D-Link DFL-800-AV-12 User Manual - Page 236

L2TP Roaming Clients with Certificates, 9.2.6. PPTP Roaming Clients

Page 236 highlights

9.2.5. L2TP Roaming Clients with Certificates Chapter 9. VPN Action Allow NAT Src Interface l2tp_tunnel ipsec_tunnel Src Network l2tp_pool l2tp_pool Dest Interface any ext Dest Network int_net all-nets Service All All The second rule would be included to allow clients to surf the Internet via the ext interface on the D-Link Firewall. The client will be allocated a private internal IP address which must be NATed if connections are then made out to the public Internet via the D-Link Firewall. 8. Set up the client. Assuming Windows XP, the Create new connection option in Network Connections should be selected to start the New Connection Wizard. The key information to enter in this wizard is: the resolvable URL of the D-Link Firewall or alternatively its ip_ext IP address. Then choose Network > Properties. In the dialog that opens choose the L2TP Tunnel and select Properties. In the new dialog that opens select the Networking tab and choose Force to L2TP. Now go back to the L2TP Tunnel properties, select the Security tab and click on the IPsec Settings button. Now enter the pre-shared key. 9.2.5. L2TP Roaming Clients with Certificates If certificates are used with L2TP roaming clients instead of pre-shared keys then the differences in the setup described above are: 1. Load a Gateway Certificate and Root Certificate into NetDefendOS. 2. When setting up the IPsec Tunnel object, specify the certificates to use under Authentication. This is done by: a. Enable the X.509 Certificate option. b. Select the Gateway Certificate. c. Add the Root Certificate to use. 3. If using the Windows XP L2TP client, the appropriate certificates need to be imported into Windows before setting up the connection with the New Connection Wizard. The step to set up user authentication is optional since this is additional security to certificates. 9.2.6. PPTP Roaming Clients PPTP is simpler to set up than L2TP since IPsec is not used and instead relies on its own, less strong, encryption. A major secondary disadvantage is not being able to NAT PPTP connections through a tunnel so multiple clients can use a single connection to the D-Link Firewall. If NATing is tried then only the first client that tries to connect will succeed. The steps for PPTP setup are as follows: 1. In Hosts & Networks define the following IP objects: • A pptp_pool IP object which is the range of internal IP addresses that will be handed out from an internal network. 236

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Action
Src Interface
Src Network
Dest Interface
Dest Network
Service
Allow
l2tp_tunnel
l2tp_pool
any
int_net
All
NAT
ipsec_tunnel
l2tp_pool
ext
all-nets
All
The second rule would be included to allow clients to surf the Internet via the
ext
interface on the
D-Link Firewall. The client will be allocated a private internal IP address which must be NATed if
connections are then made out to the public Internet via the D-Link Firewall.
8.
Set up the client. Assuming Windows XP, the
Create new connection
option in
Network
Connections
should be selected to start the
New Connection Wizard
. The key information to
enter in this wizard is: the resolvable URL of the D-Link Firewall or alternatively its
ip_ext
IP
address.
Then choose
Network > Properties
. In the dialog that opens choose the L2TP Tunnel and
select
Properties
. In the new dialog that opens select the
Networking
tab and choose
Force to
L2TP
. Now go back to the L2TP Tunnel properties, select the
Security
tab and click on the
IPsec Settings
button. Now enter the pre-shared key.
9.2.5. L2TP Roaming Clients with Certificates
If certificates are used with L2TP roaming clients instead of pre-shared keys then the differences in
the setup described above are:
1.
Load a
Gateway Certificate
and
Root Certificate
into NetDefendOS.
2.
When setting up the
IPsec Tunnel
object, specify the certificates to use under
Authentication
.
This is done by:
a.
Enable the
X.509 Certificate
option.
b.
Select the
Gateway Certificate.
c.
Add the
Root Certificate
to use.
3.
If using the Windows XP L2TP client, the appropriate certificates need to be imported into
Windows before setting up the connection with the
New Connection Wizard
.
The step to set up user authentication is optional since this is additional security to certificates.
9.2.6. PPTP Roaming Clients
PPTP is simpler to set up than L2TP since IPsec is not used and instead relies on its own, less
strong, encryption.
A major secondary disadvantage is not being able to NAT PPTP connections through a tunnel so
multiple clients can use a single connection to the D-Link Firewall. If NATing is tried then only the
first client that tries to connect will succeed.
The steps for PPTP setup are as follows:
1.
In
Hosts & Networks
define the following IP objects:
A
pptp_pool
IP object which is the range of internal IP addresses that will be handed out
from an internal network.
9.2.5. L2TP Roaming Clients with
Certificates
Chapter 9. VPN
236