background image

VPN Connection
to Nokia CryptoCluster 500
VPN Gateway

11 December 2002

This document explains how to configure a virtual private network
connection over an open network from a remote host running SSH
Sentinel to a private network protected by a Nokia CryptoCluster
500 VPN gateway.

Summary of Contents for CC500 - VPN - Gateway

Page 1: ...00 VPN Gateway 11 December 2002 This document explains how to configure a virtual private network connection over an open network from a remote host running SSH Sentinel to a private network protected by a Nokia CryptoCluster 500 VPN gateway ...

Page 2: ...e are trademarks of SSH Communications Security Corp and may be registered in certain jurisdictions All other names and marks are property of their respective owners THERE IS NO WARRANTY OF ANY KIND FOR THE ACCU RACY OR USEFULNESS OF THIS INFORMATION EXCEPT AS REQUIRED BY APPLICABLE LAW OR EXPRESSLY AGREED IN WRITING SSH Communications Security Corp Fredrikinkatu 42 FIN 00100 Helsinki FINLAND SSH ...

Page 3: ... 2 Platform Requirements 5 1 2 Configuring Nokia CryptoCluster 500 6 1 2 1 Prerequisites 6 1 2 2 Enabling Client Access in CryptoCluster 6 1 3 Configuring SSH Sentinel 9 1 3 1 Prerequisites 9 1 3 2 Creating the VPN Rule 9 1 4 Troubleshooting 11 VPN with SSH Sentinel and Nokia CryptoCluster c 2002 SSH Communications Security Corp ...

Page 4: ...4 CONTENTS c 2002 SSH Communications Security Corp VPN with SSH Sentinel and Nokia CryptoCluster ...

Page 5: ...figure other features of CC500 please refer to the Nokia CryptoCluster 500 CC500 VPN Gateway documentation 1 1 1 Further Information SSH Sentinel User Manual SSH Sentinel support http www ipsec com 1 1 2 Platform Requirements The interoperability between SSH Sentinel and Nokia CryptoCluster 500 has been tested using the following components SSH Sentinel VPN client v1 4 Nokia CryptoCluster 500 CC50...

Page 6: ...he CRL and SCEP settings in the Settings page A request for a gateway certificate can be created under Gateway Properties Certificates Device Certificates Note The client certificate used by SSH Sentinel needs to contain an e mail address in the SubjectAltName field Otherwise the CryptoCluster gateway will not accept the connection 1 2 2 Enabling Client Access in CryptoCluster To enable client acc...

Page 7: ...Sec settings 5 In the Client Policy view click Settings to configure the Client IKE Policy 6 Select Edit to modify an existing IKE policy or Add to create a new one Make the settings shown in Figure 1 4 CryptoCluster IKE Policy settings and click OK twice to close the dialogs 7 Click the Access tab in the Client Policy view and select the access policy that suits your needs This is likely to be Th...

Page 8: ...cate based authentication and add a new Certificate Clients entry as shown in Figure 1 5 CryptoCluster Client Access settings Figure 1 5 CryptoCluster Client Access settings 10 Take the new settings into use by selecting Actions Apply Changes in the Policy Manager main menu c 2002 SSH Communications Security Corp VPN with SSH Sentinel and Nokia CryptoCluster ...

Page 9: ...ce CRLs are not used in this example configuration Figure 1 6 Certificate properties of the CA certificate 1 3 2 Creating the VPN Rule 1 On the Security Policy page of the Policy Editor select VPN Connections and click Add to create a new VPN connection rule For detailed instructions see the SSH Sentinel User Manual Specify the following values see Figure 1 7 The general properties of the VPN conn...

Page 10: ...e legacy Figure 1 7 The general properties of the VPN connection 2 On the Rule properties dialog box under IPSec IKE proposal click Settings to specify the following IKE proposal Encryption algorithm 3DES Integrity function SHA 1 IKE mode main mode IKE group MODP 1024 group 2 IPSec proposal Encryption algorithm 3DES Integrity function HMAC SHA 1 IPSec mode tunnel PFS group MODP 1024 group 2 c 2002...

Page 11: ...ngs 5 Select the CryptoCluster VPN rule and click Diagnostics to probe the connection 6 Open the VPN tunnel via the SSH Sentinel tray icon 7 Ping the private interface of the router and verify that traffic goes through the VPN tunnel 1 4 Troubleshooting The audit logs and IKE log are available in SSH Sentinel for troubleshooting Refer to the SSH Sentinel User Manual for details VPN with SSH Sentin...

Reviews: