VPN Wizard Default Settings and General Information



Similar documents
Configure IPSec VPN Tunnels With the Wizard

7. Configuring IPSec VPNs

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Chapter 5 Virtual Private Networking Using IPsec

VPN Configuration of ProSafe VPN Lite software and NETGEAR ProSafe Router:

Chapter 6 Virtual Private Networking

Chapter 6 Basic Virtual Private Networking

Configure VPN between ProSafe VPN Client Software and FVG318

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Configuring a VPN for Dynamic IP Address Connections

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

How to configure VPN function on TP-LINK Routers

Chapter 8 Virtual Private Networking

How To Industrial Networking

VPN. VPN For BIPAC 741/743GE

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

IP Office Technical Tip

Application Notes. How to Configure UTM with Apple OSX and ios Devices for IPsec VPN

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Chapter 4 Virtual Private Networking

Windows XP VPN Client Example

How to configure VPN function on TP-LINK Routers

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Connecting Remote Offices by Setting Up VPN Tunnels

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

IPSec Pass through via Gateway to Gateway VPN Connection

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

VPN L2TP Application. Installation Guide

Firewall Defaults and Some Basic Rules

VPN Configuration of ProSafe Client and Netgear ProSafe Router:

HOWTO: How to configure IPSEC gateway (office) to gateway

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

Configuring IPsec VPN with a FortiGate and a Cisco ASA

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Scenario: Remote-Access VPN Configuration

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

Configuring IPsec between a Microsoft Windows XP Professional (1 NIC) and the VPN router

Global VPN Client Getting Started Guide

ISG50 Application Note Version 1.0 June, 2011

Cisco QuickVPN Installation Tips for Windows Operating Systems

Virtual Private Network and Remote Access Setup

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE

Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide.

Understanding the Cisco VPN Client

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

IP Office Technical Tip

Cisco SA 500 Series Security Appliance

DI-804HV with Windows 2000/XP IPsec VPN Client Configuration Guide

Setting up D-Link VPN Client to VPN Routers

LAN-Cell to Cisco Tunneling

Appendix C Network Planning for Dual WAN Ports

VPNC Interoperability Profile

GB-OS. VPN Gateway. Option Guide for GB-OS 4.0. & GTA Mobile VPN Client Version 4.01 VPNOG

VPN PPTP Application. Installation Guide

Gateway to Gateway VPN Connection

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

FortiOS Handbook IPsec VPN for FortiOS 5.0

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Broadband Firewall Router with 4-Port Switch/VPN Endpoint

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Chapter 2 Connecting the FVX538 to the Internet

Planet CS TheGreenBow IPSec VPN Client. Configuration Guide.

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

V310 Support Note Version 1.0 November, 2011

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

Cisco RV 120W Wireless-N VPN Firewall

NETGEAR ProSAFE VPN Client

Enable VPN PPTP Server Function

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

TheGreenBow VPN Client. User Guide

How to access peers with different VPN through IPSec. Tunnel

Scenario: IPsec Remote-Access VPN Configuration

Configuring GTA Firewalls for Remote Access

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

VPN Quick Configuration Guide. Astaro Security Gateway V8

VPN Configuration Guide WatchGuard Fireware XTM

Pre-lab and In-class Laboratory Exercise 10 (L10)

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Symantec Firewall/VPN 200

EtherFast Cable/DSL VPN Router with 4-Port Switch

How To Configure Apple ipad for Cyberoam L2TP

How To Establish IPSec VPN between Cyberoam and Microsoft Azure

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key

Dial-Up VPN auf eine Juniper

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

ZyXEL ZyWALL P1 firmware V3.64

How To Configure An Ipsec Tunnel On A Network With A Network Gateways (Dfl-800) On A Pnet 2.5V2.5 (Dlf-600) On An Ipse Vpn

Using Opensource VPN Clients with Firetunnel

Transcription:

1. ProSecure UTM Quick Start Guide This quick start guide describes how to use the IPSec VPN Wizard to configure IPSec VPN tunnels on the ProSecure Unified Threat Management (UTM) Appliance. The IP security (IPSec) virtual private networking (VPN) feature provides secure, encrypted communications between your local network and a remote network or computer. For information about other features and for complete configuration steps, see the ProSecure Unified Threat Management (UTM) Appliance Reference Manual, available at http://downloadcenter.netgear.com. This quick start guide contains the following sections: VPN Wizard Default Settings and General Information Create a Gateway-to-Gateway VPN Tunnel Configure an IPSec VPN Connection between a Gateway and a Client For More Information VPN Wizard Default Settings and General Information Configuring a VPN tunnel connection requires that you specify all settings on both sides of the VPN tunnel to match or mirror each other precisely. The VPN Wizard guides you through the setup procedure with a series of questions that determine the IPSec keys and VPN policies it sets up. The VPN Wizard also configures the settings for the network connection: security association (SA), traffic selectors, authentication algorithm, and encryption. The default IKE policy and VPN policy settings of the VPN Wizard are explained in the following tables: Table 1. Default IKE policy settings for the VPN Wizard IKE Policy Settings Gateway-to-Gateway Tunnels Gateway-to-Client Tunnels Exchange mode Main Aggressive ID type IP address or FQDN FQDN Local WAN ID Local WAN IP address or FQDN utm_local1.com Remote WAN ID Remote WAN IP address or FQDN utm_remote1.com Encryption algorithm 3DES 3DES 1

Table 1. Default IKE policy settings for the VPN Wizard (continued) IKE Policy Settings Gateway-to-Gateway Tunnels Gateway-to-Client Tunnels Authentication algorithm SHA-1 SHA-1 Authentication method Pre-shared Key Pre-shared Key Key group DH-Group 2 (1024 bit) DH-Group 2 (1024 bit) Life time 8 hours 8 hours Table 2. Default VPN policy settings for the VPN Wizard VPN Policy Settings Gateway-to-Gateway Tunnels Gateway-to-Client Tunnels Encryption algorithm 3DES 3DES Authentication algorithm SHA-1 SHA-1 Life time 1 hour 1 hour Key group DH-Group 2 (1024 bit) DH-Group 2 (1024 bit) NetBIOS Enabled Disabled Tip: For Dynamic Host Configuration Protocol (DHCP) WAN configurations, first set up the tunnel with IP addresses. After you have validated the connection, you can use the wizard to create new policies using the domain names, also referred to as fully qualified domain names (FQDNs), for the WAN addresses. Tip: When you use FQDNs and a Dynamic DNS (DDNS) service, if the DDNS service is slow to update its servers when your DHCP WAN address changes, the VPN tunnel fails because the FQDNs do not resolve to your new address. If you have the option to configure the update interval, set it to an appropriately short time. Tip: To ensure that tunnels stay active, after completing the wizard steps, manually edit the VPN policy to enable keep-alives, which periodically sends ping packets to the host on the peer side of the network to keep the tunnel alive. For more information, see Configure Keep-Alives in Chapter 7, Virtual Private Networking Using IPSec, PPTP, or L2TP Connections, of the reference manual. 2

Create a Gateway-to-Gateway VPN Tunnel To set up a gateway-to-gateway VPN tunnel using the VPN Wizard: 1. Select VPN > IPSec VPN > VPN Wizard. The VPN Wizard screen displays. (The following screen contains an example.) The About VPN Wizard section of the VPN Wizard screen shows the following minor differences for the various UTM models: Single WAN port models. No WAN selection drop-down lists and no Enable RollOver check box. Multiple WAN port models. A drop-down list to select the WAN interface, a check box to enable VPN rollover, and another drop-down list to select a WAN interface for VPN rollover. If a multiple WAN port model is configured to function in WAN auto-rollover mode, you can use the VPN Wizard to configure VPN rollover and do not need to configure this manually. [Multiple WAN port models only] Figure 1. 3

2. Select the radio buttons and complete the fields and as explained in the following table: Table 3. IPSec VPN Wizard settings for a gateway-to-gateway tunnel # Setting Description About VPN Wizard This VPN tunnel will connect to the following peers This VPN tunnel will use following local WAN Interface (multiple WAN port models only) Select the Gateway radio button. The local WAN port s IP address or Internet name displays in the End Point Information section of the screen. Select a WAN interface from the drop-down list to specify which local WAN interface the VPN tunnel uses as the local endpoint. Select the Enable RollOver? check box to enable VPN rollover, and then select a WAN interface from the drop-down list to the right of the check box to specify the interface to which the VPN rollover should occur. Note: If the multiple WAN port model is configured to function in WAN auto-rollover mode, you can use the VPN Wizard to configure VPN rollover and do not need to configure this manually. Connection Name and Remote IP Type What is the new Connection Name? What is the pre-shared key? Enter a descriptive name for the connection. This name is used to help you to manage the VPN settings; the name is not supplied to the remote VPN endpoint. Enter a pre-shared key. The key needs to be entered both here and on the remote VPN gateway. This key needs to have a minimum length of 8 characters and should not exceed 49 characters. End Point Information a What is the Remote WAN s IP Address or Internet Name? What is the Local WAN s IP Address or Internet Name? Enter the IP address or Internet name (FQDN) of the WAN interface on the remote VPN tunnel endpoint. When you select the Gateway radio button in the About VPN Wizard section of the screen, the IP address of the UTM s active WAN interface is automatically entered. Secure Connection Remote Accessibility What is the remote LAN IP Address? What is the remote LAN Subnet Mask? Enter the LAN IP address of the remote gateway. Important: The remote LAN address needs to be in a different subnet from the local LAN IP address. For example, if the local subnet is 192.168.1.x, then the remote subnet could be 192.168.10.x but could not be 192.168.1.x. If this information is incorrect, the tunnel fails to connect. Enter the LAN subnet mask of the remote gateway. a. Both local and remote endpoints should be defined as either FQDNs or IP addresses. A combination of an IP address and an FQDN is not supported. 4

3. Click Apply to save your settings. The IPSec VPN policy is now added to the List of VPN Policies table on the VPN Policies screen. By default, the VPN policy is enabled. Figure 2. 4. Configure a VPN policy on the remote gateway that allows connection to the UTM. 5. Activate the IPSec VPN connection: a. Select Monitoring > Active Users & VPNs > IPSec VPN Connection Status. The IPSec VPN Connection Status screen displays: Figure 3. b. Locate the policy in the table, and click the Connect table button. The IPSec VPN connection becomes active. Configure an IPSec VPN Connection between a Gateway and a Client Configure the Gateway Connection Configure the VPN Client Connection Using the VPN Client Configuration Wizard Test the VPN Client Connection To set up an IPSec VPN connection between a gateway and a NETGEAR VPN client, first configure the gateway connection, and then configure the VPN client connection. 5

Configure the Gateway Connection To set up a client-to-gateway VPN tunnel using the VPN Wizard: 1. Select VPN > IPSec VPN > VPN Wizard. The VPN Wizard screen displays. (The following screen contains an example.) The About VPN Wizard section of the VPN Wizard screen shows the following minor differences for the various UTM models: Single WAN port models. No WAN selection drop-down lists and no Enable RollOver check box. Multiple WAN port models. A drop-down list to select the WAN interface, a check box to enable VPN rollover, and another drop-down list to select a WAN interface for VPN rollover. If a multiple WAN port model is configured to function in WAN auto-rollover mode, you can use the VPN Wizard to configure VPN rollover and do not need to configure this manually. [Multiple WAN port models only] Not applicable Figure 4. 6

2. Select the radio buttons and complete the fields and as explained in the following table: Table 4. IPSec VPN Wizard settings for a client-to-gateway tunnel # Setting Description About VPN Wizard This VPN tunnel will connect to the following peers This VPN tunnel will use following local WAN Interface (multiple WAN port models only) Select the VPN Client radio button. The default remote FQDN (utm_remote.com) and the default local FQDN (utm_local.com) display in the End Point Information section of the screen. Select a WAN interface from the drop-down list to specify which local WAN interface the VPN tunnel uses as the local endpoint. Select the Enable RollOver? check box to enable VPN rollover, and then select a WAN interface from the drop-down list to the right of the check box to specify the interface to which the VPN rollover should occur. Note: If the multiple WAN port model is configured to function in WAN auto-rollover mode, you can use the VPN Wizard to configure VPN rollover and do not need to configure this manually. Connection Name and Remote IP Type What is the new Connection Name? What is the pre-shared key? Enter a descriptive name for the connection. This name is used to help you to manage the VPN settings; the name is not supplied to the remote VPN endpoint. Enter a pre-shared key. The key needs to be entered both here and on the remote VPN gateway, or the remote VPN client. This key needs to have a minimum length of 8 characters and cannot exceed 49 characters. End Point Information a What is the Remote Identifier Information? What is the Local Identifier Information? When you select the Client radio button in the About VPN Wizard section of the screen, the default remote FQDN (utm_remote.com) is automatically entered. Use the default remote FQDN, or enter another FQDN. When you select the Client radio button in the About VPN Wizard section of the screen, the default local FQDN (utm_local.com) is automatically entered. Use the default local FQDN, or enter another FQDN. Secure Connection Remote Accessibility What is the remote LAN IP Address? What is the remote LAN Subnet Mask? These fields are masked out for VPN client connections. a. Both local and remote endpoints should be defined as either FQDNs or IP addresses. A combination of an IP address and an FQDN is not supported. 7

3. Click Apply to save your settings. The IPSec VPN policy is now added to the List of VPN Policies table on the VPN Policies screen. By default, the VPN policy is enabled. Figure 5. 4. Optional step: Collect the information that you need to configure the VPN client. You can print the following table to help you keep track of this information. Note: In the following table, numbers,, and do not relate to Figure 4, Figure 5, and Table 4. However,,, and do relate to the numbers in Figure 4, Figure 5, and Table 4. These numbers are used in the figures and descriptions in Configure the VPN Client Connection Using the VPN Client Configuration Wizard on page 9. Table 5. Information required to configure the VPN client # Component Information to be collected Example Router s LAN network IP address 192.168.1.0 Router s LAN network mask 255.255.255.0 Router s WAN IP address 10.34.116.22 Pre-shared key I7!KL39dFG_8 Remote identifier information Local identifier information utm_remote.com utm_local.com 8

Configure the VPN Client Connection Using the VPN Client Configuration Wizard Note: Perform these tasks from a computer that has the NETGEAR ProSafe VPN Client installed. If you do not have a VPN client, visit http://www.netgear.com/business/products/software/vpn-client-soft ware/default.aspx. The VPN client lets you set up the VPN connection with the integrated Configuration Wizard, which configures the default settings and provides basic interoperability so that the VPN client can easily communicate with the UTM (or third-party VPN devices). The Configuration Wizard does not let you enter the local and remote IDs, so you need to enter this information manually. To use the Configuration Wizard to set up a VPN connection between the VPN client and the UTM: 1. Right-click the VPN client icon in your Windows system tray, and select Configuration Panel. The Configuration Panel screen displays (see the left screen in the following figure). 2. From the main menu on the Configuration Panel screen, select Configuration > Wizard. The Choice of the remote equipment wizard screen (screen 1of 3) displays (see the right screen in the following figure). Figure 6. 3. Select the A router or a VPN gateway radio button, and click Next. The VPN tunnel parameters wizard screen (screen 2 of 3) displays (see the left screen in the following figure; the numbers in the figure refer to the numbers in Table 5 on page 8 and are described in Step 4). 9

Figure 7. 4. Specify the following VPN tunnel parameters: IP or DNS public (external) address of the remote equipment. Enter the remote IP address or DNS name of the UTM. For example, enter 10.34.116.22. () Preshared key. Enter the pre-shared key that you already specified on the UTM. For example, enter I7!KL39dFG_8. () IP private (internal) address of the remote network. Enter the remote private IP address of the UTM. For example, enter 192.168.1.0. () This IP address enables communication with the entire 192.168.1.x subnet. 5. Click Next. The Configuration Summary wizard screen (screen 3 of 3) displays (see the right screen in Figure 7). 6. This screen is a summary screen of the new VPN configuration. Click Finish. 7. Specify the local and remote IDs: a. In the tree list pane of the Configuration Panel screen, click Gateway (the default name given to the authentication phase). The Authentication pane displays in the Configuration Panel screen, with the Authentication tab selected by default. b. Click the Advanced tab in the Authentication pane. The Advanced pane displays. 10

Figure 8. c. Specify the settings that are explained in the following table. Table 6. VPN client advanced authentication settings # Setting Description Advanced features Aggressive Mode NAT-T Select this check box to enable aggressive mode as the mode of negotiation with the UTM. Select Automatic from the drop-down list to enable the VPN client and UTM to negotiate NAT-T. Local and Remote ID Local ID As the type of ID, select DNS from the Local ID drop-down list because you specified FQDN in the UTM configuration. As the value of the ID, enter utm_remote.com as the local ID for the VPN client. Remote ID Note: The remote ID on the UTM is the local ID on the VPN client. It might be less confusing to configure an FQDN such as client.com as the remote ID on the UTM and then enter client.com as the local ID on the VPN client. As the type of ID, select DNS from the Remote ID drop-down list because you specified an FQDN in the UTM configuration. As the value of the ID, enter utm_local.com as the remote ID for the UTM. Note: The local ID on the UTM is the remote ID on the VPN client. It might be less confusing to configure an FQDN such as router.com as the local ID on the UTM and then enter router.com as the remote ID on the VPN client. 11

8. Configure the global parameters: a. In the tree list pane of the Configuration Panel screen, click Global Parameters. The Global Parameters pane displays in the Configuration Panel screen. Figure 9. b. Specify the default lifetimes in seconds: Authentication (IKE), Default. The default lifetime value is 3600 seconds. Change this setting to 28800 seconds to match the configuration of the UTM. Encryption (IPSec), Default. The default lifetime value is 1200 seconds. Change this setting to 3600 seconds to match the configuration of the UTM. 9. Click Apply to use the new settings immediately, and click Save to keep the settings for future use. The VPN client configuration is now complete. Test the VPN Client Connection There are many ways to establish a connection. The following procedures assume that you use the default authentication phase name Gateway and the default IPSec configuration name Tunnel. NETGEAR recommends that you test the connection from a computer that is located off-site rather than from a computer that is located behind the UTM. To establish a connection: Right-click the system tray icon ( ), and select Open tunnel 'Tunnel' (in the following figure, see the left screen). When the tunnel opens successfully, the Tunnel opened message displays above the system tray (in the following figure, see the right screen). 12

Figure 10. Once launched, the VPN client displays an icon in the system tray that indicates whether a tunnel is opened, using a color code: Green icon: at least one VPN tunnel opened Purple icon: no VPN tunnel opened Figure 11. For More Information Chapter 7, Virtual Private Networking Using IPSec, PPTP, or L2TP Connections, of the reference manual provides information about the following VPN topics: Managing IPSec VPN and IKE policies Configuring extended authentication (XAUTH) Assigning IP addresses to remote users (Mode Config) Configuring keep-alives and dead peer detection Configuring NetBIOS bridging with IPSec VPN Configuring the PPTP server Configuring the L2TP server 13