User Tools

Site Tools


firewall:configuration:vpn:how_to_configure_a_vpn_tunnel

HOW TO CONFIGURE A VPN TUNNEL

Firewall VPN Configuration

  1. 1 Log into the Firewall
  2. Go to the VPN button and click on the “VPN Configure” tab
  3. Locate the “Security Association” pull down menu and select “-Add New SA-“
  4. Select “IKE” under the “IPSec Keying Mode:” pull down menu
  5. Enter the name you wish to use to identify this Security Association in the SA Name field
  6. Leave the “Enable Windows Networking (NetBIOS) broadcast” unchecked
  7. Leave the “Destination Network” field of 0.0.0.0 (or blank) unchanged
  8. Leave the “Destination Subnet Mask” field of 0.0.0.0 (or blank) unchanged
  9. Leave the “IPSec Gateway Address” field of 0.0.0.0 (or blank) unchanged
  10. Select either “Encrypt and Authenticate (ESP DES HMAC MD5)” or “Strong Encrypt and Authenticate (ESP 3DES HMAC MD5)” under the Encryption Method pull down menu
  11. Enter your “Shared Secret” in the Shared Secret field. This shared secret must be a minimum of 8 characters in length (if using DES) or at least 24 characters (if using 3DES) and will match the shared secret on the VPN client
  12. Click on the “Update” button
  13. The “Status” field at the bottom of the Firewall screen should state “Restart”
  14. Click on the “Restart” link at the bottom of the page
  15. Confirm you want to restart the Firewall by clicking “YES”

SafeNet IRE VPN Client Configuration

  1. 1Launch the Secure Policy Editor. Start/Programs/SafeNet Soft-PK/Security Policy Editor (Alternatively, you can right click on the SN icon, which should be in the system tray. A menu will pop up and you can choose Secure Policy Editor)
  2. Select Options/Global Policy Settings. Change the Retransmit Interval (seconds) from 15 to at least 30 (I recommend 45)
  3. Click OK to close that window
  4. Select Edit/Add/Connection
  5. This will create a new connection, which you may title whatever you like
  6. Click the “+” next to your newly created connection
  7. Click the “+” next to Security Policy
  8. Click the “+” next to Authentication (Phase 1)
  9. Click the “+” next to Key Exchange (Phase 2)
  10. Highlight Security Policy and check Aggressive Mode under “Select Phase 1 Negotiation Mode”. Click on the floppy disk icon to save changes
  11. Highlight the name of your new connection
  12. In the Connection Security section, select “Secure” (default)
  13. In the Remote Party Identity and Addressing section, select ID Type “IP Subnet”
  14. Type in the IP Address of the LAN port of the Firewall in the Subnet: field
  15. Type in the subnet mask of the LAN port of the Firewall in the Mask: field
  16. Under Protocol, select “All” to allow IP traffic through the VPN tunnel (default)
  17. Check the box “Connect using Secure Gateway Tunnel”
  18. Under that box, choose ID Type: Domain Name and enter the Unique Firewall Identifier located in the Firewall’s VPN Summary tab (for example, “00301E05201D”)
  19. In the IP Address field enter the WAN IP Address of the Firewall. Save your changes
  20. Highlight “My Identity”
  21. In the My Identity section, click on the “Pre-Shared Key” button. Then, click the Enter Key button
  22. Enter your “Pre-Shared Key”. This shared secret must be a minimum of 8 characters (for DES) or 24 characters (for 3DES) in length and will match the shared secret on the VPN Firewall
  23. Click OK to close that window
  24. From the “Select Certificate” drop down menu, select “None” (default)
  25. From the “ID Type” drop down menu, choose “Domain Name” and enter any name you like (does not matter, so long as you put something in there)
  26. In the “Internet Interface” section, select your ethernet NIC (or PPP addapter if using dial up networking). The IP Addr field will be set to the IP address assigned to your NIC. Save your changes
  27. Highlight “Security Policy”
  28. Leave unchecked the “Enable Perfect Forward Secrecy (PFS)” option (default), but check the “Enable Replay Detection” option (default). Save your changes
  29. Highlight “Proposal 1” under “Authentication (Phase 1)”
  30. In the Authentication Method and Algorithms section locate the Authentication Method drop down menu and select “Pre-Shared Key” (default)
  31. In the Encryption and Data Integrity Algorithms section, select DES or Triple DES as the Encrypt Alg. (this will be determined by what was set on the firewall)
  32. From the Hash Alg pull down menu, select “MD5”
  33. From the SA Life, select “Unspecified” (default)
  34. Leave the Key Group at “Diffe-Hellman Group 1” (default). Save your changes
  35. Highlight “Proposal 1” under Key Exchange (phase 2)
  36. Leave the SA Life set to “Unspecified” (default) and the Compression to “None” (default)
  37. Check the box next to Encapsulation Protocol (ESP) (default)
  38. Set the Encrypt Alg to DES or Triple DES (again, this follows whatever the firewall is set to)
  39. Set the Hash Alg to “MD5”
  40. Set the Encapsulation to “Tunnel” (default)
  41. Make sure the “Authentication Protocol (AH)” check box is unchecked (default). Save your changes

NOTE:To test your encrypted tunnel, send a PING from your client PC, located on the WAN side of the Firewall, to the IP address assigned to the LAN port of the Firewall. In most cases, the ping will time out, but it will serve to initiate the tunnel. If successful, the SN icon in your system tray should turn into a golden key (may take up to a minute). You should also be able to enter the IP address of the LAN port of the Firewall into your web browser and you should be able to login to the Firewall web management interface (once you have the golden key icon)

David Gonzalez 2021/03/30 09:47

firewall/configuration/vpn/how_to_configure_a_vpn_tunnel.txt · Last modified: 2021/03/30 09:47 by dgonzalez

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki