How To - Establish Net-to-Net IPSec Connection between Cyberoam and Cisco Router using Preshared key

Similar documents
Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

IPsec VPN Application Guide REV:

Vodafone MachineLink 3G. IPSec VPN Configuration Guide

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

LAN-Cell to Cisco Tunneling

REMOTE ACCESS VPN NETWORK DIAGRAM

GregSowell.com. Mikrotik VPN

Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1

Triple DES Encryption for IPSec

Packet Tracer Configuring VPNs (Optional)

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key

Lab a Configure Remote Access Using Cisco Easy VPN

Configure ISDN Backup and VPN Connection

How To Establish Site-to-Site VPN Connection. using Preshared Key. Applicable Version: onwards. Overview. Scenario. Site A Configuration

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

VPN SECURITY POLICIES

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

How To Establish IPSec VPN between Cyberoam and Microsoft Azure

Deploying IPSec VPN in the Enterprise

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Cisco 1841 MyDigitalShield BYOG Integration Guide

Using IPsec VPN to provide communication between offices

Industrial Classed H685 H820 Cellular Router User Manual for VPN setting

Lab Configure a PIX Firewall VPN

Configuring Remote Access IPSec VPNs

VPN Configuration Guide. Cisco ASA 5500 Series

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI

Expert Reference Series of White Papers. Integrating Active Directory Users with Remote VPN Clients on a Cisco ASA

How To Configure L2TP VPN Connection for MAC OS X client

VPN. VPN For BIPAC 741/743GE

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Lab Configure Remote Access Using Cisco Easy VPN

Module 6 Configure Remote Access VPN

Gateway to Gateway VPN Connection

Interoperability Guide

External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy

Virtual Private Network (VPN)

Application Notes. How to Configure UTM with Apple OSX and ios Devices for IPsec VPN

IPSec Pass through via Gateway to Gateway VPN Connection

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

VPN L2TP Application. Installation Guide

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520

Katana Client to Linksys VPN Gateway

How To Industrial Networking

Cisco EXAM Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product.

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

ZyWALL USG-Series. How to setup a Site-to-site VPN connection between two ZyWALL USG series.

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Configuring IPsec VPN Fragmentation and MTU

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Application Notes SL1000/SL500 VPN with Cisco PIX 501

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

Setting up VPN Tracker with Nortel VPN Routers

Network Security 2. Module 6 Configure Remote Access VPN

Scenario: Remote-Access VPN Configuration

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

How to configure VPN function on TP-LINK Routers

Configuring a VPN for Dynamic IP Address Connections

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Technical Document. Creating a VPN. GTA Firewall to Cisco PIX 501 TDVPNPIX

IPSec. User Guide Rev 2.2

Configuring L2TP over IPSec

Network Diagram Scalability Testbed and Configuration Files

IPSec interoperability between Palo Alto firewalls and Cisco ASA. Tech Note PAN-OS 4.1. Revision A 2011, Palo Alto Networks, Inc.

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuring a FortiGate unit as an L2TP/IPsec server

How to access peers with different VPN through IPSec. Tunnel

How To Configure Syslog over VPN

Scenario 1: One-pair VPN Trunk

How To Configure Apple ipad for Cyberoam L2TP

ISG50 Application Note Version 1.0 June, 2011

Connecting Remote Offices by Setting Up VPN Tunnels

How to Set Up an IPsec Connection Between Two Ingate Firewalls/SIParators (including SIP)

Greenbow VPN Client with Teldat VPN Server. Configuration Highlights

2.0 HOW-TO GUIDELINES

Configuring IPsec VPN between a FortiGate and Microsoft Azure

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and SDM

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

Workflow Guide. Establish Site-to-Site VPN Connection using RSA Keys. For Customers with Sophos Firewall Document Date: November 2015

How to configure VPN function on TP-LINK Routers

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Point-to-Point GRE over IPsec Design and Implementation

7. Configuring IPSec VPNs

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Configuring the PIX Firewall with PDM

Configuring SSH Sentinel VPN client and D-Link DFL-500 Firewall

VPN PPTP Application. Installation Guide

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.

RF550VPN and RF560VPN

SingTel VPN as a Service. Quick Start Guide

Transcription:

How To - Establish Net-to-Net IPSec Connection between Cyberoam and Cisco Router using Preshared key How To Establish Net-to-Net IPSec VPN Connection between Cyberoam and Cisco Router using Product: The information in this article is based on Cyberoam Version 95314 and Cisco Router. This article describes a detailed configuration example that demonstrates how to set up a net-tonet IPSec VPN connection between Cyberoam and Cisco Router using preshared key to authenticate VPN peers. Throughout the article we will use the network parameters as shown in the below given network diagram. Cyberoam is installed at AHMD branch while Cisco Router is installed at DLH branch. In the hypothetical example considered in this article, static IP address is configured for Cyberoam but depending on the network requirement it is also possible that dynamic IP address is configured for Cyberoam. Article includes network diagram and details on the information to be gathered before configuration and covers following scenarios when Cyberoam is configured for: 1. Aggressive mode Authentication 2. Main mode Authentication Static IP address is assigned to Cyberoam Dynamic IP address is assigned to Cyberoam Each scenario includes: Cyberoam configuration steps Cisco Router configuration steps We will establish VPN connection from AHMD branch to DLH branch therefore: For AHMD branch: Cyberoam is the Local server. Cisco Router is the Remote server. For DLH branch: Cisco Router is the Local server. Cyberoam is the Remote server. Network Diagram

. Information to be gathered before configuration Before configuring for IPSec connection, gather the following information about the Remote server: 1. Connection details - Encryption algorithm, Authentication Algorithm and DH/PFS Group 2. Preshared Key 3. Server IP addresses 4. Internal Network Subnet Configuration Table Please note: Phase 1 and Phase 2 parameters: Encryption algorithm, Authentication Algorithm and DH/PFS Group must be same for both the peers Cyberoam and Cisco Router VPN servers. Configuration Parameters IPSec Connection (Net-to-Net) Cyberoam Local Network details Cyberoam WAN IP address 182.7.7.254 Cisco Router Local Network details Cisco Router IP address 125.16.7.254 Local Internal Network 192.168.1.0/24 Local Internal Network 192.168.2.0/24 Preshared Key - 0123456789 Preshared Key 0123456789 Remote Network details Remote VPN server IP address 125.16.7.254 Remote Internal Network 192.168.2.0/24 Remote Network details Remote VPN server IP address 182.7.7.254 Remote Internal Network 192.168.1.0/24

Cyberoam Configuration Applicable to version: 9.5.8 onwards Task list 1. Define VPN policy configure Phase 1 & Phase 2 parameters to authenticate the remote peer and establish a secure connection 2. Define VPN connection parameters Case I Aggressive mode Authentication Step 1: Create VPN Policy Go to VPN Policy Create Policy and create VPN policy with following values: Policy Name: CR_2_Cisco Allow Re-keying: Yes Authentication Mode: Aggressive mode Phase 1 Encryption Algorithm: 3DES Authentication Algorithm: MD5 DH Group (Key Group): 2 (DH1024) Phase 2 Encryption Algorithm: 3DES Authentication Algorithm: MD5 DH Group (Key Group): Same as Phase 1

Step 2: Create IPSec connection Go to VPN IPSec Connection Create Connection and create connection with the following values: Connection name: n2n_ahmd Policy: CR_2_Cisco (created in step 1) Action on restart: As required Mode: Tunnel Type: Net to Net Authentication Type Preshared Key Preshared Key: 0123456789 Local server IP address (WAN IP address) 182.7.7.254 Local Internal Network 192.168.1.0/24

Remote server IP address (WAN IP address) 125.16.7.254 Remote Internal Network 192.168.2.0/24 User Authentication Mode: Disabled Protocol: As required Step 3: Activate Connection Go to VPN IPSec Connection Manage Connection and click connection. against the n2n_ahmd Under the Connection status indicates that the connection is successfully activated

Note At a time only one connection can be active if both the types of connection - Digital Certificate and Preshared Key - are created with the same source and destination. In such situation, at the time of activation, you will receive error unable to activate connection hence you need to deactivate all other connections. Cisco Router Configuration Step 1. Logon to Cisco Router with Enable privilege Router> en Password: ****** Router# conf t Step 2. Configuring IKE Parameters as follows: crypto isakmp policy 10 encr 3des hash md5 authentication pre-share group 2 lifetime 3600 crypto isakmp key 0123456789 address 182.7.7.254 Step 3. Verify the IKE Parameters using below given commands show isakmp show isamp policy Step 4. Define Access-list to allow IPSec tunnel traffic access-list dlhtoahmd permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list dlhtoahmd permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 Step 5. Configuring IPSec Parameters

crypto ipsec transform-set dlhtransform esp-3des esp-md5-hmac crypto map dlhmap ipsec-isakmp description Tunnel to CR set peer 182.7.7.254 set transform-set dlhtransform set pfs group2 match address dlhtoahmd Step 6. Enabling the IPSec on External Interface of Cisco Router Interface fastethernet0/1 (external interface of Cisco router) crypto map dlhmap Case II Main mode Authentication and Cyberoam configured with static IP address Step 1: Create VPN Policy Go to VPN Policy Create Policy and create VPN policy with following values: Policy Name: CR_2_Cisco Allow Re-keying: Yes Authentication Mode: Main mode Phase 1 Encryption Algorithm: 3DES Authentication Algorithm: MD5 DH Group (Key Group): 2 (DH1024) Phase 2 Encryption Algorithm: 3DES Authentication Algorithm: MD5 DH Group (Key Group): Same as Phase 1

Step 2: Create IPSec connection Go to VPN IPSec Connection Create Connection and create connection with the following values: Connection name: n2n_ahmd Policy: CR_2_Cisco (created in step 1) Action on restart: As required Mode: Tunnel Type: Net to Net Authentication Type Preshared Key Preshared Key: 0123456789 Local server IP address (WAN IP address) 182.7.7.254 Local Internal Network 192.168.1.0/24

Remote server IP address (WAN IP address) 125.16.7.254 Remote Internal Network 192.168.2.0/24 User Authentication Mode: Disabled Protocol: As required Step 3: Activate Connection Go to VPN IPSec Connection Manage Connection and click connection. against the n2n_ahmd Under the Connection status indicates that the connection is successfully activated

Note At a time only one connection can be active if both the types of connection - Digital Certificate and Preshared Key - are created with the same source and destination. In such situation, at the time of activation, you will receive error unable to activate connection hence you need to deactivate all other connections. Cisco Router Configuration Step 1. Logon to Cisco Router with Enable privilege Router> en Password: ****** Router# conf t Step 2. Configuring IKE Parameters as follows: crypto isakmp policy 10 encr 3des hash md5 authentication pre-share group 2 lifetime 3600 crypto isakmp key 0123456789 address 182.7.7.254 Step 3. Verify the IKE Parameters using below given commands show isakmp show isamp policy Step 4. Define Access-list to allow IPSec tunnel traffic access-list dlhtoahmd permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list dlhtoahmd permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0 Step 5. Configuring IPSec Parameters crypto ipsec transform-set dlhtransform esp-3des esp-md5-hmac

crypto map dlhmap ipsec-isakmp description Tunnel to CR set peer 182.7.7.254 set transform-set dlhtransform set pfs group2 match address dlhtoahmd Step 6. Enabling the IPSec on External Interface of Cisco Router Interface fastethernet0/1 (external interface of Cisco router) crypto map dlhmap Case III Main mode Authentication and Cyberoam configured with dynamic IP address Step 1: Create VPN Policy Go to VPN Policy Create Policy and create VPN policy with following values: Policy Name: CR_2_Cisco Allow Re-keying: Yes Authentication Mode: Main mode Phase 1 Encryption Algorithm: 3DES Authentication Algorithm: MD5 DH Group (Key Group): 2 (DH1024) Phase 2 Encryption Algorithm: 3DES Authentication Algorithm: MD5 DH Group (Key Group): Same as Phase 1

Step 2: Create IPSec connection Go to VPN IPSec Connection Create Connection and create connection with the following values: Connection name: n2n_ahmd Policy: CR_2_Cisco (created in step 1) Action on restart: As required Mode: Tunnel Type: Net to Net Authentication Type Preshared Key Preshared Key: 0123456789 Local server IP address (WAN IP address) Dynamic IP address assigned to the Cyberoam WAN interface

Local Internal Network 192.168.1.0/24 Remote server IP address (WAN IP address) 125.16.7.254 Remote Internal Network 192.168.2.0/24 User Authentication Mode: Disabled Protocol: As required Step 3: Activate Connection Go to VPN IPSec Connection Manage Connection and click connection. against the n2n_ahmd

Under the Connection status indicates that the connection is successfully activated Note At a time only one connection can be active if both the types of connection - Digital Certificate and Preshared Key - are created with the same source and destination. In such situation, at the time of activation, you will receive error unable to activate connection hence you need to deactivate all other connections. Cisco Router Configuration Step 1. Logon to Cisco Router with Enable privilege Router> en Password: ****** Router# conf t Step 2. Configuring IKE Parameters as follows: crypto isakmp policy 10 encr 3des hash md5 authentication pre-share group 2 lifetime 3600 crypto isakmp key 0123456789 hostname elite.elitecore.com no-xauth Step 3. Verify the IKE Parameters using below given commands show isakmp show isamp policy Step 4. Define Access-list to allow IPSec tunnel traffic access-list dlhtoahmd permit ip 192.168.2.0 255.255.255.0 192.168.1.0 255.255.255.0 access-list dlhtoahmd permit ip 192.168.1.0 255.255.255.0 192.168.2.0 255.255.255.0

Step 5. Configuring IPSec Parameters crypto ipsec transform-set dlhtransform esp-3des esp-md5-hmac crypto map dlhmap ipsec-isakmp description Tunnel to CR set peer elite.elitecore.com (With CR on DDNS) set transform-set dlhtransform set pfs group2 match address dlhtoahmd Step 6. Enabling the IPSec on External Interface of Cisco Router Interface fastethernet0/1 (external interface of Cisco router) crypto map dlhmap Document version: 1.0-24/12/2008