Route Based Virtual Private Network



Similar documents
TechNote. Configuring SonicOS for Amazon VPC

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Configuring IPsec VPN with a FortiGate and a Cisco ASA

TechNote. Configuring SonicOS for MS Windows Azure

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Configuring SonicOS for Microsoft Azure

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

Using IPsec VPN to provide communication between offices

Supporting Multiple Firewalled Subnets on SonicOS Enhanced

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Global VPN Client Getting Started Guide

Application Notes for Configuring a SonicWALL VPN with an Avaya IP Telephony Infrastructure - Issue 1.0

SSL-VPN 200 Getting Started Guide

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

Scenario: IPsec Remote-Access VPN Configuration

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

How To Set Up A Pploe On A Pc Orca On A Ipad Orca (Networking) On A Macbook Orca 2.5 (Netware) On An Ipad 2.2 (Netrocessor

Firewall Defaults and Some Basic Rules

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

VPN Wizard Default Settings and General Information

Chapter 4 Virtual Private Networking

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

SonicWALL Check Point Firewall-1 VPN Interoperability

Global VPN Client Getting Started Guide

Configuring High Availability for Embedded NGX Gateways in SmartCenter

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Windows XP VPN Client Example

Creating a VPN with overlapping subnets

Using SonicWALL NetExtender to Access FTP Servers

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

SonicOS Enhanced Release Notes

Configuring a FortiGate unit as an L2TP/IPsec server

Configuring a VPN for Dynamic IP Address Connections

Cisco QuickVPN Installation Tips for Windows Operating Systems

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

vcloud Air - Virtual Private Cloud OnDemand Networking Guide

How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS)

SonicOS Enhanced 4.0: NAT Load Balancing

How To Configure An Ipsec Tunnel On A Network With A Network Gateways (Dfl-800) On A Pnet 2.5V2.5 (Dlf-600) On An Ipse Vpn

Configure IPSec VPN Tunnels With the Wizard

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

How To Set Up Checkpoint Vpn For A Home Office Worker

For more information refer: UTM - FAQ: What are the basics of SSLVPN setup on Gen5 UTM appliances running SonicOS Enhanced 5.2?

Configuring IPsec VPN between a FortiGate and Microsoft Azure

Contents. Platform Compatibility. SonicOS

Chapter 3 LAN Configuration

SonicOS 5.8.1: Configuring the Global Bandwidth Management Service

How To Industrial Networking

ZyWALL USG-Series. How to setup a Site-to-site VPN connection between two ZyWALL USG series.

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

VPN Configuration Guide. Dell SonicWALL

Best Practices: Pass-Through w/bypass (Bridge Mode)

GNAT Box VPN and VPN Client

HOWTO: How to configure IPSEC gateway (office) to gateway

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

Chapter 3 Security and Firewall Protection

For paid computer support call

How do I set up a branch office VPN tunnel with the Management Server?

SonicOS Enhanced Release Notes

Chapter 6 Basic Virtual Private Networking

Configure VPN between ProSafe VPN Client Software and FVG318

VMware vcloud Air Networking Guide

Scenario: Remote-Access VPN Configuration

Fireware How To Network Configuration

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

How To Configure SSL VPN in Cyberoam

Configuration Example

VPN Configuration Guide. Cisco Small Business (Linksys) WRV210

Configuring IPsec between a Microsoft Windows XP Professional (1 NIC) and the VPN router

How do I configure multi-wan in Routing Table mode?

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Configuring WAN Failover & Load-Balancing

How to set up as VPN Network

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs.

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Introduction. Technology background

VPN Configuration Guide. Cisco Small Business (Linksys) RV016 / RV042 / RV082

Getting Started Guide

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

If you have questions or find errors in the guide, please, contact us under the following address:

VPNC Interoperability Profile

VPN Solution Guide Peplink Balance Series. Peplink Balance. VPN Solution Guide Copyright 2015 Peplink

Global VPN Client Getting Started Guide

User Guide Managed VPN Router. Wireless Maingate AB. Wireless Maingate AB

Connecting an Android to a FortiGate with SSL VPN

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

FortiOS Handbook IPsec VPN for FortiOS 5.0

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

SonicWALL NAT Load Balancing

Title: Peer to Peer Communications on TDE systems Using Multi-Tech Routers

ISG50 Application Note Version 1.0 June, 2011

Transcription:

Route Based Virtual Private Network Document Scope This solutions document provides details about Route Based Virtual Private Network (VPN) Technology, its advantages, and procedures to configure a Route Based VPN. This document contains the following sections: Overview section on page 1 Using Route Based VPN section on page 2 Overview This section provides an introduction to Route Based VPN. This section contains the following subsections: What is a Route Based VPN? section on page 1 Benefits section on page 2 Platforms section on page 2 What is a Route Based VPN? In general, a Virtual Private Network (VPN) is a way for companies to have the same security as if all the distributed networks were together, with only one access to the private network, or intranet. Each location has a firewall, configured specially so that it recognizes all the other firewall locations. When the firewall sees a packet headed outward to another protected location, the packet is encrypted. After it travels across the Internet, the receiving firewall then decrypts the packet. A policy-based approach forces the VPN policy configuration to include the network topology configuration. This makes it difficult for the network administrator to configure and maintain the VPN policy with a constantly changing network topology. With the Route Based VPN approach, network topology configuration is removed from the VPN policy configuration. The VPN policy configuration creates a Tunnel Interface between two end points. Static routes can then be added to the Tunnel Interface. The Route Based VPN approach moves network configuration from the VPN policy configuration to route configuration. SonicWALL Route Based VPN Feature Module 1

Using Route Based VPN Benefits Platforms Not only does Route Based VPN make configuring and maintaining the VPN policy easier, a major advantage of the Route Based VPN feature is that it provides flexibility on how traffic is routed. With this feature, users can now define multiple paths for overlapping networks over a clear or redundant VPN. Route The Route Based Based VPN VPN is a feature for is supported SonicOS 5.5 on Enhanced. SonicOS 5.5 Enhanced and higher. Using Route Based VPN This Route section based contains VPN configuration the following is a subsections: two step process. The first step involves creating a Tunnel Interface. The crypto suites used to secure the traffic between two end-points are defined in the Tunnel Interface. The second Configuring step involves Static creating Route a Based route VPN using Tunnel section Interface. on page 2 This Configuration section contains Overview the following section subsections: page 2 Adding Configuration a Tunnel Overview Interface section section on on page page 2 3 Creating Adding a a Tunnel Static Route Interface for Tunnel section Interface on page 3section on page 4 Route Creating Entries a Static for Route Different for Tunnel Network Interface Segments section section on on page page 4 5 Redundant Route Entries Static for Routes Different for Network a Network Segments section on section page on 6 page 5 Drop Redundant Tunnel Static Interface Routes section for a Network on page 6section on page 6 Creating Drop Tunnel a Static Interface Route for section Drop on Tunnel page 6Interface section on page 7 Advanced Route Configuration for Tunnel Interface section on page 8 Configuring Routing Protocol for a Tunnel Interface section on page 10 Configuring Static Route Based VPN Configuration Overview Additional Configuration Scenarios section on page 11 Route based VPN configuration is a two step process. The first step involves creating a Tunnel Interface. The crypto suites used to secure the traffic between two end-points are defined in the Tunnel Interface. The second step involves creating a static route using Tunnel Interface. Configuration Overview The Tunnel Interface is created when a Policy of type Tunnel Interface is added for the remote gateway. The Tunnel Interface must be bound to a physical interface and the IP address of that physical interface is The used Tunnel as the source Interface address is created of the when tunneled a Policy packet. of type Tunnel Interface is added for the remote gateway. The Tunnel Interface must be bound to a physical interface and the IP address of that physical interface is A route ties the traffic (source, destination, and service) to the Tunnel Interface. Any number of overlapping used as the source address of the tunneled packet. static routes can be added for the tunneled traffic. When networks are added or removed from the topology, A the Static static Route routes ties only the need traffic to (source, be updated destination, accordingly; and the service) tunnel to interface the Tunnel configuration Interface. Any does number not need of to overlapping be updated. static routes can be added for the tunneled traffic. When networks are added or removed from the topology, the static routes only need to be updated accordingly; the tunnel interface configuration does For more details about a general tunnel interface configuration, please refer to the SonicOS Enhanced 5.4 not need to be updated. Administrator s Guide: http://www.sonicwall.com/ 2 SonicWALL Route Based VPN Feature Module

Using Route Based VPN Adding a Tunnel Interface The following procedures explain how to add a Tunnel Interface: Step 1 Step 2 Navigate to VPN>Settings>VPN Policies. Click the Add... button. This will open the VPN Policy Configuration dialog box. On the General tab, select the policy type as Tunnel Interface. Step 3 Next, navigate to the Proposal tab and configure the IKE and IPSec proposals for the tunnel negotiation. SonicWALL Route Based VPN Feature Module 3

Using Route Based VPN Step 4 Navigate to the Advanced tab to configure the advanced properties for the Tunnel Interface. By default, Enable Keep Alive is enabled. This is to establish the tunnel with remote gateway proactively. Also, the default tunnel interface is bound to the X1 interface, but can be bound to any of the available interfaces. Creating a Static Route for Tunnel Interface After you have successfully added a Tunnel Interface, you may then create a Static Route. Follow the procedures to create a Static Route for a Tunnel Interface. Navigate to Network>Routing>Route Policies. Click the Add... button. A dialogue window appears for adding Static Route. Note that the Interface dropdown menu lists all available tunnel interfaces. 4 SonicWALL Route Based VPN Feature Module

Using Route Based VPN Auto-add Access Rule When using Any and not specifying the source of the route policy, inbound and outbound access rules that allow traffic between non-trusted zones and the tunnel interface will not be auto-added. VPN Allow Rules from and to these zones for the remote network(s) must be manually added for successful communication between these local and remote networks. Note The auto-added VPN > WAN allow rule(s) for the remote networks to Any is intended for route-all scenarios. Route Entries for Different Network Segments After a tunnel interface is created, multiple route entries can be configured to use the same tunnel interface for different networks. This provides a mechanism to modify the network topology without making any changes to the tunnel interface. The image below shows an example of same tunnel interface for different networks (Routes 1 & 2): SonicWALL Route Based VPN Feature Module 5

Drop Tunnel Interface Redundant Static Routes for a Network Also after more than one tunnel interface is configured, you can add multiple overlapping static routes; each static route uses a different tunnel interface to route the traffic. This provides routing redundancy for the traffic to reach the destination. The image below illustrates redundant static routes for a network (Routes 2 & 3): Drop Tunnel Interface The Drop Tunnel Interface is a pre-configured tunnel interface. This interface provides added security for traffic. An example of this would be if a static route bind interface is deemed the drop tunnel interface, then all the traffic for that route is dropped and not forwarded in clear. If a static route bind to tunnel interface is defined for traffic (source/destination/service), and it is desired that traffic should not be forwarded in the clear if the tunnel interface is down, it is recommended to configure a static route bind to drop tunnel interface for the same network traffic. As a result, if the tunnel interface is down, traffic will be dropped due to the drop tunnel interface static route. 6 SonicWALL Route Based VPN Feature Module

Drop Tunnel Interface Creating a Static Route for Drop Tunnel Interface To add a static route for drop tunnel interface, navigate to Network>Routing>Routing Policies. Click the Add... button. Similar to configuring a State route for a Tunnel Interface, configure the values for Source, Destination, and Service Objects. Under Interface, select Drop_tunnelIf. Once added, the route is enabled and displayed in the Route Policies. SonicWALL Route Based VPN Feature Module 7

Advanced Route Configuration for Tunnel Interface Advanced Route Configuration for Tunnel Interface To allow RIP and OSPF configuration, follow the steps below: Step 1 Enable the Allow Advance Routing option on tunnel interface configuration. With this option enabled, the tunnel interface will appear under Advanced Routing Configuration in the Network > Routing screen. 8 SonicWALL Route Based VPN Feature Module

Advanced Route Configuration for Tunnel Interface Step 2 Enable RIP and OSPF on the tunnel interface and configure the IP address borrowed from and Remote IP on both site appliances. Note The fields IP Address borrowed from and Remote IP Address require the IP addresses for routing protocol tunnels and must be in the same subnet. Note Remember that the Remote IP Address must match the IP Address in the remote site s RIP/OSPF configuration for the IP borrowed Interface address. SonicWALL Route Based VPN Feature Module 9

Advanced Route Configuration for Tunnel Interface Configuring Routing Protocol for a Tunnel Interface After you have successfully added a Tunnel Interface, you can navigate to the Network>Routing>Advanced Routing page for a full list of interfaces. To configure Advanced Routing options, click on the Configure RIP or Configure OSPF icon for the Tunnel Interface you wish to configure. This section contains the following subsections: Configuring RIP for a Tunnel Interface section on page 10 Configuring OSPF for a Tunnel Interface section on page 11 Configuring RIP for a Tunnel Interface From the Network>Routing>Routing Protocols page, click the Configure RIP icon. A dialog will appear which will allow you to configure the RIP for the Tunnel Interface. Click OK when you have finished configuring the RIP settings. 10 SonicWALL Route Based VPN Feature Module

Additional Configuration Scenarios Note If you select the Send and Receive option for RIP, you will have to select the RIP version for each message sent and received. Configuring OSPF for a Tunnel Interface From the Network>Routing>Routing Protocols page, click the Configure OSPF icon. A dialog will appear which will allow you to configure the OSPF for the Tunnel Interface. Click OK when you have finished configuring the OSPF settings. Additional Configuration Scenarios The following section contains procedures for more configuring more advanced route-based VPN scenarios. This section includes the following subsections: Single Tunnel Interface Configuration Between Two Sites section on page 12 Multiple Tunnel Interface Configuration Between Two Sites section on page 13 Failover and Load Balancing section on page 15 Mesh Configuration for Redundant Route-Based VPN Between Multiple Sites section on page 19 SonicWALL Route Based VPN Feature Module 11

Additional Configuration Scenarios Single Tunnel Interface Configuration Between Two Sites The following steps describe how to configure a single tunnel interface between two sites (Site A and Site B): Step 1 On the first site s network (Site A), create the first tunnel interface policy by navigating to the VPN > Settings screen. Select Tunnel Interface as the Policy Type, and fill in the Name for this interface. In this example, we have our Site A interface named as RTVPN1. Step 2 On the second site s network (Site B), repeat Step 1 to create a Policy Type. For this Site B interface, we have named it RTVPN2. Note Both interfaces are bound to the WAN (X1) interface on each respective appliance. 12 SonicWALL Route Based VPN Feature Module

Additional Configuration Scenarios Step 3 On the Site A appliance, navigate to the Network > Routing screen, and configure a static route from Site A to Site B, with Site A as the Source and Site B being the Destination. Step 4 On the Site B appliance, repeat step 3, with Site B as the Source and Site A as the Destination. Multiple Tunnel Interface Configuration Between Two Sites The following steps describe how to configure mu tip le tunnel interface between two sites (Site A and Site B): Step 1 For Site A s first network (Network 1), create a tunnel interface policy by navigating to the VPN > Settings screen. Select Tunnel Interface as the Policy Type, and fill in the Name for this interface. In this example, we have the Site A Network 1 interface named as RTVPN1. SonicWALL Route Based VPN Feature Module 13

Additional Configuration Scenarios Step 2 For Site A s second network (Network 2), create a tunnel interface policy by repeating Step 1. In this example, we have the Site A Network 2 interface named as RTVPN3. Step 3 On Site B s network, repeat Steps 1 & 2 to create a Policy Type for its two interfaces (Site B Network 1 and Site B Network 2). For the Site B Network 1 interface, we have named it RTVPN2-X1. For the Site B Network 2interface, we have named it RTVPN2-X2. 14 SonicWALL Route Based VPN Feature Module

Additional Configuration Scenarios Step 4 Step 5 On the Site A appliance, navigate to the Network > Routing screen, and configure a static route from Site A Network 1 (RTVPN 1) to Site B Network 1 (RTVPN2-X1), with Site A as the Source and Site B being the Destination. Configure another static route from Site A Network 2 (RTVPN3) to Site B Network 2 (RTVPN2-X2), with Site A as the Source and Site B being the Destination. Step 6 Repeat Steps 4 and 5 for the Site B appliance, configuring a static route from Site B Network 1 (RTVPN2-X1) to Site A Network 1 (RTVPN 1) and another static route from Site B Network 2 (RTVPN2-X2) to Site A Network 2 (RTVPN 2), with Site B as the Source and Site A as the Destination for both routes. Failover and Load Balancing When the tunnel interfaces are bound to a physical interface, you can configure tunnel failover or traffic load balancing using static routing on additional routes. Follow the steps below to configure failover and load balancing for multiple tunnel interfaces between two sites: Step 1 Add additional routes on Site A appliance: SonicWALL Route Based VPN Feature Module 15

Additional Configuration Scenarios For Site A Network 1 and Site B Network 1 with the interface as RTVPN3, add a tunnel interface with a metric lower than the static route for the same network with tunnel interface (10.8.23.208 for this example). For Site A Network 2 and Site B Network 2 with the interface as RTVPN1, add a tunnel interface with a metric lower than the static route for the same network with tunnel interface (10.9.23.209, for this example). Step 2 Repeat Step 1 to add additional routes on Site B appliance: 16 SonicWALL Route Based VPN Feature Module

Additional Configuration Scenarios For Site B Network 1 and Site A Network 1 with the interface as RTVPN2-X2, add a tunnel interface with a metric lower than the static route for the same network with tunnel interface (10.8.23.206 for this example). For Site B Network 2 and Site A Network 2 with the interface as RTVPN2-X1, add a tunnel interface with a metric lower than the static route for the same network with tunnel interface (10.9.23.209, for this example). Note Step 3 When the high priority route is not available, the low priority route is used to forward the traffic to the destination network. Navigate to the Network > Routing screen to configure the following tunnel interface VPN Policy on Site A: RTVPN1 bound to interface X1 for remote gateway 10.8.23.208. RTVPN3 bound to interface X2 for remote gateway 10.9.23.209. Step 4 Configure the following tunnel interface VPN Policy on Site B: RTVPN2 bound to interface X1 for remote gateway 10.6.23.206. RTVPN4 bound to interface X2 for remote gateway 10.7.23.207. Step 5 Next, configure the following static routes on Site A: For Site A Network 1 and Site B Network 1, configure the interface as RTVPN1. SonicWALL Route Based VPN Feature Module 17

Additional Configuration Scenarios For Site A Network 2 and Site B Network 2, configure the interface as RTVPN3. Step 6 Repeat Step 5 to configure the following static routes on Site B: For Site B Network 1 and Site A Network 1, configure the interface as RTVPN2. For Site B Network 2 and Site A Network 2, configure the interface as RTVPN4. Step 7 As the tunnel interfaces are bound to a physical interface and not to a zone, tunnel failover or traffic load balancing can be achieved using static routing. Route the following additional routes on Site A: For Site A Network 1 and Site B Network 1 with interface RTVPN3, configure a static route for the same network with tunnel interface RTVPN1. This is the static route you configured in Step 5. For Site A Network 2 and Site B Network 2 with interface RTVPN1, configure a static route for the same network with tunnel interface RTVPN3. This is the static route you configured in Step 5. Step 8 Route the following additional routes on Site B: For Site B Network 1 and Site A Network 1 with interface RTVPN4, configure a static route for the same network with tunnel interface RTVPN2. This is the static route you configured in Step 6. For Site B Network 2 and Site A Network 2 with interface RTVPN2, configure a static route for the same network with tunnel interface RTVPN4. This is the static route you configured in Step 6. 18 SonicWALL Route Based VPN Feature Module

Additional Configuration Scenarios Mesh Configuration for Redundant Route-Based VPN Between Multiple Sites Follow the steps to configure a mesh configuration for Site A, Site B, and Site C using the WAN interface X1: Step 1 Configure the following tunnel interface VPN policy on Site A: RTVPN1 bound to interface X1 for remote gateway 10.8.23.208 for traffic between Site A and Site B. RTVPN3 bound to interface X1 for remote gateway 10.10.23.210 for traffic between Site A and Site C. Step 2 Configure the following tunnel interface VPN Policy on Site B: RTVPN2 bound to interface X1 for remote gateway 10.6.23.206 for traffic between Site A and Site B. RTVPN4 bound to interface X1 for remote gateway 10.10.23.210 for traffic between Site B and Site C. Step 3 Configure the following tunnel interface VPN Policy on Site C: RTVPN5 bound to interface X1 for remote gateway 10.6.23.206 for traffic between Site A and Site C. RTVPN6 bound to interface X1 for remote gateway 10.8.23.208 for traffic between Site B and Site C Note When the direct route between site A and B is not available, traffic can be forwarded from Site A to Site B, or vice versa, via the Site C network if the connection between site A to Site C and Site B to Site C is available. Step 4 Next, configure static route on Site A: For Site A Network and Site B Network, configure RTVPN2 for traffic between Site A and Site B. For Site A Network and Site C Network, configure RTVPN4 for traffic between Site A and Site C. SonicWALL Route Based VPN Feature Module 19

Additional Configuration Scenarios For Site A Network and Site B Network, configure RTVPN 4 for traffic between Site A and Site B via Site C tunnel interface. Step 5 Configure static route on Site B: For Site B Network and Site A Network, configure RTVPN1 for traffic between Site A and Site B. For Site B Network and Site C Network, configure RTVPN3 for traffic between Site B and Site C. For Site B Network and Site A Network, configure RTVPN3 for traffic between Site A and Site B via site C tunnel interface. Step 6 Configure static route on Site C: For Site C Network and Site A Network, configure RTVPN5 for traffic between Site A and Site C. For Site B Network and Site C Network, configure RTVPN6 for traffic between Site B and Site C. For Site A Network and Site B Network, configure RTVPN6 for traffic between Site A and Site B via Site C tunnel interface RTVPN5 and RTVPN6. For Site B Network and Site A Network, configure RTVPN5 for traffic between Site A and Site B via Site C tunnel interface RTVPN5 and RTVPN6. Solution Document Version History Version Number Date Notes 1 6/24/2009 This document was created by A. Mendoza. 2 7/20/2009 Incorporated feedback from N. Kulshreshtha. 3 7/20/2009 Incorporated feedback from P. Lydon. 4 7/27/2009 Incorporated feedback from N. Kulshreshtha. 5 8/14/2009 Incorporated feedback from N. Kulshreshtha and N. Baumen. 6 8/10/2011 Incorporated feedback from N. Kulshreshtha. 7 8/15/2011 Incorporated additional feedback from N. Kulshreshtha 20 SonicWALL Route Based VPN Feature Module