9.2.1. IPsec LAN to LAN with Pre-shared Keys
The objective is to create a secure means of joining two networks: a Local Network which is on the
protected side of a local firewall; and a Remote Network which is on the other side of some remote
device, located across an insecure network.
The steps for setup are as follows:
1.
Create a Pre-shared Key object.
2.
Optionally create a new IKE Algorithms object and/or an IPsec Algorithms object if the
default algorithm proposal lists do not provide a set of algorithms that are acceptable to the
tunnel remote end point. This will depend on the capabilities of the device at the other end of
the VPN tunnel.
3.
In the Address Book create IP objects for:
•
The remote VPN gateway which is the IPv4 address of the network device at the other end
of the tunnel (let's call this object remote_gw). This may or may not be another NetDefend
Firewall.
•
The remote network which lies behind the remote VPN gateway (let's call this object
remote_net).
•
The local network behind the NetDefend Firewall which will communicate across the
tunnel. Here we will assume that this is the predefined address lannet and this network is
attached to the NetDefendOS lan interface which has the IPv4 address lan_ip.
4.
Create an IPsec Tunnel object (let's call this object ipsec_tunnel). Specify the following tunnel
parameters:
•
Set Local Network to lannet.
•
Set Remote Network to remote_net.
•
Set Remote Endpoint to remote_gw.
•
Set Encapsulation mode to Tunnel.
•
Choose the IKE and IPsec algorithm proposal lists to be used.
•
For Authentication select the Pre-shared Key object defined in step (1) above.
The IPsec Tunnel object can be treated exactly like any NetDefendOS Interface object in later
steps.
5.
Set up two IP rules in the IP rule set for the tunnel:
•
An Allow rule for outbound traffic that has the previously defined ipsec_tunnel object as
the Destination Interface. The rule's Destination Network is the remote network
9.2.1. IPsec LAN to LAN with
Pre-shared Keys
Chapter 9. VPN
420
Summary of Contents for NetDefend DFL-1660
Page 28: ...1 3 NetDefendOS State Engine Packet Flow Chapter 1 NetDefendOS Overview 28 ...
Page 88: ...2 6 3 Restore to Factory Defaults Chapter 2 Management and Maintenance 88 ...
Page 166: ...3 10 DNS Chapter 3 Fundamentals 166 ...
Page 254: ...4 7 5 Advanced Settings for Transparent Mode Chapter 4 Routing 254 ...
Page 268: ...5 4 IP Pools Chapter 5 DHCP Services 268 ...
Page 368: ...6 7 Blacklisting Hosts and Networks Chapter 6 Security Mechanisms 368 ...
Page 390: ...7 4 7 SAT and FwdFast Rules Chapter 7 Address Translation 390 ...
Page 414: ...8 3 Customizing Authentication HTML Pages Chapter 8 User Authentication 414 ...
Page 490: ...9 8 6 Specific Symptoms Chapter 9 VPN 490 ...
Page 528: ...10 4 6 Setting Up SLB_SAT Rules Chapter 10 Traffic Management 528 ...
Page 544: ...11 7 HA Advanced Settings Chapter 11 High Availability 544 ...
Page 551: ...12 3 5 Limitations Chapter 12 ZoneDefense 551 ...
Page 574: ...Default 512 13 9 Miscellaneous Settings Chapter 13 Advanced Settings 574 ...
Page 575: ...13 9 Miscellaneous Settings Chapter 13 Advanced Settings 575 ...