How To Set Up Checkpoint Vpn For A Home Office Worker



Similar documents
Configuring Windows 2000/XP IPsec for Site-to-Site VPN

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Check Point FW-1/VPN-1 NG/FP3

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

GNAT Box VPN and VPN Client

Global VPN Client Getting Started Guide

Windows XP VPN Client Example

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

VPNC Interoperability Profile

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Scenario: IPsec Remote-Access VPN Configuration

SonicWALL Check Point Firewall-1 VPN Interoperability

Chapter 4 Virtual Private Networking

Remote Access VPN Solutions

How To Industrial Networking

Scenario: Remote-Access VPN Configuration

Chapter 8 Virtual Private Networking

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Check Point UserAuthority Guide. Version NGX R61

WatchGuard Mobile User VPN Guide

Configuring the BIG-IP and Check Point VPN-1 /FireWall-1

Chapter 6 Basic Virtual Private Networking

ISG50 Application Note Version 1.0 June, 2011

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

Checkpoint Check Point Provider-1 NGX (v4) Practice Test. Version 2.1

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Cert Pro 4/17/01 2:05 AM Page 1 T HE C HECK P OINT. Certified Professional Program SECURE.

Configuring a VPN between a Sidewinder G2 and a NetScreen

HOWTO: How to configure IPSEC gateway (office) to gateway

Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client

CheckPoint Software Technologies LTD. How to Install and Configure SecureClient and SecureServer

TechNote. Configuring SonicOS for Amazon VPC

VPN Wizard Default Settings and General Information

Configure VPN between ProSafe VPN Client Software and FVG318

Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab

TechNote. Configuring SonicOS for MS Windows Azure

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

Integrate Check Point Firewall

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE

If you have questions or find errors in the guide, please, contact us under the following address:

VPN. VPN For BIPAC 741/743GE

Configure IPSec VPN Tunnels With the Wizard

How do I set up a branch office VPN tunnel with the Management Server?

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Advanced VPN Concepts and Tunnel Monitoring

Fireware How To Network Configuration

VPN Tracker for Mac OS X

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Route Based Virtual Private Network

VNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide

Nokia Mobile VPN How to configure Nokia Mobile VPN for Cisco ASA with PSK/xAuth authentication

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

Sophos UTM. Remote Access via PPTP. Configuring UTM and Client

Using Microsoft Active Directory for Checkpoint NG AI SecureClient

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

Integrity Advanced Server Gateway Integration Guide

How To Configure An Ipsec Tunnel On A Network With A Network Gateways (Dfl-800) On A Pnet 2.5V2.5 (Dlf-600) On An Ipse Vpn

DI-804HV with Windows 2000/XP IPsec VPN Client Configuration Guide

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

VPN L2TP Application. Installation Guide

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Chapter 5 Virtual Private Networking Using IPsec

VPN SECURITY POLICIES

Global VPN Client Getting Started Guide

nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.

VPNC Interoperability Profile

How to setup a VPN on Windows XP in Safari.

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

Virtual Private Network and Remote Access Setup

Connecting Remote Offices by Setting Up VPN Tunnels

How to configure VPN function on TP-LINK Routers

Configuring IPsec VPN between a FortiGate and Microsoft Azure

Configuring a VPN for Dynamic IP Address Connections

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Laboratory Exercises V: IP Security Protocol (IPSec)

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

How to configure VPN function on TP-LINK Routers

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm

Step By Step Guide: Demonstrate DirectAccess in a Test Lab

McAfee Firewall Enterprise 8.2.1

Firewall Troubleshooting

IPSec Pass through via Gateway to Gateway VPN Connection

Transcription:

SofaWare VPN Configuration Guide Part No.: 700411 Oct 2002 For Safe@ gateway version 3

COPYRIGHT & TRADEMARKS Copyright 2002 SofaWare, All Rights Reserved. SofaWare, SofaWare S-box, Safe@Home and Safe@Office are trademarks, service marks, or registered trademarks of SofaWare Technologies Ltd. Check Point, the Check Point logo, FireWall-1, FireWall-1 SecureServer, FireWall-1 SmallOffice, FloodGate-1, INSPECT, IQ Engine, Meta IP, MultiGate, Open Security Extension, OPSEC, Provider-1, SecureKnowledge, SecureUpdate, SiteManager-1, SVN, UAM, User-to-Address Mapping, UserAuthority, Visual Policy Editor, VPN-1, VPN-1 Accelerator Card, VPN-1 Gateway, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 SmallOffice, and ConnectControl are trademarks, service marks, or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668 and 5,835,726 and may be protected by other U.S. Patents, foreign patents, or pending applications. 2 SofaWare VPN Configuration Guide

Contents Contents...3 Introduction...5 SofaWare Safe@Home... 6 SofaWare Safe@Home Pro... 6 SofaWare Safe@Office... 6 SofaWare Safe@Office Plus... 6 About This Guide... 6 Typological Conventions... 7 Contacting Technical Support... 7 VPN Connectivity Solution Models...9 Safe@Office to Safe@Office (Site-to-Site VPN)... 10 Safe@Office to VPN-1 (Site-to-Site VPN)... 11 VPN RAS Client to VPN-1 VPN RAS Server... 12 VPN RAS Client to Safe@Office VPN RAS Server... 13 Using Safe@Home Pro as a VPN RAS Client... 14 Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN...15 Configuring VPN-1 NG FP1/FP2 for Site-to-Site VPN... 16 Configuring VPN-1 4.1 for Site-to-Site VPN...37 Configuring VPN-1 4.1 for Site-to-Site VPN... 38 SofaWare VPN Configuration Guide 3

Contents Configuring VPN-1 for Safe@ RAS VPN...53 Configuring VPN-1 NG for Safe@ RAS VPN... 53 Configuring VPN-1 4.1 for Safe@ RAS VPN... 64 Configuring VPN-1 NG FP3...73 Configuring Safe@ gateway to NG FP3 In Client to Site Mode... 74 Configuring Safe@ gateway to NG FP3 in Site To Site mode...79 4 SofaWare VPN Configuration Guide

Chapter 1 Introduction The SofaWare S-box is available with the following software configurations: SofaWare Safe@Home, SofaWare Safe@Home Pro, SofaWare Safe@Office and SofaWare Safe@Office Plus. All four provide a web-based management interface, which enables you to manage and configure the S-box operation and options. Table1 summarizes the differences between the available Safe@ software configurations. Table 1: Safe@ Product Summary Safe@Home Safe@Home Pro Safe@Office and Safe@Office Plus Solution Home user firewall Telecommuter and home office Small branch offices Nodes 5 5 10/25 Standalone firewall Yes Yes Yes VPN functionality No Remote Access Client Remote Access Client/Server Your S-box can be upgraded to a more advanced product level, without replacing the hardware. For more information, contact your reseller or email order@checkpoint.com. SofaWare VPN Configuration Guide 5

Introduction SofaWare Safe@Home Safe@Home protects your home network from hostile Internet activity. It is intended for home users and can be used by up to five computers and users. SofaWare Safe@Home Pro In addition to all the benefits of SofaWare Safe@Home, SofaWare Safe@Home Pro provides Virtual Private Networking (VPN) functionality. SofaWare Safe@Home Pro contains a remote access VPN client, which enables employees working from home to securely connect to the corporate network. SofaWare Safe@Home Pro is intended for home users who are part of an extended enterprise network. It can be used by up to five computers and users. SofaWare Safe@Office SofaWare Safe@Office provides all the benefits of SofaWare Safe@Home Pro, along with expanded VPN functionality. It acts not only as a remote access VPN client, but as a remote access VPN server which is installed office-side to protect the company s VPN and make it available to telecommuting employees. SofaWare Safe@Office can also be configured as a VPN gateway, which allows permanent Site-to-Site VPN connections between two gateways, such as two company offices. SofaWare Safe@Office is intended both for companies with extended enterprise networks and for their employees working from home. It can be used by up to ten computers and users. SofaWare Safe@Office Plus SofaWare Safe@Office Plus extends SofaWare Safe@Office to support up to 25 computers and users. About This Guide This guide describes supported VPN solutions and provides instructions for implementing them. You should be familiar with the following before using this guide:! Basic FW-1/VPN-1 use. For information, refer to the Check Point VPN-1/FireWall-1 Administration Guide.! S-box use for your software configuration. For information, refer to the SofaWare S-box Getting Started Guide. 6 SofaWare VPN Configuration Guide

Introduction Typological Conventions To make finding information in this manual easier, some types of information are marked with special symbols or formatting. Boldface type is used for command and button names. Note: Notes are denoted by indented text and preceded by the Note icon. Important: Important notes are denoted by indented text and preceded by the Important icon. Contacting Technical Support To contact technical support, send an email to: support@sofaware.com SofaWare VPN Configuration Guide 7

Chapter 2 VPN Connectivity Solution Models A virtual private network (VPN) consists of at least one VPN remote access (RAS) server or VPN gateway, and several VPN RAS clients. A VPN RAS server makes the corporate network remotely available to authorized users, such as employees working from home, who connect to the VPN RAS server using VPN RAS clients. A VPN gateway can be connected to another VPN gateway in a permanent, bi-directional relationship (Site-to-Site VPN). The two connected networks function as a single network. A connection between two VPN sites is called a VPN tunnel. VPN tunnels encrypt and authenticate all traffic passing through them. Through these tunnels, employees can safely use their company s network resources when working at home. For example, they can securely read email, use the company s intranet, or access the company s database from home. SofaWare Safe@Home Pro and SofaWare Safe@Office provide VPN functionality. SofaWare Safe@Home Pro contains a VPN RAS client. SofaWare Safe@Office can act as a VPN RAS client, a VPN RAS server, or a Siteto-Site VPN gateway. Both SofaWare Safe@Office and Safe@Home Pro enable an exciting number of solutions to support your VPN connectivity needs. This chapter describes the following four basic solutions:! Safe@Office to Safe@Office (Site-to-Site VPN), page 10! Safe@Office to VPN-1 (Site-to-Site VPN), page 11! VPN RAS Client to VPN-1 VPN RAS Server, page 12! VPN RAS Client to Safe@Office VPN RAS Server, page 13 SofaWare VPN Configuration Guide 9

VPN Connectivity Solution Models Safe@Office to Safe@Office (Site-to-Site VPN) This solution enables you to establish Site-to-Site VPN connections between Safe@Office Site-to-Site VPN gateways. Note: In this solution model, both Safe@Office Site-to-Site VPN gateways must have a static IP address. Figure 1 shows a sample implementation of the Safe@Office to Safe@Office solution with three Safe@Office appliances (sbox1, sbox2, and sbox3). Each S-box acts as a Site-to-Site VPN gateway for a fully secure network. The networks communicate via VPN connections. Figure 1: Safe@Office to Safe@Office (Site-to-Site VPN) For information on configuring Safe@Office for Site-to-Site VPN, refer to the SofaWare S-box Getting Started Guide. 10 SofaWare VPN Configuration Guide

VPN Connectivity Solution Models Safe@Office to VPN-1 (Site-to-Site VPN) This solution enables you to establish Site-to-Site VPN connections between a Safe@Office Site-to-Site VPN gateway and a VPN-1 Site-to-Site VPN gateway. Note: In this solution model, both the VPN-1 and Safe@Office Site-to-Site VPN gateways must have a static IP address. Dynamic IP in Site-to-Site VPN is supported using a certificate. For more information refer to www.sofaware.com or contact support@sofaware.com. Figure 2 shows a sample implementation of the Safe@Office to VPN-1 solution, in which two Safe@Office appliances (sbox1 and sbox2) are connected to a VPN-1 Site-to-Site VPN gateway. Figure 2: Safe@Office to VPN-1 (Site-to-Site VPN) For information on configuring VPN-1 NG for Site-to-Site VPN, see Configuring VPN-1 NG FP3, page 73. For information on configuring VPN-1 4.1 for Site-to-Site VPN, see Configuring VPN-1 4.1 for Site-to-Site VPN, page 37. SofaWare VPN Configuration Guide 11

VPN Connectivity Solution Models VPN RAS Client to VPN-1 VPN RAS Server This solution enables Safe@, Check Point SecureClient, and Check Point SecuRemote VPN RAS clients to connect to a VPN-1 VPN RAS server. Note: In this solution model, the VPN-1 VPN RAS server must have a static IP address. Figure 3 shows a sample implementation of the VPN RAS Client to VPN-1 VPN RAS Server solution, in which two Safe@ appliances (sbox1 and sbox2), a Check Point SecuRemote, and a Check Point SecureClient act as VPN RAS clients that download topology information from a VPN-1 VPN RAS gateway. Figure 3: VPN RAS Client to VPN-1 VPN RAS Server For information on configuring a VPN-1 NG or VPN-1 4.1 as a VPN RAS Server, see Configuring VPN-1 4.1 for Safe@ RAS VPN, page 64. 12 SofaWare VPN Configuration Guide

VPN Connectivity Solution Models VPN RAS Client to Safe@Office VPN RAS Server This solution enables Safe@Home Pro, Safe@Office, Check Point SecureClient, and Check Point SecuRemote VPN RAS clients to connect to a Safe@Office VPN RAS server. Note: In this solution model, the Safe@Office VPN RAS server must have a static IP address. Figure 4 shows a sample implementation of the VPN RAS Client to Safe@Office VPN RAS Server solution, in which two Safe@ appliances (sbox1 and sbox2), a Check Point SecuRemote, and a Check Point SecureClient act as VPN RAS clients that download topology information from the Safe@Office VPN RAS server (sbox3). Figure 4: VPN RAS Client to Safe@Office VPN RAS Server For information on configuring Safe@Home Pro, Safe@Office, Check Point SecuRemote, or Check Point SecureClient as a VPN RAS client to a Safe@Office VPN RAS server, refer to the SofaWare S-box Getting Started Guide. SofaWare VPN Configuration Guide 13

VPN Connectivity Solution Models Using Safe@Home Pro as a VPN RAS Client Safe@Home Pro functions in VPN RAS client mode, in which connection is initiated only by the VPN RAS client. Safe@Home Pro uses only Manual mode VPN connection, in which the end-user surfs to http://my.vpn and selects the VPN RAS server to which they want to establish a VPN connection. Figure 5 shows Safe@Home Pro acting as a VPN RAS client to VPN-1 and Safe@Office VPN RAS servers. Figure 5: Safe@Home Pro VPN RAS Client 14 SofaWare VPN Configuration Guide

Chapter 3 Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN This chapter explains how to configure Check Point VPN-1 NG FP1/FP2 for the Safe@Office to VPN-1 (Site-to- Site VPN) solution described in Safe@Office to VPN-1 (Site-to-Site VPN), page 11. Note: To configure NG FP3, refer to chapter 6 Configure VPN-1 NG FP3 page 75 This chapter contains the following sections:! Configuring VPN-1 NG FP1/FP2 for Site-to-Site VPN, page 16 VPN-1 NG FP2 must be configured to work in Traditional Mode. Note: The screens shown in this chapter appear in both VPN-1 NG FP1 and FP2. Where FP1 and FP2 screens differ, both are shown. Note: You must configure the VPN-1 object to use a pre-shared secret before you configure VPN-1 NG FP1/FP2 for Site-to-Site. Note: Working with Dynamic IP s and certificates is supported. For more information, please refer to www.sofaware.com or contact support@sofaware.com. SofaWare VPN Configuration Guide 15

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN Configuring VPN-1 NG FP1/FP2 for Site-to-Site VPN To configure VPN-1 NG FP1/FP2 for Site-to-Site VPN 1. Open the Check Point Policy Editor. 2. Create an S-box object by doing the following: a. In the Manage menu, click Network Objects. The Network Objects dialog box appears. b. If you are using FP1, click New and then click Workstation. The Workstation Properties dialog box appears with the General tab displayed. Do the following: 16 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN 1) In the Name field, type the object s name. 2) In the IP Address field, type the S-box s hiding address. 3) In the Type area, select Gateway. 4) Select Check Point products installed. 5) In the Version list, select 4.1. 6) In the Check Point Products list, select Firewall-1 and VPN-1. 7) In the Object Management area, select Managed by another Management Server [External]. c. If you are using FP2, click New, Check Point, and then Externally Managed Gateway. The Externally Managed Check Point Gateway dialog box opens with General Properties tab displayed. Do the following: SofaWare VPN Configuration Guide 17

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN 1) In the Name field, type the object s name. 2) In the Version list, select 4.1. 3) In the IP Address field, type the S-box s hiding address. 4) In the Check Point Products list, select Firewall-1 and VPN-1 Pro. d. Click Topology. The Topology tab is displayed. By default, no interfaces are defined. e. Add both an internal and external S-box interface. Do the following for each interface: 1) Click Add. The Interface Properties dialog box appears with the General tab displayed. 2) Type the interface s name, IP address, and subnet mask in the appropriate fields. 3) Click on the Topology tab. The Topology tab is displayed. 18 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN 4) If you are configuring the external interface, select External (leads out to the Internet) in the Topology area. Do not change the other settings. 5) If you are configuring the internal interface, select Internal (leads to the local network) in the Topology area, and select Network defined by the interface IP in the IP address Behind this interface area. Do not change the other settings. SofaWare VPN Configuration Guide 19

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN 6) Select All IP Address behind Gateway based on Topology 7) Click OK. f. In the menu, click VPN. The VPN tab is displayed. 20 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN g. Click Edit. Note: In FP1, FWZ appears in the Encryption Schemes list. Do not select FWZ. The IKE Properties dialog box appears. SofaWare VPN Configuration Guide 21

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN h. In the Support authentication methods area, select Pre-shared Secret, and click Edit Secrets... The Shared Secret dialog box appears. Do the following: 1) In the Peer Name column, click on the S-box s peer name. 22 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN Note: If the VPN-1 object was not configured to use a pre-shared secret, the peer name will not be listed. 2) In the Enter Secrets field, type the unique password that should be used by the S-box and VPN-1 when establishing VPN connections to each other. 3) Click Set. 4) Click OK. The IKE Properties dialog box reappears. i. Click Advanced. The Advanced IKE properties dialog box appears. j. Optional - Select the Support aggressive mode check box. SofaWare VPN Configuration Guide 23

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN Note: Main mode is supported in Site to Site configuration. k. Click OK. The IKE Properties dialog box reappears. l. Click OK. The Externally Managed VPN Host dialog box reappears with the VPN tab is displayed. m. Click OK. 3. Set VPN properties for the VPN-1 NG FP1/FP2 object by doing the following: a. In the Manage menu, click Network Objects. The Network Objects dialog box appears. b. Select the VPN-1 NG object and click Edit. The Check Point Gateway dialog box opens with General Properties tab displayed. 24 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN c. In the menu, click VPN. The VPN tab is displayed. d. Select IKE and click Edit. The IKE Properties dialog box appears. e. Click Advanced. The Advanced IKE properties dialog box appears. f. Select the Support aggressive mode check box. g. Click OK. The IKE Properties dialog box reappears. h. Click OK. The VPN tab reappears with certificate information displayed. SofaWare VPN Configuration Guide 25

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN 4. If desired, create a Topology user by doing the following: Note: A Topology user is a User object that enables the S-box to download the VPN-1 NG FP1/FP2 topology. If you do not create a Topology user, you must specify the VPN-1 s network configuration in the S-box VPN wizard. a. In the menu, click Topology. The Topology tab is displayed. 26 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN b. Select Exportable for SecuRemote/SecureClient. c. Click OK. d. In the Manage menu, choose Users and Administrators. The Users window opens. SofaWare VPN Configuration Guide 27

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN e. Click New, Users by Template, and then Default. The Users Properties dialog box appears with the General tab displayed. 28 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN f. Type the login name. In this example the name Topology is used. g. Click on the Encryption tab. The Encryption tab is displayed. SofaWare VPN Configuration Guide 29

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN Note: In FP1, FWZ appears in the Client Encryption Methods list. Do not select FWZ. h. Select IKE and click Edit. The IKE Properties dialog box appears. 30 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN Do the following: 1) Select the Password (pre-shared Secret) checkbox. The Password and Confirm Password fields are enabled. 2) In the Password and Confirm Password fields, type the pre-shared secret for the S-box. 3) Click on the Encryption tab. The Encryption tab is displayed. If you are using FP1, the screen appears as follows: SofaWare VPN Configuration Guide 31

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN If you are using FP2, the screen appears as follows: 4) If you are using FP2, select Defined below. 5) In the Encryption Algorithm list, select 3DES. 6) In the Data Integrity area, select SHA1. 7) Click OK. The User Properties dialog box reappears with the Encryption tab displayed. i. Click OK. The Users window reappears. j. Click Close. 5. Configure the rule base. 32 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN Example 1 Note: Example 1 matches the Unrestricted configuration mode in the Safe@ gateway. In this case, all traffic should be directed to the secured network (and not to the external IP of the Safe@ gateway). All VPN traffic will be allowed into the safe@ secured network, and no VPN ONLY Allow / Server rules must be defined in the Safe@ gateway. Note: The object Internal represents the encryption domain of the NG firewall. The object Sbox_Network represents the subnet behind the Safe@ gateway. Note: If VPN access to the NG firewall itself is also needed, the NG object needs to appear in the rule base as well. Note: In this instance, the services that will be encrypted in both directions are ICMP, Telnet and FTP. Example 2 SofaWare VPN Configuration Guide 33

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN Note: Example 2 matches Restricted configuration in the Safe@ gateway. In this case all traffic must be directed to the external interface of the Safe@ gateway, and can be forward inbound using VPN ONLY allow / server rules. Directing the traffic to the secured network behind the Safe@ gateway is not allowed in this mode. Note: The object called Internal represents the encryption domain of the NG firewall. Note: If VPN access to the NG firewall itself is also needed, the NG object needs to appear in the rule base as well. Note: In this instance, the services that will be encrypted in both directions are ICMP, Telnet and FTP. 6. Set encryption properties for each of the rules by doing the following: a. In desired rule s row, right-click on the Encrypt icon, and click Set Properties in the popup menu that appears. The Encryption Properties dialog box appears. 34 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN b. Click Edit. The IKE Phase 2 Properties dialog box appears. c. In the Data Integrity list, select SHA1. SofaWare VPN Configuration Guide 35

Configuring VPN-1 NG FP1 and FP2 for Site-to-Site VPN d. Click OK. The Encryption Properties dialog box appears. e. Click OK. 7. Compile the policy. 36 SofaWare VPN Configuration Guide

Chapter 4 Configuring VPN-1 4.1 for Site-to-Site VPN This chapter explains how to configure Check Point VPN-1 4.1 for the Safe@Office to VPN-1 (Site-to-Site VPN) solution described in Safe@Office to VPN-1 (Site-to-Site VPN), page 11. Note: The information in this chapter is correct for VPN-1 4.1, SP4, and higher. This chapter contains the following sections:! Configuring VPN-1 4.1 for Site-to-Site VPN Note: You must configure the VPN-1 object to use a pre-shared secret before you configure VPN-1 NG 4.1 for Site-to-Site. SofaWare VPN Configuration Guide 37

Configuring VPN-1 4.1 for Site-to-Site VPN Configuring VPN-1 4.1 for Site-to-Site VPN To configure VPN-1 4.1 for Site-to-Site VPN 1. Open the Check Point Policy Editor. 2. Create the Safe@ Gateway object by doing the following: a. In the Manage menu, choose Network Objects. The Network Objects dialog box appears. b. Click New and then click Workstation. The Workstation Properties dialog box appears with the General tab displayed. 38 SofaWare VPN Configuration Guide

Configuring VPN-1 4.1 for Site-to-Site VPN Do the following: 1) In the Name field, type the object s name. 2) In the IP Address field, type the S-box s hiding address. 3) In the Location area, select External. 4) In the Type area, select Gateway. 5) In the Modules Installed area, select VPN-1& FireWall-1 version 4.1. c. Click OK. 3. Configure the Safe@ Gateway internal network object by doing the following: a. In the Manage menu, choose Network Objects. The Network Objects dialog box appears. b. Click New and then click Network. The Network Properties dialog box appears with the General tab displayed. SofaWare VPN Configuration Guide 39

Configuring VPN-1 4.1 for Site-to-Site VPN Do the following: 1) In the Name field, type the network object name. 2) In the IP Address field, type the network object s IP address. 3) In the Net Mask field, type the network object s subnet mask. The subnet mask represents the home network. 4) Click OK. c. Open the Safe@ Gateway object you defined earlier. The Workstation Properties dialog box appears with the General tab displayed. d. In the menu, click VPN. The VPN tab is displayed. 40 SofaWare VPN Configuration Guide

Configuring VPN-1 4.1 for Site-to-Site VPN. e. In the Domain area, select Other, and then select network object from the Other list. (In the example above, the network object is Mynet.) f. Click Edit. The IKE Properties dialog box appears. SofaWare VPN Configuration Guide 41

Configuring VPN-1 4.1 for Site-to-Site VPN g. In the Support authentication methods area, select Pre-shared Secret, and click Edit Secrets... The Shared Secret dialog box appears. Do the following: 1) In the Peer Name column, click on the VPN-1 s peer name. Note: If the VPN-1 object was not configured to use a pre-shared secret, the peer name will not be listed. 42 SofaWare VPN Configuration Guide

Configuring VPN-1 4.1 for Site-to-Site VPN 2) In the Enter Secrets field, type the unique password that should be used by the S-box and VPN-1 when establishing VPN connections to each other. 3) Click Set. 4) Click OK. The IKE Properties dialog box reappears. h. Click OK. The Workstation Properties dialog box reappears with the VPN tab displayed. i. Click OK. 4. Configure the VPN-1 object by doing the following: a. In the Manage menu, choose Network Objects. The Network Objects dialog box appears. b. Select the VPN-1 object and click Edit. The Workstation Properties dialog box appears with the General tab displayed. c. Click on the VPN tab. The VPN tab is displayed. SofaWare VPN Configuration Guide 43

Configuring VPN-1 4.1 for Site-to-Site VPN Note: Your Domain area may look different, depending on the VPN topology of your network. d. In the Domain section, select the Exportable for SecuRemote check box. e. In the Encryption schemes defined area, click Edit. The IKE Properties dialog-box appears. 44 SofaWare VPN Configuration Guide

Configuring VPN-1 4.1 for Site-to-Site VPN f. Verify that the following options are selected:! Pre-shared Secret! Optional - Support Aggressive Mode Note: Main Mode is also supported so Aggressive mode is optional.! Support keys exchange for subnets 4. If desired, create a Topology user by doing the following: Note: A Topology user is a User object that enables the S-box to download the VPN-1 NG FP1/FP2 topology. If you do not create a Topology user, you must specify the VPN-1 s network configuration in the S-box VPN wizard. a. In the Manage menu choose Users. The Users dialog box appears. SofaWare VPN Configuration Guide 45

Configuring VPN-1 4.1 for Site-to-Site VPN b. Click New,and then click Default. The Users Properties dialog box appears with the General tab displayed. c. In the Name field, type the user name. In this example the name Topology is used. d. In the Expiration Date field, type the expiration date. e. Click on the Encryption tab. The Encryption tab is displayed. 46 SofaWare VPN Configuration Guide

Configuring VPN-1 4.1 for Site-to-Site VPN f. In the Client Encryption Methods area, select the IKE check box and clear the FWZ check box. g. Click Edit. The IKE Properties dialog box appears with the Authentication tab displayed. h. Select Password, and type the password in the field. i. Click on the Encryption tab. The Encryption tab is displayed. SofaWare VPN Configuration Guide 47

Configuring VPN-1 4.1 for Site-to-Site VPN Do the following: 1) In the Data Integrity area, select SHA1. 2) In the Encryption Algorithm list, select 3DES. 3) Click OK. The Users Properties dialog box reappears with the Encryption tab displayed. j. Click OK. 5. Edit the existing rule base. Example 1 Note: Example 1 matches the Unrestricted configuration mode in the Safe@ gateway. In this case, all traffic should be directed to the secured network (and not to 48 SofaWare VPN Configuration Guide

Configuring VPN-1 4.1 for Site-to-Site VPN the external IP of the Safe@ gateway). All VPN traffic will be allowed into the safe@ secured network, and no VPN ONLY Allow / Server rules must be defined in the Safe@ gateway. Note: The object Local_VPN_Domain represents the encryption domain of the behind the 4.1 firewall. The object Mynet represents the subnet behind the Safe@ gateway. Note: If VPN access to the 4.1 firewall itself is also needed, the 4.1 object needs to appear in the rule base as well. Note: In this instance, the services that will be encrypted in both directions are ICMP, and FTP. Example 2 This example shows the rules that must be added to an existing rule base in order for FTP and ICMP to be encrypted to and from the S-box. Note: Example 2 matches Restricted configuration in the Safe@ gateway. In this case all traffic must be directed to the external interface of the Safe@ gateway, and can be forward inbound using VPN ONLY allow / server rules. Directing the traffic to the secured network behind the Safe@ gateway is not allowed in this mode. Note: The object Local_VPN_Domain is the subnet behind the FW-1 4.1 firewall. SofaWare VPN Configuration Guide 49

Configuring VPN-1 4.1 for Site-to-Site VPN Note: If VPN access to the 4.1 firewall itself is also needed, the 4.1 object needs to appear in the rule base as well. Note: In this instance, the services that will be encrypted in both directions are ICMP, and FTP. 6. Set encryption properties for each of the rules by doing the following: a. In desired rule s row, right-click on the Encrypt icon, and click Set Properties in the popup menu that appears. The Encryption Properties dialog box appears. b. Click Edit. The IKE Properties dialog box appears. 50 SofaWare VPN Configuration Guide

Configuring VPN-1 4.1 for Site-to-Site VPN c. In the Data Integrity list, select SHA1. d. Click OK. The Encryption Properties dialog box reappears. e. Click OK. 7. Compile the policy. SofaWare VPN Configuration Guide 51

Chapter 5 Configuring VPN-1 for Safe@ RAS VPN This chapter explains how to configure Check Point VPN-1 as a VPN RAS server, as described in the solution VPN RAS Client to VPN-1 VPN RAS Server, page 12. The VPN-1 versions supported are Check Point 4.1 SP4 and above, NG FP1, and NG FP2. If you are using NG FP3, please refer to Configuring VPN-1 NG FP3, page 73 After configuring VPN-1, you must configure the Safe@ appliance to act as a VPN RAS client. For instructions, refer to the SofaWare Safe@ Getting Started Guide. The SofaWare Safe@ Gateway uses IKE shared secrets to establish an IPSEC VPN connection from the Safe@ Gateway to the Check Point Enterprise VPN-1. This chapter contains the following sections:! Configuring VPN-1 NG for Safe@ RAS VPN, page 53.! Configuring VPN-1 4.1 for Safe@ RAS VPN, page 64 Configuring VPN-1 NG for Safe@ RAS VPN Note: This procedure can be used for VPN-1 NG FP1 and FP2. To configure VPN-1 NG for Safe@ RAS VPN 1. Open the Check Point Policy Editor. 2. Edit the VPN-1 NG properties by doing the following: a. From the Manage menu, select Network Objects. The Network Objects dialog box appears. SofaWare VPN Configuration Guide 53

Configuring VPN-1 for Safe@ RAS VPN b. Click on the VPN-1 workstation object that should receive the Safe@ gateway VPN session request. The Workstation Properties dialog box appears with the General tab displayed. 54 SofaWare VPN Configuration Guide

Configuring VPN-1 for Safe@ RAS VPN c. In the menu, click VPN. The VPN tab is displayed. d. In the Encryption schemes area, verify that the IKE check box is selected. e. Click Edit. The IKE Properties dialog box appears. SofaWare VPN Configuration Guide 55

Configuring VPN-1 for Safe@ RAS VPN f. Verify that the following selections are made:! In the Support key exchange encryption with list: DES and/or 3DES! In the Support data integrity with area: MD5 and/or SHA1 Note: These are the minimal selections. If desired, you can select additional options. g. Click Advanced. The Advanced IKE properties dialog box appears. 56 SofaWare VPN Configuration Guide

Configuring VPN-1 for Safe@ RAS VPN Do the following: 1) Select the Use UDP encapsulation check box. 2) From the Use UDP encapsulation list, select VPN1_IPSEC_encapsulation. 3) In the Rekeying Parameters area, set Renegotiate IKE security associations to 1440 minutes, and set Renegotiate IPSEC Security associations every to 3600 seconds. 4) In the Misc area, select Support IP compression for SecureClient, Support aggressive mode, and Support key exchange for subnets. 5) Click OK. The IKE Properties dialog box reappears. h. Click OK. The Workstation Properties dialog box reappears with the VPN tab displayed. i. Click OK. SofaWare VPN Configuration Guide 57

Configuring VPN-1 for Safe@ RAS VPN 3. Create a new group object by doing the following: a. In the Manage menu, click Users. The Users dialog box appears. b. Click New and then Group. The Group Properties dialog box appears. 58 SofaWare VPN Configuration Guide

Configuring VPN-1 for Safe@ RAS VPN c. In the Name field, type the group object s name. d. If users are already defined and you wish to add them to the new group, add users to your group by doing the following: 1) In the Not in Group list, select desired users. 2) Click Add>. The selected users are moved to the In Group list. e. Click OK. The Users dialog box reappears. The new group object appears in the Users list. f. Click Close. 4. If you wish to create a new Safe@ gateway user object, do the following: a. In the Manage menu, click Users. The Users window appears. b. Click New, User by Template, and then Default. The User Properties dialog box appears with the General tab displayed. SofaWare VPN Configuration Guide 59

Configuring VPN-1 for Safe@ RAS VPN c. Type a login name for the new Safe@ gateway user. d. Click the Groups tab. The Groups tab is displayed. e. In the Available Groups list, select the group you created earlier and click Add>. The group is moved to the Belongs to Groups list. f. Click on the Encryption tab. The Encryption tab is displayed. 60 SofaWare VPN Configuration Guide

Configuring VPN-1 for Safe@ RAS VPN g. In the Client Encryption Methods area, verify that the IKE check box is selected. h. Click Edit. The IKE Properties dialog box appears with the Authentication tab displayed. SofaWare VPN Configuration Guide 61

Configuring VPN-1 for Safe@ RAS VPN Do the following: 1) Select Password. The Password and Confirm Password fields are enabled. 2) In the Password and Confirm Password fields, type the pre-shared secret for the Safe@ gateway. 3) Click on the Encryption tab. The Encryption tab is displayed. 62 SofaWare VPN Configuration Guide

Configuring VPN-1 for Safe@ RAS VPN 4) In the Transform area, select Encryption + Data Integrity (ESP). 5) In the Data Integrity area, select SHA1 or MD5. 6) In the Encryption Algorithm list, select DES or 3DES. 7) Click OK. The User Properties dialog box reappears with the Encryption tab displayed. i. Click OK. The Users window reappears. j. Click Close. 5. Add a rule to your rule base: Note: The rule above is only an example. The Destination and Service may vary according to your VPN settings and your network needs. 6. Compile the policy. Note: The object Internal represent the encryption domain of the NG firewall. SofaWare VPN Configuration Guide 63

Configuring VPN-1 for Safe@ RAS VPN Configuring VPN-1 4.1 for Safe@ RAS VPN To configure VPN-1 4.1 for Safe@ RAS VPN 1. Open the Check Point Policy Editor. 2. Edit the VPN-1 4.1 properties by doing the following: a. From the Manage menu, select Network Objects. The Network Objects dialog box appears. b. Click on the VPN-1 4.1 object that should receive the Safe@ gateway VPN session request, and click Edit. The Workstation Properties dialog box appears with the General tab displayed. 64 SofaWare VPN Configuration Guide

Configuring VPN-1 for Safe@ RAS VPN c. Click on the VPN tab. The VPN tab is displayed. SofaWare VPN Configuration Guide 65

Configuring VPN-1 for Safe@ RAS VPN d. In the Encryption schemes defined area, verify that the IKE check box is selected. e. Click Edit. Note: In the example above, the Local_VPN_Domain object represents the secured networks protected by VPN-1. Your VPN-1 may have other network objects defined. The IKE Properties dialog box appears. 66 SofaWare VPN Configuration Guide

Configuring VPN-1 for Safe@ RAS VPN f. Verify that the following selections are made:! In the Key Negotiation Encryption Method(s) list: DES and/or 3DES Note: CAST is not supported by Safe@ gateway, but can be selected if desired.! In the Hash Method area: MD5 and/or SHA1! Support Aggressive Mode! Support Subnets Note: These are the minimal selections. If desired, you can select additional options. g. Click OK. The Workstation Properties dialog box reappears with the VPN tab displayed. h. Click OK. 3. Create a new group object by doing the following: a. From the Manage menu, click Users. The Users dialog box appears. SofaWare VPN Configuration Guide 67

Configuring VPN-1 for Safe@ RAS VPN b. Click New and then click Group. The Group Properties dialog box appears. c. In the Name field, type the group object s name. d. If users are already defined, and you wish to add them to the new group, do the following: 1) In the Not in Group list, select desired users. 2) Click Add>. The selected users are moved to the In Group list. 68 SofaWare VPN Configuration Guide

Configuring VPN-1 for Safe@ RAS VPN e. Click OK. The Users dialog box reappears. The new group appears in the Users list. f. Click Close. 4. If you wish to create a new Safe@ gateway user object, do the following: a. From the Manage menu, click Users. The Users window appears. b. Click New and then click Default. The User Properties dialog box appears with the General tab displayed. Do the following: 1) In the Name field, type a name for the new Safe@ gateway user. 2) If desired, type a new expiration date for the Safe@ gateway user object in the Expiration Date field. c. Click the Groups tab. The Groups tab is displayed. SofaWare VPN Configuration Guide 69

Configuring VPN-1 for Safe@ RAS VPN d. In the Available Groups list, select the group you created earlier and click Add >. The group is moved to the Belongs to Groups list. e. Click on the Encryption tab. The Encryption tab is displayed. f. In the Client Encryption Methods area, verify that the IKE check box is selected. 70 SofaWare VPN Configuration Guide

Configuring VPN-1 for Safe@ RAS VPN g. Click Edit. The IKE Properties dialog box appears with the Authentication tab displayed. Do the following: 1) Select Password. The Password field is enabled. 2) In the Password field, type the pre-shared secret for the Safe@ gateway. 3) Click on the Encryption tab. The Encryption tab is displayed. SofaWare VPN Configuration Guide 71

Configuring VPN-1 for Safe@ RAS VPN 4) In the Transform area, select Encryption + Data Integrity (ESP). 5) In the Data Integrity area, select SHA1 or MD5. 6) In the Encryption Algorithm list, select DES or 3DES. 7) Click OK. The User Properties dialog box reappears with the Encryption tab displayed. h. Click OK. The Users window reappears. i. Click Close. 5. Add a rule to your rule base: Note: The rule above is only an example. The Destination and Service may vary according to your VPN settings and your network needs. 6. Compile the policy. Note: The object Internal represents the encryption domain of the FW-1 4.1 firewall. 72 SofaWare VPN Configuration Guide

Chapter 6 Configuring VPN-1 NG FP3 This chapter explains how to create Site-to-Site and Client-to-Site VPN tunnels between Safe@ gateway and NG FP3 using communities. Note: SSC (SofaWare SmartCenter Connector) add-on must be installed on the NG FP3 firewall SofaWare VPN Configuration Guide 73

Configuring VPN-1 NG FP3 Configuring Safe@ gateway to NG FP3 In Client to Site Mode Create and Configure Safe@ object 1. Open the Check Point Policy Editor. 2. Create a Safe@ Gateway object by doing the following: a. In the Manage menu, click Network Objects. The Network Objects dialog box appears. b. Click New, Check Point, and then Safe@ Gateway... c. The Safe@ Gateway properties page appears 3. Configure the Safe@ Gateway Object by doing the following: 74 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP3 a. In the Name field, type the object s name. b. Next to the IP Address field select the Dynamic Address checkbox. c. In the Type field choose GW Type. d. In the SofaWare Profile field choose Profile. e. In the Password field enter a password, or press on the Generate Password button. f. Select the VPN Enabled check box. g. Save the object by clicking OK. Note: The Safe@ password is automatically used as its shared secret in the community. SofaWare VPN Configuration Guide 75

Configuring VPN-1 NG FP3 Configure the Community 1. Define the Community by doing the following: a. Select the VPN Manager tab: b. Double click on the RemoteAccess community. The RemoteAccess Community Properties window appears. 2. Add participants to the pre-defined RemoteAccess Community: a. In the General Tab, Enter Object name. b. In the Participating Gateways, choose the firewall gateways you wish to use. 76 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP3 c. In the Participating User Groups, select All SofaWare VPN GW s d. Click OK. Note: You can choose All Users, and it will include All SofaWare VPN GW s SofaWare VPN Configuration Guide 77

Configuring VPN-1 NG FP3 Configure Global Properties 1. From the menu select Policy and Global Properties 2. The Global Properties page appears. 3. Select Remote Access and then VPN Basic in the tree on the left side of the dialog-box. 4. Select the Hybrid Mode (VPN-1 & Firewall-1 authentication) checkbox. 5. Click OK Rule base Note: If using Safe@ Gateways version 2.0.x, it is mandatory to select also Preshared Secret Note: The If Via access rule condition means "Accept if encrypted between community members". In the example below, all services are allowed via the RemoteAccess community. 78 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP3 6. Install the policy on the desired gateways and profiles. Configuring Safe@ gateway to NG FP3 in Site To Site mode Create a network object Note: Working with Dynamic IP s and certificates is supported. For more information, please refer to www.sofaware.com or contact support@sofaware.com. 1. Open the Check Point Policy Editor. 2. Create a Safe@ Gateway object by doing the following: a. In the Manage menu, click Network Objects. SofaWare VPN Configuration Guide 79

Configuring VPN-1 NG FP3 b. Click New. c. Select Network... d. The Network Properties window opens e. In the Name field type the name of the object f. In the Network Address field type the network IP address 80 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP3 g. In the Net Mask field type the subnet mask h. Click OK Create and Configure Safe@ object 1. Open the Check Point Policy Editor. 2. Create a Safe@ Gateway object by doing the following: a. In the Manage menu, click Network Objects. The Network Objects dialog box appears. b. Click New, Check Point, and then Safe@ Gateway. c. The Safe@ Gateway properties page appears. 3. Configure the Safe@ Gateway object by doing the following: SofaWare VPN Configuration Guide 81

Configuring VPN-1 NG FP3 a. In the Name field, type the object s name. b. In the IP Address field, type your IP address. c. In the Type field, choose GW Type d. In the SofaWare Profile field, choose Profile e. In the Password field, enter a password, or press the Generate Password button. f. Select the VPN Enabled check box. 4. Configure Topology by doing the following: a. Select the Topology tab 82 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP3 b. From the Manually defined drop-down menu select the network object that represents the network protected by the safe@ gateway c. Save the object by clicking OK. Configure the Community 1. Define the Community a. Select the VPN Manager tab. b. Right-click in the VPN Manager, then from the New Community menu choose Star. Note: Meshed communities are not supported in NG FP3 with Safe@ gateways The Start community Properties page appears SofaWare VPN Configuration Guide 83

Configuring VPN-1 NG FP3 c. In the Name field type the name of the object. Note: In order to accept encrypted traffic, the user can check the "Accept all encrypted traffic" checkbox on the community object. This will add an automatic access rule for all encrypted traffic between community members. d. Select the Central Gateways tab. e. Add the gateway object you wish to be the Central Gateway. 84 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP3 f. Select the Satellite Gateways tab g. Click Add... and choose the Safe@ gateway object. h. Services in the Clear definitions will not effect the tunnel between Safe@ and FP3. The Safe@ will encrypt all traffic. i. Click on VPN Properties tab. j. Define Phase 1 and Phase 2 properties. SofaWare VPN Configuration Guide 85

Configuring VPN-1 NG FP3 Note: All VPN Encryption and Data Integrity combinations are allowed. In the example above Phase 1 is configured to use 3DES + MD5, and phase 2 is configured to use 3DES + SHA1. Other combinations are allowed. Note: There is no need to define Advanced Properties. Note: There is no need to define the shared secret on the community. The Safe@ password is automatically used as its shared secret in the community. k. Click OK l. The new Start community is presented in the VPN Manager tab. 86 SofaWare VPN Configuration Guide

Configuring VPN-1 NG FP3 Rule Base Note: The "If Via" access rule condition means "Accept if encrypted between community members." Note: In the example below, only FTP and ICMP protocols will be Encrypted via the Star_1 Community. SofaWare VPN Configuration Guide 87