab How to Configure the Juniper NetScreen 5GT to Support Avaya H.323 IP Telephony Issue 1.0 Abstract These Application Notes describe how to configure the Juniper

More information

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client A P P L I C A T I O N N O T E Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client This application note describes how to set up a VPN connection between a Mac client and a Sidewinder

More information

VPN Configuration Guide. Juniper Networks NetScreen / SSG / ISG Series

VPN Configuration Guide. Juniper Networks NetScreen / SSG / ISG Series VPN Configuration Guide Juniper Networks NetScreen / SSG / ISG Series equinux AG and equinux USA, Inc. 2009 equinux USA, Inc. All rights reserved. Under the copyright laws, this manual may not be copied,

More information

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Application Note Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089

More information

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring NetScreen 50, NetScreen 25 and NetScreen-Remote Client Software with Avaya IP Office and Avaya PhoneManager - Issue 1.0 Abstract

More information

Release Notes. Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 2 Troubleshooting...

Release Notes. Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 2 Troubleshooting... Global VPN Client SonicWALL Global VPN Client 4.7.3 Release Notes Contents Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues... 2 Troubleshooting... 4

More information

Configuring the PIX Firewall with PDM

Configuring the PIX Firewall with PDM Configuring the PIX Firewall with PDM Objectives In this lab exercise you will complete the following tasks: Install PDM Configure inside to outside access through your PIX Firewall using PDM Configure

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip no: 190 Release Date: September 27, 2007 Region: GLOBAL Configuring a VPN Remote IP Phone with a Sonicwall Tz170 Standard / Enhanced VPN Router The following document assumes

More information

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0:

SonicWALL strongly recommends you follow these steps before installing Global VPN Client (GVC) 4.0.0: GVC SonicWALL Global VPN Client 4.0.0 Contents Pre-installation Recommendations Platform Compatibility New Features Known Issues Resolved Known Issues Troubleshooting Pre-installation Recommendations SonicWALL

More information

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client Generally speaking, remote users need to use a VPN client software for establishing a VPN connection to their home/work router

More information

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later)

More information

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels This article provides a reference for deploying a Barracuda Link Balancer under the following conditions: 1. 2. In transparent (firewall-disabled)

More information

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0 Abstract Avaya IP Softphone R3 V2.1 now supports H.323 VoIP applications running over different

More information

DIGIPASS Authentication for Juniper ScreenOS

DIGIPASS Authentication for Juniper ScreenOS DIGIPASS Authentication for Juniper ScreenOS With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 53 Disclaimer Disclaimer of Warranties and Limitations

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring a Virtual Private Network (VPN) for Avaya IP Office using the Edgewater Networks EdgeMarc 4500 VoIP VPN Appliance - Issue 1.0

More information

V310 Support Note Version 1.0 November, 2011

V310 Support Note Version 1.0 November, 2011 1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6

More information

7. Configuring IPSec VPNs

7. Configuring IPSec VPNs 7. This guide describes how to use the Unified Threat Management appliance (UTM) IPSec VPN Wizard to configure the IP security (IPSec) virtual private networking (VPN) feature. This feature provides secure,

More information

VPNremote for the 4600 Series IP Telephones Release 2.1 Administrator Guide

VPNremote for the 4600 Series IP Telephones Release 2.1 Administrator Guide VPNremote for the 4600 Series IP Telephones Release 2.1 Administrator Guide 19-600753 Issue 3 June 2007 2007 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the

More information

Configuring H.323 over Port Network Address Translation (PNAT) for Avaya IP Endpoints using the Avaya SG200 Security Gateway - Issue 1.

Configuring H.323 over Port Network Address Translation (PNAT) for Avaya IP Endpoints using the Avaya SG200 Security Gateway - Issue 1. Configuring H.323 over Port Network Address Translation (PNAT) for Avaya IP Endpoints using the Avaya SG200 Security Gateway - Issue 1.0 Abstract These Application Notes describe how to configure the Avaya

More information

Release Notes. Contents. Release Purpose. Pre-Installation Recommendations. Platform Compatibility. Dell SonicWALL Global VPN Client 4.

Release Notes. Contents. Release Purpose. Pre-Installation Recommendations. Platform Compatibility. Dell SonicWALL Global VPN Client 4. Global VPN Client Dell SonicWALL Global VPN Client 4.9 Release Notes SonicOS Contents Release Purpose... 1 Pre-Installation Recommendations... 1 Platform Compatibility... 1 Known Issues... 2 Resolved Issues...

More information

VPNC Interoperability Profile

VPNC Interoperability Profile VPNC Interoperability Profile Valid for Barracuda NG Firewall 5.0 Revision 1.1 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2010,

More information

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1. Application Note Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.0 Page 1 Controlling Access to Large Numbers of Networks Devices to

More information

Configuring an IPSec Tunnel between a Cisco 3825 Router and the Cisco VPN Client to Support Avaya IP Softphone Issue 1.0

Configuring an IPSec Tunnel between a Cisco 3825 Router and the Cisco VPN Client to Support Avaya IP Softphone Issue 1.0 Avaya Solution & Interoperability Test Lab Configuring an IPSec Tunnel between a Cisco 3825 Router and the Cisco VPN Client to Support Avaya IP Softphone Issue 1.0 Abstract These Application Notes describe

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

ZyWALL 2. Internet Security Gateway. Compact Guide Version 3.62 April 2004

ZyWALL 2. Internet Security Gateway. Compact Guide Version 3.62 April 2004 Internet Security Gateway Compact Guide Version 3.62 April 2004 Table of Contents 1 Introducing the ZyWALL... 4 2 Hardware... 4 2.1 Rear Panel... 5 2.2 The Front Panel LEDs... 5 3 Setting Up Your Computer

More information

2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14

2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14 1. Introduction... 2 2. Remote Access via IPSec... 2 2.1. Configuration of the Astaro Security Gateway... 2 2.2. Configuration of the Remote Client...13 2.2.1. Astaro User Portal: Getting Software and

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall TheGreenBow IPSec VPN Client Configuration Guide Cisco RV 120W Wireless-N VPN Firewall WebSite: Contact: http://www.thegreenbow.com support@thegreenbow.com IPSec VPN Router Configuration Property of TheGreenBow

More information

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel

More information

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050 VPN Configuration Guide ZyWALL USG Series / ZyWALL 1050 2011 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this configuration guide may not be copied, in whole or in part,

More information

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview Configuration Guide How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios Overview The iphone is a line of smartphones designed and marketed by Apple Inc. It runs Apple s IOS mobile

More information

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012

More information

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Overview... 3 Architecture... 5 Configure Juniper IPSec on an

More information

How To Industrial Networking

How To Industrial Networking How To Industrial Networking Prepared by: Matt Crites Product: Date: April 2014 Any RAM or SN 6xxx series router Legacy firmware 3.14/4.14 or lower Subject: This document provides a step by step procedure

More information

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved NCP Secure Client Juniper Edition Service Release: 9.30 Build 102 Date: February 2012 1. New Features and Enhancements The following describe the new features introduced in this release: Visual Feedback

More information

21.4 Network Address Translation (NAT) 21.4.1 NAT concept

21.4 Network Address Translation (NAT) 21.4.1 NAT concept 21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially

More information

Configuring a Lan-to-Lan VPN with SSG5 and Check Point Appliance Safe@Office 500

Configuring a Lan-to-Lan VPN with SSG5 and Check Point Appliance Safe@Office 500 Application Note Configuring a Lan-to-Lan VPN with SSG5 and Check Point Appliance Safe@Office 500 Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408

More information

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway Fireware How To VPN How do I set up a manual branch office VPN tunnel? Introduction You use Branch Office VPN (BOVPN) with manual IPSec to make encrypted tunnels between a Firebox and a second IPSec-compliant

More information

Chapter 5 Virtual Private Networking Using IPsec

Chapter 5 Virtual Private Networking Using IPsec Chapter 5 Virtual Private Networking Using IPsec This chapter describes how to use the IPsec virtual private networking (VPN) features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide

More information

Contents. Pre-Installation Recommendations. Platform Compatibility. G lobal VPN Client SonicWALL Global VPN Client 4.2.6 for 64-Bit Clients

Contents. Pre-Installation Recommendations. Platform Compatibility. G lobal VPN Client SonicWALL Global VPN Client 4.2.6 for 64-Bit Clients G lobal VPN Client SonicWALL Global VPN Client 4.2.6 for 64-Bit Clients Contents Pre-Installation Recommendations... 1 Platform Compatibility... 1 New Features... 2 Troubleshooting... 3 Pre-Installation

More information

axsguard Gatekeeper IPsec XAUTH How To v1.6

axsguard Gatekeeper IPsec XAUTH How To v1.6 axsguard Gatekeeper IPsec XAUTH How To v1.6 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products

More information

Juniper NetScreen 5GT

Juniper NetScreen 5GT TheGreenBow IPSec VPN Client Configuration Guide Juniper NetScreen 5GT WebSite: Contact: http://www.thegreenbow.com support@thegreenbow.com Configuration Guide written by: Writer: Connected Team Company:

More information

Service "NCPCLCFG" is not running In this case, increase the WaitForConfigService setting until the problem is circumvented

Service NCPCLCFG is not running In this case, increase the WaitForConfigService setting until the problem is circumvented NCP Secure Client Juniper Edition Service Release: 9.30 Build 186 Date: July 2012 1. New Features and Enhancements The following describes the new feature introduced in this release: Configurable Service

More information

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without

More information

IPsec VPN Application Guide REV: 1.0.0 1910010876

IPsec VPN Application Guide REV: 1.0.0 1910010876 IPsec VPN Application Guide REV: 1.0.0 1910010876 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Configuration... 2 Chapter 3. Configuration... 5 3.1 Configure IPsec VPN on TL-WR842ND (Router A)...

More information

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router How To Establish IPSec VPN connection between Cyberoam and Mikrotik router Applicable Version: 10.00 onwards Scenario Establish IPSec VPN connection between Cyberoam and Mikrotik router using Preshared

More information

Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager and Avaya Aura Session Manager Issue 1.0

Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager and Avaya Aura Session Manager Issue 1.0 Avaya Solution & Interoperability Test Lab Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager and Avaya Aura Session Manager Issue 1.0 Abstract These Application Notes

More information

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If

More information

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004 ZyWALL 5 Internet Security Appliance Quick Start Guide Version 3.62 (XD.0) May 2004 Introducing the ZyWALL The ZyWALL 5 is the ideal secure gateway for all data passing between the Internet and the LAN.

More information

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide

More information

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel Active Management Technology with System Defense Feature Quick Start Guide Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine

More information

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall This document is a step-by-step instruction for setting up VPN between Netgear ProSafe VPN firewall (FVS318 or FVM318) and Cisco PIX

More information

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance This article will easily explain how to configure your Apple ipad, iphone or ipod Touch

More information

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router Configuring TheGreenBow VPN Client with a TP-LINK VPN Router This chapter describes how to configure TheGreenBow VPN Client with a TP-LINK router. This chapter includes the following sections: Example

More information

RF550VPN and RF560VPN

RF550VPN and RF560VPN RF550VPN and RF560VPN FQDN & DDNS Examples Reference Guide How-To: RF550VPN/RF560VPN FQDN & DDNS Examples Copyright 2003 This publication may not be reproduced, in whole or in part, without prior expressed

More information

LifeSize Video Communications Systems Administrator Guide

LifeSize Video Communications Systems Administrator Guide LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made

More information

Setting up VPN Access for Remote Diagnostics Support

Setting up VPN Access for Remote Diagnostics Support Setting up VPN Access for Remote Diagnostics Support D. R. Joseph, Inc. supports both dial-up and Internet access for remote support of 3GIBC1 and LF-Sizer control systems. This document describes how

More information

How to configure VPN function on TP-LINK Routers

How to configure VPN function on TP-LINK Routers How to configure VPN function on TP-LINK Routers 1. VPN Overview... 2 2. How to configure LAN-to-LAN IPsec VPN on TP-LINK Router... 3 3. How to configure GreenBow IPsec VPN Client with a TP-LINK VPN Router...

More information

IP Office Technical Tip

IP Office Technical Tip IP Office Technical Tip Tip No: 205 Release Date: 10 June 2008 Region: GLOBAL VPN Telephone Deployment Guide for IP Office This document describes how to install and deploy the Avaya VPN Telephones for

More information

Broadband Bandwidth Controller

Broadband Bandwidth Controller User s Manual Broadband Bandwidth Controller Model No.: SP883B World Wide Web: www.micronet.com.tw Table of Content -------------------------------------------------------------------------------------------------------------------------

More information

Chapter 8 Virtual Private Networking

Chapter 8 Virtual Private Networking Chapter 8 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FWG114P v2 Wireless Firewall/Print Server. VPN tunnels provide secure, encrypted

More information

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)

More information

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall. Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall Overview This document describes how to implement IPSec with pre-shared secrets

More information

Windows XP VPN Client Example

Windows XP VPN Client Example Windows XP VPN Client Example Technote LCTN0007 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail: support@proxicast.com

More information

Dial-Up VPN auf eine Juniper

Dial-Up VPN auf eine Juniper Dial-Up VPN auf eine Juniper Gateway Konfiguration Phase 1 Konfiguration Create a user that is used to define the phase1 id parameters. Navigate to the following screen using the tree pane on the left

More information

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0 Abstract These Application Notes describe the steps for

More information

Configuring Avaya 1120E, 1140E, 1220 and 1230 IP Deskphones with Avaya IP Office Release 6.1 Issue 1.0

Configuring Avaya 1120E, 1140E, 1220 and 1230 IP Deskphones with Avaya IP Office Release 6.1 Issue 1.0 Avaya Solution & Interoperability Test Lab Configuring Avaya 1120E, 1140E, 1220 and 1230 IP Deskphones with Avaya IP Office Release 6.1 Issue 1.0 Abstract These Application Notes describe a solution comprised

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

Juniper Networks Integrated Firewall and IPSec VPN Evaluators Guide

Juniper Networks Integrated Firewall and IPSec VPN Evaluators Guide Juniper Networks Integrated Firewall and IPSec VPN Evaluators Guide How to configure and test firewall, VPN and Deep Inspection functionality Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355 VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page

More information

Configuring GTA Firewalls for Remote Access

Configuring GTA Firewalls for Remote Access GB-OS Version 5.4 Configuring GTA Firewalls for Remote Access IPSec Mobile Client, PPTP and L2TP RA201010-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220

More information

Chapter 6 Basic Virtual Private Networking

Chapter 6 Basic Virtual Private Networking Chapter 6 Basic Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVG318 wireless VPN firewall. VPN communications paths are called tunnels.

More information

Application Note Startup Tool - Getting Started Guide

Application Note Startup Tool - Getting Started Guide Application Note Startup Tool - Getting Started Guide 1 April 2012 Startup Tool Table of Contents 1 INGATE STARTUP TOOL... 1 2 STARTUP TOOL INSTALLATION... 2 3 CONNECTING THE INGATE FIREWALL/SIPARATOR...

More information

Scenario: IPsec Remote-Access VPN Configuration

Scenario: IPsec Remote-Access VPN Configuration CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Steps for Basic Configuration

Steps for Basic Configuration 1. This guide describes how to use the Unified Threat Management appliance (UTM) Basic Setup Wizard to configure the UTM for connection to your network. It also describes how to register the UTM with NETGEAR.

More information

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1)

Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) University of Pittsburgh School of Information Science IS2820/TEL2813 - Security Management Lab assignment #2 IPSec and VPN Tunnels (Document version 1.1) Lab GSA: Carlos Caicedo Page I. Lab resources

More information

HP Helion Configuration

HP Helion Configuration HP Helion Configuration HP Setup for VNS3 2015 copyright 2015 1 Table of Contents Introduction 3 Step 1: HP Helion Deployment Setup 9 Step 2: Launching a VNS3 Controller 15 Server VNS3 Configuration Document

More information

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in

More information

Configuring SonicOS for Microsoft Azure

Configuring SonicOS for Microsoft Azure Configuring SonicOS for Microsoft Azure December 2015 Topics: Purpose Deployment Considerations Supported Platforms Configuring a Policy-based VPN Configuring a Route-based VPN Purpose This details how

More information

Application Notes for the Ingate SIParator with Avaya Converged Communication Server (CCS) - Issue 1.0

Application Notes for the Ingate SIParator with Avaya Converged Communication Server (CCS) - Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for the Ingate SIParator with Avaya Converged Communication Server (CCS) - Issue 1.0 Abstract These Application Notes describe the configuration

More information

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview Configuration Guide How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall Overview This document describes how to implement IPSec with pre-shared secrets establishing

More information

VPN SECURITY POLICIES

VPN SECURITY POLICIES TECHNICAL SUPPORT NOTE Introduction to the VPN Menu in the Web GUI Featuring ADTRAN OS and the Web GUI Introduction This Technical Support Note shows the different options available in the VPN menu of

More information

FortiOS Handbook IPsec VPN for FortiOS 5.0

FortiOS Handbook IPsec VPN for FortiOS 5.0 FortiOS Handbook IPsec VPN for FortiOS 5.0 IPsec VPN for FortiOS 5.0 26 August 2015 01-504-112804-20150826 Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, and FortiGuard, are registered

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel between a WatchGuard Firebox Vclass appliance (Vcontroller version

More information