VPN Tracker for Mac OS X



Similar documents
VPN Tracker for Mac OS X

VPN Tracker for Mac OS X

VPN Tracker for Mac OS X

VPN Tracker for Mac OS X

VPN Configuration Guide D-Link DFL-800

VPN Tracker for Mac OS X

VPN Configuration Guide. Cisco Small Business (Linksys) WRVS4400N / RVS4000

VPN Configuration Guide LANCOM

VPN Configuration Guide. Cisco Small Business (Linksys) WRV210

VPN Configuration Guide D-Link DFL-200

VPN Configuration Guide. Cisco Small Business (Linksys) RV016 / RV042 / RV082

VPN Configuration Guide Netgear FVS338 / FVX538 / FVS124G

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

VPN Configuration Guide. Parallels Remote Desktop for Mac

VPN Quick Configuration Guide. Astaro Security Gateway V8

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

VPN Configuration Guide WatchGuard Fireware XTM

VPN Configuration Guide Linksys RV042/RV082

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

VPN Configuration Guide. Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router

VPN Configuration Guide DrayTek Vigor / VigorPro

VPN Configuration Guide. Juniper Networks NetScreen / SSG / ISG Series

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

VPN Configuration of ProSafe VPN Lite software and NETGEAR ProSafe Router:

Configuring a VPN for Dynamic IP Address Connections

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

VPN Configuration Guide. Cisco ASA 5500 Series

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

VPN Configuration Guide. Dell SonicWALL

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

WatchGuard Mobile User VPN Guide

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configuring IPsec VPN with a FortiGate and a Cisco ASA

IPsec VPN Application Guide REV:

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

VPN Configuration Guide. AVM FRITZ!Box

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

VPN Configuration Guide. Dealing with Identical Local and Remote Network Addresses

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

Chapter 7 Managing Users, Authentication, and Certificates

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

HOWTO: How to configure IPSEC gateway (office) to gateway

How To Configure An Ipsec Tunnel On A Network With A Network Gateways (Dfl-800) On A Pnet 2.5V2.5 (Dlf-600) On An Ipse Vpn

Configuring IPsec VPN between a FortiGate and Microsoft Azure

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

VPNC Interoperability Profile

How To Industrial Networking

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Configuring IPsec between a Microsoft Windows XP Professional (1 NIC) and the VPN router

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Enable VPN PPTP Server Function

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE

How To Configure L2TP VPN Connection for MAC OS X client

Global VPN Client Getting Started Guide

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

How do I set up a branch office VPN tunnel with the Management Server?

If you have questions or find errors in the guide, please, contact us under the following address:

Zeroshell: VPN Host-to-Lan

Chapter 6 Virtual Private Networking

Global VPN Client Getting Started Guide

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Configure IPSec VPN Tunnels With the Wizard

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Configure VPN between ProSafe VPN Client Software and FVG318

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Scenario 1: One-pair VPN Trunk

Chapter 8 Virtual Private Networking

VPN Wizard Default Settings and General Information

What information will you find in this document?

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Gateway-to-Gateway VPN with Certificate

IPSecuritas 3.x. Configuration Instructions. AVM FRITZ!Box. for

Application Note Configuring the UGate 3000 for use with ClipMail Pro and ClipExpress

Setting up VPN connection: DI-824VUP+ with Windows PPTP client

Quick Note 041. Digi TransPort to Digi TransPort VPN Tunnel using OpenSSL certificates.

How To Configure Apple ipad for Cyberoam L2TP

How to Create a Basic VPN Connection in Panda GateDefender eseries

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

CA Nimsoft Service Desk

Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide.

KNX IP Interface 730 KNX IP Router 750 KNX IP LineMaster 760 KNX IP BAOS 770 KNX IP BAOS 771 KNX IP BAOS 772 KNX IP BAOS 777

Installing the Microsoft Network Driver Interface

Configuring Global Protect SSL VPN with a user-defined port

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

How to setup a VPN on Windows XP in Safari.

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

Deploying Windows Streaming Media Servers NLB Cluster and metasan

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

Chapter7 Setting the Receiving PC for Direct Upload. Setting the Receiving PC for Direct Upload For Windows For Macintosh...

Fireware How To Network Configuration

Chapter 5 Virtual Private Networking Using IPsec

Configuring a single-tenant BIG-IP Virtual Edition in the Cloud

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

Transcription:

VPN Tracker for Mac OS X How-to: Interoperability with Novell BorderManager 3.8 Rev. 1.0 Copyright 2003-2004 equinux USA Inc. All rights reserved.

1. Introduction 1. Introduction This document describes how VPN Tracker can be used to establish a connection between a Macintosh running Mac OS X and Novell BorderManager 3.8 installed on a Novell NetWare server. The Novell BorderManager server is configured as a router connecting a company LAN to the Internet. This paper is only a supplement to, not a replacement for, the instructions that have been included with Novell NetWare / BorderManager. Please be sure to read those instructions and understand them before starting. All trademarks, product names, company names, logos, screenshots displayed, cited or otherwise indicated on the How-To are the property of their respective owners. EQUINUX SHALL HAVE ABSOLUTELY NO LIABILITY FOR ANY DIRECT OR INDIRECT, SPECIAL OR OTHER CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE USE OF THE HOW-TO OR ANY CHANGE TO THE ROUTER GENERALLY, INCLUDING WITHOUT LIMITATION, ANY LOST PROFITS, BUSINESS, OR DATA, EVEN IF EQUINUX HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 2

2. Prerequisites 2. Prerequisites First you have to make sure, that you ve installed a recent Novell NetWare server, for this document version 6.5 has been used. Furthermore you should verify, that you use Novell BorderManager 3.8, since previous versions haven t been confirmed to interoperate with VPN Tracker. For the configuration of the Novell BorderManager VPN services, imanager has been used. So please also make sure, that imanager 2.0 or higher and the VPN snap-ins for imanager are installed. On the Mac side you need one VPN Tracker Personal license for each Mac connecting to the Novell BorderManager server. VPN Tracker is compatible with Mac OS X 10.2 or higher. 3

3. Connecting a VPN Tracker host to a Novell BorderManager server In this example the Mac running VPN Tracker is directly connected to the Internet via a dialup or PPP connection. 1 The Novell BorderManager server is configured in NAT mode and has the static WAN IP address 169.1.2.3 and the private LAN IP address 192.168.1.1. The Stations in the LAN behind the Novell BorderManager server use 192.168.1.1 as their default gateway and should have a working Internet connection. mac-vpntracker dynamic IP Novell BorderManager WAN 169.1.2.3 LAN 192.168.1.1 192.168.1.10 192.168.1.20 192.168.1.30 LAN 192.168.1.0/24 Figure 1: VPN Tracker Novell BorderManager connection diagram 1 Please note that the connection via a router, which uses Network Address Translation (NAT), only works if the NAT router supports IPsec pass-through. Please contact your router s manufacturer for details. 4

3.1 N o vell Bor derm anager Certificate Cr eation Please follow the next steps to create the trusted root object, trusted root certificate, server certificates and user certificates. We ll need these objects later for the VPN Client to Site and VPN Server Configuration. Step 1 Please select Create Trusted Root Containers under Novell Certificate Server from the left panel and enter the name and context of the container. Figure 2: Novell BorderManager - Create Trusted Root Container 5

Step 2 Click on Create Trusted Root under Novell Certificate Server and enter an arbitrary certificate name, select the container you created in step 1 and browse the RootCert.der file (normally located in the pub directory). Figure 3: Novell BorderManager - Create Trusted Root Certificate 6

Step 3 Select Create Server Certificate under Novell Certificate Server and enter the server name and an arbitrary certificate nickname. Make sure that the Creation method is set to Custom and click on Next. Figure 4: Novell BorderManager - Create Server Certificate Wizard 7

Check the Organizational Certificate Authority checkbox and click on Next. Figure 5: Novell BorderManager - Certificate Authority 8

Select Custom as Key Type and make sure that all Key Usage checkboxes are checked. Figure 6: Novell BorderManager - Key Size and Usage 9

Just click on Next in the following 2 screens. Figure 7: Novell BorderManager - Certificate Parameters 10

Figure 8: Novell BorderManager - Trusted Root 11

After step 3 your configuration should look like this: Figure 9: Novell BorderManager Summary 12

Step 4 Please create a new Certificate Signing Request (CSR) in the VPN Tracker Certificates menu, Tab Request. Figure 10: VPN Tracker Certificates Enter your details, then save and export the request in the.pem format. Figure 11: VPN Tracker - Certificate Request Details 13

Step 5 Import and sign the request you have created in VPN Tracker. Figure 12: Novell BorderManager - Issue Certificate Wizard Please refer to step 3 for the settings of the next two screens. 14

Save the certificate in binary DER format. Figure 13: Novell BorderManager - Save Certificate 15

Finally save the certificate to your disk and import it into VPN Tracker. Figure 14: Novell BorderManager - Download Certificate Figure 15: VPN Tracker - Import Signed Certificate 16

3.2 N o vel l Bor derm anager VPN Client to S ite Configuration Now you should have all the objects required to configure VPN services. Next we ll need to setup the VPN Client To Site Configuration, which we ll later need for the VPN Server Configuration. Step 1 Please click on Default_C2S_Service_yourContext under NBM Client To Site Configuration. Figure 16: Novell BorderManager - Client To Site Service List 17

Step 2 Select the Trusted Root Container we ve created before and click on apply. Figure 17: Novell BorderManager - Client to Site General 18

Step 3 Now click on Traffic Rules and change the Default rule action to Encrypt. Figure 18: Novell BorderManager - Client to Site Traffic Rule 19

Step 4 Finally click on Authentication Rules and add a new Rule. Enter an arbitrary name for the rule, check Allow Certificate Authentication and Trust Server CA under Authentication Condition and add your Trusted Root to the Issuer List. Figure 19: Novell BorderManager - Client to Site Authentication Rules Then just click on Apply and Ok to save your settings. We ve now configured the authentication method (certificates) and the authentication algorithms. In the next step we ll add these settings to the VPN Server Configuration. 20

3.3 N o vell Bor derm anager VPN S erver Configuration Step 1 Please click on NBM VPN Server Configuration and add a new server. Select the correct Server and click on Next. In the Server Properties screen enter the public IP and Netmask of your Novell BorderManager Server as Server Address and an arbitrary Tunnel Address. Please make sure, that the Tunnel Address is not in the real LAN subnet. Also select the Server Certificate and the Trusted Root we ve created in section 3.1. Figure 20: Novell BorderManager - VPN Server Configuration 21

Step 2 Please make sure, that Client To Site is checked and click on details to select the Default_C2S_Service.yourContext VPN Service. Figure 21: Novell BorderManager - Select Client To Site Service Finally update and save your VPN Server Configuration. Now all the configuration steps on the Novell BorderManager side are done and we can go over to the VPN Tracker configuration. 22

3.4 VPN T racker Configuration Step 1 Add a new connection with the following options: Choose Novell BorderManager as the Connection Type, Host to Network as Topology, then type in the remote endpoint (169.1.2.3) and the remote network (192.168.1.0/24). Figure 22: VPN Tracker - Main Window 23

Step 2 Select Certificates as Authentication method and click on Edit.... Choose the certificate you ve created with VPN Tracker and Novell BorderManager as Own Certificate and verify the remote certificate with CAs. Change the Local/Remote Identifier to Own/Remote certificate. Figure 23: VPN Tracker - Certificate Dialog Step 3 Save the connection and Click Start IPsec in the VPN Tracker main window. You re done. After 10-20 seconds the red status indicator for the connection should change to green, which means you re securely connected to the Novell BorderManager Server. After IPsec has been started, you may quit VPN Tracker. The IPsec service will keep running. Now to test your connection simply ping a host in the Novell BorderManager Server network from the dialed-in Mac in the Terminal utility: ping 192.168.1.1 > Debugging If the status indicator does not change to green please have a look at the log file on both sides. You can define the amount of information available in the log file in the VPN Tracker preferences. 24