VPN Tracker for Mac OS X



Similar documents
VPN Tracker for Mac OS X

VPN Tracker for Mac OS X

VPN Tracker for Mac OS X

VPN Tracker for Mac OS X

VPN Configuration Guide D-Link DFL-800

VPN Configuration Guide LANCOM

VPN Quick Configuration Guide. Astaro Security Gateway V8

VPN Configuration Guide Netgear FVS338 / FVX538 / FVS124G

VPN Configuration Guide D-Link DFL-200

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

VPN Configuration Guide Linksys RV042/RV082

VPN Configuration Guide. Juniper Networks NetScreen / SSG / ISG Series

VPN Configuration Guide. Cisco Small Business (Linksys) WRVS4400N / RVS4000

VPN Configuration Guide. Cisco Small Business (Linksys) WRV210

VPN Configuration Guide WatchGuard Fireware XTM

Configuring IPsec VPN with a FortiGate and a Cisco ASA

VPN Configuration Guide. ZyWALL USG Series / ZyWALL 1050

VPN Tracker for Mac OS X

VPN Configuration Guide DrayTek Vigor / VigorPro

VPN Configuration Guide. Cisco Small Business (Linksys) RV016 / RV042 / RV082

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

VPN Configuration Guide. Dell SonicWALL

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

VPN Configuration Guide. Cisco ASA 5500 Series

VPNC Interoperability Profile

Configure an IPSec Tunnel between a Firebox Vclass & a Check Point FireWall-1

How To Configure Apple ipad for Cyberoam L2TP

How To Configure L2TP VPN Connection for MAC OS X client

Configuring a VPN for Dynamic IP Address Connections

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Sonicwall Firewall.

VPN Configuration Guide. Parallels Remote Desktop for Mac

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Virtual Private Network and Remote Access Setup

VPN. VPN For BIPAC 741/743GE

STONEGATE IPSEC VPN 5.1 VPN CONSORTIUM INTEROPERABILITY PROFILE

VPN Configuration Guide. Linksys (Belkin) LRT214 / LRT224 Gigabit VPN Router

DFL-210/260, DFL-800/860, DFL-1600/2500 How to setup IPSec VPN connection

How To Configure An Ipsec Tunnel On A Network With A Network Gateways (Dfl-800) On A Pnet 2.5V2.5 (Dlf-600) On An Ipse Vpn

Configuring an IPsec VPN to provide ios devices with secure, remote access to the network

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

Zeroshell: VPN Host-to-Lan

Chapter 8 Virtual Private Networking

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Check Point FW-1/VPN-1 NG/FP3

How To Industrial Networking

Chapter 4 Virtual Private Networking

Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

Setting up D-Link VPN Client to VPN Routers

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

Configure IPSec VPN Tunnels With the Wizard

Chapter 5 Virtual Private Networking Using IPsec

Virtual Private Network and Remote Access

IPsec VPN Application Guide REV:

Windows XP VPN Client Example

VPN Configuration of ProSafe VPN Lite software and NETGEAR ProSafe Router:

Scenario: Remote-Access VPN Configuration

Configure VPN between ProSafe VPN Client Software and FVG318

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

Configuring GTA Firewalls for Remote Access

REMOTE ACCESS VPN NETWORK DIAGRAM

VPN SECURITY POLICIES

Scenario: IPsec Remote-Access VPN Configuration

HOWTO: How to configure IPSEC gateway (office) to gateway

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Application Notes. How to Configure UTM with Apple OSX and ios Devices for IPsec VPN

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

VPN L2TP Application. Installation Guide

How to setup PPTP VPN connection with DI-804HV or DI-808HV using Windows PPTP client

Connecting an Android to a FortiGate with SSL VPN

Chapter 6 Basic Virtual Private Networking

Industrial Classed H685 H820 Cellular Router User Manual for VPN setting

How to Create a Basic VPN Connection in Panda GateDefender eseries

Configuring SSH Sentinel VPN client and D-Link DFL-500 Firewall

VNS3 to Cisco ASA Instructions. ASDM 9.2 IPsec Configuration Guide

VPN Configuration Guide. Dealing with Identical Local and Remote Network Addresses

VPN Wizard Default Settings and General Information

Chapter 6 Virtual Private Networking

Ingate Firewall. TheGreenBow IPSec VPN Client Configuration Guide.

How to access peers with different VPN through IPSec. Tunnel

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

Netopia TheGreenBow IPSec VPN Client. Configuration Guide.

ISG50 Application Note Version 1.0 June, 2011

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Global VPN Client Getting Started Guide

How To Set Up Checkpoint Vpn For A Home Office Worker

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

DI-804HV with Windows 2000/XP IPsec VPN Client Configuration Guide

Workflow Guide. Establish Site-to-Site VPN Connection using Digital Certificates. For Customers with Sophos Firewall Document Date: November 2015

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

axsguard Gatekeeper IPsec XAUTH How To v1.6

Setting up VPN Tracker with Nortel VPN Routers

Transcription:

VPN Tracker for Mac OS X How-to: Interoperability with Check Point VPN-1 Gateway Rev. 3.0 Copyright 2003-2004 equinux USA Inc. All rights reserved.

1. Introduction 1. Introduction This document describes how VPN Tracker can be used to establish a connection between a Macintosh running Mac OS X and a Check Point VPN-1 Gateway. The Check Point Firewall is configured as an Internet Gateway connecting a company LAN to the Internet. This paper is only a supplement to, not a replacement for, the instructions that have been included with your Check Point Firewall. Please be sure to read those instructions and understand them before starting. All trademarks, product names, company names, logos, screenshots displayed, cited or otherwise indicated on the How-to are the property of their respective owners. EQUINUX SHALL HAVE ABSOLUTELY NO LIABILITY FOR ANY DIRECT OR INDIRECT, SPECIAL OR OTHER CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE USE OF THE HOW-TO OR ANY CHANGE TO THE ROUTER GENERALLY, INCLUDING WITHOUT LIMITATION, ANY LOST PROFITS, BUSINESS, OR DATA, EVEN IF EQUINUX HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 2

2. Prerequisites 2. Prerequisites First you have to make sure that your Check Point Firewall has VPN support built in. Please refer to your Check Point manual for details. Furthermore you should use a recent Check Point version. Unfortunately, Check Point version 4.1 is not supported. For this document, VPN-1 FP3 and FP4 has been used. When using Pre-shared key authentication you need one VPN Tracker Personal Edition license for each Mac connecting to the Check Point Firewall. For certificate authentication you need a CA with private key, so one VPN Tracker Professional Edition is required in order to sign certificates. Only one VPN Tracker Professional Edition is required, other VPN users can use a Personal Edition. For further information please refer to chapter 3 in the VPN Tracker manual. VPN Tracker is compatible with Mac OS X 10.2.x / 10.3. 3

3. Connecting VPN Tracker to a Check Point Firewall using a Pre-shared Key In this example the Mac running VPN Tracker is directly connected to the Internet via a dialup or PPP connection. 1 The Check Point Firewall is configured in NAT mode and has the static WAN IP address 169.1.2.3 and the private LAN IP address 192.168.1.1. The Stations in the LAN behind the Check Point use 192.168.1.1 as their default gateway and should have a working Internet connection. The firewall rules are already defined and the VPN connection between the windows clients and the Check Point VPN-1 GateWay works. Chicago Mac-VPN Tracker dynamic IP New York Check Point WAN 169.1.2.3 LAN 192.168.1.1 192.168.1.10 192.168.1.20 192.168.1.30 Figure 1: VPN Tracker Check Point connection diagram LAN 192.168.1.0/24 1 Please note that the connection via a router, which uses Network Address Translation (NAT), only works if the NAT router supports IPSEC passthrough. Please contact your router s manufacturer for details. 4

3.1 Check P oint Configuration The pre-defined VPN Tracker connection type has been created using the default settings for your Check Point Firewall. If you change any of the settings on the Check Point side, you will eventually have to adjust the connection type in VPN Tracker. Step 1 Adjust the VPN - Basic settings: Pre-shared Secret: check Figure 2: Check Point - VPN - Basic 5

Step 2 Adjust the VPN - Advanced settings: Encryption Algorithm: AES-128 Data Integrity: SHA-1 Support Diffie-Hellman groups: check Group 2 Figure 2: Check Point 6

Step 3 Adjust the User Properties: Login Name: enter in e-mail address format (e.g. vpnuser@domain) Figure 3: Check Point User Properties Authentication Scheme: Undefined Figure 4: Check Point - User Properties - Authentication 7

Enable the IKE Encryption Method and the Log. Figure 5: Check Point - User Properties - Encryption Edit the IKE encryption method: Password (Pre-shared secret): the user password (e.g presharedkey) Figure 6: Check Point - IKE Phase 2 Properties 8

Step 4 Add user in a RemoteAccess Group. The screenshots are only an example of adding the previously created user in a group called RemoteAccessUsers. You may already have existing Access Groups. We used the following. Figure 7: Check Point - Group Properties - RemoteAccessUsers Figure 8: Check Point - Main Screen cpmodule 9

Step 5 Please be sure that the previously created group is in the VPN community. Click on the Traditional mode configuration button. Figure 10: Check Point Gateway - cpmodule Enable Pre-Shared Secret and adjust the advanced settings. Figure 11: Traditional mode IKE Properties 10

Traditional mode advanced IKE properties: Support aggressive mode: enabled Support Diffie-Hellman groups: enable Group 2 Figure 12: Traditional mode advanced IKE properties > Multiple VPN Tracker Hosts To create another user with the same settings, please repeat step 3-4. 11

3.2 VPN Tracker Configuration Step 1 Add a new connection with the following options: Vendor: Check Point Model: your Check Point Software version Figure 13: VPN Tracker - Connection settings 12

Step 2 Change your Network Settings: VPN Server Address: public IP address of your VPN Gateway (e.g. 169.1.2.3) Remote Network/Mask: network address and netmask of the remote network (eg. 192.168.1.0/255.255.255.0). Figure 14: VPN Tracker Network settings Please note: In order to access multiple remote networks simultaneously, just add them by pressing the Plus-button. 2 2 For this step VPN Tracker Professional Edition is needed. 13

Step 3 Change your Authentication Settings: Pre-shared key: the same Pre-shared key as in the Check Point configuration. Figure 15: VPN Tracker - Authentication settings 14

Step 4 Identifier Settings: Local Identifier: your username (e.g. vpnuser@example.com). Remote Identifier: Remote endpoint IP address. Figure 9: VPN Tracker - Identifier settings Please note: If you have typed in a correct username, the word "email" should be visible beside the input field. Starting with VPN Tracker version 2.0.5 you can use a username in the form vpntracker but you have to type in @vpntracker as local identifier. An identifier of the form "@user" will be interpreted as "user" with a type of "email" (User-FQDN). This is to help all Check Point users who have usernames without an "@" in them, as Check Point always expects a User-FQDN identifier. 15

Step 5 Save the connection and Click Start IPsec in the VPN Tracker main window. You re done. After 10-20 seconds the red status indicator for the connection should change to green, which means you re securely connected to the Check Point. After IPsec has been started, you may quit VPN Tracker. The IPsec service will keep running. Now to test your connection simply ping a host in the Check Point network from the dialed-in Mac in the Terminal utility: ping 192.168.1.10 16

4. Connecting VPN Tracker Host to Check Point Firewall using Certificates 4. Connecting VPN Tracker Host to Check Point Firewall using Certificates 4.1 Check P oint Configuration Step 1 Step 2 Please refer to section 3.1. User Properties: Please enter an Identifier in the form certificateuser Figure 10: Check Point - User Properties - General 17

4. Connecting VPN Tracker Host to Check Point Firewall using Certificates Figure 11: Check Point - User Properties - Groups Generate and save the certificate. The PKCS#12 file contains the certificate, your private key and the CA. Figure 12: user Properties - Certificates 18

4. Connecting VPN Tracker Host to Check Point Firewall using Certificates Please be sure that you enable the Public Key Authentication in the IKE Phase 2 Properties. Figure 13: IKE Phase 2 Properties Step 4 Tradition mode IKE properties: Please enable the Public key Signatures. You can leave the Pre-Shared Secrets enabled. Figure 14: Check Point - Traditional mode IKE properties 19

4.2 VPN Tracker Configuration 4. Connecting VPN Tracker Host to Check Point Firewall using Certificates Step 1 Go to the VPN Tracker certificate manager ( + E ) and import the PKCS#12 file you ve previously exported. Figure 15: VPN Tracker - Certificate Import Step 2-3 Step 4 Please refer to section 3.2 step 1-2. Change your Authentication Settings: Own Certificate: imported certificate from step 1 Remote Certificate: Verify with CA s Figure 16: VPN Tracker - Authentication Settings 20

4. Connecting VPN Tracker Host to Check Point Firewall using Certificates Step 5 Change your Identifier Settings: Local Identifier: Own Certificate Remote Identifier: Remote endpoint IP address Verify remote identifier: unchecked Figure 17: VPN Tracker - Identifier Settings Step 6 Please refer to section 3.2 step 5. 21