D-Link DFL-800-AV-12 User Manual - Page 258

IP Validation, Use Pre-defined IP Pool Object, Use a Static Pool, NBNS/WINS, Subnets, Warning

Page 258 highlights

9.4.3. Roaming Clients Chapter 9. VPN Currently only one Config Mode object can be defined in NetDefendOS and this is referred to as the Config Mode Pool object. The key parameters associated with it are as follows: Use Pre-defined IP Pool Object Use a Static Pool DNS NBNS/WINS DHCP Subnets The IP Pool object that provides the IP addresses. As an alternative to using an IP Pool, a static set of IP addresses can be defined. The IP address of the DNS used for URL resolution (already provided by an IP Pool). The IP address for NBNS/WINS resolution (already provided by an IP Pool). Instructs the host to send any internal DHCP requests to this address. A list of the subnets that the client can access. Example 9.7. Setting Up Config Mode In this example the Config Mode Pool object is enabled by associating with it an already configured IP Pool object called ip_pool1 Web Interface 1. Go to Objects > VPN Objects > IKE Config Mode Pool 2. The Config Mode Pool object properties web page now appears 3. Select Use a pre-defined IPPool object 4. Choose the ip_pool1 object from the IP Pool drop-down list 5. Click OK After defining the Config Mode object, the only remaining action is to enable Config Mode to be used with the IPsec Tunnel. Example 9.8. Using Config Mode with IPsec Tunnels Assuming a predefined tunnel called vpn_tunnel1 this example shows how to enable Config Mode for that tunnel. Web Interface • Go to Interfaces > IPsec • Select the tunnel vpn_tunnel1 for editing • Select IKE Config Mode drop down list • Click OK IP Validation NetDefendOS always checks if the source IP address of each packet inside an IPsec tunnel is the same as the IP address assigned to the IPsec client with IKE Config Mode. If a mismatch is detected the packet is always dropped and a log message generated with a severity level of Warning. This 258

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355

Currently only one Config Mode object can be defined in NetDefendOS and this is referred to as the
Config Mode Pool
object. The key parameters associated with it are as follows:
Use Pre-defined IP Pool Object
The IP Pool object that provides the IP addresses.
Use a Static Pool
As an alternative to using an IP Pool, a static set of IP
addresses can be defined.
DNS
The IP address of the DNS used for URL resolution (already
provided by an IP Pool).
NBNS/WINS
The IP address for NBNS/WINS resolution (already provided
by an IP Pool).
DHCP
Instructs the host to send any internal DHCP requests to this
address.
Subnets
A list of the subnets that the client can access.
Example 9.7. Setting Up Config Mode
In this example the Config Mode Pool object is enabled by associating with it an already configured IP Pool object
called
ip_pool1
Web Interface
1.
Go to
Objects > VPN Objects > IKE Config Mode Pool
2.
The Config Mode Pool object properties web page now appears
3.
Select
Use a pre-defined IPPool object
4.
Choose the
ip_pool1
object from the
IP Pool
drop-down list
5.
Click
OK
After defining the Config Mode object, the only remaining action is to enable Config Mode to be
used with the IPsec Tunnel.
Example 9.8. Using Config Mode with IPsec Tunnels
Assuming a predefined tunnel called
vpn_tunnel1
this example shows how to enable Config Mode for that tunnel.
Web Interface
Go to
Interfaces > IPsec
Select the tunnel
vpn_tunnel1
for editing
Select
IKE Config Mode
drop down list
Click
OK
IP Validation
NetDefendOS always checks if the source IP address of each packet inside an IPsec tunnel is the
same as the IP address assigned to the IPsec client with IKE Config Mode. If a mismatch is detected
the packet is always dropped and a log message generated with a severity level of
Warning
. This
9.4.3. Roaming Clients
Chapter 9. VPN
258