Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300



Similar documents
Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

How to configure VPN function on TP-LINK Routers

How to configure VPN function on TP-LINK Routers

ISG50 Application Note Version 1.0 June, 2011

Configure VPN between ProSafe VPN Client Software and FVG318

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configure IPSec VPN Tunnels With the Wizard

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

VPN Wizard Default Settings and General Information

Chapter 4 Virtual Private Networking

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Chapter 8 Virtual Private Networking

VPN Configuration of ProSafe VPN Lite software and NETGEAR ProSafe Router:

IPSec Pass through via Gateway to Gateway VPN Connection

VPN. VPN For BIPAC 741/743GE

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

Configuring SSH Sentinel VPN client and D-Link DFL-500 Firewall

Chapter 6 Virtual Private Networking

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Chapter 6 Basic Virtual Private Networking

Cisco RV 120W Wireless-N VPN Firewall

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Chapter 5 Virtual Private Networking Using IPsec

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

Juniper NetScreen 5GT

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Firewall Defaults and Some Basic Rules

Gateway to Gateway VPN Connection

V310 Support Note Version 1.0 November, 2011

HOWTO: How to configure IPSEC gateway (office) to gateway

Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide.

How To Configure Apple ipad for Cyberoam L2TP

Ingate Firewall. TheGreenBow IPSec VPN Client Configuration Guide.

Windows XP VPN Client Example

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Cisco SA 500 Series Security Appliance

LAN-Cell to Cisco Tunneling

Configuring IPsec VPN with a FortiGate and a Cisco ASA

How To Industrial Networking

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

Micronet SP881. TheGreenBow IPSec VPN Client Configuration Guide.

Planet CS TheGreenBow IPSec VPN Client. Configuration Guide.

Laboratory Exercises V: IP Security Protocol (IPSec)

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

GNAT Box VPN and VPN Client

IP Office Technical Tip

Using Opensource VPN Clients with Firetunnel

ZyXEL ZyWALL P1 firmware V3.64

Symantec Firewall/VPN 200

How To Set Up Checkpoint Vpn For A Home Office Worker

Linksys RV042. TheGreenBow IPSec VPN Client. Configuration Guide.

DI-804HV with Windows 2000/XP IPsec VPN Client Configuration Guide

IPsec VPN Application Guide REV:

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

VPN SECURITY POLICIES

IP Office Technical Tip

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Configuring a VPN between a Sidewinder G2 and a NetScreen

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Multi-Homing Dual WAN Firewall Router

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. October

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

OfficeConnect Internet Firewall VPN Upgrade User Guide

Connecting Remote Offices by Setting Up VPN Tunnels

Understanding the Cisco VPN Client

Configuring the Juniper SSG as an IPSec VPN Head-end to Support the Avaya VPNremote Phone and Avaya Phone Manager Pro with Avaya IP Office Issue 1.

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Virtual Private Network and Remote Access Setup

Configuring a VPN for Dynamic IP Address Connections

How To Configure An Ipsec Tunnel On A Network With A Network Gateways (Dfl-800) On A Pnet 2.5V2.5 (Dlf-600) On An Ipse Vpn

Dial-Up VPN auf eine Juniper

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Watchguard Firebox X Edge e-series

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Firewall Troubleshooting

Configuring Global Protect SSL VPN with a user-defined port

Technical Document. Creating a VPN. GTA Firewall to WatchGuard Firebox SOHO 6 TD: GB-WGSOHO6

The VPNaaS Plugin for Fuel Documentation

Lecture 17 - Network Security

7. Configuring IPSec VPNs

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

VNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide

Using IPsec VPN to provide communication between offices

Virtual Server and DDNS. Virtual Server and DDNS. For BIPAC 741/743GE

VPN Configuration of ProSafe Client and Netgear ProSafe Router:

How To Configure SSL VPN in Cyberoam

Transcription:

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway. A laptop with Netscreen remote client software can be used from home or road to connect to branch office RN300 VPN gateway. The secure tunnel can be established between laptop and central/branch office over the Internet or any public network that uses IPSec. Required 1. RN300 VPN Gateway device should be running RanchOS-3.0.9 or above 2. Ensure VPN Feature is enabled on RN300 device. This can be verified from System Configuration Image Configuration Version Info screen. VPN Basic or VPN Advanced must be listed in Features Enabled column. 3. Install and configure RN300 device at branch office. Create two Zones (Internet and Local). Connect Internet zone (10.1.2.0 subnet) to public router and Local zone (10.1.9.0 subnet) to your protected network. Configure required firewall security policies for systems from LAN to access Internet services such as http, https, dns, ftp etc. 4. Install NetScreen Remote client software on home laptop. A laptop running with Windows 2000 professional and NetScreen Remote Client with Security Policy Editor 10.5.1 (Build 8) version is used in this example. Ensure that you have internet connectivity and can reach public interface (10.1.2.2) of branch office RN300. Ensure the connectivity between Site A and Site B RN300 devices. 5. Admin privileges on both RN300 and Laptop Network Diagram

Background IPSec is a set of open standard protocols to support secure exchange of data packets at IP layer. It provides data confidentiality, data integrity, and data origin authentication between IPSec peers. There are two Internet Key Exchange (IKE) phases. Step by Step configuration on branch office RN300 Briefly: a) Configure VPN Global configuration. MY IKE ID is defined to self identify the RN unit. Ex. IP Address 10.1.2.2 for Site A (VPN Global Config) b) Define Phase 2 profile (VPN Tunnel Setup Phase 2 proposals) c) Define Remote to Local Profile (VPN Tunnel Setup Tunnel Config) d) Create Tunnel & Phase 1 (VPN Tunnel Setup Tunnel Config) e) Define Local to Remote Policies and associate them to Phase 2 proposals (VPN Tunnel Setup Tunnel Config) f) Edit each Local to Remote Policy and define traffic rules that were originating from local subnets (from behind Site A) to remote subnets (to behind Site B) (VPN Tunnel Setup Tunnel Config) g) Define traffic rules that were originating from remote subnets (from behind Site B) to local subnets (to behind Site A) (Firewall configuration Firewall rules to Security profiles) 1. Login to web GUI 2. Go to VPN Global Config menu

3. Under Negotiation tab, select IP Address as ID Type and enter 10.1.2.2 Select Allow NAT Traversal

4. Go to VPN Tunnel Set Up Tunnel Config menu 5. Click on Remote To Local Profile to create policy profile for traffic to flow from remote Laptop to branch office local site. This profile contains all firewall rules for hosts from Laptop (Remote) those can access branch office (Local) resources. Enter following details and click on Add Profile Profile Name NSRemote-to-Local Description NSRemote-to-Local

Click on Done to close this window 6. Select the following options in the following menu and click Save Configuration

Tunnel Name NSRemote-to-RN300 Tunnel Description NSRemote-to-RN300 Tunnel Type Remote Access Remote End Point 10.1.2.42 User Profile Id NSRemote-to-Local IKE Configuration (Phase 1) IKE ID Type FQDN Peer IKE ID laptop.rn300.com Authentication Method Shared Key Shared Key secretpassword Verify Shared key secretpassword Encryption 3DES Hash Algorithm MD5 Mode Auto Life time 86400 sec Continue Phas1 & 2 Uncheck NAT Traversal Check Compute UDP Checksum Uncheck Keep Alive interval 10 secs 7. Now, we need to define policies for traffic originating from Latop (Remote site) and coming to branch office RN300 (Local site) Go to Firewall Configuration Security Profiles menu

Browse for NSRemote-to-RN300 profile that was created in Tunnel configuration

By default, all traffic is blocked from remote site to local site trough tunnel. Click on Add/Modify button to create a number of firewall rules.

This example allows FTP (Rule Number 50) and ICMP (Rule Number 51). Once all parameters are configured, click on Add Rule

Rule Number 50 Source Zone Name Any Destination Zone Name Any Source IP/NetMask Any Source Port Any Destination IP/NetMask 10.1.9.0/24 Destination Port List 21 IP Protocol TCP Action To Take Accept

Rule Number 51 Source Zone Name Any Destination Zone Name Any Source IP/NetMask Any Source Port Any Destination IP/NetMask 10.1.9.0/24 Destination Port List Any IP Protocol ICMP Action To Take Accept

Step by Step configuration on Laptop (NetScreen Remote Client) Briefly: a) Configure VPN Global configuration. MY IKE ID is defined to self identify the RN unit. Ex. IP Address 10.1.2.27 for Site B (VPN Global Config) b) Define Phase 2 profile (VPN Tunnel Setup Phase 2 proposals) c) Define Remote to Local Profile (VPN Tunnel Setup Tunnel Config) d) Create Tunnel & Phase 1 (VPN Tunnel Setup Tunnel Config) e) Define Local to Remote Policies and associate them to Phase 2 proposals (VPN Tunnel Setup Tunnel Config) f) Edit each Local to Remote Policy and define traffic rules that were originating from local subnets (from behind Site B) to remote subnets (to behind Site A) (VPN Tunnel Setup Tunnel Config) g) Define traffic rules that were originating from remote subnets (from behind Site A) to local subnets (to behind Site B) (Firewall configuration Firewall rules to Security profiles) 1. Install Netscreen Remote client software (Security Policy Editor 10.5.1 - Build 8) on Latpop 2. Create New Connection with following parameters

Connection Security Secure Remote Party Identity and Addressing ID Type IP Address Range From 10.1.9.0 To 10.1.9.255 Protocol All Connect using Secure Gateway Tunnel ID Type IP Address 10.1.2.2 3. Go to My Identity menu

Select Certificate ID Type None Domain Name Laptop.rn300.com 4. Click on Pre-Shared key button, enter secrepassword and click OK 5. Go to Security Policy, select Aggressive Mode and check Enable Replay Protection

6. Go to Authentication (Phase 1) and create Proposal 1 Authentication Method Pre-Shared Key Encryption Alg Triple DES Hash Alg MD5 SA Life 1200 Seconds Key Group Deffie-Hellman Group 2

7. Go to Key Exchange (Phase 2) menu and create Proposal 1 SA Life 1200 Seconds Compression None Encapsulation Protocol (ESP) Check Encrypt Alg Triple DES Hash Alg MD5 Encapsulation Tunnel

Connection Verification 1. Tunnel can be established by initiating traffic from Laptop towards RN300 s branch office local net. For example, initiate PING traffic from laptop to 10.1.9.2

2. FTP data transfer also will work as this service is allowed in NSRemoteto-RN300 profile. If you require other services such as telnet, ssh or http etc, you need to define and allow in NSRemote-to-RN300 profile 3. Ensure that the traffic is secure and encrypted by capturing data packets between laptop and RN300. We can do this by placing a hub in between and capture data packets on a ethereal host as shown followed

The packet capture available is as followed. Note that traffic from laptop (10.1.2.42) to any other host (10.1.2.107) is clear text where as traffic to brach office network (host 10.1.9.2) is encapsulated and encrypted in IP ESP packets.