D-Link DFL-800-AV-12 User Manual - Page 234

IPsec Roaming Clients with Certificates, 9.2.4. L2TP Roaming Clients with Pre-Shared Keys

Page 234 highlights

9.2.3. IPsec Roaming Clients with Certificates Chapter 9. VPN • Create a Config Mode Pool object (there can only be one associated with a NetDefendOS installation) and associate with it the IP Pool object defined in the previous step. • Enable the IKE Config Mode option in the IPsec Tunnel object ipsec_tunnel. Configuring the IPsec Client In both cases (A) and (B) above the IPsec client will need to configured with the URL of the D-Link Firewall as well as the pre-shared key. 9.2.3. IPsec Roaming Clients with Certificates If certificates are used with IPsec roaming clients instead of pre-shared keys then no Pre-shared Key object is needed and the other differences in the setup described above are: 1. Load a Gateway Certificate and Root Certificate into NetDefendOS. 2. When setting up the IPsec Tunnel object, specify the certificates to use under Authentication. This is done by: a. Enable the X.509 Certificate option. b. Select the Gateway Certificate. c. Add the Root Certificate to use. 3. The IPsec client software will need to appropriately configured with the certificates and remote IP addresses. The step to set up user authentication is optional since this is additional security to certificates. 9.2.4. L2TP Roaming Clients with Pre-Shared Keys Due to the inbuilt L2TP client in Microsoft Windows, L2TP is a popular choice for roaming client VPN scenarios. L2TP is usually encapsulated in IPsec to provide encryption with IPsec running in transport mode instead of tunnel mode. The steps for L2TP over IPsec setup are: 1. Create an IP object (let's call it l2tp_pool) which defines the range of IP addresses which can be handed out to clients. The range chosen could be of two types: • A range taken from the internal network to which clients will connect. If the internal network is 192.168.0.0/24 then we might use the address range 192.168.0.10 to 192.168.0.20. The danger here is that an IP address might be accidentally used on the internal network and handed out to a client. • Use a new address range that is totally different to any internal network. This prevents any chance of an address in the range also being used on the internal network. 2. Define two other IP objects: • ip_ext which is the external public IP address through which clients connect (let's assume this is on the ext interface). • ip_int which is the internal IP address of the interface to which the internal network is connected (let's call this interface int). 234

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Create a
Config Mode Pool
object (there can only be one associated with a NetDefendOS
installation) and associate with it the IP Pool object defined in the previous step.
Enable the
IKE Config Mode
option in the
IPsec Tunnel
object
ipsec_tunnel
.
Configuring the IPsec Client
In both cases
(A)
and
(B)
above the IPsec client will need to configured with the URL of the D-Link
Firewall as well as the pre-shared key.
9.2.3. IPsec Roaming Clients with Certificates
If certificates are used with IPsec roaming clients instead of pre-shared keys then no
Pre-shared
Key
object is needed and the other differences in the setup described above are:
1.
Load a
Gateway Certificate
and
Root Certificate
into NetDefendOS.
2.
When setting up the
IPsec Tunnel
object, specify the certificates to use under
Authentication
.
This is done by:
a.
Enable the
X.509 Certificate
option.
b.
Select the
Gateway Certificate
.
c.
Add the
Root Certificate
to use.
3.
The IPsec client software will need to appropriately configured with the certificates and remote
IP addresses.
The step to set up user authentication is optional since this is additional security to certificates.
9.2.4. L2TP Roaming Clients with Pre-Shared Keys
Due to the inbuilt L2TP client in Microsoft Windows, L2TP is a popular choice for roaming client
VPN scenarios. L2TP is usually encapsulated in IPsec to provide encryption with IPsec running in
transport mode
instead of
tunnel mode
. The steps for L2TP over IPsec setup are:
1.
Create an IP object (let's call it
l2tp_pool
) which defines the range of IP addresses which can be
handed out to clients. The range chosen could be of two types:
A range taken from the internal network to which clients will connect. If the internal
network
is
192.168.0.0/24
then
we
might
use
the
address
range
192.168.0.10
to
192.168.0.20. The danger here is that an IP address might be accidentally used on the
internal network and handed out to a client.
Use a new address range that is totally different to any internal network. This prevents any
chance of an address in the range also being used on the internal network.
2.
Define two other IP objects:
ip_ext
which is the external public IP address through which clients connect (let's assume
this is on the
ext
interface).
ip_int
which is the internal IP address of the interface to which the internal network is
connected (let's call this interface
int
).
9.2.3. IPsec Roaming Clients with
Certificates
Chapter 9. VPN
234