GNAT Box VPN and VPN Client



Similar documents
Technical Document. Creating a VPN. GTA Firewall to WatchGuard Firebox SOHO 6 TDVPNWGSOHO

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Configuring GTA Firewalls for Remote Access

Technical Document. Creating a VPN. GTA Firewall to WatchGuard Firebox SOHO 6 TD: GB-WGSOHO6

Configuring a GB-OS Site-to-Site VPN to a Non-GTA Firewall

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Technical Document. Creating a VPN. GTA Firewall to Cisco PIX 501 TDVPNPIX

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520

GB-OS Version 6.2. Configuring IPv6. Tel: Fax Web:

Technical Document. Creating a VPN. GTA Firewall to Linksys Cable/DSL Router TDVPNLINKSYS

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

VPN Tracker for Mac OS X

Configuring Windows 2000/XP IPsec for Site-to-Site VPN

Installing the SSL Client for Linux

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Installing the Shrew Soft VPN Client

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

GTA SSO Auth. Single Sign-On Service. Tel: Fax Web:

GTA SSO Auth. Single Sign-On Service. Tel: Fax Web:

Shrew Soft VPN Client Configuration for GTA Firewalls

Installing the IPSecuritas IPSec Client

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Chapter 8 Virtual Private Networking

How To Set Up Checkpoint Vpn For A Home Office Worker

Chapter 4 Virtual Private Networking

VPNC Interoperability Profile

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

How To Industrial Networking

GB-OS. Certificate Management. Tel: Fax Web:

Branch Office VPN Tunnels and Mobile VPN

GTA SSL Client & Browser Configuration

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Windows XP VPN Client Example

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

How do I set up a branch office VPN tunnel with the Management Server?

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

OfficeConnect Internet Firewall VPN Upgrade User Guide

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Chapter 6 Basic Virtual Private Networking

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Fireware How To Network Configuration

Implementing and Managing Security for Network Communications

HOWTO: How to configure IPSEC gateway (office) to gateway

Nokia Mobile VPN How to configure Nokia Mobile VPN for Cisco ASA with PSK/xAuth authentication

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Configuring a VPN between a Sidewinder G2 and a NetScreen

What information will you find in this document?

DI-804HV with Windows 2000/XP IPsec VPN Client Configuration Guide

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

Watchguard Firebox X Edge e-series

IPSec Pass through via Gateway to Gateway VPN Connection

Laboratory Exercises V: IP Security Protocol (IPSec)

LinkProof And VPN Load Balancing

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Understanding the Cisco VPN Client

RouteFinder. IPSec VPN Client. Setup Examples. Reference Guide. Internet Security Appliance

This section provides a summary of using network location profiles to identify network connection types. Details include:

Configuring IKEv2 VPN for Mac OS X Remote Access to a GTA Firewall

Virtual Private Network and Remote Access

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

RF550VPN and RF560VPN

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Fireware Essentials Exam Study Guide

GB-OS. VPN Gateway. Option Guide for GB-OS 4.0. & GTA Mobile VPN Client Version 4.01 VPNOG

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

VPN Wizard Default Settings and General Information

Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide.

Configure VPN between ProSafe VPN Client Software and FVG318

axsguard Gatekeeper IPsec XAUTH How To v1.6

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

Creating a VPN with overlapping subnets

VPN. VPN For BIPAC 741/743GE

Overview. Protocols. VPN and Firewalls

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Virtual Private Network and Remote Access Setup

Purple Sturgeon Standard VPN Installation Manual for Windows XP

Ingate Firewall. TheGreenBow IPSec VPN Client Configuration Guide.

WatchGuard Mobile User VPN Guide

Cisco RV 120W Wireless-N VPN Firewall

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

Scenario: IPsec Remote-Access VPN Configuration

ISG50 Application Note Version 1.0 June, 2011

Internet. SonicWALL IP SEV IP IP IP Network Mask

Creating a Gateway to Gateway VPN between Sidewinder G2 and Linux

Application Note: Onsight Device VPN Configuration V1.1

TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: Contact:

Route Based Virtual Private Network

Lecture 17 - Network Security

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Using IPsec VPN to provide communication between offices

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks

Transcription:

Technical Document TD VPN-GB-WG-02 with SoftRemoteLT from SafeNet, Inc. GTA Firewall WatchGuard Firebox Configuring an IPSec VPN with IKE GNAT Box System Software version 3.3.2 Firebox 1000 Strong Encryption 4.6.1

Copyright 1996-2002, Global Technology Associates, Incorporated (GTA). All rights reserved. GTA acknowledges all trademarks appearing in this document. This product includes software developed by the University of California, Berkeley, and its contributors. Except as permitted under copyright law, no part of this manual may be reproduced or distributed in any form or by any means without the prior permission of Global Technology Associates, Incorporated. Disclaimer Neither GTA, nor its distributors and dealers, make any warranties or representations, either expressed or implied, as to the software and documentation, including without limitation, the condition of software and implied warranties of its merchantability or fitness for a particular purpose. GTA shall not be liable for any lost profits or for any direct, indirect, incidental, consequential or other damages suffered by licensee or others resulting from the use of the program or arising out of any breach of warranty. GTA further reserves the right to make changes to the specifications of the program and contents of the manual without obligation to notify any person or organization of such changes. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation for their use. GTA assumes no responsibility with regard to the performance or use of these products. Every effort has been made to ensure that the information in this manual is accurate. GTA is not responsible for printing or clerical errors. Trademarks GNAT Box is a registered trademark of Global Technology Associates, Incorporated. RoBoX is a trademark of Global Technology Associates, Incorporated. SafeNet VPN client SoftRemoteLT is a trademark of SafeNet, Inc. All other products are trademarks of their respective companies. Version Information SafeNet VPN client SoftRemoteLT version 8.0.2 October 2002 GNAT Box System Software version 3.3.2 November 2002 Technical Support GTA s direct customers in the USA should email GTA via the contact information listed below. Other customers should contact their local GTA authorized reseller. Contact Information Global Technology Associates, Inc. 3505 Lake Lynda Drive, Suite 109 Orlando, FL 32817 USA Tel +1.407.380.0220 Fax +1.407.380.6080 Web http //www.gta.com Email info@gta.com Support support@gta.com Document Information Technical Document GTA Firewall WatchGuard Firebox, Configuring an IPSec VPN with IKE December 2002

Configuring an IPSec VPN with IKE Table of Contents iii Table of Contents Introduction 1 Common Encryption Methods 1 Firebox (non-configurable) 1 GTA Firewall to Firebox 1 Examples 2 GTA Firewall VPN Configuration 2 VPN Object 2 VPN Authorization 3 Remote Access Filters 4 IP Pass Through Filters 4 Firebox VPN Configuration 5 Define the VPN 5 Define a gateway 5 Define a tunnel 7 Add an IPSec (Routing) Policy for the VPN 9 Create a Service 10 Define Incoming service 11 Define Outgoing service 12 Save the configuration 13 Index 15

iv GTA Firewall WatchGuard Firebox TD GB-WG-02

Configuring an IPSec VPN with IKE 1 Introduction CONFIGURING AN IPSEC VPN WITH IKE FOR A GTA FIREWALL AND WATCHGUARD FIREBOX is written for the administrator who has both of these systems operating on a network, and requires a virtual private network (VPN) to utilize both firewalls. This manual is written with the assumption that the reader has a strong working knowledge of TCP/IP, WatchGuard administration utilities, and the GNAT Box System Software for GTA Firewalls. This manual was developed using GNAT Box System Software version 3.3.2 and a WatchGuard Firebox 1000 Strong encryption 4.6.1. Common Encryption Methods A number of encryption algorithms on the GTA Firewall do not have corresponding methods on a Firebox. The following methods are common to both firewall systems; use them to configure both firewalls for a VPN connection. Neither the encryption method nor the hash algorithm for Phase I of the VPN can be configured on a Firebox 1000. Therefore, Phase I on the GTA Firewall must use encryption method DES or 3DES, hash algorithm SHA-1, and key group Diffie-Hellman Group 1 to match the Firebox default configuration. Note Phase I and II are not clearly differentiated in WatchGuard Firebox 1000. Firebox (non-configurable) Mode ESP Hash GTA Firewall to Firebox IKE DES or 3DES (Triple DES) SHA-1 IPSec Key Mode IKE Phase I Exchange Mode Main ESP DES Hash SHA-1 Key Group Diffie-Hellman Group 1 Phase II ESP DES or 3DES Hash SHA-1 or MD5 Key Group Diffie-Hellman Group 1

2 GTA Firewall WatchGuard Firebox Examples To configure a GTA Firewall for VPN, use GBAdmin or the Web Interface. The examples given in this documentation use GBAdmin. This guide uses the following IP addresses as examples for a GTA Firewall VPN configuration: External Interface 199.120.225.76 Protected Interface 192.168.1.1 Protected Network 192.168.1.0//24 To configure the Firebox, (referred to in this document as FB ) use the WatchGuard Policy Manager. This guide uses the following IP addresses as examples for an FB configuration: FB External Interface 199.120.225.90 FB Protected Interface 10.10.11.1 FB Protected Network 10.10.11.0/255.255.255.0 GTA Firewall VPN Configuration In order to use the GTA Firewall VPN feature, four functional areas must be configured: VPN Objects, VPN Authorization, Remote Access Filters and IP Pass Through Filters. VPN objects are used as the basis for VPN authorization, forming a link between the GTA Firewall and another firewall. User Authorization allows a GTA Firewall to connect to and authenticate a mobile client user or dynamic system user. Note For more information and illustrations about configuring a GTA Firewall VPN, see the GNAT BOX SYSTEM SOFTWARE USER S GUIDE. VPN Object Open Objects -> VPN Objects. Use the field table below as an example for entering data into the VPN Object fields. VPN Object Fields Disable Name Description (Uncheck). Enter a name for the object: (GTA Firewall - FB VPN) Enter a description: (GTA Firewall - FB IKE VPN) TD GB-WG-02

Configuring an IPSec VPN with IKE 3 Local Gateway Local Network Require Mobile Authentication Force Mobile Protocol Exchange Mode Encryption (ESP) Hash Select the interface object or enter the IP address for the GTA Firewall External Interface. (199.120.225.76) Select the interface object for the GTA Firewall Protected Interface. (192.168.1.0/24) Uncheck. Uncheck. Main. DES. SHA-1. Phase I Key Group Diffie-Hellman Group 2. Encryption (ESP) Hash DES. SHA-1. Phase II Key Group Diffie-Hellman Group 1. VPN Authorization Open Authorization -> VPNs and add a new VPN. In the Key Exchange Type dialog, select IKE. Select OK, then enter the information in the VPN Authorization fields. VPN Object Fields Example Disable Key Exchange Description Identity VPN Object Remote Gateway Remote Network Preshared Secret Enable. (Uncheck.) IKE (Uneditable. Selected in the previous dialog.) Enter a description of the VPN object. (GTA Firewall - FB VPN Authorization) Leave blank. Select the VPN object created previously. (GTA Firewall - FB IKE VPN) Select the IP address or object that references the FB External Network interface. (199.120.225.90) Select the IP Address or object that references the FB Protected Network. (10.10.11.0/24) Preshared secret/key entered on the FB system. (Preshared keys must be the same on both systems.)

4 GTA Firewall WatchGuard Firebox Remote Access Filters When using IKE, two Remote Access filter are necessary; one for the ESP Tunnel (IP protocol 50) and the other to allow access for IKE on UDP/500. 1. Allow ESP connections (GNAT Box FB IKE VPN). Type Accept Interface ANY Protocol 50 (ESP) Source 199.120.225.90/32 Port Blank Destination 199.120.225.76/32 Port Blank 2. Allow IKE connections (GNAT Box FB IKE VPN). Type Accept Interface ANY Protocol UDP Source 199.120.225.90 /32 Port Blank Destination 199.120.225.76/32 Port 500 IP Pass Through Filters The example filters below allow all access between the Firebox and the GTA Firewall networks. At a minimum, an IP Pass Through filter must be created that allows outbound access on the defined VPN. Depending on your security policy, the filter can be as simple as allowing any host on the local network outbound access to any remote host for any protocol at any time, or as narrow as limiting a specific local host outbound access to a specific remote host for a given protocol at a specific time. Generally, in addition, an inbound IP Pass Through filter is created that allows the remote side of the VPN access to the local Protected Network. This filter does not have to be symmetrical to the outbound IP Pass through filter, but rather should be created to meet the local security policy. Typically, single inbound and outbound IP Pass Through filters are created for a VPN, but multiple filters may be required to make access conform to the local security policy. TD GB-WG-02

Configuring an IPSec VPN with IKE 5 1. VPN, inbound connections (GNAT Box FB IKE VPN) Type Accept Interface External Protocol ANY Source 10.10.11.0/32 Port Blank Source 192.168.1.0/32 Port Blank 2. VPN, outbound connections (GNAT Box FB IKE VPN) Type Accept Interface Protected Protocol ANY Source 192.168.1.0/32 Port Blank Source 10.10.11.0/32 Port Blank Firebox VPN Configuration Open the WatchGuard Policy Manager and follow the instructions below to set up a GTA Firewall to Firebox 1000 VPN. In the example, select screens are shown to illustrate the configuration process. Note This example allows all access between the Firebox networks and the GTA Firewall networks. Consult your corporate security policy for specific filtering rules. Define the VPN Define a gateway This step defines the External Interface of the GTA Firewall. From the Main Menu, Select Network Branch Office VPN IPSec.

6 GTA Firewall WatchGuard Firebox Network Menu This brings up the IPSec Configuration screen. Click Gateways. IPSec Configuration screen This brings up the Configure Gateways screen. Click ADD. The IPSec Gateway dialog box will appear. In the Name field, enter the name that will be used to identify the Firebox remote gateway to the GTA Firewall. In the Key Negotiation Type field, select isakmp (dynamic). In the Remote Gateway IP field, enter the External IP Address of the GTA Firewall. In the Shared key field, enter the same shared key as the one entered in the GNAT Box system s Pre-shared Secret field. Note The shared key must be identical to the pre-shared secret on the GNAT Box system. TD GB-WG-02

Configuring an IPSec VPN with IKE 7 Enter information into each field, or select it from the drop-down box, as in the following example: IPSec Gateway Fields Name Key Negotiation Type GB-External_Interface isakmp (dynamic) Remote Gateway 199.120.225.76 Shared key 12345678 IPSec Gateway dialog box completed Click OK to save this gateway and return to the Configure Gateways screen. The new gateway will appear in the list. Define a tunnel Configure Gateways screen The tunnel encapsulates packets between the GTA Firewall and the Firebox 1000. It also specifies the tunnel s encryption types, authentication methods and end points.

8 GTA Firewall WatchGuard Firebox From the Configure Gateways screen, click Tunnels. This will bring up the Configure Tunnels screen. Configure Tunnels screen Click ADD to add a new tunnel. This brings up the Select Gateway dialog box. Select GB-External_Interface, the gateway created in the first step, then click OK. The Configure Tunnel dialog box will appear. In the Identity tab, give the tunnel a name by entering VPN-Tunnel Configure Tunnel dialog box Identity tab TD GB-WG-02

Configuring an IPSec VPN with IKE 9 Click the Dynamic Security tab. Enter, or select from the drop-down box, the required information as in the following example: Configure Tunnel Fields Type Authentication Encryption Force key expiration ESP (Encapsulated Security Payload). SHA1-HMAC. DES or 3DES. (Uncheck.) Note Configure Tunnel dialog box Dynamic Security tab GTA recommends that the user disable (uncheck) FORCE KEY EXPIRATION in the Firebox side of the VPN configuration. This will allow the GTA Firewall to renegotiate the key at default intervals. If Force key expiration is enabled on the Firebox, key renegotiation may not work properly. In a GTA Firewall, the default for Phase I key renegotiation is 90 minutes and the default for Phase II is 60 minutes. To save this tunnel configuration, click OK. The Configure Tunnels screen will reappear. Click OK again to return to the IPSec Configuration screen. Add an IPSec (Routing) Policy for the VPN In a Firebox system, the term policy refers to a set of rules that define how IPSec traffic is routed thorugh a tunnel. An IPSec policy is defined by the end points of the VPN, which can be either hosts or networks connecting through the VPN. For this example, we will use network end points.

10 GTA Firewall WatchGuard Firebox In the IPSec Configuration screen, click ADD. This brings up the Add Routing Policy screen. Enter, or select from the drop-down box, the required information as in the following example: Local <Network> 10.10.11.0/24 Remote <Network> 192.168.100.0/24 Disposition secure Tunnel VPN-Tunnel (Tunnel created in step 2) Click OK to finish adding the new policy. Click OK again to close the IPSec Configuration Screen. Create a Service In a Firebox system, the term service refers to the set of rules set up to allow certain services through the VPN tunnel. (Some call this a policy. ) This step allows the user to select what services are allowed through the VPN tunnel. The Firebox must be configured to allow GTA Firewall traffic through the VPN tunnel. Note This example creates a VPN service with the same rules as the Firebox Any service, which allows all traffic through any port. You should consult your own security policy before implementing the VPN Tunnel as described. Create a new service by selecting Edit Add Service from the Main Window. This brings up the Services window. TD GB-WG-02

Configuring an IPSec VPN with IKE 11 Services window In the Services window, expand Packet Filters. Select Any from the list and click Add (at the bottom of the window). This brings up the Add Service dialog box. Give the service a name by entering: GB-WG_VPN. Click OK. Add Service dialog box This brings up the Properties dialog box for the new service with the Incoming tab selected. Define Incoming service On the Incoming tab, select Enabled and Allowed from the drop-down list. In the top portion of the dialog box, under the From list, click ADD. This brings up the Add Address dialog box. Click Add Other. This brings up the Add Member dialog box. Enter the following:

12 GTA Firewall WatchGuard Firebox Choose Type Network IP Address Value 192.168.1.0/24 (The IP address of the network behind the GTA Firewall.) Click OK. This returns the user to the Add Address dialog box. Click OK to save the address to the From list and return to the service s Properties box. In the bottom portion of the dialog box, under the To list, click ADD. This brings up the Add Address dialog box. Click Add Other. This will bring up the Add Member dialog box. Enter the following: Choose Type Network IP Address Value 10.10.11.0/24 (The IP address of the network behind the Firebox.) Click OK. This returns the user to the Add Address dialog box. Click OK to save the address to the To list and return to the service s Properties dialog box. Define Outgoing service Properties dialog box, Incoming tab, complete This process is simply the inverse of that in the Incoming tab. Select the Outgoing tab. Select Enabled and Allowed from the drop-down list. In the top portion of the dialog box, under the From list, click ADD. This brings up the Add Address dialog box. Click Add Other. This will bring up the Add Member dialog box. Enter the following: TD GB-WG-02

Configuring an IPSec VPN with IKE 13 Choose Type Network IP Address Value 10.10.11.0/24 (The IP address of the network behind the Firebox.) Click OK. This returns the user to the Add Address dialog box. Click OK to save the address to the From list and return to the service s Properties dialog box. In the bottom portion of the dialog box, under the To list, click ADD. This brings up the Add Address dialog box. Click Add Other. This will bring up the Add Member dialog box. Enter the following: Choose Type Network IP Address Value 192.168.1.0/24 (The IP address of the network behind the GTA Firewall.) Click OK. This returns the user to the Add Address dialog box. Click OK to save the address to the From list and return to the service s Properties dialog box. Any Properties dialog box, Outgoing tab, complete Click OK in the Properties dialog box to close it and save the new service and its properties. Save the configuration To save the new gateway, tunnel, IPSec policy and service to the Firebox: Select File>Save to Firebox.

14 GTA Firewall WatchGuard Firebox Select your Firebox from the drop-down list. Enter the configuration read/write pass phrase (password). Click OK. Reboot the Firebox to enable the new VPN. Your GTA Firewall and Firebox VPN is now in place. TD GB-WG-02

Configuring an IPSec VPN with IKE Index 15 Index Symbols 3DES 2 C Copyright ii D DES 2 Diffie-Hellman 2, 3 E email support ii ESP 9 F force key expiration 9 G gateway 5 local 3 remote 4 GBAdmin 1 GNAT Box System Software ii H hash 2 I IPSec policy 10 isakmp 6 K key expiration 9 group 3 pre-shared secret 6 renegotiation 10 shared 6 P Phase I GB default 10 Phase II GB default 10 policy 10, 11 R reboot 16 S save configuration 16 service 11 incoming 13 outgoing 14 SHA-1 2 support ii T TCP/IP 1 Telephone ii trademark ii tunnel 7 V version ii GNAT Box 1 WatchGuard 1 VPN 1 W Web Interface 1