ZXSEC US IPSec VPN User Guide
ZXSEC US IPSec VPN User Guide
User Guide
Version 1.0
ZTE CORPORATION
ZTE Plaza, Keji Road South,
Hi-Tech Industrial Park,
Nanshan District, Shenzhen,
P. R. China
518057
Tel: (86) 755 26771900 800-9830-9830
Fax: (86) 755 26772236
URL: http://support.zte.com.cn
E-mail: doc@zte.com.cn
LEGAL INFORMATION
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
Revision History
Document
IPSec VPN User Guide
Name
Document Revision
Product Version V1.0 R1.0
Number
Equipment
Serial No. sjzly20081976
Installation Date
Presentation:
(Introductions, Procedures, Illustrations, Completeness, Level of Detail, Organization,
Appearance)
Good Fair Average Poor Bad N/A
Intelligibility:
(Language, Vocabulary, Readability & Clarity, Technical Accuracy, Content)
Good Fair Average Poor Bad N/A
Please check the suggestions which you feel can improve this documentation:
Improve the overview/introduction Make it more concise/brief
Improve the Contents Add more step-by-step procedures/tutorials
Improve the organization Add more troubleshooting information
Include more figures Make it less technical
Your Add more examples Add more/better quick reference aids
suggestions for Add more detail Improve the index
improvement of
this Other suggestions
documentation __________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
# Please feel free to write any comments on an attached sheet.
If you wish to be contacted regarding your comments, please complete the following:
Name Company
Postcode Address
Telephone E-mail
This page is intentionally blank.
Contents
Contents ..........................................................................5
Chapter 1......................................................................1
System Overview ............................................................1
Overview...............................................................................1
About ZXSEC US IPSec VPNs............................................. 1
Using the web-based manager and CLI to configure IPSec VPNs...2
About this document ........................................................ 3
Document conventions............................................................4
Typographic conventions .........................................................5
Chapter 2......................................................................7
Configuring IPSec VPNs ..................................................7
Overview...............................................................................7
IPSec VPN overview ......................................................... 7
Planning your VPN ........................................................... 8
Network topologies.................................................................8
Choosing policy-based or route-based VPNs ........................ 9
General preparation steps ............................................... 10
How to use this guide to configure an IPSec VPN ............... 10
Chapter 3....................................................................13
Gateway-to-gateway configurations ............................13
Overview ............................................................................ 13
Configuration overview ................................................... 13
Gateway-to-gateway infrastructure requirements .................... 15
General configuration steps............................................. 15
Configure the VPN peers ................................................. 16
Configuration example.................................................... 19
Define the phase 1 parameters on ZXSEC US_1 ...................... 19
Define the phase 2 parameters on ZXSEC US_1 ...................... 20
Define the firewall policy on ZXSEC US_1 ............................... 21
Configure ZXSEC US_2 ......................................................... 23
Chapter 4....................................................................27
Hub-and-spoke configurations ......................................27
Overview ............................................................................ 27
Configuration overview ................................................... 27
Hub-and-spoke infrastructure requirements ............................ 28
General configuration steps............................................. 28
Configure the hub .......................................................... 30
Define the spoke VPN configurations ...................................... 30
Configuring communication between spokes (policy-based VPN) 32
Configuring communication between spokes (route-based VPN) 32
Using a zone as a concentrator.............................................. 33
Using a zone with a policy as a concentrator ........................... 33
Using firewall policies as a concentrator.................................. 34
Configure the spokes...................................................... 34
Configuring firewall policies for hub-to-spoke communication .... 35
Configuring firewall policies for spoke-to-spoke communication . 36
Chapter 5....................................................................63
Dynamic DNS configurations ........................................63
Overview............................................................................. 63
Configuration overview ................................................... 63
Dynamic DNS infrastructure requirements ............................... 65
General configuration steps............................................. 65
Configure the dynamically-addressed VPN peer ................. 66
Configure the fixed-address VPN peer .............................. 68
Chapter 6....................................................................71
US Desktop dialup-client ...............................................71
Overview............................................................................. 71
Configuration overview ................................................... 71
Peer identification................................................................. 72
Automatic configuration of US Desktop dialup clients ................ 73
How the ZXSEC US unit determines which settings to apply....... 73
Using virtual IP addresses ..................................................... 74
US Desktop dialup-client infrastructure requirements................ 76
US Desktop-to-ZXSEC US VPN configuration steps ............. 76
Configure the ZXSEC US unit........................................... 77
Configuring ZXSEC US unit VPN settings ................................. 78
Configuring the ZXSEC US unit as a VPN policy server .............. 80
Configuring DHCP service on the ZXSEC US unit ...................... 81
Configure the US Desktop Host Security application ........... 83
Configuring US Desktop to work with VPN policy distribution...... 83
Configuring US Desktop manually........................................... 83
Chapter 7....................................................................91
ZXSEC US dialup-client..................................................91
Overview ............................................................................ 91
Chapter 8..................................................................101
Internet-browsing configuration.................................101
Overview ...........................................................................101
Configuration overview ................................................. 101
Creating an Internet browsing firewall policy ................... 103
Routing all remote traffic through the VPN tunnel ............ 104
Configuring a ZXSEC US remote peer to support Internet browsing
........................................................................................104
Configuring a US Desktop application to support Internet browsing
........................................................................................105
Chapter 9..................................................................107
Redundant VPN configurations ...................................107
Overview ...........................................................................107
Configuration overview ................................................. 107
Redundant infrastructure requirements .................................108
General configuration steps - route-based VPN ................ 109
Configure the VPN peers - route-based VPN .................... 109
Redundant route-based VPN configuration example.......... 111
Configuring ZXSEC US_1 .....................................................112
Configuring ZXSEC US_2..................................................... 117
General configuration steps - policy-based VPN ............... 123
Configure the VPN peers - policy-based VPN.................... 123
Policy-based redundant tunnel configuration example....... 125
Configuring ZXSEC US_1..................................................... 126
Define the phase 1 parameters ............................................ 127
Define the phase 2 parameters ............................................ 128
Define the IPSec firewall policies .......................................... 129
Configuring the ping servers ................................................ 131
Configuring ZXSEC US_2..................................................... 131
Chapter 10.............................................................145
Transparent VPN configurations.................................145
Overview........................................................................... 145
Configuration overview ................................................. 145
Transparent VPN infrastructure requirements......................... 148
Before you begin ................................................................ 149
Configure the VPN peers ............................................... 149
Chapter 11.............................................................153
Manual-key configurations..........................................153
Overview........................................................................... 153
Configuration overview ................................................. 153
Specify the manual keys for creating a tunnel ................. 154
Chapter 12.............................................................157
Auto Key phase 1 parameters.....................................157
Overview........................................................................... 157
Defining the tunnel ends............................................... 158
Choosing main mode or aggressive mode ....................... 159
Authenticating the ZXSEC US unit.................................. 159
Authenticating the ZXSEC US unit with digital certificates ........160
Authenticating the ZXSEC US unit with a pre-shared key .........161
Authenticating remote peers and clients ......................... 163
Enabling VPN access for specific certificate holders .................163
Before you begin ................................................................164
Enabling VPN access by peer identifier...................................166
Enabling VPN access using user accounts and pre-shared keys .167
Defining IKE negotiation parameters .............................. 169
Generating keys to authenticate an exchange ........................170
Defining IKE negotiation parameters .....................................171
Defining the remaining phase 1 options .......................... 172
NAT traversal .....................................................................173
NAT keepalive frequency .....................................................173
Dead peer detection ............................................................173
Using XAuth authentication ........................................... 174
Using the ZXSEC US unit as an XAUTH server ........................174
Authenticating the ZXSEC US unit as a client with XAUTH ........175
Chapter 13.............................................................177
Phase 2 parameters ....................................................177
Overview ...........................................................................177
Chapter 14.............................................................185
Defining firewall policies.............................................185
Overview........................................................................... 185
Defining firewall addresses............................................ 185
Defining firewall policies ............................................... 186
Defining an IPSec firewall policy for a policy-based VPN .......... 187
Before you begin ................................................................ 188
Defining multiple IPSec policies for the same tunnel ............... 189
Defining firewall policies for a route-based VPN ...................... 190
Chapter 15.............................................................193
Monitoring and testing VPNs ......................................193
Overview........................................................................... 193
Monitoring VPN connections .......................................... 193
Monitoring connections to remote peers ................................ 193
Monitoring dialup IPSec connections ..................................... 194
Monitoring IKE sessions ................................................ 195
Testing VPN connections ............................................... 196
Logging VPN events ..................................................... 196
VPN troubleshooting tips............................................... 199
A word about NAT devices ................................................... 200
Tables ..........................................................................201
Figures.........................................................................203
Index ...........................................................................205
This page is intentionally blank.
About This Manual
Purpose
This manual is ZXSEC US IPSec VPN User Guide. It is written for
the ZXSEC US IPSec VPN system. This manual is intended for
the system user and other management personnel who are
related to the system.
Intended Audience
This manual is intended for users and technicians who perform
operation activities on the ZXSEC US IPSec VPN.
Chapter Summary
Chapter 1, System Introduce the overall information of the
Overview IPSec VPN system.
Chapter 2, Configuring provide a brief overview of IPSec
IPSec VPNs technology and includes general
information about how to configure IPSec
VPNs using this guide.
Chapter 3, Gateway-to- Explain how to set up a basic gateway-to-
gateway configurations gateway (site-to-site) IPSec VPN.
Chapter 4, Hub-and- Describe how to set up hub-and-spoke
spoke configurations IPSec VPNs consisting of VPN peers and/or
US Desktop dialup clients.
Chapter 5, Dynamic Describe how to configure a site-to-site
DNS configurations VPN, in which one ZXSEC US unit has a
static IP address and the other ZXSEC US
unit has a static domain name and a
dynamic IP address.
Chapter Summary
Chapter 6, US Desktop The US Desktop Host Security application
dialup-client is a VPN client with antivirus, antispam
configurations and firewall capabilities. This section
explains how to configure dialup VPN
connections between a ZXSEC US unit and
one or more US Desktop Host Security
applications.
Chapter 7, ZXSEC US Explain how to set up a ZXSEC US dialup-
dialup-client client IPSec VPN. In a ZXSEC US dialup-
configuration client configuration, a ZXSEC US unit with
a static IP address acts as a dialup server
and a ZXSEC US unit having a dynamic IP
address initiates a VPN tunnel with the
ZXSEC US dialup server.
Chapter 8, Internet- Explain how to support secure web
browsing configuration browsing performed by dialup VPN clients,
and/or hosts behind a remote VPN peer.
Remote users can access the private
network behind the local ZXSEC US unit
and browse the Internet securely. All
traffic generated remotely is subject to the
firewall policy that controls traffic on the
private network behind the local ZXSEC US
unit.
Chapter 9, Redundant Discusse the options for supporting
VPN configurations redundant and partially redundant IPSec
VPNs. Both policy-based and route-based
approaches are shown.
Chapter 10, Describe transparent VPN configurations,
Transparent VPN in which two ZXSEC US units create a VPN
configurations tunnel between two separate private
networks transparently.
Chapter Summary
Chapter 14, Defining Explain how to specify the source and
firewall policies destination IP addresses of traffic
transmitted through an IPSec VPN, and
how to define appropriate firewall policies.
Chapter 15, Monitoring Provide some general maintenance and
and testing VPNs monitoring procedures for VPNs.
Conventions
Typographic ZTE documents employ the following typographical conventions.
al
Conventions T ABLE 2 TYPOGRAPHICAL CONVENTIONS
Typeface Meaning
Italics References to other Manuals and documents.
“
Quotes” Links on screens.
Bold Menus, menu options, function names, input
fields, radio button names, check boxes, drop-
down lists, dialog box names, window names.
CAPS Keys on the keyboard and buttons on screens
and company name.
Constant width Text that you type, program code, files and
directory names, and function names.
[] Optional parameters.
{} Mandatory parameters.
| Select one of the parameters that are delimited
by it.
Note: Provides additional information about a
certain topic.
System Overview
Overview
This chapter introduces you to ZXSEC US VPNs and the following
topics:
About ZXSEC US IPSec VPNs
About this document
ZTE documentation
Customer service and technical support
Document conventions
The following document conventions are used in this guide:
In the examples, private IP addresses are used for both
private and public IP addresses.
Notes and Cautions are used to provide important
information:
Typographic conventions
ZXSEC US documentation uses the following typographical
conventions:
Convention Example
In the Gateway Name field, type a name for
the remote VPN
Keyboard input
peer or client (for example,
Central_Office_1).
config vpn ipsec phase2
Code examples edit US1toDialupClients
set single-source enable end
config vpn ipsec phase2
CLI command edit <tunnel_name>
syntax
set single-source enable end
Variables <tunnel_name>
Overview
This section provides a brief overview of IPSec technology and
includes general information about how to configure IPSec
VPNs using this guide.
The following topics are included in this section:
Network topologies
The topology of your network will determine how remote peers
and clients connect
to the VPN and how VPN traffic is routed. You can read about
various network topologies and find the high-level procedures
needed to configure IPSec VPNs in one of these sections:
1. Gateway-to-gateway configurations
2. Hub-and-spoke configurations
3. Dynamic DNS configurations
4. US Desktop dialup-client configurations
5. ZXSEC US dialup-client configurations
6. Internet-browsing configuration
7. Redundant VPN configurations
8. Transparent VPN configurations
9. Manual-key configurations
Choosing policy-based or
route-based VPNs
T A B L E 5 C O M PA RI SO N O F P OL I C Y - B A S ED A N D R O U T E - B A S ED V P N S
Policy-based Route-based
Available in NAT/Route or
Available only in NAT/Route mode
Transparent mode
Requires a firewall policy with Requires only a simple firewall
IPSEC action that specifies the policy with ACCEPT action. A
VPN tunnel. One policy controls separate policy is required for
connections in both directions. connections in each direction.
Gateway-to-gateway
configurations
Overview
This section explains how to set up a basic gateway-to-
gateway (site-to-site) IPSec VPN.
The following topics are included in this section:
Configuration overview
General configuration steps
Configure the VPN peers
Configuration example
Configuration overview
In a gateway-to-gateway configuration, two ZXSEC US units
create a VPN tunnel between two separate private networks.
All traffic between the two networks is encrypted and
protected by ZXSEC US firewall policies.
F I G U R E 1 E X A MP L E G A T EW A Y- T O - G AT E W AY C O N F I G U RA T I O N
Gateway-to-gateway infrastructure
requirements
The ZXSEC US units at both ends of the tunnel must be
operating in NAT/Route mode and have static public IP
addresses.
Source Interface/Zone
Select the interface that connects to the private network
behind this ZXSEC US unit.
Source Address Name
Select the address name that you defined in Step 3 for the
private network behind this ZXSEC US unit.
Destination Interface/Zone
Select the VPN Tunnel (IPSec Interface) you configured in Step
1.
Destination Address Name
Select the address name that you defined in Step 3 for the
private network behind the remote peer.
Action
Select ACCEPT.
NAT
Disable.
To permit the remote client to initiate communication, you
need to define a firewall policy for communication in that
direction. Enter these settings in particular:
Source Interface/Zone
Select the VPN Tunnel (IPSec Interface) you configured in Step
1.
Source Address Name
Select the address name that you defined in Step 3 for the
private network behind the remote peer.
Destination Interface/Zone
Select the interface that connects to the private network
behind this ZXSEC US unit.
Destination Address Name
Select the address name that you defined in Step 3 for the
private network behind this ZXSEC US unit.
Action
Select ACCEPT.
NAT
Disable.
5. Place VPN policies in the policy list above any other policies
having similar source and destination addresses.
6. Repeat this procedure at the remote ZXSEC US unit.
Configuration example
The following example demonstrates how to set up a basic
gateway-to-gateway IPSec VPN that uses preshared keys to
authenticate the two VPN peers.
F I G U R E 4 E X A MP L E G A T EW A Y- T O - G AT E W AY C O N F I G U RA T I O N
Name
Type a name to identify the VPN tunnel (for example,
US1toUS2_Tunnel).
Remote Gateway
Static IP Address
IP Address
172.16.30.1
Local Interface
Port 2
Mode
Main
Authentication Method
Preshared Key
Pre-shared Key
Enter the preshared key.
Peer Options
Accept any peer ID Advanced
Advanced
Enable IPSec
Enable to create a route-based VPN.
Interface Mode
Disable to create a policy-based VPN.
This example shows both policy and route-based VPNs.
Phase 1
Select the Phase 1 configuration that you defined previously
(for example, US1toUS2_Tunnel).
4. Place the policies in the policy list above any other policies
having similar source and destination addresses.
Hub-and-spoke
configurations
Overview
This section describes how to set up hub-and-spoke IPSec VPNs
consisting of VPN peers and/or US Desktop dialup clients.
The following topics are included in this section:
Configuration overview
General configuration steps
Configure the hub
Configure the spokes
Basic configuration example
US Desktop in hub-and-spoke VPN example
Configuration overview
In a hub-and-spoke configuration, connections to a number of
remote peers and/or clients radiate from a single, central ZXSEC
US unit. Site-to-site connections between the remote peers
and/or clients do not exist; however, VPN tunnels between the
remote peers and/or clients can be established through the
ZXSEC US unit “ hub”.
In a hub-and-spoke network, all VPN tunnels terminate at the
hub. The peers and/or clients that connect to the hub are known
as “spokes”. The hub functions as a concentrator on the network,
managing all VPN connections between the spokes. VPN traffic
passes from one tunnel to the other through the hub.
Hub-and-spoke infrastructure
requirements
The ZXSEC US hub must be operating in NAT/Route mode
and have a static public IP address.
Spokes may have static IP addresses, dynamic IP
addresses (refer to “US Desktop dialup-client
configurations” and/or “ZXSEC US dialup-client
configurations”), or static domain names and dynamic IP
addresses (refer to “Dynamic DNS configurations” ).
3. Place the policy in the policy list above any other policies
having similar source and destination addresses.
To define the IPSec firewall policy for hub-to-Spoke_2
traffic
1. Go to Firewall > Policy.
2. Select Create New, enter the following information, and select
OK:
Source Interface/Zone
Select the interface to the HR network.
Address Name
HR_Network
Destination Interface/Zone
Select the interface to the external (public) network.
Address Name
Site_2
Schedule As required. Service As required. Action IPSEC
VPN Tunnel US1toSP2_Tunnel
Configure Spoke_1
The Spoke_1 configuration requires the following settings:
phase 1 authentication parameters to initiate a connection
with the hub
phase 2 tunnel creation parameters to establish a VPN
tunnel with the hub
a source address that represents the network behind
Spoke_1
a destination address that represents the HR network
behind the hub
an IPSec firewall policy to enable communications
between Spoke_1 and the hub
a destination address that represents the network behind
Spoke_2
an IPSec firewall policy to enable communications
between Spoke_1 and Spoke_2
To define the phase 1 parameters
1. At Spoke_1, go to VPN > IPSEC > Auto Key.
2. Select Create Phase 1, enter the following information, and
select OK:
Name Type a name for the hub (for example, ZXSEC US_1).
Site_1
Destination Interface/Zone
Select the interface to the external (public) network.
Address Name
HR_Network
Schedule As required.
Service As required.
Action IPSEC
VPN Tunnel SP1toUS1_Tunnel
3. Place the policy in the policy list above any other policies
having similar source and destination addresses.
To specify the IP address of the network behind Spoke_2
1. Go to Firewall > Address.
2. Select Create New, enter the following information, and select
OK:
Address Name Enter an address name (for example, Site_2).
Subnet/IP Range Enter the IP address of the network behind
Spoke_2 (for example, 192.168.44.0/24).
3. Place the policy in the policy list above any other policies
having similar source and destination addresses.
Configure Spoke_2
The Spoke_2 configuration requires the following settings:
phase 1 authentication parameters to initiate a connection
with the hub
phase 2 tunnel creation parameters to establish a VPN
tunnel with the hub
a source address that represents the network behind
Spoke_2
a destination address that represents the HR network
behind the hub
an IPSec firewall policy to enable communications
between Spoke_2 and the hub
a destination address that represents the network behind
Spoke_1
an IPSec firewall policy to enable communications
between Spoke_2 and Spoke_1
To define the phase 1 parameters
1. At Spoke_2, go to VPN > IPSEC > Auto Key.
2. Select Create Phase 1, enter the following information, and
select OK:
Name Type a name for the hub (for example, ZXSEC US_1).
Remote Gateway Static IP Address
IP Address 172.16.10.1
Local Interface Internal
Mode Main
Authentication Method Preshared Key
Pre-shared Key Enter the preshared key. The value must be
identical to the preshared key that you specified previously in the
ZXSEC US_1 configuration.
Peer Options Accept any peer ID
3. Place the policy in the policy list above any other policies
having similar source and destination addresses.
To specify the IP address of the network behind Spoke_1
1. Go to Firewall > Address.
2. Select Create New, enter the following information, and select
OK:
Address Name Enter an address name (for example, Site_1).
3. Place the policy in the policy list above any other policies
having similar source and destination addresses.
US Desktop in hub-and-
spoke VPN example
This example that demonstrates how to include US Desktop
dialup clients in a basic hub-and-spoke IPSec VPN. The VPN peers
and clients use preshared keys for authentication purposes.
Note: More than one dialup client can connect to the same
VPN tunnel. When you need to configure access for a group of
dialup clients, assign a VIP address to each dialup client from a
subnet comprising VIP addresses (for example,
10.254.254.0/24). As an alternative, you may configure a VIP
address range (for example, 10.254.254.[100-110]).
In the example, VIP addresses are assigned to the dialup clients
manually. When a VIP address is assigned, the US Desktop Host
Security application and the ZXSEC US unit both use the VIP
address as the IP address of the US Desktop dialup client for the
duration of the connection. As a result, when the ZXSEC US unit
receives a packet from a US Desktop dialup client that has a VIP
address, the source address in the encrypted packet IP header
will be the VIP address used by the US Desktop Host Security
application.
Assigning VIP addresses manually enables you to create an IPSec
firewall policy that allows connections from a specific VIP address,
a VIP address range, or a subnet address comprising VIP
addresses.
Configuring Spoke_1
The Spoke_1 configuration requires the following settings:
phase 1 authentication parameters to initiate a connection
with the hub
phase 2 tunnel creation parameters to establish a VPN tunnel
with the hub
a source address that represents the network behind
Spoke_1
a destination address that represents the HR network behind
the hub
an IPSec firewall policy to enable communications between
Spoke_1 and the hub
a destination address that represents the network behind
Spoke_2
an IPSec firewall policy to enable communications between
Spoke_1 and Spoke_2
a destination address that represents the VIP addresses
assigned to US Desktop dialup clients
an IPSec firewall policy to enable communications between
Spoke_1 and the US Desktop dialup clients
To define the phase 1 parameters
1. At Spoke_1, go to VPN > IPSEC > Auto Key.
Configuring Spoke_2
The Spoke_2 configuration requires the following settings:
phase 1 authentication parameters to initiate a connection
with the hub
phase 2 tunnel creation parameters to establish a VPN
tunnel with the hub
a source address that represents the network behind
Spoke_2
a destination address that represents the HR network
behind the hub
an IPSec firewall policy to enable communications
between Spoke_2 and the hub
Destination Interface/Zone
Select the interface to the external (public) network.
Address Name
Site_1
Schedule As required.
Service As required.
Action IP
VPN Tunnel SP2toUS1_Tunnel
14. In the IP and Subnet Mask fields, type the IP address of the
private network behind Spoke_1 (for example,
192.168.33.0/255.255.255.0) and select OK.
15. In the Remote Network group, select Add.
16. In the IP and Subnet Mask fields, type the IP address of the
private network behind Spoke_2 (for example,
192.168.44.0/255.255.255.0) and select OK.
17. Select OK twice to close the dialog boxes.
18. Exit US Desktop and repeat this procedure at all other remote
US Desktop hosts. When you assign a VIP address to the next
remote US Desktop host in Step 10, ensure that you use a
different VIP address from the designated VIP network.
Dynamic DNS
configurations
Overview
This section describes how to configure a site-to-site VPN, in
which one ZXSEC US unit has a static IP address and the other
ZXSEC US unit has a static domain name and a dynamic IP
address.
The following topics are included in this section:
Configuration overview
General configuration steps
Configure the dynamically-addressed VPN peer
Configure the fixed-address VPN peer
Configuration overview
In this type of scenario, one of the ZXSEC US units in a gateway-
to-gateway configuration has a static domain name (for example,
example.com) and a dynamic IP address. Refer to ZXSEC US_2
in Figure 8. Whenever that ZXSEC US unit connects to the
Internet (and possibly also at predefined intervals set by the ISP),
the ISP may assign a different IP address to the ZXSEC US unit.
Therefore, remote peers have to locate the ZXSEC US unit
through DNS lookup.
F I G U R E 8 E X A MP L E D Y N AM I C D N S C O N F I G U RA T I O N
US Desktop dialup-client
configurations
Overview
The US Desktop Host Security application is a VPN client with
antivirus, antispam and firewall capabilities. This section explains
how to configure dialup VPN connections between a ZXSEC US
unit and one or more US Desktop Host Security applications.
US Desktop users are usually mobile or remote users who need
to connect to a private network behind a ZXSEC US unit. For
example, the users might be employees who connect to the
office network while traveling or from their homes.
For greatest ease of use, the US Desktop application can
download the VPN settings from the ZXSEC US unit to configure
itself automatically. This section covers both automatic and
manual configuration.
Configuration overview
Dialup users typically obtain dynamic IP addresses from an ISP
through Dynamic Host Configuration Protocol (DHCP) or Point-to-
Point Protocol over Ethernet (PPPoE). Then, the US Desktop Host
F I G U R E 9 E X A MP L E U S D E S K T O P D IALU P- CL I E N T CON FI G U R AT I O N
Peer identification
The US Desktop application can establish an IPSec tunnel with a
ZXSEC US unit configured to act as a dialup server. When the
ZXSEC US unit acts as a dialup server, it does not identify the
client using the phase 1 remote gateway address. The IPSec
tunnel is established if authentication is successful and the IPSec
firewall policy associated with the tunnel permits access. There
are several different ways to authenticate dialup clients and
restrict access to private networks based on client credentials.
For more information, refer to “ Authenticating remote peers and
clients”.
Automatic configuration of US
Desktop dialup clients
The US Desktop application can obtain its VPN settings from the
ZXSEC US VPN server. US Desktop users need to know only the
ZXSEC US VPN server IP address and their user name and
password on the ZXSEC US unit.
The ZXSEC US unit listens for VPN policy requests from clients on
TCP port 8900. When the dialup client connects:
The client initiates a Secure Sockets Layer (SSL)
connection to the ZXSEC US unit.
The ZXSEC US unit requests a user name and password
from the US Desktop user. Using these credentials, it
authenticates the client and determines which VPN policy
applies to the client.
Provided that authentication is successful, the ZXSEC US
unit downloads a VPN policy to the client over the SSL
connection. The information includes IPSec phase 1 and
phase 2 settings, and the IP addresses of the private
networks that the client is authorized to access.
The client uses the VPN policy settings to establish an
IPSec phase 1 connection and phase 2 tunnel with the
ZXSEC US unit.
Note:
To determine the VIP address that the US Desktop Host Security
application is using, type ipconfig/all at the Windows
Command Prompt on the US Desktop host. The output will also
show the IP address that has been assigned to the host Network
Interface Card (NIC).
It is best to assign VIPs using DHCP over IPSec. The ZXSEC US
dialup server can act as a DHCP server or relay requests to an
external DHCP server. You can also configure VIPs manually on
US Desktop applications, but it is more difficult to ensure that all
clients use unique addresses.
Note:
If you assign a VIP on the private network behind the ZXSEC US
unit and enable DHCP-IPsec (a phase 2 advanced option), the
ZXSEC US unit acts as a proxy on the local private network for
the US Desktop dialup client. Whenever a host on the network
behind the dialup server issues an ARP request for the device
MAC address of the US Desktop host, the ZXSEC US unit
answers the ARP request on behalf of the US Desktop host and
forwards the associated traffic to the US Desktop host through
the tunnel. For more information, refer to “
DHCP-IPsec”
.
US Desktop dialup-client
infrastructure requirements
To support policy-based VPNs, the ZXSEC US dialup
server may operate in either NAT/Route mode or
Transparent mode. NAT/Route mode is required if you
want to create a route-based VPN.
If the US Desktop dialup clients will be configured to
obtain VIP addresses through ZXSEC US DHCP relay, a
DHCP server must be available on the network behind the
ZXSEC US unit and the DHCP server must have a direct
route to the ZXSEC US unit.
If the ZXSEC US interface to the private network is not
the default gateway, the private network behind the
ZXSEC US unit must be configured to route IP traffic
destined for dialup clients back (through an appropriate
gateway) to the ZXSEC US interface to the private
network. As an alternative, you can configure the IPSec
firewall policy on the ZXSEC US unit to perform inbound
NAT on IP packets. Inbound NAT translates the source
addresses of inbound decrypted packets into the IP
address of the ZXSEC US interface to the local private
network.
US Desktop-to-ZXSEC US
VPN configuration steps
Configuring dialup client capability for US Desktop dialup clients
involves the following general configuration steps:
If you will be using VIP addresses to identify dialup clients,
determine which VIP addresses to use. As a precaution,
consider using VIP addresses that are not commonly used.
Configure the ZXSEC US unit to act as a dialup server.
Refer to “
Configure the ZXSEC US unit”
.
If the dialup clients will be configured to obtain VIP
addresses through DHCP over IPSec, configure the ZXSEC
US unit to act as a DHCP server or to relay DHCP requests
to an external DHCP server.
Configure the dialup clients. Refer to “
Configure the US
Desktop Host Security application”.
Note:
When a ZXSEC US unit has been configured to accept
connections from US Desktop dialup-clients, you can optionally
arrange to have an IPSec VPN configuration downloaded to
ZXSEC US dialup clients automatically. For more information,
refer to “
Configuring the ZXSEC US unit as a VPN policy server”
.
Note:
To accept connections from US Desktop evaluation version
applications, you must select DES for encryption and MD5 for
authentication.
NAT Disable.
If you want to allow hosts on the private network to initiate
communications with the US Desktop users after the tunnel is
established, you need to define a firewall policy for
communication in that direction. Enter these settings in particular:
Source Interface/Zone Select the interface that connects to
the private network behind this ZXSEC US unit.
Source Address Name Select All.
Destination Interface/Zone Select the VPN Tunnel (IPSec
Interface) you configured in Step 1.
Destination Address Name Select All.
Action Select ACCEPT.
NAT Disable.
5. Place VPN policies in the policy list above any other policies
having similar source and destination addresses.
network behind the ZXSEC US unit (for example, if the dialup clients
need to access a host on local subnet 192.168.12.0/24, you could
configure the DHCP server to assign any VIP address in the
10.254.254.100 to 10.254.254.125 range). If you need to exclude
specific IP addresses from the range, you can define an exclusion
range (refer to Advanced below).
Network Mask Enter the network mask of the IP addresses that
you specified in the IP Range fields (for example, 255.255.255.0 for
a class C network).
Default Gateway Enter the IP address of the default gateway that
the DHCP server assigns to DHCP clients.
Domain If you want the ZXSEC US unit to assign a domain name
to dialup clients when they connect, enter the registered domain
name.
Lease Time Specify a lease time:
US Desktop dialup-client
configuration example
This example demonstrates how to set up a US Desktop dialup-
client IPSec VPN that uses preshared keys for authentication
purposes. In the example configuration, the DHCP over IPSec
feature is enabled in the US Desktop Host Security application so
that the US Desktop Host Security application can acquire a VIP
address through ZXSEC US DHCP relay.
F I G U R E 1 1 E X A MP L E U S D E S K T O P D IALU P- CL I E N T CON FI G U R AT I O N
Mode Main
Authentication Method Preshared Key
Pre-shared Key Enter the preshared key.
Peer Options Accept any peer ID
Advanced
Enable IPSec Disable
Interface Mode
12. Exit US Desktop and repeat this procedure at all other remote
hosts.
ZXSEC US dialup-client
configuration
Overview
This section explains how to set up a ZXSEC US dialup-client
IPSec VPN. In a ZXSEC US dialup-client configuration, a ZXSEC
US unit with a static IP address acts as a dialup server and a
ZXSEC US unit having a dynamic IP address initiates a VPN
tunnel with the ZXSEC US dialup server.
The following topics are included in this section:
Configuration overview
ZXSEC US dialup-client configuration steps
Configure the dialup server to accept ZXSEC US dialup-client
connections
Configure the ZXSEC US dialup client
Configuration overview
A dialup client can be a ZXSEC US unit—the ZXSEC US dialup
client typically obtains a dynamic IP address from an ISP through
the Dynamic Host Configuration Protocol (DHCP) or Point-to-Point
Protocol over Ethernet (PPPoE) before initiating a connection to a
ZXSEC US dialup server.
F I G U R E 1 2 E XAMPL E ZXSEC US D IA LU P- CL I EN T CO NF I GU R A TI O N
ZXSEC US dialup-client
infrastructure requirements
To support a policy-based VPN, the ZXSEC US dialup server
may operate in either NAT/Route mode or Transparent mode.
ZXSEC US dialup-client
configuration steps
The procedures in this section assume that computers on the
private network behind the ZXSEC US dialup client obtain IP
addresses from a local DHCP server. The assigned IP addresses
do not match the private network behind the ZXSEC US dialup
server.
5. Place the policy in the policy list above any other policies
having similar source and destination addresses.
Internet-browsing
configuration
Overview
This section explains how to support secure web browsing
performed by dialup VPN clients, and/or hosts behind a remote
VPN peer. Remote users can access the private network behind
the local ZXSEC US unit and browse the Internet securely. All
traffic generated remotely is subject to the firewall policy that
controls traffic on the private network behind the local ZXSEC US
unit.
The following topics are included in this section:
Configuration overview
Creating an Internet browsing firewall policy
Routing all remote traffic through the VPN tunnel
Configuration overview
A VPN provides secure access to a private network behind the
ZXSEC US unit. You can also enable VPN clients to access the
Internet securely. The ZXSEC US unit inspects and processes all
traffic between the VPN clients and hosts on the Internet
according to the Internet browsing policy. This is accomplished
even though the same ZXSEC US interface is used for both
encrypted VPN client traffic and unencrypted Internet traffic.
In Figure 14, ZXSEC US_1 enables secure Internet browsing for
US Desktop Host Security users such as Dialup_1 and users on
the Site_2 network behind ZXSEC US_2, which could be a VPN
peer or a dialup client.
F I G U R E 1 4 E X A MP L E I N T E R N E T - B ROW S I N G CON F I G U RA T I O N
Creating an Internet
browsing firewall policy
On the ZXSEC US unit that acts as a VPN server and will provide
secure access to the Internet, you must create an Internet
browsing firewall policy. This policy differs depending on whether
your gateway-to-gateway configuration is policy- based or route-
based.
To create an Internet browsing policy - policy-based VPN
1. Go to Firewall > Policy.
2. Select Create New, enter the following information and then
select OK:
Source Interface The interface to which the VPN tunnel is bound.
Source Address Name The address of the remote ZXSEC US
gateway. Destination Interface The interface to which the VPN
tunnel is bound. (Same as Source Address).
Destination Address Name All
Schedule As required.
Service As required.
Action IPSEC
VPN Tunnel Select the tunnel that provides access to the private
network behind the ZXSEC US unit.
Protection Profile Select the protection profile that you want to
apply to Internet access.
Allow Inbound Enable
Allow Outbound Enable
Inbound NAT Enable Configure other settings as needed.
To create an Internet browsing policy - route-based VPN
1. Go to Firewall > Policy.
2. Select Create New, enter the following information and then
select OK:
Source Interface The IPSec VPN interface.
Source Address Name All
Destination Interface The interface that connects to the
Internet. The virtual IPSec interface is configured on this physical
interface.
Destination Address Name All
Schedule As required.
Service As required.
Action ACCEPT NAT Enable
Protection Profile Select the protection profile that you want to
apply to Internet access.
Configuring a US Desktop
application to support Internet
browsing
By default, the US Desktop application configures the PC so that
traffic destined for the remote protected network passes through
the VPN tunnel but all other traffic is sent to the default gateway.
You need to modify the US Desktop settings so that it configures
the PC to route all outbound traffic through the VPN.
To route all traffic through VPN - US Desktop application
1. At the remote host, start US Desktop.
2. Go to VPN > Connections.
3. Select the definition that connects US Desktop to the ZXSEC
US dialup server.
4. Select Advanced and then select Edit.
5. In the Edit Connection dialog box, select Advanced.
6. In the Remote Network group, select Add.
7. In the IP and Subnet Mask fields, type 0.0.0.0/0.0.0.0 and
select OK. The address is added to the Remote Network list.
The first destination IP address in the list establishes a VPN
tunnel. The second destination address (0.0.0.0/0.0.0.0 in
this case) forces all other traffic through the VPN tunnel.
8. Select OK twice to close the dialog boxes.
Redundant VPN
configurations
Overview
This section discusses the options for supporting redundant and
partially redundant IPSec VPNs. Both policy-based and route-
based approaches are shown.
The following topics are included in this section:
Configuration overview
General configuration steps - route-based VPN
Configure the VPN peers - route-based VPN
Redundant route-based VPN configuration example
General configuration steps - policy-based VPN
Configure the VPN peers - policy-based VPN
Policy-based redundant tunnel configuration example
Partially redundant tunnel configuration example
Configuration overview
A ZXSEC US unit can be configured to support redundant VPNs to
the same remote peer if the ZXSEC US unit has more than one
interface to the Internet. In a fully redundant configuration, the
remote peer must have the same number of Internet
connections.
When more than one public ZXSEC US interface is available, you
can configure more than one VPN to ensure that a remote peer
can access the ZXSEC US unit should the primary connection fail.
If the primary connection fails, the ZXSEC US unit can establish a
VPN using the redundant connection.
F I G U R E 1 5 E XA M P LE R ED U N D A N T - T U N N E L CON F I G U RA T I O N
Redundant infrastructure
requirements
Both VPN peers must have at least two public interfaces
and have static IP addresses for each public interface.
Both VPN peers must be operating in NAT/Route mode.
F I G U R E 1 6 E X A MP L E R E DUNDANT R O UT E - BA S E D V P N C ONFI GU R AT I ON
For each path, VPN configuration, firewall policies and routing are
defined. By specifying a different routing distance for each path,
the paths are prioritized. A VPN tunnel is established on each
path, but only the highest priority one is used.
If the highest priority path goes down, the traffic is automatically
routed over the next highest priority path. You could use dynamic
routing, but to keep this example simple, static routing is used.
3. Select the Edit icon for the WAN1 interface, enter the
following information and then select OK:
Addressing mode Manual
IP/Netmask 10.10.10.2/255.255.255.0
4. Select the Edit icon for the WAN2 interface, enter the
following information and then select OK:
Addressing mode Manual
IP/Netmask 172.16.20.2/255.255.255.0
Name Route_C.
Phase 1 Site_1_C
5. Select Create Phase 2, enter the following information and
select OK:
Name Route_D.
Phase 1 Site_1_D
To configure routes
1. Go to Router > Static.
2. Select Create New, enter the following default gateway
information and then select OK:
Destination IP/Mask 0.0.0.0/0.0.0.0
Device WAN1
Gateway 10.10.10.1
Distance 10
3. Select Create New, enter the following information and then
select OK:
Destination IP/Mask 192.168.22.0/255.255.255.0
Device Site_1_A
Distance 1
4. Select Create New, enter the following information and then
select OK:
Destination IP/Mask 192.168.22.0/255.255.255.0
Device Site_1_B
Distance 2
5. Select Create New, enter the following information and then
select OK:
Destination IP/Mask 192.168.22.0/255.255.255.0
Device Site_1_C
Distance 3
6. Select Create New, enter the following information and then
select OK:
Destination IP/Mask 192.168.22.0/255.255.255.0
Device Site_1_D
Distance 4
To configure firewall policies
1. Go to Firewall > Policy.
2. Select Create New, enter the following information, and select
OK:
3. Select the Edit icon for the WAN1 interface, enter the
following information and then select OK:
Addressing mode Manual
IP/Netmask 10.10.20.2/255.255.255.0
4. Select the Edit icon for the WAN2 interface, enter the
following information and then select OK:
Addressing mode Manual
IP/Netmask 172.16.30.2/255.255.255.0
Advanced
Enable IPSec Interface Mode Select
Dead Peer Detection Select
4. Select Create Phase 1, enter the following information, and
select OK:
Name Site_2_C
Remote Gateway Static IP Address
IP Address 10.10.10.2
Local Interface WAN2
Mode Main
Authentication Method Preshared Key
Pre-shared Key Enter the preshared key.
Peer Options Accept any peer ID
Advanced
Enable IPSec Interface Mode Select
Dead Peer Detection Select
5. Select Create Phase 1, enter the following information, and
select OK:
Name Site_2_D
Remote Gateway Static IP Address
IP Address 172.16.20.2
Local Interface WAN1
Mode Main
Authentication Method Preshared Key
Pre-shared Key Enter the preshared key.
Peer Options Accept any peer ID
Advanced
Enable IPSec Interface Mode Select
Dead Peer Detection Select
To define the phase 2 configurations for the four VPNs
1. Go to VPN > IPSEC > Auto Key.
To configure routes
1. Go to Router > Static.
2. Select Create New, enter the following default gateway
information and then select OK:
Destination IP/Mask 0.0.0.0/0.0.0.0
Device WAN1
Gateway 10.10.10.1
Distance 10
Schedule Always
Service Any
Action ACCEPT
6. Select Create New, enter the following information, and select
OK:
Source Interface/Zone Internal
Source Address Name All
Destination Interface/ZoneSite_2_C
Destination Address Name All
Schedule Always
Service Any
Action ACCEPT
7. Select Create New, enter the following information, and select
OK:
Source Interface/Zone Site_2_C
Source Address Name All
Destination Interface/Zone Internal
Destination Address Name All
Schedule Always
Service Any
Action ACCEPT
8. Select Create New, enter the following information, and select
OK:
Source Interface/Zone Internal
Source Address Name All
Destination Interface/Zone Site_2_D
Destination Address Name All
Schedule Always
Service Any
Action ACCEPT
9. Select Create New, enter the following information, and select
OK:
Source Interface/Zone Site_2_D
Source Address Name All
Destination Interface/Zone Internal
Destination Address Name All
Schedule Always
Service Any
Action ACCEPT
Address Name
Select the destination address that you defined in Step 6.
Action IPSEC
VPN Tunnel Select the name of the phase 2 configuration that you
created in Step 5.
Policy-based redundant
tunnel configuration example
This example demonstrates how to set up a redundant-tunnel
IPSec VPN that uses preshared keys for authentication purposes.
In the example configuration (refer to Figure 17):
Two separate interfaces to the Internet are available on
both VPN peers.
Both VPN peers have static IP addresses for each public
interface.
Both VPN peers operate in NAT/Route mode.
IP Address 10.10.20.1
Local Interface Internal
Mode Main
Authentication Method Preshared Key Pre-shared Key Enter
the preshared key.
Peer Options Accept any peer ID
Advanced Select Dead Peer Detection.
3. Select OK.
3. Select OK.
3. Place the policy in the policy list above any other policies
having similar source and destination addresses.
To define the IPSec firewall policy for the local redundant
interface
1. Go to Firewall > Policy.
2. Select Create New, enter the following information, and select
OK:
Source Interface/Zone
Select the local interface to the internal (private) network.
Address Name
Finance_Network
Destination Interface/Zone
Select the local redundant interface to the Internet.
Address Name
HR_Network
Schedule As required.
Service As required.
Action IPSEC
VPN Tunnel US1toUS2_RTunnel
3. Place the policy in the policy list directly beneath the policy
that you created for the primary interface.
3. Place the policy in the policy list above any other policies
having similar source and destination addresses.
To define the IPSec firewall policy for the local redundant
interface
1. Go to Firewall > Policy.
2. Select Create New, enter the following information, and select
OK:
Source Interface/Zone
Select the local interface to the internal (private) network.
Address Name
HR_Network
Destination Interface/Zone
Select the local redundant interface to the Internet.
Address Name Finance_Network
Schedule As required.
Service As required.
Action IPSEC
VPN Tunnel US2toUS1_RTunnel
3. Place the policy in the policy list directly beneath the policy
that you created for the primary interface.
To add a ping server to the local primary interface
1. Go to System > Network > Interface.
2. In the row that corresponds to the primary interface, select
the Edit button.
3. In the Ping Server field, type the IP address of the primary
remote interface on ZXSEC US_1.
4. Select Enable.
5. In the Administrative Access group, ensure that PING is
selected.
6. Select OK.
Address Name
Corporate_Network
Destination Interface/Zone
Select the local redundant interface to the Internet.
Address Name
SOHO_Network
Schedule As required.
Service As required.
Action IPSEC
VPN Tunnel US1toUS2_Tunnel
Select Allow inbound to enable traffic from the remote network to
initiate the tunnel.
Clear Allow outbound to prevent traffic from the local network from
initiating the tunnel after the tunnel has been established.
3. Place the policy in the policy list directly beneath the policy
that you created for the primary interface.
Transparent VPN
configurations
Overview
This section describes transparent VPN configurations, in which
two ZXSEC US units create a VPN tunnel between two separate
private networks transparently.
The following topics are included in this section:
Configuration overview
Configure the VPN peers
Configuration overview
In Transparent mode, all interfaces of the ZXSEC US unit except
the management interface (which by default is assigned IP
address 10.10.10.1/255.255.255.0) are invisible at the network
layer. Typically, when a ZXSEC US unit runs in Transparent mode,
different network segments are connected to the ZXSEC US
interfaces.
Figure 19 shows the management station on the same subnet.
The management station can connect to the ZXSEC US unit
directly through the web-based manager.
F I G U R E 1 9 M A N AGEM E N T S TA T I O N O N I N T ER N AL N E T W O R K
F I G U R E 2 0 M A N A G E M EN T S TA T I O N O N E X T ER N AL N ET W O R K
F I G U R E 2 3 DE S T I N A T I O N S O N R E M O T E N ET W O RK S B EH I N D I N T E R N A L ROU T E R S
5. Place the policy in the policy list above any other policies
having similar source and destination addresses.
6. Repeat this procedure at the remote ZXSEC US unit.
Manual-key
configurations
Overview
This section explains how to manually define cryptographic keys
to establish an IPSec VPN, either policy-based or route-based.
The following topics are included in this section:
Configuration overview
Specify the manual keys for creating a tunnel
Configuration overview
If required, you can manually define cryptographic keys for the
ZXSEC US unit to establish an IPSec VPN. You define manual
keys where:
Prior knowledge of the encryption and/or authentication
key is required (that is, one of the VPN peers requires a
specific IPSec encryption and/or authentication key).
Encryption and authentication needs to be disabled.
In both cases, you do not specify IPSec phase 1 and phase 2
parameters; you define manual keys on the VPN > IPSEC >
Manual Key tab instead.
If one VPN peer uses specific authentication and encryption keys
to establish a tunnel, both VPN peers must be configured to use
the same encryption and authentication algorithms and keys.
Algorithm
DES-Digital Encryption Standard, a 64-bit block algorithm
that uses a 56-bit key.
3DES-Triple-DES, in which plain text is encrypted three
times by three keys.
AES128-A 128-bit block algorithm that uses a 128-bit key.
AES192-A 128-bit block algorithm that uses a 192-bit key.
AES256-A 128-bit block algorithm that uses a 256-bit key.
Authentication Select one of the following message digests:
Algorithm
MD5-Message Digest 5 algorithm, which produces a 128-
bit message digest.
SHA1-Secure Hash Algorithm 1, which produces a 160-bit
message digest.
Authentication Key If you selected:
MD5, type a 32-character hexadecimal number (0-9, a-f)
nseparated into two segments of 16 characters.
SHA1, type 40-character hexadecimal number (0-9, a-f)
separated into one segment of 16 characters and a
second segment of 24 characters.
IPSec Interface Mode Select to create a route-based VPN.
A virtual IPSec interface is created on the Local Interface that
you selected. This option is available only in NAT/Route mode.
3. Select OK.
Overview
This section provides detailed step-by-step procedures for
configuring a ZXSEC US unit to accept a connection from a
remote peer or dialup client. The phase 1 parameters identify the
remote peer or clients and support authentication through
preshared keys or digital certificates. You can increase access
security further using peer identifiers, certificate distinguished
names, group names, or the ZXSEC US extended authentication
(XAuth) option for authentication purposes.
parameters. Refer to “
Using the ZXSEC US unit as an XAUTH
server”
.
5. Select OK.
FIGURE 24 L OC AL CERTIFICATES
FIGURE 25 CA CERTIFICATES
If both VPN peers (or a VPN server and its client) have
static IP addresses and use aggressive mode, select a
single DH group. The setting on the ZXSEC US unit must
be identical to the setting on the remote peer or dialup
client.
When the remote VPN peer or client has a dynamic IP
address and uses aggressive mode, select up to three DH
groups on the ZXSEC US unit and one DH group on the
remote peer or dialup client. The setting on the remote
NAT traversal
Network Address Translation (NAT) is a way to convert private
IP addresses to publicly routable Internet addresses and vise
versa. When an IP packet passes through a NAT device, the
source or destination address in the IP header is modified.
ZXSEC US units support NAT version 1 (encapsulate on port 500
with non-IKE marker), version 3 (encapsulate on port 4500 with
non-ESP marker), and compatible versions.
NAT cannot be performed on IPSec packets in ESP tunnel mode
because the packets do not contain a port number. As a result,
the packets cannot be demultiplexed. To work around this
problem, the ZXSEC US unit provides a way to protect IPSec
packet headers from NAT modifications. When the Nat-traversal
option is enabled, outbound encrypted packets are wrapped
inside a UDP IP header that contains a port number. This extra
encapsulation allows NAT devices to change the port number
without modifying the IPsec packet directly.
To provide the extra layer of encapsulation on IPSec packets,
the Nat-traversal option must be enabled whenever a NAT
device exists between two ZXSEC US VPN peers or a ZXSEC US
unit and a dialup client such as US Desktop. On the receiving
end, the ZXSEC US unit or US Desktop removes the extra layer
of encapsulation before decrypting the packet.
Phase 2 parameters
Overview
This section describes the phase 2 parameters that are required
to establish communication through a VPN.
The following topics are included in this section:
Basic phase 2 settings
Exchanging keys to implement security associations
Defining the remaining tunnel creation options
Configure the phase 2 parameters
Exchanging keys to
implement security
associations
In phase 2, the ZXSEC US unit and the VPN peer or client
exchange keys again to establish a secure communication
channel between them. The P2 Proposal parameters select the
encryption and authentication algorithms needed to generate
keys for protecting the implementation details of Security
Associations (SAs). The keys are generated automatically using a
Diffie-Hellman algorithm.
The Keylife setting sets a limit on the length of time that a
phase 2 key can be used. Alternatively, you can set a limit
on the number of kilobytes (KB) of processed data, or
both. If you select both, the key expires when either the
time has passed or the number of KB have been
processed. When the phase 2 key expires, a new key is
generated without interrupting service.
The Autokey Keep Alive setting is used to rekey phase 2
SA negotiations when the key life expires so that the
tunnel will not shut down. Enable the option to ensure
that the tunnel remains active when no data is being
processed.
F I G U R E 2 7 AD V AN C E D P H AS E 2 S E T T I N G S
Replay detection
IPSec tunnels can be vulnerable to replay attacks. Replay
detection enables the ZXSEC US unit to check all IPSec packets
to refer to if they have been received before.
If any encrypted packets arrive out of order, the ZXSEC US unit
discards them.
DHCP-IPsec
Select this option if the ZXSEC US unit assigns VIP addresses to
US Desktop dialup clients through a DHCP server or relay. This
option is available only if the Remote Gateway in the phase 1
You can select either of the following message digests to check the
authenticity of messages during an encrypted session:
NULL-Do not use a message digest.
MD5-Message Digest 5, the hash algorithm developed by
RSA Data Security.
SHA1-Secure Hash Algorithm 1, which produces a 160-bit
message digest.
To specify one combination only, set the Encryption and
Authentication options of the second combination to NULL. To
specify a third combination, use the Add button beside the fields
for the second combination.
Enable replay detection Optionally enable or disable replay
detection. Replay attacks occur when an unauthorized party
Overview
This section explains how to specify the source and destination
IP addresses of traffic transmitted through an IPSec VPN, and
how to define appropriate firewall policies.
The following topics are included in this section:
Defining firewall addresses
Defining firewall policies
Overview
This section provides some general maintenance and monitoring
procedures for VPNs.
The following topics are included in this section:
Monitoring VPN connections
Monitoring IKE sessions
Testing VPN connections
Logging VPN events
VPN troubleshooting tips
F I G U R E 3 0 S ESSIO N L IST
Configuration
Correction
problem
Select complementary mode settings.
Mode settings do not
Refer to “
Choosing main mode or
match.
aggressive mode”
Configuration
Correction
problem
Go to VPN > Phase 1.
Depending on the Remote Gateway and
Authentication Method settings, you have a
choice of options to authenticate ZXSEC US
Peer ID or certificate dialup clients or
name of the remote
VPN peers by ID or certificate name (refer
peer or dialup client is
to
not recognized by
ZXSEC US VPN server. “
Authenticating remote peers and clients”
).
If you are configuring authentication
parameters for US Desktop dialup clients,
refer to the Authenticating US Desktop
Dialup Clients Technical Note.
Preshared keys do not Reenter the preshared key. Refer to
match. “Authenticating remote peers and clients”
.
Make sure that both VPN peers have at
Phase 1 or phase 2 key least one set of proposals in common for
exchange proposals each phase. Refer to
are mismatched. “
Defining IKE negotiation parameters”
and “
Configure the phase 2 parameters”
Select or clear both options as required.
NAT traversal settings
Refer to “NAT traversal”and “ NAT
are mismatched.
keepalive frequency” .
SPI settings for manual
Enter complementary SPI settings. Refer to
key tunnels are
“Manual-key configurations”
.
mismatched.
Figure 27 Basic Phase 2 settings (VPN > IPSEC > Auto Key (IKE)
> Create Phase 2 ............................................................ 177
Figure 28 Advanced phase 2 settings ................................ 179
Figure 29 List of static-IP and dynamic-DNS tunnels .......... 194
Figure 30 List of dialup tunnels ........................................ 194
Figure 31 Session list...................................................... 196
Symbols
(XAuth)
A
Accept peer ID in dialup group
Accept this peer certificate group only
Accept this peer certificate only
Accept this peer ID
Address, IP address example
Allow inbound, encryption policy
Allow outbound, encryption policy
ambiguous routing
resolving in ZXSEC US dialup-client configuration
authenticating
based on peer IDs
IPsec VPN peers and clients 143 through IPSec certificate
through XAuth settings
authenticating ZXSEC US unit with pre-shared key
Authentication Algorithm, Manual Key
Authentication Key, Manual Key
authentication server, external for XAuth
Autokey Keep Alive
IPSec interface mode
Autokey Keep Alive, Phase 2
C
Certificate Name, Phase 1
certificate, IPSec group
Local ID setting
using DN to establish access
viewing local DN
CLI
using instead of web-based manager
comments, documentation concentrator, defining configuring
dynamic DNS VPN
US Desktop dialup-client VPN
US Desktop in dialup-client VPN
ZXSEC US dialup-client VPN
ZXSEC US in dialup-client IPSec VPN
gateway-to-gateway IPSec VPN
hub-and-spoke IPSec VPN
IPSec VPNs
manual key IPSec VPN
transparent IPSec VPN
customer service
D
DDNS services, subscribing to
Dead Peer Detection, Phase 1
DH Group
IPSec interface mode
DH Group, Phase 1
DH Group, Phase 2
DHCP relay
in US Desktop dialup-client configuration
in ZXSEC US dialup-client configuration
DHCP server
in US Desktop dialup-client configuration
DHCP-IPSec
IPSec interface mode
DHCP-IPsec, phase 2 156
dialup-client IPSec configuration
configuration steps for ZXSEC US dialup clients
DHCP relay for US Desktop VIP
DHCP server for US Desktop VIP
dialup server for US Desktop dialup clients
dialup server for ZXSEC US dialup clients
E
Enable perfect forward secrecy (PFS) IPSec interface mode
Enable perfect forward secrecy (PFS), Phase 2
Enable replay detection
IPSec interface mode
Enable replay detection, Phase 2
Encryption Algorithm, Manual Key
Encryption Key, Manual Key
encryption policy
allow outbound and inbound
defining IP addresses
defining IPSec
defining multiple for same IPSec tunnel
enabling specific services
evaluating multiple
outbound and inbound NAT
traffic direction
examples
F
firewall IP addresses defining IPSec
firewall policy
defining for policy-based VPN
defining for route-based VPN
US Desktop dialup-client configuration configuration steps
US Desktop configuration
overview
US Desktop dialup-client IPSec configuration
VIP address assignment
ZXSEC US dialup-client IPSec configuration
ZXSEC US acting as client
using DHCP relay in
ZXSEC US documentation commenting on
ZTE customer service
ZTE documentation
ZTE Knowledge Center
G
gateway-to-gateway IPSec configuration configuration example
23 configuration steps
infrastructure requirements
overview
generating
IPSec phase 1 keys
IPSec phase 2 keys
H
hub-and-spoke IPSec configuration basic configuration example
concentrator, defining configuration steps
US Desktop in hub-and-spoke VPN example
I
IKE negotiation parameters
Inbound NAT, encryption policy
Internet-browsing
configuring US Desktop
Internet-browsing firewall policy
VPN server
Internet-browsing IPSec configuration US Desktop dialup-client
configuration gateway-to-gateway configuration infrastructure
requirements
overview
introduction
ZXSEC US IPSec VPNs
ZTE documentation
IPSec VPN Guide
IPSec VPN
authentication methods
authentication options
certificates
extended authentication (XAuth)
firewall IP addresses, defining
firewall IPSec policy
ZXSEC US implementation
keeping tunnel open
overview
peer identification
phase 1 parameters
phase 2 parameters
role of encryption policy
K
Keepalive Frequency, Phase 1
Keylife
IPSec interface mode
Keylife, Phase 1
Keylife, Phase 2
L
LDAP server, external for XAuth
Local ID
for certificates
for peer IDs
to identify ZXSEC US dialup clients
Local SPI, Manual Key
M
manual key IPSec configuration configuration steps overview
meshed VPN
Mode, Phase 1
N
NAT
keepalive frequency
traversal
Nat-traversal, Phase 1
negotiating
IPSec phase 1 parameters
IPSec phase 2 parameters
network topology dynamic DNS
US Desktop dialup-client
ZXSEC US dialup-client
fully meshed network
gateway-to-gateway
hub-and-spoke
Internet-browsing
manual key
partially meshed network
redundant-tunnel
supported IPSec VPNs
transparent VPN
O
Outbound NAT, encryption policy
overlap
resolving IP address
resolving through ZXSEC US DHCP relay
P
P1 Proposal, Phase 1
P2 Proposal
Phase 2 IPSec interface mode
P2 Proposal, Phase 2
partially meshed VPN
partially redundant tunnel configuration example configuration
peer ID
assigning to ZXSEC US unit
enabling
Local ID setting
perfect forward secrecy, enabling
phase 1 parameters authentication method authentication
options defining
negotiating
overview
phase 2 parameters configuring
defining
negotiating
planning VPN configuration
pre-shared key
authenticating ZXSEC US unit with
Pre-shared Key, Phase 1
Q
Quick mode identities, Phase 2
Quick Mode Selector
IPSec interface mode
S
source IP address example
subscribing to DDNS service
T
technical support
Transparent mode
transparent VPN IPSec configuration configuration steps
infrastructure requirements
overview
prerequisites to configuration
V
VIP address, US Desktop dialup clients
virtual domain, transparent VPN IPSec configuration
VPN basic settings
general steps for configuring IPSec
interoperability
VPNs planning configurations
preparation steps
W
web-based manager
X
XAUTH
ZXSEC US unit as client
ZXSEC US unit as server
XAuth (extended authentication)
authenticating users with
XAuth client, ZXSEC US unit as
XAuth Enable as Client, Phase 1
XAuth Enable as Server, Phase 1
XAuth server, ZXSEC US unit as