Example VPN between an internal network and remote clients
Use the following procedures to configure an IPSec Autokey IKE VPN that allows VPN clients to connect to
an internal network:
·
Configuring the network end of the VPN tunnel
·
Adding source and destination addresses
·
·
Configuring the IPSec VPN client
Configuring the network end of the VPN tunnel
A VPN tunnel consists of a name for the tunnel, the remote gateway IP address (in this example, the IP
address of the client), the keylife for the tunnel, and the authentication key to be used to start the tunnel.
You can either create one VPN tunnel for each VPN client, or you can create one VPN tunnel with a remote
gateway address set to 0.0.0.0. This VPN tunnel can accept IPSec connections from any Internet address.
You must create complementary VPN tunnels on the VPN gateway and the clients. On both, the tunnel must
have the same name, keylife, and authentication key.
Example VPN Tunnel configuration
shows the information required to configure the VPN tunnel for the VPN in
Example VPN between an internal network and remote clients
.
Example VPN Tunnel configuration
Description
Example
Setting
Tunnel Name
Enter a name for the tunnel. The name can contain numbers (0-9), and upper and
lower case letters (A-Z, a-z), and the special characters - and _. Other special
characters and spaces are not allowed.
Client_VPN
Remote
Gateway
To accept connections from a client at a static IP address (for example, 2.2.2.2).
2.2.2.2
P1 Proposal
Select the
Encryption
algorithms to propose for Phase 1 of the IPSec VPN
connection. See
DES and
3DES
DFL-500 User Manual
60