SonicWALL VPN Page 141
•
Authenticate (AH SHA1)
uses AH to authenticate VPN communications and SHA1 to
generate a 160-bit message digest.
•
Authenticate (ESP MD5)
authenticates using ESP as the security protocol, no
encryption, and MD5 to generate a 128-bit message digest.
•
Authenticate (ESP SHA1)
authenticates using ESP as the security protocol, no
encryption, and SHA1 to generate a 160-bit message digest.
•
Encrypt and Authenticate (ESP DES HMAC SHA1)
uses 56-bit DES encryption and
HMAC SHA1 authentication.
9. Enter a alphanumeric “secret” in the
Shared Secret
field. The
Shared Secret
must match
the corresponding field in the remote SonicWALL. This field can range from 4 to 128
characters in length and is case sensitive.
10. Click
Add New Network...
to define the destination network addresses. Clicking
Add
New Network...
updates the VPN configuration and opens the
VPN Destination
Network
window.
11. Enter the IP address of the remote network in the
Network
field. This address is a private
address if the remote LAN has enabled NAT.
12. Enter the subnet mask of the remote network in the
Subnet mask
field.
13. Click
Update
to add the remote network and close the
VPN Destination Network
window. Once the SonicWALL has been updated, a message confirming the update is
displayed at the bottom of the browser window.
14. Click
Advanced Settings
and select the boxes that apply to your SA:
•
Use Aggressive Mode
- requires half of the main mode messages to be exchanged in
Phase 1 of the SA exchange.
•
Enable Keep Alive
- if you want to maintain the current connection by listening for traffic
on the network segment between the two connections.
•
Enable Windows Networking (NetBIOS) broadcast
- if remote clients use Windows
Network Neighborhood to browse remote networks.
•
Apply NAT and firewall rules -
to apply NAT and firewall rules to the SA or just firewall
rules if in Standard mode.
•
Forward packets to remote VPNs -
if creating a “hub and spoke” network configuration
•
Enable Perfect Forward Secrecy
- if you want to add another layer of security by adding
an additional Diffie-Hellman key exchange.
•
Phase 2 DH Group
- select the level of Phase 2 DH key exchange if
Perfect Forward
Secrecy
is enabled.
•
Default LAN Gateway
- if specifying the IP address of the default LAN route for incoming
IPSec packets for this SA. This is used in conjunction with the
Route all internet traffic
through this SA
check box.
15. Click
OK
to close the
Advanced Settings
window. Click
Update
to upload the changes
in the SonicWALL.