RUGGEDCOM ROX II
CLI User Guide
Chapter 6
Security
Configuring the Firewall for a VPN in a DMZ
189
5. Configure a host for the interface that carries the unencrypted IPsec traffic. Make sure the VPN zone is
associated with the interface. If VPN tunnels to multiple remote sites are required, make sure host entry
exists for each or collapse them into a single subnet. For more information about configuring hosts, refer to
Section 6.9.11, “Managing Hosts”
6. Configure a second host for the interface that carries the encrypted IPsec traffic. Make sure the interface is
associated with the network zone and specify a wider subnet mask, such as 0.0.0.0/0. For more information
about configuring hosts, refer to
Section 6.9.11, “Managing Hosts”
NOTE
The VPN host must be specified before the network host so the more specific VPN zone subnet can
be inspected first.
The following are examples of possible host configurations:
Host
Interface
Subnet
IPsec Zone
vpn
W1ppp
192.168.1.0/24
Yes
net
W1ppp
0.0.0.0/0
No
7. Configure rules with the following parameter settings for the UDP, Authentication Header (AH) and
Encapsulation Security Payload (ESP) protocols:
NOTE
The IPsec protocol operates on UDP port 500, using protocols Authentication Header (AH) and
Encapsulation Security Payload (ESP) protocols. The firewall must be configured to accept this
traffic in order to allow the IPsec protocol.
Action
Source-Zone
Destination-Zone
Protocol
Dest-Port
Accept
net
fw
ah
—
Accept
net
fw
esp
—
Accept
net
fw
udp
500
For more information about configuring rules, refer to
Section 6.9.15, “Managing Rules”
8. Configure the following rule to allow traffic from Libreswan, the IPsec daemon, to enter the firewall:
NOTE
IPsec traffic arriving at the firewall is directed to Libreswan, the IPsec daemon. Libreswan decrypts
the traffic and then forwards it back to the firewall on the same interface that originally received
it. A rule is required to allow traffic to enter the firewall from this interface.
Action
Source-Zone
Destination-Zone
Protocol
Dest-Port
Accept
vpn
loc
—
—
For more information about configuring rules, refer to
Section 6.9.15, “Managing Rules”
Section 6.9.7
Configuring the Firewall for a VPN in a DMZ
When the firewall needs to pass VPN traffic through to another device, such as a VPN device in a Demilitarized
Zone (DMZ), then a DMZ zone and special rules are required.
Содержание RUGGEDCOM ROX II
Страница 2: ...RUGGEDCOM ROX II CLI User Guide ii ...
Страница 4: ...RUGGEDCOM ROX II CLI User Guide iv ...
Страница 39: ...RUGGEDCOM ROX II CLI User Guide Table of Contents xxxix 19 5 VLANs 752 ...
Страница 40: ...Table of Contents RUGGEDCOM ROX II CLI User Guide xl ...
Страница 46: ...Preface RUGGEDCOM ROX II CLI User Guide xlvi Customer Support ...
Страница 96: ...Chapter 2 Using RUGGEDCOM ROX II RUGGEDCOM ROX II CLI User Guide 50 Accessing Maintenance Mode ...
Страница 170: ...Chapter 5 System Administration RUGGEDCOM ROX II CLI User Guide 124 Deleting a Scheduled Job ...
Страница 256: ...Chapter 6 Security RUGGEDCOM ROX II CLI User Guide 210 Enabling Disabling a Firewall ...
Страница 402: ...Chapter 11 Wireless RUGGEDCOM ROX II CLI User Guide 356 Managing Cellular Modem Profiles ...
Страница 646: ...Chapter 13 Unicast and Multicast Routing RUGGEDCOM ROX II CLI User Guide 600 Deleting a Multicast Group Prefix ...
Страница 732: ...Chapter 15 Network Discovery and Management RUGGEDCOM ROX II CLI User Guide 686 Viewing NETCONF Statistics ...
Страница 790: ...Chapter 17 Time Services RUGGEDCOM ROX II CLI User Guide 744 Deleting a Broadcast Multicast Address ...