9.2. VPN Quick Start
Later sections in this chapter will explore VPN components in detail. To help put those later
sections in context, this section is a quick start summary of the key steps in VPN setup.
It outlines the individual steps in setting up VPNs for the most common VPN scenarios. These are:
•
IPsec LAN to LAN with Pre-shared Keys
•
IPsec LAN to LAN with Certificates
•
IPsec Roaming Clients with Pre-shared Keys
•
IPsec Roaming Clients with Certificates
•
L2TP Roaming Clients with Pre-Shared Keys
•
L2TP Roaming Clients with Certificates
•
PPTP Roaming Clients
9.2.1. IPsec LAN to LAN with Pre-shared Keys
1.
Create a Pre-shared Key object.
2.
Optionally create a new IKE Algorithms object and/or an IPsec Algorithms object if the
default algorithm proposal lists do not provide a set of algorithms that are acceptable to the
tunnel remote end point. This will depend on the capabilities of the device at the other end of
the VPN tunnel.
3.
In the Address Book create IP objects for:
•
The remote VPN gateway which is the IP address of the network device at the other end of
the tunnel (let's call this object remote_gw).
•
The remote network which lies behind the remote VPN gateway (let's call this object
remote_net).
•
The local network behind the D-Link Firewall which will communicate across the tunnel.
Here we will assume that this is the pre-defined address lannet and this network is attached
to the NetDefendOS lan interface.
4.
Create an IPsec Tunnel object (let's call this object ipsec_tunnel). Specify the following tunnel
parameters:
•
Set Local Network to lannet.
•
Set Remote Network to remote_net.
9.2. VPN Quick Start
Chapter 9. VPN
323
Summary of Contents for 800 - DFL 800 - Security Appliance
Page 24: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 24 ...
Page 69: ...2 6 4 Restore to Factory Defaults Chapter 2 Management and Maintenance 69 ...
Page 121: ...3 9 DNS Chapter 3 Fundamentals 121 ...
Page 181: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 181 ...
Page 192: ...5 5 IP Pools Chapter 5 DHCP Services 192 ...
Page 282: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 282 ...
Page 300: ...mechanism 7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 300 ...
Page 301: ...7 3 7 SAT and FwdFast Rules Chapter 7 Address Translation 301 ...
Page 318: ...8 3 Customizing HTML Pages Chapter 8 User Authentication 318 ...
Page 322: ...ALG 9 1 5 The TLS Alternative for VPN Chapter 9 VPN 322 ...
Page 377: ...Management Interface Failure with VPN Chapter 9 VPN 377 ...
Page 408: ...10 4 6 SLB_SAT Rules Chapter 10 Traffic Management 408 ...
Page 419: ...11 5 HA Advanced Settings Chapter 11 High Availability 419 ...
Page 426: ...12 3 5 Limitations Chapter 12 ZoneDefense 426 ...
Page 449: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 449 ...