Configuring Windows 2000/XP IPsec for Site-to-Site VPN



Similar documents
How To Set Up Checkpoint Vpn For A Home Office Worker

DI-804HV with Windows 2000/XP IPsec VPN Client Configuration Guide

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Configuring IPsec between a Microsoft Windows XP Professional (1 NIC) and the VPN router

Windows XP VPN Client Example

VPN Wizard Default Settings and General Information

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Scenario: IPsec Remote-Access VPN Configuration

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

How To Industrial Networking

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

How to setup a VPN on Windows XP in Safari.

Configure IPSec VPN Tunnels With the Wizard

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

Global VPN Client Getting Started Guide

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Scenario: Remote-Access VPN Configuration

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

TechNote. Configuring SonicOS for Amazon VPC

If you have questions or find errors in the guide, please, contact us under the following address:

How do I set up a branch office VPN tunnel with the Management Server?

Defender EAP Agent Installation and Configuration Guide

TechNote. Configuring SonicOS for MS Windows Azure

GNAT Box VPN and VPN Client

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Global VPN Client Getting Started Guide

Purple Sturgeon Standard VPN Installation Manual for Windows XP

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Configuring IPsec VPN between a FortiGate and Microsoft Azure

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

Configuring a VPN between a Sidewinder G2 and a NetScreen

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE

How To Establish IPSec VPN between Cyberoam and Microsoft Azure

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Configuring WPA-Enterprise/WPA2 with Microsoft RADIUS Authentication

HOWTO: How to configure IPSEC gateway (office) to gateway

WatchGuard Mobile User VPN Guide

Global VPN Client Getting Started Guide

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Fireware How To Network Configuration

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

7. Configuring IPSec VPNs

Configuring a VPN for Dynamic IP Address Connections

VPNC Interoperability Profile

SonicWALL Global Management System Configuration Guide Standard Edition

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How to Setup PPTP VPN Between a Windows PPTP Client and the DIR-130.

V310 Support Note Version 1.0 November, 2011

VPN L2TP Application. Installation Guide

Implementing and Managing Security for Network Communications

VPN Tracker for Mac OS X

Creating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs.

Internet Protocol Security (IPSec)

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

Configuration Procedure

How To Configure An Ipsec Tunnel On A Network With A Network Gateways (Dfl-800) On A Pnet 2.5V2.5 (Dlf-600) On An Ipse Vpn

Virtual Data Centre. User Guide

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Configuring Network Load Balancing with Cerberus FTP Server

Network/VPN Overlap How-To with SonicOS 2.0 Enhanced Updated 9/26/03 SonicWALL,Inc.

VPN Tracker for Mac OS X

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Getting Started Guide

Chapter 4 Virtual Private Networking

Step-by-Step Guide for Setting Up VPN-based Remote Access in a

VPN. VPN For BIPAC 741/743GE

Route Based Virtual Private Network

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. October

What information will you find in this document?

ISG50 Application Note Version 1.0 June, 2011

Pre-lab and In-class Laboratory Exercise 10 (L10)

Remote Access Technical Guide To Setting up RADIUS

VPN Configuration of ProSafe VPN Lite software and NETGEAR ProSafe Router:

Chapter 5 Virtual Private Networking Using IPsec

Chapter 6 Basic Virtual Private Networking

IPsec VPN Application Guide REV:

Laboratory Exercises V: IP Security Protocol (IPSec)

Getting Started - Client VPN

CTERA Cloud Onramp for IBM Tivoli Storage Manager

Nokia Mobile VPN How to configure Nokia Mobile VPN for Cisco ASA with PSK/xAuth authentication

How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication

Configuring the OfficeConnect Secure Gateway for a remote L2TP over IPSec connection

Set Up Setup with Microsoft Outlook 2007 using POP3

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

Sophos UTM. Remote Access via PPTP Configuring Remote Client

RSA Security Analytics

Cisco SA 500 Series Security Appliance

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

etoken Enterprise For: SSL SSL with etoken

SSL Certificate Based VPN

Transcription:

IPsec for Site-to-Site VPN November 2002 Copyright 2002 SofaWare Technologies Inc, All Rights Reserved. Reproduction, adaptation, or translation with prior written permission is prohibited except as allowed under copyright laws.

Introduction Introduction This document explains how to configure Microsoft Windows 2000, Windows 2000 Server, and Windows XP IPsec for the Site-to-Site VPN solutions. Figure 1 shows a sample implementation of this solution, in which a Safe@Office appliance is connected to a Windows machine in a Site-to-Site VPN. Figure 1: Safe@Office to Windows 2000/XP IPsec (Site-to-Site VPN) Scenarios This document provides solutions for the following four scenarios: Windows Gateway to Safe@Office in Unrestricted Mode Traffic is encrypted between the gateways subnets (Network A to Network B). Windows Gateway to Safe@Office in Restricted Mode Traffic is encrypted between the network behind the Windows gateway and the Safe@Office WAN IP address (Network A to Safe@Office external IP). Windows Host to Safe@Office in Unrestricted Mode Traffic is encrypted between the Windows host and the Safe@Office internal network (Windows machine to Network B). Windows Host to Safe@Office in Restricted Mode Traffic is encrypted between the Windows host and the Safe@Office WAN IP address (Windows machine to Safe@Office external IP). Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 1

Note: For all the scenarios above, the configuration of the Windows machine is identical, except for the Filter Properties configuration. For further information, see pages 11 and 16. Important: Both the Safe@ gateway and Windows machine must be configured with a static IP address. DHCP mode in the Windows machine may not work properly. Contacting Technical Support To contact technical support, send an email to: support@sofaware.com Configuring Windows 2000/XP Note: The screens shown below appear in both Windows 2000 and XP. Note: The IP addresses in Figure 1, page 1, appear in the screens below as an example. Important: Additional security software installed on the Windows machine, (for example Check Point SecuRemote), may prevent the tunnel from working properly. To configure Windows 2000/XP for Site-to-Site VPN 1. Create an IP security policy by doing the following: a. Open the Windows Control Panel. b. In the Administrative Tools menu, click Local Security Policy. The Local Security Settings window opens. 2 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

c. Double-click on IP Security Policies On Local Machine. The IP security policies on the local machine are displayed in the right-hand pane. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 3

d. In the Action menu, click Create IP Security Policy. The IP Security Policy Wizard opens with the Welcome to the IP Security Policy wizard dialog box displayed. e. Click Next. The IP Security Policy Name dialog box appears. 4 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

f. In the Name field, enter the policy s name. In the example above, the policy s name is New_Policy. g. Click Next. The Requests for Secure Communication dialog box appears. h. Clear the Activate the default response rule check box. i. Click Next. The Completing the IP Security Policy Wizard dialog box appears. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 5

j. Clear the Edit properties check box. k. Click Finish. The new policy appears in the Local Security Settings window. 2. Double-click on the new policy. The Properties dialog box appears, with the Rules tab displayed. 6 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

3. Clear the Use Add Wizard check box. 4. Click Add. The New Rule Properties dialog box appears, with the IP Filter List tab displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 7

5. Create an A to B IP filter for the security policy, by doing the following: a. Click Add. The IP Filter List dialog box appears. 8 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

b. In the Name field, type A to B. c. Clear the Use Add Wizard check box. d. Click Add. The Filter Properties dialog box appears, with the Addressing tab displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 9

e. Select one of the following filters: 10 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

Windows Gateway to Safe@Office, Unrestricted Mode Windows Host to Safe@Office, Unrestricted Mode Windows Host to Safe@Office, Restricted Mode Windows Gateway to Safe@Office, Restricted Mode Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 11

f. Clear the Mirrored check box. g. Click on the Description tab. The Description tab is displayed. h. If desired, in the Description area, type a description of the filter. i. Click OK. The New Rule Properties dialog box reappears, with the IP Filter List displayed. The new filter appears in the IP Filter Lists area. 12 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

6. Create a B to A IP filter for the security policy, by doing the following: a. Click Add. The IP Filter List dialog box appears. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 13

b. In the Name field, type B to A. c. Clear the Use Add Wizard check box. d. Click Add. The Filter Properties dialog box appears, with the Addressing tab displayed. 14 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

e. Select one of the following filters: Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 15

Windows Gateway to Safe@Office, Unrestricted Mode Windows Host to Safe@Office, Unrestricted Mode Windows Host to Safe@Office, Restricted Mode Windows Gateway to Safe@Office, Restricted Mode 16 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

f. Clear the Mirrored check box. g. Click on the Description tab. The Description tab is displayed. h. If desired, in the Description area, type a description of the filter. i. Click OK. The New Rule Properties dialog box reappears, with the IP Filter List displayed. The new filter appears in the IP Filter Lists area. 7. In the IP Filter Lists area, click A to B. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 17

8. Set the filter action for the A to B IP filter, by doing the following: a. Click the Filter Action tab. The Filter Action tab is displayed. 18 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

b. Clear the Use Add Wizard check box. c. Click Add. The New Filter Action Properties dialog box appears, with the Security Methods tab displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 19

Do the following: 1) Click Negotiate Security. 2) Clear the Accept unsecured communications, but always respond using IPsec check box. 3) Clear the Allow unsecured communications with non IPsec-aware computer check box. 4) Click Add. The New Security Method dialog box appears, with the Security Method tab displayed. 20 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

d. Click Custom. e. Click Settings. The Custom Security Method Settings dialog box appears. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 21

Do the following: 1) Clear the Data and address integrity without encryption (AH) check box. 2) Select the Data integrity and encryption (ESP) check box. 3) From the Integrity Algorithm drop-down list, select SHA1. 4) From Encryption Algorithm drop-down list, select 3DES. 5) In the Session Key Settings area, clear all check boxes. 6) Click OK. The New Filter Action Properties dialog box reappears, with the Security Methods tab displayed. The new security method is listed in the Security Method preference order area. 22 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

f. Click the General tab. The General tab is displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 23

g. In the Name field, type Encrypt. h. Click OK. The New Rule Properties dialog box reappears, with the Filter Action tab displayed. The Encrypt action is listed in the Filter Actions area. 24 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

i. In the Filter Actions area, click Encrypt. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 25

j. Click the Authentication Methods tab. The Authentication Methods tab is displayed. 26 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

k. Click Add. The New Authentication Method Properties dialog box appears, with the Authentication Method tab displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 27

Do the following: 1) Click Use this string to protect the key exchange (preshared key). 2) In the text box, type the preshared key. Note: Use this preshared key as the Preshared Secret password, when you create the tunnel from the Safe@ gateway to the Windows machine. 3) Click OK. The New Rule Properties dialog box reappears, with the Authentication Methods tab displayed. The new authentication method ( Preshared Key ) is listed in the Authentication Method preference order area. 28 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

l. Select Kerberos. m. Click Remove. A confirmation message appears. n. Click Yes. The Kerberos method is deleted from the Authentication Method preference order area. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 29

o. Click on the Tunnel Settings tab. The Tunnel Settings tab is displayed. 30 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

p. Click The tunnel endpoint is specified by this IP Address. q. In the text box, type the Safe@ gateway s IP address. r. Click on the Connection Type tab. The Connection Type tab is displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 31

s. Click All network connections. t. Click Close. 32 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

9. Set the filter action for the B to A IP filter, by doing the following: a. Click Add. The New Rule Properties dialog box appears, with the IP Filter List tab displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 33

b. In the IP Filter Lists area, click B to A. 34 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

c. Click the Filter Action tab. The Filter Action tab is displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 35

d. In the Filter Actions area, click Encrypt. 36 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

e. Click the Authentication Methods tab. The Authentication Methods tab is displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 37

f. Click Add. The New Authentication Method Properties dialog box appears, with the Authentication Method tab displayed. 38 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

Do the following: 1) Click Use this string to protect the key exchange (preshared key). 2) In the text box, type the preshared key. Note: Use this preshared key as the Preshared Secret password, when you create the tunnel from the Safe@ gateway to the Windows machine. 3) Click OK. The New Rule Properties dialog box reappears, with the Authentication Methods tab displayed. The new authentication method ( Preshared Key ) is listed in the Authentication Method preference order area. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 39

g. Select Kerberos. h. Click Remove. A confirmation message appears. i. Click Yes. The Kerberos method is deleted from the Authentication Method preference order area. 40 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

j. Click on the Tunnel Settings tab. The Tunnel Settings tab is displayed. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 41

k. Click The tunnel endpoint is specified by this IP Address. l. In the text box, type the Windows machine s IP address. m. Click on the Connection Type tab. The Connection Type tab is displayed. 42 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

n. Click All network connections. o. Click Close. The Properties dialog box reappears, with the Rules tab displayed. The B to A filter and its action is listed in the IP Security Rules area. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 43

10. Click Close. The Local Area Settings window reappears. 44 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs

11. Right-click on the new IP security policy. Configuring Windows 2000/XP IPsec for Site-to-Site VPNs 45

Configuring the Safe@Office Appliance 12. From the pop-up menu, select Assign. The new security policy is assigned to the network adapter. Configuring the Safe@Office Appliance You must create the VPN profile in Safe@ Office. For instructions, see the SofaWare S-box Getting Started Guide, Adding and Editing VPN Sites using SofaWare Safe@Office, page 102. Note: While creating the VPN profile, you must select Specify Configuration in the VPN Network Configuration dialog box. Topology download is not supported. Note: In Restricted mode, in order to forward encrypted traffic to hosts behind the Safe@ gateway, you must define Virtual Server and/or Allow rules. You must select the VPN Only check box for those rules. 46 Configuring Windows 2000/XP IPsec for Site-to-Site VPNs