Advanced VPN Training v11.7
Advanced VPN Training v11.7
Notice to Users
Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the express written permission of WatchGuard Technologies, Inc.
SUPPORT www.watchguard.com/support [email protected] U.S. and Canada +877.232.3531 All Other Countries +1.206.613.0456
ii
Table of Contents
Exercise ........................................................................................................................ 42
Make a Manual VPN Between a Single-WAN XTM Device and a Multi-WAN XTM Device .... 42
Frequently Asked Questions ....................................................................................... Related Courseware and Information ........................................................................ What You Have Learned .............................................................................................. Test Your Knowledge ................................................................................................... Mobile VPN ........................................................................................................................... What You Will Learn .................................................................................................... Connect Remote Users Securely to the Corporate Network .....................................
48 49 49 50 51 51 51
Types of Mobile VPN .................................................................................................................. 52 Enable the XTM Device for Mobile VPN .................................................................................... 54 Distribute Client Software and Configuration File ................................................................... 55
Use Mobile VPN with IPSec With a Mac OS X or iOS Device ..................................... 58
Configure the XTM Device ......................................................................................................... 58 Configure the VPN Client on an iOS Device ............................................................................. 59 Configure the VPN Client on a Mac OS X Device ..................................................................... 59
Mobile VPN with L2TP IPSec Settings ........................................................................ 61 Mobile VPN Exercises .................................................................................................. 62
iii
Exercise 2: Configure Mobile VPN with IPSec and Prepare Mobile VPN Client Configuration Files .......................................................................................................... 68 Exercise 3: Restrict Mobile VPN with IPSec Users by Policy ....................................... 73 Exercise 4: Use the Shrew Soft IPSec Client ................................................................ 76
Install the Shrew Soft VPN Client .............................................................................................. 76 Connect and Disconnect the Shrew Soft VPN Client .............................................................. 77
Exercise 5: Configure the XTM device for Mobile VPN with SSL ................................. 79
Activate the XTM Device for SSL VPN ....................................................................................... 79 Add Users to the SSLVPN-Users Group .................................................................................... 81 Restrict SSL VPN Users by Policy .............................................................................................. 82
Exercise 6: Change the Port Used for Mobile VPN with SSL ....................................... 84 Exercise 7: Use the Mobile VPN with SSL Client .......................................................... 85
Install the Mobile VPN with SSL Client ..................................................................................... 85 Connect with the Mobile VPN with SSL Client ......................................................................... 86
iv
Introduction
What You Will Learn
In this course, you learn how to make branch office virtual private networks (BOVPNs) between WatchGuard XTM devices with Fireware XTM, when one or both devices have multiple connections to the Internet. You learn how to make these VPNs manually, not with the WatchGuard Management Server. You also learn how VPN failover works.
Exercise
This course includes a step-by-step exercise to show you how to make VPNs in a multi-WAN environment. It also illustrates a use case that might apply in your organization. Before you start the exercise, make sure to read Before You Begin, on page 41. This section has a list of the equipment and software you need for the exercise, and gives you basic information about how to prepare your device.
About Side Notes Side notes include extra information that is not necessary to understand the training. They might be configuration or troubleshooting tips, or extra technical information. This training module does not include instructions to use Fireware XTM CLI or the Web UI. All configuration changes are made with Policy Manager, and you monitor the XTM devices with WSM and related tools.
One gateway device at each location completes the IPSec encapsulation process for all the computers behind the gateway device. The computers at each location do not need any special software and they are not aware that the IPSec encapsulation process takes place. The XTM device looks at traffic that comes from and goes to computers on its protected networks. It knows what traffic to encrypt and send to the other office based on the source and destination IP address of the traffic and the VPN settings.
IPSec is built on a collection of several different protocols. BOVPNs can have more than 30 settings. The configuration on your XTM device must mirror the configuration of its peer device. We will look at every setting in the XTM device VPN configuration to give you the information you need to make successful VPNs every time.
(NAT), the VPN negotiations can move to UDP port 4500, and all subsequent traffic between the two devices uses UDP port 4500. NAT-T prevents the NAT device from interfering with the IPSecencoded traffic by re-encapsulating it in an additional layer of UDP and IP headers. IP Protocol 50 Encapsulating Security Payload (ESP) After VPN negotiations succeed, traffic between the two sites can be securely and privately sent over the tunnel with ESP. ESP authenticates and encrypts the traffic and encapsulates it in new IP datagrams with IP protocol 50. The ESP traffic may or may not be re-encapsulated in UDP port 4500 packets, depending on whether NAT-T is used. IP protocol 51 Authentication Header (AH) Similar to ESP, AH encapsulates VPN traffic between the two sites after VPN negotiations succeed. AH does not encrypt traffic, however, it only guarantees that the traffic came from the correct source and that it was not tampered with in transit. Because AH does not provide privacy (encryption), it is rarely used for IPSec VPNs today. IP protocol 50 and 51 are not ports; no ports are associated with ESP or AH. ESP and AH are distinct IP protocols, like ICMP (IP protocol 1), TCP (IP protocol 6), or UDP (IP protocol 17).
Phase 1
The main purpose of Phase 1 is to set up a secure encrypted channel through which the two devices can negotiate Phase 2. When Phase 1 finishes successfully, the devices quickly move to Phase 2 negotiations. If Phase 1 fails, the devices cannot begin Phase 2. Phase 1 negotiations can use one of two modes: Main Mode or Aggressive Mode. We discuss the two modes in more detail in a subsequent section.
Phase 2
The purpose of Phase 2 negotiations is for the two peers to agree on a set of parameters that define what traffic can go over the VPN, and how to encrypt and authenticate the traffic. This agreement is called a Security Association.
Phase 1 negotiations are often called IKE negotiations or ISAKMP negotiations. Depending on the mode used, they are also called Aggressive Mode Negotiations or Main Mode Negotiations. Phase 2 negotiations are often called IPSec negotiations or Quick Mode negotiations.
AES Advanced Encryption Standard This encryption algorithm is the strongest available. Fireware XTM can use AES with encryption keys of length 128, 192, or 256 bits. AES is also more efficient and more secure than 3DES. Aggressive Mode One of the two modes that Phase 1 VPN negotiations can use. It uses a total of three messages between the two IKE peers. Aggressive Mode does not give protection for the identities of the two IKE peers. AH Authentication Header Defined in RFC 2402, AH provides security by adding authentication information to the IP datagram. Because AH does not provide encryption, it is not typically used for VPNs. Because AH calculates a message digest of the entire IP packet, AH can never be used behind a device that does network address translation (NAT). NAT, by definition, changes IP headers. This means that verification of the message digest that AH calculates will always fail when NAT is involved. The Internet Assigned Numbers Authority (IANA) assigned AH the IP protocol number 51. (Compare to TCP which is IP protocol 6, and UDP which is IP protocol 17.) DES Data Encryption Standard An older encryption algorithm that is still in wide use. It uses an encryption key that is 56 bits long. 3DES Triple-DES or three-DES An encryption algorithm based on DES. The DES encryption algorithm is applied to a data set once with one symmetric key, and then the result is encrypted again with DES with a different key. Finally, this result is encrypted one more time with DES with the first key. Diffie-Hellman group (DH group) A group of integers used for the Diffie-Hellman key exchange. The Diffie-Hellman group is also called the DH group or key group. Fireware XTM can use DH groups 1, 2, and 5. The larger key groups give larger integers to use in the exchange, which provides stronger security.
Diffie-Hellman key exchange A method of making a shared encryption key available to two entities without actually exchanging the key. The encryption key for the two devices is used as a symmetric key for encrypting data. The security of the resulting encryption key comes from the extreme difficulty of solving certain mathematical problems in reverse (the discrete logarithm problem). Only the two parties involved in the key exchange can get the shared key, and the key is never sent over the wire. ESP Encapsulating Security Payload Defined in RFC 2406, ESP provides confidentiality and integrity of data. ESP takes the original data payload of a data packet and replaces it with encrypted data. It adds integrity checks to be sure that the data is not altered in transit, and that the data came from the proper source. The Internet Assigned Numbers Authority (IANA) assigns a number to each protocol. For ESP, the IP protocol number is 50. (Compare to TCP, which is assigned IP protocol number 6, and UDP, IP protocol number 17.) Hash A mathematical transform applied to a set of data. This transform takes a string of bits as input and produces an output called the hash or hash value. (The hash value is normally much smaller than the original data input.) A hash is generally a oneway function. It is not possible to find the original input if the only data you have is the hash. There are different hash algorithms, but for any given input and any given algorithm, the hash value is always the same. If two entities each have a set of data and they want to see if they are the same data set without actually exchanging the data, they can both use the same hash algorithm to compute the hash of their own data set. Next, they exchange the hash values that they each compute and compare them. If the two hash values match, then the input data is the same on each side. If the hash values do not match, then the data sets are not identical. VPN traffic uses a variation of the hash method called a Hashed Message Authentication Code or HMAC (sometimes also called a Keyed HMAC). Similar to the normal use of hash functions, each VPN peer computes hashes of data to guarantee the datas integrity. In addition, each side mixes the data with a secret key before the hash is computed. This guarantees the authenticity of the data; each side knows that the data came from the authorized peer and not an imposter or attacker. IKE Internet Key Exchange Defined in RFC 2409, IKE specifies methods to obtain authenticated keying material for use with ISAKMP. IKE peer The entity to which your XTM device makes a VPN tunnel. The IKE peer is typically another IPSec device such as another firewall, or a remote users computer with software that can make an IPSec VPN tunnel. IPSec A collection of cryptography-based services and security protocols to protect communication between entities that send traffic through an untrusted network (such as the public Internet). ISAKMP Internet Security Association and Key Management Protocol Defined in RFC 2408, ISAKMP provides a framework to use to authenticate a communicating peer, for key generation techniques, and to manage (negotiate, form, and destroy) Security Associations. IKE and Oakley operate within this framework.
Branch Office VPN Tunnels 5 Symmetric-key encryption is an encryption scheme where both parties share one key that is used to both encrypt and decrypt data. It is much faster than the alternative, asymmetric-key encryption. In what is known as public-key cryptography, one private key encrypts the data and a different public key decrypts it. It is not possible to use publickey encryption for every set of data that goes through a VPN fast enough for acceptable throughput. Public-key cryptography is used in the Diffie-Hellman key exchange algorithm, but ultimately a symmetric key is used to encrypt the data through the VPN. The symmetric key is derived through the highly secure DiffieHellman key exchange. Because the hash value is much smaller than the actual, raw data, it is much more efficient to compute hash values and use them to compare data sets than to exchange and compare the raw data.
Key expiration
Phase 1 keys usually expire based on an amount of time, but some devices allow expiration of Phase 1 keys based on the amount of data exchanged. Fireware XTM expires the Phase 1 key based only on the amount of time passed. Phase 2 keys usually expire based on an amount of time or an amount of data sent. The first event that happens (time elapsed or amount of data sent) causes the key to expire. If you set either the time or data limit to zero, the XTM device disregards that limit. If you set both the time and data limits to zero, the XTM device expires the key after 8 hours. If you set the data limit to less than less than 24,576 kilobytes, then 24,576 kilobytes is used.
Phase 1 and Phase 2 session and encryption keys change periodically. This makes sure an attacker cannot get access to a large data set with the same encryption keys. When a key must change, the appliance declares the current key no longer valid and negotiates a new key with the IKE peer. Main Mode One of the two modes that Phase 1 VPN negotiations can use. It uses a total of six messages between the two IKE peers. Main Mode gives protection to the identities of the two IKE peers. MD5 Message Digest 5 This is a hash algorithm. Verification of the MD5 sum provides data integrity (a guarantee that the data has not changed in transit). In IPSec, authentication of the data (a guarantee that the data came from the proper source) is achieved by enhancing the hash with a shared secret key (see HMAC explanation in the definition of hash). MD5 is not considered as strong a hash algorithm as SHA-1. Oakley Oakley Key Determination Protocol This is a protocol for two parties to agree on a secret key. RFC 2412 describes the protocol named Oakley, by which two authenticated parties can agree on secure and secret keying material. The basic mechanism is the Diffie-Hellman key exchange algorithm. PFS Perfect Forward Secrecy A guarantee that the keying material used to generate one encryption key is not used to generate a new encryption key. If one key is compromised, it gives the attacker no information about subsequent encryption keys. Quick Mode The mode that Phase 2 VPN negotiations use. Quick Mode is the only mode that Phase 2 uses. The two IKE peers exchange three messages to complete Quick Mode. Replay An attack that captures data packets sent from one IKE peer to another, and then sends them to the recipient again. The attacker can get information about the IPSec implementation from the responses it gets from the recipient. Fireware XTM uses the sequence numbers in ESP packets to reject duplicate packets and old packets, to protect against replay attacks.
SA Security Association This is a contract between two IPSec endpoints. The SA is an abstract object that contains all the information necessary for two entities to exchange data securely. Successful completion of each part of VPN negotiations, Phase 1 and Phase 2 negotiations, results in an SA. There is only one Phase 1 SA between two IKE peers. The Phase 1 SA defines encryption and authentication parameters that protect all Phase 2 negotiations. The Phase 2 SA is unidirectional. If a tunnel is a bidirectional tunnel (traffic can go in and out of the protected network), each peer has one incoming SA and one outgoing SA for that tunnel. Thus, each tunnel has at least one Phase 2 SA, and usually has two. However, there can be multiple tunnels between two IKE peers. Each Tunnel Route you add to the Branch Office Tunnel results in at least one unique Phase 2 SA (and usually two, because most tunnels are bidirectional) when Phase 2 negotiations finish. SHA-1 Secure Hash Algorithm 1 A type of hash algorithm called a cryptographic hash function. It provides data integrity (a guarantee that the data has not changed in transit) as well as authentication of the data (a guarantee that the data came from the proper source). SHA-1 is considered a stronger hash algorithm than MD5. SPI Security Parameters Index This is a unique 32-bit number that identifies an IPSec (Phase 2) SA. The SPI number is an identifier in the header of every IPSec data packet. This number tells the receiving gateway device to which IPSec data flow the packet belongs. The SPI number is not bidirectional. Each device keeps an SPI number for traffic it sends (outgoing SPI) and an SPI number for traffic it receives (incoming SPI). Traffic selector The configuration parameter that tells the gateway device what traffic should be handled by IPSec. Traffic selectors in Fireware XTM are called tunnel routes. Traffic selectors consist of source IP addresses and destination IP addresses. Each peer has a reverse match of the other peers traffic selectors. If one peer has subnet A as the local part of its traffic selector and subnet B as the remote part of its traffic selector, then the other peer has subnet B as local and subnet A as remote. When a data packet comes in from a host on an internal network, Fireware XTM checks to see if the source and destination IP addresses of the packet match a traffic selector. If they do, and if there is a policy to allow the traffic, then Fireware XTM encapsulates the data packet in IPSec and sends it to the IPSec peer.
In Fireware XTM 11.3.1 and later, the XTM device does a route lookup first. If a traffic flow matches an IPSec traffic selector, but a route to the destination is also in the devices local routing table (not in the devices default route), the device can honor that route. You can configure the device not to use IPSec to handle the traffic when a non-default route exists in the local routing table. Phase 1 SAs are sometimes called ISAKMP SAs. Phase 2 SAs are usually called IPSec SAs.
In previous versions of Fireware XTM 11.x, the XTM device always used IPSec to process the traffic when a traffic selector matches. In v11.3.1 and later, you can control this behavior in Policy Manager (select VPN > VPN Settings). To configure the XTM device to honor nondefault routes and use them to take precedence over IPSec traffic selectors, select the Enable the use of non-default (static or dynamic) routes to determine if IPSec is used check box.
Tunnel The virtual path between two locations on the Internet that have a VPN between them. This virtual path is called a tunnel because data packets are encapsulated inside ESP headers and trailers, and inside a new IP header. Thus, two computers behind two IKE gateways can send packets to private IP addresses, effectively tunneling through the public Internet.
1. Open Policy Manager for your XTM device. 2. Click . Or, select VPN > Branch Office Gateways.
The Gateways dialog box appears.
3. Click Add.
The New Gateway dialog box appears. The subsequent sections discuss the different parts of this dialog box.
You specify which method the peers use in the New Gateway dialog box, on the General Settings tab, in the Credential Method section.
Pre-Shared Key
The pre-shared key is a way for each device to prove that it is the authorized IKE peer for this VPN. The devices use the pre-shared key, along with the Phase 1 identifier, to verify that the remote peer is the correct entity and not an imposter. Do not give the pre-shared key to anyone except the administrator of the remote IKE peer device. If you use a pre-shared key, make sure to choose characters that are difficult to guess. You can use a string of numbers, upper and lower-case letters, and punctuation marks. The pre-shared key must exactly match the pre-shared key that the remote device uses. We recommend that you use pre-shared keys for your first VPN. They are easier to configure than certificates, and it is less likely that you will make an error.
10
When your XTM device responds to IKE negotiations from the peer, your XTM device must decide: Does my configuration allow me to negotiate with this device, based on the way the device identifies itself and the source IP address of the IKE packets? If I specified more than one external interface for this peer to use for negotiations, did the IKE packets come to the correct one? You specify how the XTM device answers these question when you configure the Gateway Endpoints at the bottom of the New Gateway dialog box.
The Use modem for failover check box appears only if serial modem failover is enabled in the device network settings.
Each row in the Gateway Endpoints list in Figure 5 represents one set of gateway endpoints. You can add more than one set of gateway endpoints if either device has more than one external interface it can use to send and receive IKE negotiations. This allows VPN Failover to occur. An IPSec device can terminate a specific VPN on only one interface at a time. However, if a device has more than one external interface and one of them is not available, your XTM device can try to negotiate the VPN through a different external interface. You can also use a modem for VPN failover, if you have enabled serial modem failover on the device. Your XTM device can do VPN failover if: Your XTM device runs Fireware 10.x or later, has more than one external interface, and the remote device can do VPN failover. You want your XTM device to use one external interface to make the first VPN connection. However, if that interface is not available, you want your device to use a different external interface to make the VPN connection. The remote peer is a Firebox X e-Series or WatchGuard XTM device that runs Fireware 10.x or later, and it has more than one external interface. You want your XTM device to make the VPN connection to one of the remote peers external interfaces first. However, if that interface is not available, you want your device to be able to make the VPN connection with one of the remote peers other external interfaces. Your XTM device has a dial-up modem connection that you can use for failover. You want your XTM device to use an external interface to make the VPN connection. However, if no external interfaces are available, you want to use the modem to make the VPN connection. We examine VPN failover in detail in a subsequent section. The XTM device automatically starts tunnel negotiation upon reboot if the Start Phase1 tunnel check box is selected.
Branch Office VPN Tunnels 11 In Fireware XTM v11.7 and higher, modem failover is supported on XTM 2 Series, 3 Series, and 5 Series devices.
This dialog box has two separate sections used to define a set of gateway endpoints: Local Gateway This section is for identification of the local gateway (at the top), and is used to configure how this XTM device identifies itself. Remote Gateway This section is for identification of the remote gateway (at the bottom), and is used to configure how the XTM device expects the peer to identify itself. A set of gateway endpoints is a set of Phase 1 identifier information for each IKE peer (your XTM device and the remote device). Phase 1 identifiers are used like this: Each side configures its device to send identifying information (Phase 1 ID) to the other side during Phase 1. The ID has a specific type and a value for that type. Each side also specifies an ID type and a value for that ID type for the remote device. This tells the local device what to expect from the remote device during Phase 1 negotiations. Each devices Phase 1 identifier must exactly match what the other device expects to receive. If the ID information that one device sends to its peer does not match what the peer expects, IKE negotiations fail.
12
Each device can use one of four types of identifiers, or Phase 1 ID types: IP Address (ID_IPv4_ADDR) The value for this ID type must be a dotted-decimal IP address, without a subnet mask. This is almost always the IP address assigned to the device interface that terminates the VPN. In some network topologies, the value for the IP address ID type can instead be the IP address of a device configured for Network Address Translation (NAT) that is between the IPSec device and the Internet. In these cases, the NAT device has a one-to-one NAT mapping that sends all ports and protocols to the IPSec device behind it. Domain Name (ID_FQDN) The value for this ID type is a string of text. This is usually a fully qualified domain name (such as example.domain.com or myexample.com) that has a record in the DNS system for the IP address assigned to the external interface. It is not necessary for this name to have a corresponding record in DNS. The value for this ID type can also be a simple name that serves only as a Phase 1 identifier, but does not have an address record in DNS. If your XTM device has a static IP address on the external interface and you publish a DNS record for this IP address, you can use the domain name for the Phase 1 identifier. To learn your XTM device IP address, the other device can send a DNS query for the domain name. However, in these cases you usually use the IP address for the Phase 1 identifier because the IP address never changes. If your XTM device has a dynamic IP address and you use the Dynamic DNS service, you can use the DynDNS host name for your Phase 1 identifier, for example, myexample.dyndns.org. The dynamic DNS service lets the remote peer find your XTM device with a DNS query even when your XTM device IP address changes often, so that the peer can initiate IKE negotiations. Remember, this ID type is intended to relate to a DNS record but it is not necessary. Consider this scenario: IPSec device A has a dynamic IP address but does not use a dynamic DNS service. Thus the DNS system has no record for device As external interface. Device A can use Domain Name for its ID type, and the value can be a string of text that does not have a record in the DNS system. This is the only identifier information that the other IKE peer, device B, knows about device A. When device B wants to initiate IKE negotiations to make the VPN to device A, device B sends a DNS query to resolve this name to an IP address. The DNS query fails and device B cannot find device A. In this scenario, device A must be the initiator. IKE negotiations can succeed in this scenario as long as all other parameters match. Aggressive Mode must be used. If you use certificates for the credential method, the value for this ID type is the DNS Name or Domain Name field in the certificate. When you view the certificate with a Windows certificate viewer, the certificate field name is DNS Name, and it is listed as a Subject Alternative Name. If you enable VPN failover to a modem, you must configure the local gateway to use an ID (rather than an IP address) for the gateway ID type. The ID does not need to match an actual domain name.
When the appliance has a dynamic IP address but no DNS record, you can use this ID type and the next one (User ID on Domain) in a similar way. A later side note tells you the main difference between the two types in this situation. After each ID type we show the common representation of the ID type as it is defined in the relevant RFCs. For example, with the IP Address ID Type, the IKE RFCs define the ID type ID_IPv4_ADDR.
13
Some IPSec appliances can use User ID on Domain for the remote peer only, and cannot use it for the local identifier. Firebox SOHO, SOHO 6, and legacy (non-eSeries) Edge appliances cannot use User ID for the local gateway identifier. Devices running Fireware XTM and WFS can use User ID for the local ID. The main difference between the User ID on Domain and the Domain Name ID types when the external IP address is dynamic is this: the peer does not try to resolve a User ID on Domain with a DNS query, but it usually does try to resolve a Domain Name. With User ID on Domain, the peer simply waits for the remote device to begin IKE negotiations. With Domain Name the peer can try to initiate negotiations by first doing a DNS query to find the other device.
User ID on Domain (ID_USER_FQDN) This is typically a users ID in the form of an email address, such as [email protected]. It can also be a simple string of text that does not represent a real email address, such as bobs_firebox. If you do not use certificates for the credential method, the value of the ID is only a string of identifying text. It can be a real email address, or just a simple name. You usually use this ID type when the remote IKE peer is a user who connects from a single computer (instead of an IPSec device such as a firewall). This is the case with the WatchGuard Mobile VPN client: the software uses User ID on Domain for its local Phase 1 identifier. (In the profile settings of the WatchGuard Mobile VPN IPSec client software, the local identifier is called Fully Qualified Username. The Phase 1 ID type that the WatchGuard Mobile VPN client sends is actually ID_USER_FQDN.) If an IPSec appliance that acts as the IKE gateway supports it, this ID type can be the devices own local Phase 1 identifier. You can use this ID type for the local identifier if your XTM device has a static IP address or a dynamic IP address on its external interface. If the IP address on your XTM device is dynamic, this ID type creates a situation that is similar to the previous scenario (a domain name that does not resolve to an IP address in DNS). When a device has a dynamic IP address and it uses this ID type for its Phase 1 identifier, it must be the initiator. This is because the identifier alone is not sufficient information for its peer to find it. The value for this ID type never resolves to an IP address in DNS. If you use certificates for the credential method, the value for this ID type is usually the email address field in the certificate. The certificate field name is RFC822 Name, and is listed as a Subject Alternative Name when you view the certificate with a Windows certificate viewer. X500 name (ID_DER_ASN1_DN) Use this ID type only when you use certificates for the credential method. The value for the ID is the value of the certificates Subject field. The format of an X500 name is similar to the format of a distinguished name in an LDAP-style directory service. For example: CN=MyExample,OU=Main Office,O=myexample.com,ST=NY,C=US
14
The details you include in the Local Gateway section depend on how the external interface is configured: If your XTM device has a static public IP address on the external interface, your XTM device should use the external interface IP address to identify itself to the remote device. Select the By IP Address option. In the IP Address text box, select or type the external interface IP address. If your XTM device has a dynamic IP address on the external interface (DHCP or PPPoE), the IP address assigned to your XTM device external interface changes often, so the remote peer cannot expect your XTM device to use the external interface IP address as the IKE identifier. In this case, you must select the By Domain Information option. Then click Configure.
In versions prior to 11.x, the IP Address drop-down list in Figure 7 shows the IP addresses for all the XTM device interfaces. Be careful to not select an optional or trusted IP address. The XTM device can terminate BOVPNs only on external interfaces.
Figure 8: Local Gateway ID information if the XTM device has a dynamic address
15
If you use pre-shared keys for the credential method, you can specify two different types of Domain Information identifier: By Domain Name If you registered your own domain name, use that name. Because the remote peer will usually send a DNS query to find your XTM device IP address, the DNS system should always resolve this domain name to the external IP address of your XTM device.
The XTM device Dynamic DNS capability uses only the service provided by Dynamic Network Services (also known as DynDNS.com or DynDNS.org). There are other Dynamic DNS services with the same capability. If you use one of these services, you usually have a computer on a network behind the XTM device that runs a Dynamic DNS updater client software package. The ID Type X500 that appears in Figure 10 is not available for the Local ID if you do not use certificates. It is always available for the Remote ID.
If you use the Dynamic DNS capability of the XTM device, you can use the DynDNS domain name that you register. This way, the remote device can find your XTM device by DNS lookup. It is not necessary for the DNS system to have a record associated with the name you use here. If the DNS system does not have a record for this domain name, then the remote device cannot find your XTM device by DNS lookup. In this case, your XTM device must be the one to initiate the IKE negotiations. Remember that the remote peer usually does a DNS query to resolve this name to an IP address, even when the DNS system has no such record. If you do not register a DNS name for your XTM device (whether DynDNS or a static record), you should use the next ID type, User ID on Domain, so that the remote peer does not waste CPU cycles with an unnecessary DNS query. By User ID on Domain Use this ID type if the DNS system has no address record for your XTM device external interface IP address. In this case, your XTM device must be the initiator. If the XTM device has a certificate available and you use certificates for the credential method in Figure 4, one additional option appears in the Figure 9 dialog box: By x500 Name:
Figure 10: Local Gateway ID information if you use certificates for the credential method
You can use this type of local gateway identifier only if you use certificates for the credential method. The X500 name is the distinguished name in the certificate you select for this gateway. This name appears in the certificate as the Subject Name. When you use certificates for credentials and you select By Domain Information for the local gateway identifier, you cannot edit the value for the local ID type you select. Policy Manager automatically puts the correct value for the ID type you select, based on the information in the XTM device certificate.
16
For this XTM device to find the remote device, one of these conditions must be true: The XTM device must know the IP address of the peer ahead of time. If the remote device has a static IP address, select Static IP address and type the IP address in the IP Address text box. The XTM device must know a domain name that the DNS service can resolve to an IP address. If the remote device has a dynamic IP address, select Dynamic IP address. If there is a domain name the XTM device can use to find the remote device, you set it in the next section. If your XTM device cannot find the peers IP address with a DNS query, the remote device must be the initiator. In Phase 1, the remote IKE peer must identify itself correctly. To identify itself, the remote device can use any of the four ID types discussed at the start of this section. In the Specify the gateway ID for tunnel authentication section, you select which ID type the remote peer uses, and the value of that ID type. If the remote device has a static IP address, it should use that IP address for the phase 1 identifier. Select By IP Address and type the remote peer IP address. For the other three identification types, select By Domain Information and click Configure. Refer to the previous sections for information on these ID types. If you use certificates and you do not use an IP address for the remote ID type, you must manually type the domain information (whether Domain Name, User ID on Domain, or X500 name). You can get this information from the remote device administrator or if you view the remote peers certificate in a certificate viewer.
If the XTM device cannot find the peer with one of those methods, then it cannot initiate negotiations. It must wait for the other device to initiate negotiations.
17
When you use Domain Name or User ID @ Domain to specify the remote gateway ID, the Attempt to resolve check box controls whether the XTM device attempts to resolve the domain.
Select the Attempt to resolve check box if the remote gateway uses dynamic DNS to maintain a mapping between a dynamic IP address and a domain name.
Phase 1 negotiations can use one of two modes: Main Mode or Aggressive Mode. The device that starts the IKE negotiations (the initiator) sends either a Main Mode proposal or an Aggressive Mode proposal. The responder can reject the proposal if it is not configured to use that mode. Aggressive Mode communications take place with fewer packet exchanges than Main Mode communications. Aggressive Mode is less secure but faster than Main Mode. To specify how the XTM device starts negotiations, in the New Gateway dialog box, select the Phase 1 Settings tab.
18
The XTM device can use one of three methods to start IKE negotiations: Main Mode Main Mode IKE negotiations require a total of six messages (three two-way exchanges of information). The peers never exchange their identities in the clear. Use Main Mode when both devices have static external IP addresses. If you use pre-shared keys for the credential method, to use Main Mode, both sides must use an IP address as the Phase 1 ID. If one side or the other does not use an IP address for the Phase 1 ID type, you can use Main Mode only if you use certificates for the credential method. The XTM device will not use Aggressive Mode if you select Main Mode. Aggressive Mode Aggressive Mode IKE negotiations require a total of four messages. Each message includes more information than in a Main Mode exchange. This makes Aggressive Mode more efficient than Main Mode, but not as secure, because the peers exchange their identities without encryption. Use Aggressive Mode when one of the devices has a dynamic external IP address, or both have dynamic IP addresses. An exception is possible when you use certificates for the credential method instead of pre-shared keys. See the previous description about Main Mode. Main failback to Aggressive To start IKE negotiations, the XTM device sends a Main Mode packet. If the remote gateway device rejects the first packet, the XTM device sends an Aggressive Mode packet to try to start IKE negotiations again. When the XTM device is the responder, it completes either a Main Mode or an Aggressive Mode exchange, depending on the way the peer initiates IKE negotiations. Select this option if it is possible for the remote peer to use Main Mode, but you want negotiations to succeed if the remote peer can only use Aggressive Mode.
The two devices agree on all the same Phase 1 parameters regardless of which mode is used. The difference is the number of packet exchanges and how much information each packet contains.
19
When the IKE peers agree to use NAT Traversal, they make an additional step for each data packet sent over the VPN. After an IPSec device encapsulates a data packet inside the IPSec wrapper, it encapsulates it one more time inside a UDP wrapper. By re-encapsulating traffic in UDP packets, the IKE peers can overcome the problems that IPSec has with some implementations of NAT. Traffic goes over UPD port 4500 when NAT Traversal is used.
Each side advertises its ability to use NAT-T in the first IKE packet. If a device can use NAT-T, the first IKE packet from the device contains a part called a Vendor-ID payload. If both the initiator and the responder include the NAT-T Vendor-ID payload, then they can use NAT-Traversal.
How the Peers Detect Whether One of Them is Behind a NAT Device
If the peers can both use NAT-T, the second IKE packet from each peer includes a part called the NATDiscovery payload. The NAT-Discovery payload that one device sends includes the result of a computation that is based on the source and destination IP addresses and the source and destination ports of the packet when it leaves the IKE device. When the peer device gets the NAT-Discovery payload, it performs the same computation in reverse, based on the same type of information. However, the receiving end does the computation based on the information it sees for the packet (which can be different from the information the sending device sees when a NAT device is between the two). Both sides compare the results of their own computation with the corresponding value each gets from the other side. If one or both of the devices is behind a NAT, then the two results of the same computation do not match because NAT changes the source IP addresses, the source ports, or both. The mismatch means that there is a NAT device in front of one of the IKE peers. If the values do match, then no NAT is detected and the devices do not use NAT-T. Even though both devices can use NAT-T, it is not necessary if neither device is behind a NAT.
20
The NAT device maintains this map for only a short time when there is no traffic that matches the map. If the device does not see traffic that uses the NAT map for a certain amount of time, it closes the NAT. NAT timeouts for UDP traffic are typically much lower than NAT timeouts for TCP connections. If UDP-encapsulated traffic is sent from behind the NAT device, NAT is opened on the NAT device. To keep the IPSec tunnel active when NAT-T is used, the IPSec devices keep the NAT map alive. The IPSec device behind a NAT sends a NAT-T keep-alive packet to keep the NAT map active. The peer that receives the NAT keep-alive packet replies with a keep-alive ACK to keep the NAT active on the remote NAT device. The Keep-Alive Interval affects your XTM device only if your XTM device is the IKE peer behind the NAT. It specifies how often your device sends a NAT keep-alive packet to keep the NAT map active on the NAT device in front of the XTM device. When the remote IKE peer is behind a NAT, it has its own settings for the keep-alive interval. Your XTM device responds to the NAT keep-alive messages it gets from the other side, but your XTM device does not influence the interval that the peer uses between the keep-alives it sends.
IKE Keep-alive and Dead Peer Detection (DPD, discussed in the next section) messages enable the XTM device to detect if the IKE peer is still alive. For VPN failover, either IKE Keep-alive or DPD is the method the XTM device uses to determine whether to fail over to another gateway endpoint pair. This is the only part of the gateway configuration that is not actually part of the Phase 1 negotiations. This setting is only to enable or disable the option, and to specify the interval between the messages. For IKE Keep-alive to work, each peer must be able to respond to the keep-alive messages sent by the other side. When both peers can use IKE Keep-alive messages, each device sends a Hello packet (the IKE Keep-alive message) to the other side at regular intervals. When a device receives an IKE Keep-alive packet, it returns an acknowledgement (a keep-alive ACK) to the peer that sent the message. When the sending peer gets the ACK, it knows that the remote peer is still alive and that the Phase 1 SA between them is still valid. If a device sends a specified number of keep-alive messages that get no response, the device closes the VPN and tries to start tunnel negotiations again.
All WatchGuard products respond to IKE Keep-alive messages. However, they are specific to WatchGuard products, so other vendors appliances might not respond.
21
If you use VPN failover and the maximum number of keep-alive failures is reached, the XTM device starts negotiations with the next gateway endpoints pair in the list (see Figure 5). If there is only one pair in the list, the device starts IKE negotiations again with that pair. For a fast VPN failover, we recommend you set the Message interval to a low value, such as 10 seconds, and set the Max failures to a lower value, such as 2. If you have only one gateway endpoint pair for the gateway (you do not use VPN failover), keep the default settings. For a VPN to a third-party device (not a WatchGuard product) we recommend you do not use this option. To configure the XTM device to not send keep-alive messages, clear the IKE Keep-alive check box. For a VPN to any Firebox or XTM device that can use Dead Peer Detection, we recommend you do not use this option. To configure the device to not send keep-alive messages, clear the IKE Keepalive check box.
Dead Peer Detection (RFC3706) is a traffic-based detection of an inactive peer. It works in a similar (but more intelligent) way to IKE Keep-alive. When Dead Peer Detection (DPD) is enabled, the XTM device sends a DPD probe (a message similar to the IKE Keep-alive message) only if traffic is not received from the peer for a specified length of time, and data is waiting to be sent to that peer. This method is more scalable than IKE Keep-alive messages because DPD probes are sent only when no traffic is received from the other side for some amount of time. (Compare this to the IKE Keep-alives mechanism, which sends keep-alive messages at regular intervals regardless of the health of the tunnel.) In the Traffic idle timeout text box, set the amount of time traffic can be idle before the XTM device sends a DPD probe to the peer. In the Max retries text box, set the number of times the XTM device should send a DPD probe before the peer is declared dead because it received no response. Dead Peer Detection is an industry standard that is used by most IPSec devices. If it is supported by the devices on both ends, we recommend you use Dead Peer Detection instead of IKE Keep-alive, particularly for VPN failover. Note
Do not select both IKE Keep-alive and Dead Peer Detection. Use one or the other, but not both. Use Dead Peer Detection if both endpoint devices support it.
22
The Transform Settings list includes the Phase 1 transforms the XTM device can send for this VPN. To add a transform, click Add. To edit a transform, select a transform in the list and click Edit.
The Phase 1 Transform dialog box appears.
The Phase 1 transform settings must exactly match the settings for the Phase 1 transform that the IKE peer accepts, or IKE negotiations fail. The items you can set in the transform are: Authentication Authentication ensures that the information received is exactly the same as the information sent. You can use SHA1 or MD5 as the algorithm the peers use to authenticate IKE messages from each other. SHA1 is more secure. Encryption Encryption keeps the data confidential. You can select DES, 3DES, or AES with 128, 192, or 256-bit key strength. AES is the most secure.
The Phase 1 SA is commonly called the IKE SA. The technically correct term is the ISAKMP SA. If the remote IKE peer can set a KB limit for the Phase 1 SA Life, make sure to set its Phase 1 SA Life to 0 KB, and use a time setting that matches the Fireware XTM peers Phase 1 SA life. Fireware XTM does not use an amount of data for Phase 1 SA expiration. Diffie-Hellman Group 1 provides 768 bits of keying material, Group 2 provides 1,024, and Group 5 provides 1,536.
SA Life When Phase 1 is completed, the two peers have a Phase 1 Security Association (SA). This SA is valid for only a certain amount of time. After the Phase 1 SA expires, any new Phase 2 renegotiation requires the two peers to also renegotiate Phase 1. Some IKE peers can also specify an amount of data, in KB, that can pass through the VPN before the Phase 1 SA Life expires. Fireware XTM does not specify a data lifetime. In general, if the peer requires a value for Phase 1 SA data limit, you set the peer to use 0 KB to specify no KB timeout. Key Group The Diffie-Hellman Group specifies the length of a mathematical parameter used for the DiffieHellman key exchange. You can select group 1, 2, or 5. A higher number indicates a more secure key exchange.
24
Figure 18: The newly configured gateway appears in the Gateways list.
25
To add a tunnel:
1. Open Policy Manager for your XTM device. 2. Click . Or, select VPN > Branch Office Tunnels.
The Branch Office IPSec Tunnels dialog box appears.
3. Click Add.
The New Tunnel dialog box appears.
Figure 20: New tunnel. Make sure to select the correct gateway.
4. In the Tunnel Name text box, type a friendly name for the tunnel. For this example, we type Main_Office_Tunnel.
Do not give the VPN tunnel the same name that is used for a VPN Gateway.
Fireware XTM does not send this name to the peer device. It is only used to identify the tunnel in your devices configuration.
The subsequent sections describe the purpose of each element in the tunnel configuration.
26
Figure 21: The Addresses tab for this tunnel includes IP subnets for the Phase 2 IDs.
The remote IKE peer must have the same type of Phase 2 IDs and they must be the reverse of the Phase 2 IDs on your XTM device.
Branch Office VPN Tunnels 27
The devices on both ends of the tunnel must use Fireware XTM v11.x to enable this option. When you enable broadcast routing, the tunnel supports broadcasts only to the limited broadcast IP address, 255.255.255.255. Local subnet broadcast traffic is not routed through the tunnel. (A local subnet broadcast is also called a directed broadcast, such as the 192.168.1.255 in the 192.168.1.0/24 network). If you select this option, make sure to configure Helper Addresses.
Figure 23: The Addresses tab for this tunnel shows the IP subnets in bold, to indicate that broadcast routing is enabled for this tunnel.
28
If broadcast routing through the tunnel is enabled for the added tunnel routes, the tunnel resources appear in bold. When broadcast routing is enabled, you must configure Helper Addresses,. We recommend you use IP addresses in a private network IP address range that is not used by any local network or by any remote network connected through a VPN. The XTM device uses these addresses as the endpoints of the GRE tunnel (General Routing Encapsulation tunnel protocol) inside the IPSec BOVPN tunnel. The XTM device sends the broadcast traffic through the GRE tunnel. The remote IKE peer must use the same Helper Addresses, and they must be the reverse of your XTM device Helper Addresses. When broadcast routing is not enabled the tunnel resources are not bold and the Helper Addresses are not required.
We recommend that you use IP addresses that are not used by any local or remote network to ensure that the addresses do not conflict with any other device.
29
The settings in Figure 24 show that the XTM device is enabled to send multicast traffic. This means that the origination IP address is a host within the trusted interface network. Origination IP The IP address of the multicast sending device at one end of the tunnel. Group IP A reserved multicast group IP address that is associated with recipients of the multicast traffic. Input Interface The XTM device internal interface with the subnet that holds the origination IP address as one of its hosts.
The settings in Figure 25 show that the XTM device is enabled to receive multicast traffic. The origination IP address is an address on the other end of the tunnel. Origination IP and Group IP The same values as in the tunnel configuration of the sending XTM device. Output Interface The XTM device internal interfaces where the multicast traffic is routed. The receiving hosts must be located on one of the selected internal interfaces.
30
Peers Agree on Whether to Use Perfect Forward Secrecy and Which DiffieHellman Group to Use for PFS
At the top of the New Tunnel dialog box Phase 2 Settings tab, you specify whether to use Perfect Forward Secrecy (PFS) and which Diffie-Hellman group to use to generate new keying material.
31
1. In the New Tunnel dialog box, select the Phase 2 Settings tab. 2. From the IPSec Proposals list, select a Phase 2 proposal. Or, click Add to create a new proposal.
Figure 27: Phase 2 Proposals The New Phase 2 Proposal dialog box appears.
32
3. In the Proposal Details section, configure these options for the new Phase 2 proposal:
Name Type a name for the proposal. Fireware XTM does not send this name to the IKE peer; it is only for your identification purposes. Type Most often, you select ESP (Encapsulating Security Payload). ESP provides authentication and encryption of the data that passes over the VPN. The other option, AH (Authentication Header), provides no encryption to the data that passes over the VPN. AH only provides authentication of the data. (If you select AH, the Encryption drop-down list in Figure 28 is not available. Authentication Authentication ensures that the information received is exactly the same as the information sent. You can select either SHA1 or MD5 as the algorithm the peers use to authenticate IKE messages from each other. SHA1 is more secure. Encryption Encryption keeps the data confidential. You can select DES, 3DES, or AES with 128, 192, or 256-bit key strength. AES is the most secure. Force Key Expiration The longer a Phase 2 encryption key is in use, the more data an attacker has for mounting an attack on the key. Phase 2 expiration can happen based on the amount of time passed since the SA was created, the amount of data that goes over the VPN since the SA was created, or both. - Select the Time check box to expire the key after a quantity of time. Type or select the quantity of time that must pass to force the key to expire. - Select the Traffic check box to expire the key after a quantity of traffic. Type or select the number of kilobytes of traffic that must pass to force the key to expire. If both Force Key Expiration options are disabled, the key expiration interval is set to 8 hours.
33
How the XTM Device Detects That the IPSec Peer Gateway is Down
The XTM device detects that the IPSec peer gateway is down in two ways: IKE Keep-alive or DPD messages get no response Ethernet link failure is detected on an external interface
34
To use certificates with a VPN, each gateway endpoint must have these certificates: The CA certificate from the certification authority that issued the certificate for the local device. Your XTM device must verify the client certificate for the local device (see the subsequent point). It does this with the CA certificate from the authority that issued the client certificate. Make sure you import the CA certificate before you import the client certificate. This enables the XTM device to verify the client certificate. The client certificate for the local device. For your XTM device, this is the certificate that your XTM device sends to its VPN peer. The peer device verifies this certificate by checking it against a CA certificate. The CA certificate from the certification authority that issued the remote devices IPSec certificate. When your XTM device receives an IPSec certificate from its IKE peer, it must have a way to verify the peers certificate. It does this with the CA certificate of the certification authority that signed the remote peers certificate. The certificates that your XTM device can use to prove its identity appear in New Gateway dialog box in the Select the certificate to be used for the Gateway list (see Figure 4). Items in this list can be certificates that were issued by a WatchGuard Management Server, or certificates issued by a thirdparty certification authority that you manually import to the XTM device.
Only client certificates appear in Policy Manager; you do not manage CA certificates with Policy Manager. Use Firebox System Manager to see CA certificates.
If you choose not to create a managed VPN between two managed XTM devices, you can use Policy Manager to manually set up a VPN between them. You can use the certificates issued by the Management Server when you create a manual VPN. The WatchGuard Management Server automatically sends an IPSec certificate to the managed XTM device, and it appears at the bottom of the New Gateway dialog box. You can use this certificate to create a VPN to another Firebox or XTM device if both devices are managed by the same WatchGuard Management Server. The Management Server also automatically sends each managed XTM device the CA certificate so that each XTM device can verify the certificate that its peer sends in Phase 1. You do not manually import any certificates (described in the next section) if you use these certificates.
This training module does not discuss how to use the Management Server to create VPNs.
35
If you use third-party certificates, you import the certificates manually. You must import at least two, and possibly three, of these certificates: The CA certificate from the certification authority that issued the certificate for this XTM device. The client certificate for this XTM device. If the remote device uses a certificate issued by a different certification authority (not the CA that issued your XTM device certificate), you must import the CA certificate from the certification authority that issued that devices certificate. To import certificates, use Firebox System Manager (FSM).
1. Connect to the XTM device with Firebox System Manager. 2. Click . Or, select View > Certificates.
The Certificates dialog box for this XTM device appears.
3. To make a Certificate Signing Request, click Create Request. The wizard to generate a certificate request starts. You can then submit the certificate to a certification authority to be signed. You can also use your own certification authority to create the signed certificate.
Certificates must be in Base-64 format. Both the Certificate Request Wizard and the Certificate Import features ask you to select the function for the new certificate. Make sure to select IPSec, Web Server, Other.
4. To import the signed certificate to the XTM device, click Import Certificate / CRL. Make sure to import the CA certificate from the signing authority first.
You must provide the XTM device configuration (read-write) passphrase to import a certificate.
After you import the certificate and open Policy Manager, it will appear at the bottom of the New Gateway dialog box.
36
1. Open Policy Manager for your XTM device. 2. Select VPN > VPN Settings.
The VPN Settings dialog box appears.
3. Select the Enable LDAP server for certificate verification check box. 4. In the Server text box, type the IP address or domain name for the LDAP server that hosts the CRL.
The XTM device can only use LDAP to check certificates against this CRL server. Change the port number in the Port text box only if the LDAP server listens on a non-standard port for LDAP.
The two most common protocols used to check CRLs are LDAP and HTTP. Fireware XTM v11.x can only use LDAP to check CRLs, not HTTP.
5. Click OK.
37
Automatically Add Policies That Allow Traffic Over All Ports And Protocols
When you select the Add this tunnel to the BOVPN-Allow policies check box, Policy Manager automatically adds the Any policy to your configuration. This policy allows all traffic through the VPN. You can remove this policy only when you clear the Add this tunnel to the BOVPN-Allow policies check box in every tunnel.
1. Connect to the local gateway endpoint with Firebox System Manager. 2. Select Tools > Diagnostic Tasks.
The Diagnostic Tasks dialog box appears.
3. Click the VPN tab. 4. From the Gateway drop-down list, select a branch office VPN gateway.
38
5. In the Duration text box, type or select a duration for the report to collect log data.
The default duration is 20 seconds. The maximum is 60 seconds.
When you run the VPN diagnostic report, Fireware XTM temporarily increases the diagnostic log level for the selected gateway, and then collects detailed log data about the gateway and all associated tunnels. At the end of the specified duration, the report is generated, and the log levels return to their previous levels. The VPN Diagnostic Report has six sections. The first two sections show the configuration settings for the selected gateway and all tunnels that use that gateway. Gateway Summary shows a summary of the gateway configuration, including the configuration of each configured gateway endpoint Tunnel Summary shows a summary of the tunnel configuration for all tunnels that use the selected gateway The last four sections show run-time information based on the log message data collected when the report was run. Run-time Info (gateway IKE_SA) shows the status of the IKE (Phase 1) security association for the selected gateway Run-time Info (tunnel IPSEC_SA) shows the status of the IPSec tunnel (Phase 2) security association for active tunnels that use the selected gateway Run-time Info (tunnel IPSec_SP) shows the status of the IPSec tunnel (Phase 2) security policy for active tunnels that use the selected gateway Related Logs shows tunnel negotiation log messages, if a tunnel negotiation occurs during the time period that you run the diagnostic report The information provided by the VPN Diagnostic Report can help you see the status of tunnel negotiations, and help you determine what caused the tunnel negotiations to fail. The VPN Diagnostic Report is especially helpful if you have multiple tunnels, because it helps you to focus on just the one you want to troubleshoot.
39
You can use the gateway IP addresses to filter the log messages to find log messages related to a specific gateway.
If you use this method to troubleshoot your BOVPN tunnels, you might need to increase the diagnostic log level for IKE traffic in order to see enough detailed log information. To change the diagnostic log level for IKE traffic:
1. In Policy Manager, select Setup > Logging. 2. Click Diagnostic Log Level. 3. In the category list, expand the VPN category and select IKE. 4. Move the slider to increase the level of detail the XTM device sends to the log file.
When you increase the IKE diagnostic log level, the log file captures diagnostic log messages for all branch office VPN gateways. If you have several VPN gateways, you can filter the log messages by the gateway IP address to see only the log messages for a specific gateway.
40
Firewall Configuration
If your XTM device is not yet configured, run the Quick Setup Wizard and select Routed Mode.
41
Exercise
Make a Manual VPN Between a Single-WAN XTM Device and a MultiWAN XTM Device
When your XTM device has only one external interface and you create a VPN to a XTM device that has more than one external interface, your XTM device has more than one remote gateway to select for IKE negotiations. If one of the external interfaces on the remote XTM device does not respond, your XTM device can try another external interface at the remote peer. Conversely, if your XTM device has more than one external interface, and one of the interfaces is not available, it can use the other external interface to create a VPN to its remote peer.
Network Topology
This diagram shows the two XTM devices and their external interfaces connected to the Internet.
Your classroom is set up to simulate the Internet connections. XTM device A has one external interface and XTM device B has two external interfaces. In this exercise, you work with a partner. Student A configures the single-WAN XTM device (XTM Device A). Student B configures the multi-WAN XTM device (XTM Device B). In the examples, Student A uses 10 for the student number and IP addresses, and Student B uses 20 for the student number and IP addresses, as shown in the diagram.
42
Exercise
2. Set the IP address for Interface 0 to 203.0.113.10/24, and the default gateway to 203.0.113.1. 3. Click OK.
3. In the Gateway Name text box, type a friendly name. For this example, type To_Device_B. 4. In the Credential Method section, select Use Pre-Shared Key. 5. In the Use Pre-Shared Key text box, type shh-secret!, or another string that you and your partner agree on. 6. Click Add to add a new gateway endpoints pair.
The New Gateway Endpoints Settings dialog box appears.
7. In the Local Gateway section, select By IP Address. 8. In the IP Address text box, type 203.0.113.10.
The External Interface drop-down list has only one item because this device has only one external interface.
9. In the Remote Gateway section, select Static IP address. In the IP Address text box, type the IP address of XTM Device Bs primary WAN interface, 203.0.113.20. 10. In the Remote Gateway section, select By IP Address. In the IP Address text box, type 203.0.113.20.
43
12. To add a second gateway endpoints pair, repeat Steps 612. Make sure to change the Remote Gateway settings, as described in the subsequent steps. 13. In the Local Gateway section, select By IP Address. In the IP address text box, type 203.0.113.10.
This part is the same as the previous gateway endpoint pair. Your device has only one external interface.
14. In the Remote Gateway section, select Static IP address. In the IP address text box, type the IP address of XTM Device Bs secondary WAN interface, 198.51.100.20. 15. In the Remote Gateway section, select By IP Address. In the IP address text box, type 198.51.100.20. 16. Click OK.
The new gateway endpoints pair appears in the Gateway Endpoints list with the first pair.
18. In the Dead Peer Detection section, set the Max retries value to 3.
This is set to a lower value than the default to ensure a faster VPN failover.
2. Click Add.
The New Tunnel dialog box appears.
Do not give your tunnel the same name as the branch office gateway.
3. In the Tunnel Name text box, type a friendly name for the tunnel. For this exercise, type Tunnel_to_Device_B. 4. Click Add and add a new tunnel route.
The Tunnel Route Settings dialog box appears.
5. In the Local text box, type the network address of the trusted interface on your device in slash notation. For this exercise, type 10.0.10.0/24. 6. In the Remote text box, type the trusted network address at the remote device. For this exercise, type 10.0.20.0/24. 7. Click OK.
The new tunnel route appears in the New Tunnel dialog box in the Addresses list.
8. Make sure the Add this tunnel to the BOVPN-Allow policies check box is selected.
When this check box is selected, Policy Manager automatically adds the BOVPN-Allow.out and BOVPNAllow.in policies that allow all traffic to flow between the two trusted networks.
9. Click OK.
The new tunnel appears in the Branch Office IPSec Tunnels dialog box.
Exercise
2. Set the IP address for Interface 0 to 203.0.113.20/24. The default gateway setting is 203.0.113.1. 3. Double-click Interface 6 and edit it. 4. In the Interface Type drop-down list, select External. 5. In the Interface Name (Alias) text box, type a new name for the interface. For this example, type WAN2. 6. Select Use Static IP. 7. In the IP address text box, type 198.51.100.20/24. 8. In the Default Gateway text box, type 198.51.100.1. 9. Click OK to return to Policy Manager.
7. In the Local Gateway section, select By IP Address. In the IP address text box, type 203.0.113.20. 8. From the External Interface drop-down list, select External.
External is the default name for interface 0. If you changed the name of interface 0, select that name.
Branch Office VPN Tunnels 45
9. In the Remote Gateway section, select Static IP address. In the IP address text box, type the IP address of XTM Device Bs primary WAN interface, 203.0.113.10. 10. In the Remote Gateway section, select By IP Address. In the IP address text box, type 203.0.113.10. 11. Click OK.
The new gateway endpoints pair appears in the Gateway Endpoints list.
12. To add a second gateway endpoints pair, repeat Steps 612. Make sure to change the Local Gateway settings, as described in the subsequent steps. 13. In the Local Gateway section, select By IP Address. In the IP address text box, type 198.51.100.20. 14. From the External Interface drop-down list, select WAN2.
This is the most common place to make an error. Make sure to select the interface name that corresponds to the secondary WAN interface on this device.
15. In the Remote Gateway section, select Static IP address. In the IP address text box, type the IP address of XTM Device Bs secondary WAN interface, 203.0.113.10.
These settings do not change from the previous gateway endpoint pair you added. The remote XTM device has only one external interface.
16. In the Remote Gateway section, select By IP Address. In the IP address text box, type 203.0.113.10. 17. Click OK.
The new gateway endpoints pair appears in the Gateway Endpoints list with the first pair.
19. In the Dead Peer Detection section, set the Max retries value to 3.
This is set to a lower value than the default to ensure a faster VPN failover.
2. Click Add.
The New Tunnel dialog box appears.
3. In the Tunnel Name text box, type a friendly name for the tunnel. For this exercise, type Tunnel_to_Device_A. 4. Click Add and add a new tunnel route.
The Tunnel Route Settings dialog box appears.
5. In the Local text box, type the network address of the trusted interface on your device in slash notation. For this exercise, type 10.0.20.0/24. 6. In the Remote text box, type the trusted network address at the remote device, 10.0.10.0/24. 7. Click OK.
The new tunnel route appears in the Addresses list.
46
Exercise
8. Make sure the Add this tunnel to the BOVPN-Allow policies check box is selected.
When this option is selected, Policy Manager automatically adds the BOVPN-Allow.out and BOVPN-Allow.in policies to your configuration. These policies allow all traffic to flow between the two trusted networks.
9. Click OK.
The new tunnel appears in the Branch Office IPSec Tunnels dialog box.
XTM Device B
1. Connect one end of an Ethernet cable to the device Interface 6. 2. Connect the other end of this Ethernet cable to the hub or switch that connects to the 198.51.100.x network.
Ping from an XTM device interface to the trusted interface on the other device
1. Connect to your device with Firebox System Manager. 2. Select Tools > Diagnostic Tasks.
The Diagnostic Tasks dialog box appears.
The source IP address you use for the ping in Tools > Diagnostic Tasks must be an IP address assigned to the local XTM device, and must be within the phase 2 allowed address range. You can hover the mouse over the Arguments text box to see a list of command arguments.
4. In the Arguments text box, type -I <local trusted interface IP address> <remote trusted interface IP address> For example:
- To ping from Device A to Device B, type: -I 10.0.10.1 10.0.20.1 - To ping from Device B to Device A, type: -I 10.0.20.1 10.0.10.1
5. Disconnect interface 0 on XTM Device B The devices start new IKE negotiations with XTM Device Bs secondary WAN interface. Only one to three pings should time out.
47
48
More FAQs The WatchGuard Knowledge Base provides articles that can help expand your knowledge. For example, the Knowledge Base has articles about: - BOVPN Interoperability - Use NAT through a BOVPN tunnel - Set up a default route to send all Internet-bound traffic through a BOVPN - Use tunnel switching to route VPN traffic between two BOVPN tunnels - Use traffic management with BOVPN tunnels - Improve availability of your VPN connection - Configure VPN failover Search the Knowledge Base at http://customers.watchguard.com.
49
1. True or false? The XTM device uses the Gateway Name as the Phase 1 ID to identify itself to the remote peer. 2. True or false? If more than one pair of local/remote IP addresses can send traffic over the VPN, then a unique SA is created for each pair. 3. If you want to add multiple Phase 1 transforms, Phase 1 must be configured in __________ mode. (Select one.)
A) B) C) D) E) Default Quick Aggressive Passive Main
5. True or false? You can configure a maximum of one tunnel per gateway. 6. Which is the most secure encryption method? (Select one.)
A) B) C) D) E) F) SHA1 MD5 AES-128 AES-256 DES 3DES
50
Mobile VPN
Securely Connect Mobile Users
In this module, you will connect to one or more XTM devices. If you take this course with a WatchGuard Certified Training Partner, your instructor will provide the IP address and passphrases for devices used in the exercises. For self-instruction, you can safely connect to a XTM device on a production network. It is helpful to conduct a portion of this exercise from a computer connected to the external network.
51
Mobile VPN with SSL also can create a client configuration file, but only for the WatchGuard Mobile VPN for iOS client.
When you use Mobile VPN, you first configure your XTM device and then the remote client computers. You use Policy Manager to configure the settings for each user or group of users. For Mobile VPN with IPSec and Mobile VPN with SSL, Policy Manager creates a Mobile VPN client configuration file that includes all the settings necessary to connect to the XTM device. You can also configure your policies to allow or deny traffic from Mobile VPN clients. Mobile VPN users authenticate either to the Firebox user database on the XTM device or to an external authentication server. In this module, we use the Firebox authentication method to illustrate the authentication process.
By default, Mobile VPN with L2TP uses IPSec to provide strong encryption and authentication. This is the recommended configuration. L2TP VPN negotiations happen over UDP port 500. Data that passes over the L2TP VPN, with IPSec enabled is encapsulated in ESP packets (protocol 50). UDP port 4500 can also be necessary for Mobile VPN with L2TP VPNs when IPSec is enabled. This port is for NAT Traversal (NAT-T). If either end (the XTM device or the remote client) is behind a network device that does Network Address Translation, IPSec-encapsulated traffic is reencapsulated in new UDP port 4500 packets. This prevents problems that can occur with some NAT devices that do not correctly handle IPSec traffic.
52
While there are subtle advantages and disadvantages to each method, the type of Mobile VPN you select largely depends on your existing infrastructure and your network policy preferences. The XTM device can manage all four types of mobile VPN simultaneously. A client computer can be configured to use one or more VPN connection methods. Some considerations that may influence your selection of a mobile VPN protocol are: Encryption support Client OS support Authentication server compatibility VPN tunnel capacity and licensing
Use this table to compare the characteristics of each mobile VPN protocol: Mobile VPN Type
Mobile VPN with PPTP
Client OS Support
No client installation necessary. PPTP is included with Windows OS Shrew Soft VPN client supports: Windows Vista Windows 7 and 8 Windows XP WatchGuard Mobile VPN app for iOS supports: iOS 5.x and 6.x WatchGuard Mobile VPN app for Android supports: Android 4.0.x and 4.1.x Windows Vista Windows 7 and 8 Windows XP Mac OS X v10.5 Mac OS X 10.6 (32-bit)
Base and maximum tunnels vary by XTM device model. License purchase is required to enable the maximum number of tunnels.
Maximum number of tunnels varies by XTM device model. Pro upgrade for the Fireware XTM OS is required for maximum SSL VPN tunnels. To support more than one SSL VPN tunnel you must have a Pro upgrade. Maximum number of tunnels varies by XTM device model. Pro upgrade for the Fireware XTM OS is required for maximum L2TP VPN tunnels. To support more than one L2TP VPN tunnel you must have a Pro upgrade.
No client installation necessary. Mobile VPN with L2TP VPN supports connections from most L2TP VPN v2 clients that comply with the L2TP RFC 2661 standard. WatchGuard Mobile VPN app for iOS supports: iOS 5.x and 6.x
* The Shrew Soft IPSec VPN client is not compatible with 2-factor authentication.
For the base and maximum number of tunnels supported for Mobile VPN with IPSec and Mobile VPN with SSL and Mobile VPN with L2TP, see the detailed specifications for your XTM device model. Note
SSL, IPSec, and L2TP VPN support AES-256 encryption. PPTP is limited to 128 bit (non-AES) encryption.
Mobile VPN
53
- If you define custom users or groups in the Mobile VPN with SSL authentication settings, only the group name SSLVPN-Users appears in the automatically generated Allow SSLVPNUsers policy. Even though the group name in the policy might not match the custom groups or user names you defined, this policy does apply to all users and groups you configured in the Mobile VPN with SSL authentication settings. - If you define custom users or groups in the Mobile VPN with L2TP or authentication settings, only the group name L2TP-Users appears in the automatically configured Allow L2TP-Users policy. Even though the group name in the policy might not match the custom groups or user names you defined, this policy does apply to all users and groups you configured in the Mobile VPN with L2TP authentication settings. Regardless of which authentication server you use, you must make sure that these users and groups exist on the authentication server, for them to connect with Mobile VPN.
54
Mobile VPN
55
Phase 2 Proposal
Phase 2 PFS
Because these settings are the same as the settings required for the native VPN client on Mac OS X and iOS devices, you can use the same profile for Android, Mac OS X and iOS mobile users.
56
Configure the WatchGuard Mobile VPN App for Android: 1. Generate the .wgm profile for the Mobile VPN with IPSec group. 2. Send the .wgm profile to the mobile users as an email attachment. 3. Use a secure method to give the passphrase to the mobile users 4. On the Android device, install the free WatchGuard Mobile VPN app from the Google Play app store. 5. In the email client on the Android device, open the email that contains the .wgm file attachment. 6. Open the .wgm file attachment.
The WatchGuard Mobile VPN app launches.
7. Type the passphrase received from the administrator to decrypt the file. 8. The WatchGuard Mobile VPN app imports the configuration and creates a VPN connection profile. 9. Click the VPN connection profile in the WatchGuard Mobile VPN app to start the VPN connection. Configure the Native Android 4.x VPN Client 1. On the Android device Settings page, in the Wireless & Networks section. select More > VPN. 2. Click Add VPN Network. 3. Configure these settings: - Name A name to identify this VPN connection on the Android device - Type Select IPSec Xauth PSK - Server address The external IP address of the XTM device - IPSec Identifier The group name you specified in the XTM device Mobile VPN with IPSec configuration IPSec pre-shared key The tunnel passphrase you set in the XTM device Mobile VPN with IPSec configuration
Mobile VPN
57
To configure Mobile VPN with IPSec to work with the VPN client on Mac OS X or iOS devices, you run the Mobile VPN with IPSec Wizard. Then you change the Phase 1 and Phase 2 settings in the Mobile VPN with IPSec configuration to settings that are supported by the VPN client on the Mac OS X or iOS device. Many of the VPN tunnel configuration settings in the VPN client on the iOS device are not configurable by the user. It is very important to configure the settings on your XTM device to match the settings required by the VPN client on the Mac OS X or iOS device. The Mobile VPN with IPSec configuration settings on the XTM device must be set to values that are shown in the subsequent table. Configuration
User authentication server Tunnel authentication method Internet Traffic Phase 1 Authentication Phase 1 Advanced Settings
Phase 2 Proposal
Phase 2 PFS
58
Option 1: Use the WatchGuard Mobile VPN app to Import VPN Settings to the iOS Native VPN Client 1. In Policy Manager, select VPN > Mobile VPN > IPSec. 2. Select the Mobile VPN group. Click Generate.
The .wgm file is generated and encrypted with the passphrase specified in the Mobile VPN with IPSec configuration.
3. Send the .wgm profile to the mobile users as an email attachment. 4. Use a secure method to give the passphrase to the mobile users. 5. On the iOS device, install the free WatchGuard Mobile VPN app for iOS from the Apple App Store. 6. In the email client on the iOS device, open the email that contains the .wgm file attachment. 7. Open the .wgm email file attachment.
The WatchGuard Mobile VPN app launches.
8. Type the passphrase received from the administrator to decrypt the file.
The WatchGuard Mobile VPN app imports the configuration to create an IPSec VPN configuration profile in the native iOS VPN client.
Option 2: Manually Configure VPN Settings in the iOS Native VPN Client 1. On the iOS device, select Settings > General > Network > VPN > Add VPN Configuration. 2. Configure these settings in the VPN client: - Server The external IP address of the XTM device - Account The user name on the authentication server - Use Certificate Set this option to OFF - Group Name The group name in the XTM device Mobile VPN with IPSec configuration - Secret The tunnel passphrase in the XTM device Mobile VPN with IPSec configuration - Users Password The password for the user in the authentication server configuration
1. Open System Preferences and select Network. 2. Click + at the bottom of the list to add a new interface. Configure these settings: - Interface VPN - VPN Type Cisco IPSec - Service Name type the name you want to use for this connection - Server Address The external IP address of the XTM device - Account Name The user name on the authentication server - Password The password for the user on the authentication server - Shared Secret The tunnel passphrase you set in the XTM device Mobile VPN with IPSec configuration - Group Name The group name you chose in the XTM device Mobile VPN with IPSec configuration
Mobile VPN
59
1. In Policy Manager, select VPN > Mobile VPN > L2TP > Mobile Client.
2. Type a Profile Name. 3. Type the external IP address or domain name of your XTM device. 4. Type and confirm the password to encrypt the profile. 5. Click Generate.
The .wgm file is generated and encrypted with the encryption password you specify.
6. Send the .wgm profile to the mobile users as an email attachment. 7. Use a secure method to give the encryption password to the mobile users. 8. On the iOS device, install the free WatchGuard Mobile VPN app for iOS from the Apple App Store. 9. In the email client on the iOS device, open the email that contains the .wgm file attachment. 10. Open the .wgm email file attachment.
The WatchGuard Mobile VPN app launches.
11. Type the encryption password to decrypt the file and import it to the native iOS VPN client.
Now you can select the profile in the native iOS VPN client to start the connection.
60
Mobile VPN
61
Exercise 1:
Successful Company starts with just a few mobile users and decides to use the L2TP client built into the Windows operating system on their laptop computers. It requires more configuration on the client than the alternatives, but it is a good way to start to implement a company network policy which includes remote users.
1. Open WatchGuard System Manager and connect to the XTM device you want to configure. 2. Click
or, select Tools > Policy Manager.
Policy Manager opens the configuration file for the selected XTM device.
3. In Policy Manager, select VPN > Mobile VPN > L2TP > Activate.
The WatchGuard L2TP Setup Wizard welcome page appears.
If you had configured a RADIUS server, that would be another option on the authentication servers list. If you select more than one authentication server, the server at the top of the list is the default server. To authenticate with a non-default authentication server, the user must include the server as part of the Username when they start an L2TP VPN connection. For example, if you enable RADIUS as a secondary authentication server, user mbrown must log in as radius\mbrown to authenticate with the RADIUS server.
4. Click Next.
The Select the user authentication servers page appears. Firebox-DB is selected by default.
62
8. Click Add.
The Add Address dialog box appears.
9. From the Choose Type drop-down list, select Host Range IPv4.
The Value and To text boxes appear in the dialog box.
10. In the Value text box, type 10.0.1.50. 11. In the To text box, type 10.0.1.74.
This sets a range of virtual IP addresses that L2PTP remote users can use while connected. You must add at least two IP addresses for L2TP to operate correctly.
Make sure you select IP addresses that are not used by any device behind the XTM device.
Mobile VPN
63
12. Click Next. The Select the tunnel authentication method page appears. 13. In the Use Pre-Shared Key text box, type sshh-secret! or another text string at least 8 characters long. 14. Click Next. and then Finish to close the L2TP configuration wizard.
You can examine your device configuration to see that the WatchGuard L2TP Setup Wizard made these changes: Enabled Mobile VPN with L2TP To see or edit the configuration, select VPN > Mobile VPN > L2TP > Configure. Automatically generated two policies: WatchGuard L2TP This L2TP policy allows L2TP traffic to the XTM device on UDP port 1701. Allow L2TP Users This Any policy allows the groups and users you configured for L2TP authentication to get access to resources on your network.
4. Type the Name and (optional) a Description of the new user. 5. Type and confirm the Passphrase you want the user to use to authenticate.
64 WatchGuard Fireware XTM Training
6. In the Firebox Authentication Groups section, in the Available list, select L2TP-Users and click .
The L2TP-Users group moves from the Available list to the Member list.
7. Click OK.
The user is added to the L2TP-Users group. This user can now use the configured username and passphrase to authenticate through an L2TP client.
Mobile VPN
65
1. In Windows Control Panel, select Network and Internet. 2. Click Network and Sharing Center. 3. Select Set up a new connection or network. 4. Click Connect to a workplace and click Next.
The Connect to a workplace page appears.
5. If your computer has an existing workplace connection, select No, create a new connection and click Next.
The How do you want to connect page appears.
7. In the Internet address text box, type the hostname or IP address of the XTM device external interface. 8. In the Destination name text box, type a name for the Mobile VPN (such as "L2TP to XTM"). 9. Select whether you want other people to be able to use this connection. 10. Select the Dont connect now; just set it up so I can connect later check box so that the client computer does not try to connect at this time. 11. Click Next.
The Type your user name and password page appears.
12. Type the User name and Password for the mobile user. 13. Click Create. 14. Click Close. 15. Click Connect to a Network.
A list of the configured VPN connections appears.
16. Select the name of the VPN connection you just created. Click Connect.
The Connect dialog box appears.
The General tab contains the hostname or IP address you provided in the New Connection Wizard. You do not need to change anything on this tab unless the IP address of your XTM device changes.
18. Select the Security tab. 19. From the Type of VPN drop-down list, select Layer 2 Tunneling Protocol with IPsec (L2TP/ IPSec). 20. From the Data encryption drop-down list, select Require encryption. 21. Select Microsoft CHAP Version 2 as the only allowed protocol. 22. Click Advanced settings.
The Advanced Properties dialog box appears.
23. Select Use pre-shared key for authentication. 24. Type the pre-shared key for this tunnel. The pre-shared key must match the pre-shared key configured on the XTM device Mobile VPN with L2TP IPSec settings.
If you wanted to enable split tunneling, you would do that in the Networking tab.
66
Mobile VPN
67
Exercise 2:
Configure Mobile VPN with IPSec and Prepare Mobile VPN Client Configuration Files
For Mobile VPN with IPSec, the network security administrator controls Mobile VPN with IPSec configuration files. You use Policy Manager to configure a user group with Mobile VPN with IPSec access. For each user group with Mobile VPN with IPSec access, a Mobile VPN profile is saved in four Mobile VPN configuration files with the file extensions *.wgx, *.ini, .vpn, and .wgm. The .wgx, .ini, .vpn, and .wgx files contain the shared key, user identification, IP addresses, and settings that the VPN client uses to create a secure tunnel between the remote computer and the XTM device. In this exercise, we will use the *.vpn file. Mobile VPN with IPSec generates Mobile VPN client configuration files for three different IPSec VPN clients: Shrew Soft VPN Client WatchGuard added support for the Shrew Soft VPN client in Fireware XTM v11.3.4 and Fireware XTM v11.4. This client is not supported in earlier versions of Fireware XTM. The Shrew Soft VPN client for Windows uses the .vpn Mobile VPN client configuration file. The .vpn client configuration file is not encrypted. We recommend that you use a secure method to distribute this file. WatchGuard Mobile VPN with IPSec Client WatchGuard no longer distributes this VPN client, but Fireware XTM still supports it. The WatchGuard Mobile VPN with IPSec client uses either the .wgx or the .ini Mobile VPN client configuration file. WatchGuard Mobile VPN Apps for Android and iOS The WatchGuard Mobile VPN apps for Android and iOS devices use the .wgm client configuration file. This file is encrypted with the passphrase in the Mobile VPN with IPSec configuration. This exercise shows you how to configure the XTM device and deploy the user profile and Shrew Soft VPN client to a new employee in the IT department of Successful Company. As a member of the Marketing team, Tim is constantly on the road. The Successful Company network administrator will use Policy Manager to create a Mobile VPN profile that Tim can use to connect securely to the Successful Company network.
2. Click Add.
The Add Mobile VPN with IPSec Wizard appears.
3. Click Next.
The Select a user authentication server page appears.
The SecurID authentication method is not supported with the Shrew Soft VPN client. The Shrew Soft client does not support 2factor authentication.
68
6. Click Next.
The Select a tunnel authentication method page appears.
7. Select Use this passphrase. 8. In the Tunnel Passphrase and Retype Passphrase text boxes, type successfulremote.
9. Click Next.
The Direct the flow of internet traffic page appears.
10. Click Next to accept the default, more flexible setting that configures the VPN client to send traffic through the VPN tunnel only when the traffic destination matches a resource you specify.
The Identify the resources accessible through the tunnel page appears.
Mobile VPN
69
12. In the Choose Type drop-down list, select Network IPv4. 13. In the Value text box, type 10.0.1.0/24.
This will enable members of the Mobile Users group to access the Successful Company trusted network, 10.0.1.0/24.
16. To specify the IP addresses that will be assigned to the mobile user connections, click Add.
The Add Address dialog box appears.
17. From the Choose Type drop-down list, select Host Range IPv4.
The Value and To text boxes appear in the dialog box.
Make sure you select IP addresses that are not used by any device behind the XTM device.
18. In the Value text box, type 10.0.1.200. 19. In the To text box, type 10.0.1.210.
This sets a range of virtual IP addresses that IPSec remote users can use while connected. You must add at least two IP addresses for Mobile VPN with IPSec to operate correctly.
70
22. To add Tim to the Mobile Users group, select the Add users to Mobile Users check box. 23. Click Finish.
The Authentication Servers dialog box appears.
24. Select the Firebox tab. 25. In the Users section, click Add.
The Setup Firebox User dialog box appears.
To add or remove users later, select Setup > Authentication > Authentication Servers.
Mobile VPN
71
26. In the User Information section, type the Name, Description, and Passphrase for Tim.
72
Exercise 3:
In a default configuration, Mobile VPN with IPSec users have full access to XTM device resources with the Any policy. The Any policy allows traffic on all ports and protocols between the Mobile VPN user and the network resources available through the Mobile VPN tunnel. To restrict VPN user traffic by port and protocol, you can delete the Any policy on the Mobile VPN with IPSec tab and replace it with policies that restrict access.
2. Select the Any policy and delete it. 3. Click . Or, select Edit > Add Policy.
The Select Mobile VPN with IPSec Group dialog box appears.
Mobile VPN
73
4. Select the Mobile VPN with IPSec group for this policy and click OK.
The Add Policies dialog box appears.
5. Add a policy for the traffic that you want to allow from the Mobile VPN user.
For example, expand the Packet Filters list, select the HTTP policy and click Add to add a policy that lets the Mobile VPN users connect to resources over port 80.
74
6. You can edit this policy to limit the Mobile VPN users to only a subset of the resources in the Allowed Resources list. - In the Allowed Resources list, select a resource and click Remove. - To add a more limited set of resources, such as an individual Host IP address, or a smaller subnet than the subnet in the listed resource, click Add.
Any resource you add to the Allowed Resources list must be a subset of the original allowed resource.
7. You can also limit the users allowed to use this policy. To select which members of the Mobile VPN with IPSec group are allowed to use this policy, click Specify Users.
Mobile VPN
75
Exercise 4:
The Successful Company administrator wants to use the Shrew Soft VPN client to enable remote users to establish a secure, encrypted connection to their protected network over IPSec. To do this, remote users must first connect their computers to the Internet and then use the Mobile VPN with IPSec client to connect to the protected network. Before you install the client software on your users computers, make sure the remote computer does not have any other IPSec mobile user VPN client software installed. You should also disable or uninstall any desktop firewall software (other than Microsoft firewall software) from each remote computer. To ensure the installation is successful, you must log into the remote computer with local administrator rights.
3. Select File > Import. 4. Browse to select the location of the .vpn file. 5. Click Open.
The VPN client configuration is imported and a new site configuration appears in the Shrew Soft VPN Access Manager window.
If you use the Fireware XTM Web UI to generate the .vpn file, the certificates are not included in the .vpn file and must be imported to the Shrew Soft client as a separate step.
You can use certificates to authenticate the Mobile VPN users if your XTM device is managed by a WatchGuard Management Server. If you use Policy Manager to generate the Mobile VPN client configuration file, the certificates are embedded in the .vpn file and are automatically imported to the Shrew Soft VPN client when you import the .vpn configuration file.
76
1. Connect to the Internet through a local area network (LAN) or wide area network (WAN). 2. From the Windows Start menu, start the Shrew Soft VPN Access Manager.
3. Click the Mobile Users.vpn profile icon to select it. Then click Connect.
The Shrew Soft VPN Connect dialog box appears.
If you use certificates for authentication, the user must type the username and password a second time. This password is used to open the private key for the client certificate.
Mobile VPN
77
5. Click Connect.
Connection progress appears in the Connect tab.
It can take several seconds for the Shrew Soft VPN client to connect. When the VPN client has connected, the message Tunnel Enabled appears in the Connect tab. After the VPN client has connected, you can minimize the Shrew Soft VPN Connect dialog box, but do not close it. To keep your VPN connection, you must keep the Shrew Soft VPN Connect dialog box open. You can close the Shrew Soft Access Manager window. To end the Shrew Soft VPN connection, you can click Disconnect in the Shrew Soft VPN Connect dialog box, or simply close the Shrew Soft VPN Connect application.
78
Exercise 5:
For security and ease of use, many organizations use Mobile VPN with SSL. With Mobile VPN with SSL, remote users connect to the XTM device on TCP port 443 where users can download client software and a client profile to their computers. The client software is also available on the WatchGuard web site. A XTM device administrator can also download the client software and make it available at other locations. In this exercise, we use Policy Manager to activate the XTM device for Mobile VPN with SSL and create a policy to restrict SSL VPN user access.
2. Select the Activate Mobile VPN with SSL check box. 3. Select the Force all client traffic through the tunnel check box.
This ensures that all traffic both to and from the remote user computers must pass through the XTM device. This method is more secure, however, it uses more processing power and bandwidth on the XTM device.
Mobile VPN
79
5. Make sure the check box next to Firebox-DB is selected. This is selected by default.
The group SSLVPN-Users is also added to the configuration by default.
6. Click OK.
Note
If you select other authentication servers, such as LDAP, or Active Directory, make sure that you add the users and groups that exist on those servers to the Users and Groups list.
In this exercise, we use Firebox-DB as the authentication server. You can optionally select multiple authentication servers. If you select more than one authentication server, the server at the top of the list is the default server. The default server is used for authentication unless a user specifies a different server. To authenticate with a non-default authentication server, the user must include the server as part of the Username when they log in from the Mobile VPN with SSL client. For example, if you enable LDAP as a secondary authentication server, LDAP user mbrown must log in as ldap\mbrown.
COPYRIGHT 2013 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, Firebox, and Core are registered trademarks or trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries.
4. Type the Name and (optional) a Description of the new user. 5. Type and confirm the Passphrase you want the user to use to authenticate. 6. In the Firebox Authentication Groups section, in the Available list, select SSLVPN-Users and click .
The SSLVPN-Users group appears in the Member list.
7. Click OK.
The user is added to the SSLVPN-Users group. The configured username and passphrase can now be used to authenticate.
Mobile VPN
81
When we activated Mobile VPN with SSL, Policy Manager automatically created a policy to allow all traffic to resources on the Trusted and Optional networks. In this exercise, the Successful Company administrator decides to restrict this policy to allow traffic only to their internal HTTP server. In a realworld environment, the administrator might also want to open FTP and SMTP to internal servers.
1. In the Policy Manager Firewall tab, select the Allow SSLVPN-Users policy.
This policy was automatically created when we activated Mobile VPN with SSL. This is an Any policy that allows all traffic from Mobile VPN with SSL users to all resources on the Trusted and Optional networks.
5. Expand the Proxies list and select HTTP Proxy. Click Add.
The New Policy Properties dialog box appears. You can use this policy to control access to the Successful Company web server on the trusted network, or to control access from SSLVPN-Users to the Internet.
10. In the Selected Members and Addresses list, select Any-Trusted and click Remove. 11. Click OK to close the Add Address dialog box.
The SSLVPN-Users group appears in the New Policy Properties dialog box in the From list.
14. In the Choose Type drop-down list, select Host IPv4. 15. In the Value text box, type the IP address of the web server: 10.0.2.80. Click OK.
In the Add Address dialog box, 10.0.2.80 appears in the Selected Members and Addresses list.
16. In the Selected Members and Addresses list, select Any-External and click Remove.
82
Mobile VPN
83
Exercise 6:
One of the major advantages of Mobile VPN with SSL is that it uses a port that is commonly open everywhere. The default port is TCP port 443, the same port used for HTTPS-encrypted web sites such as online banking and shopping web sites. It is possible that you might need to change this port if: Your XTM device is previously configured to allow connections to the devices external interface IP address over TCP port 443. The most common reason for this is that you have an HTTPS or SSL web server protected by the XTM device and you have an HTTPS policy that allows incoming TCP port 443 connections with the external interface IP address. AND You do not have another IP address you can assign to the external interface of your XTM device. If your XTM device already allows connections to one external IP address over port 443, you cannot use that same IP address to enable the device to host Mobile VPN with SSL sessions over TCP port 443 at the same time. You can change the port that your XTM device uses to host Mobile VPN with SSL sessions:
1. In the Mobile VPN with SSL Configuration dialog box, select the Advanced tab. 2. In the Data channel text box, type or select a new port.
84
If you change the Data channel value, users must manually type this port in the Mobile VPN with SSL connection dialog box. For example, if you change the data channel to 444, and the XTM device IP address is 203.0.113.2, the user types 203.0.113.2:444 instead of 203.0.113.2. If you keep the Data channel port value at the default setting of port 443, the user types only the XTM devices IP address (it is not necessary to type :443 after the IP address). To learn more about how to use the Mobile VPN with SSL client software to connect to the XTM device, see Exercise 7:.
Exercise 7:
In this exercise we authenticate with the SSLVPN User credentials to download and install the SSLVPN client for Windows. Then we use the client to authenticate to the XTM device.
4. Click Download for the client version you want to install. 5. Save the file to the Desktop. 6. Run the WG-MVPN-SSL.exe installation file.
Accept the default settings on each page of the installation wizard.
Mobile VPN
85
Each time the Mobile VPN with SSL client connects, it checks for updates to the client configuration. To start the Mobile VPN with SSL client:
instead of
203.0.113.2 in
1. Double-click the Mobile VPN with SSL client desktop icon. Or, in the Windows Start menu, select All Programs > WatchGuard > Mobile VPN with SSL Client > Mobile VPN with SSL Client.
The WatchGuard Mobile VPN with SSL authentication dialog box appears.
the Server text box. If Firebox-DB is not the default SSL VPN authentication server, the user must type FireboxDB\j_smith instead of j_smith in the Username text box.
2. Verify the Server and Username. 3. Type the Password. 4. Click Connect.
86
1. True or false? When you force all Internet traffic through a Mobile VPN tunnel, more processing power and bandwidth is consumed on the XTM device, but the configuration is also more secure. 2. True or false? Other than typing the IP address of the XTM device, and the user credentials, you can use the Mobile VPN with SSL client as soon as it is installed. There is no need to configure it. 3. What items does the user need to connect with the Shrew Soft Mobile VPN client? (Select all that apply.)
A) B) C) D) E) F) G) H) A shared key User name and password IP addresses of the allowed resources A .vpn client configuration file Administrator ID WatchGuard Mobile VPN with IPSec client software Shrew Soft VPN client software All of the above
4. True or false? You can create policies that control Mobile VPN access. 5. True or false? The .vpn client configuration file is not encrypted. 6. Which of these forms of Mobile User VPN are supported by WatchGuard System Manager? (Select all that apply.)
A) B) C) D) E) F) G) H) Active Directory IPSec LDAP PGP PPTP L2TP SSH SSL VPN
Mobile VPN
87
88