SonicOS 7.1 IPSec VPN
- SonicOS 7.1
- About SonicOS
- IPSec VPN Overview
- Site to Site VPNs
- VPN Auto Provisioning
- Rules and Settings
- Advanced
- DHCP over VPN
- L2TP Servers and VPN Client Access
- AWS VPN
- SonicWall Support
Configuring Google Android L2TP VPN Client Access
This provides an example for configuring L2TP client access to WAN GroupVPN SA using the built-in L2TP Server and Google Android’s L2TP VPN Client.
To enable Google Android L2TP VPN Client access to WAN GroupVPN SA, perform the following steps
- Navigate to the NETWORK | IPSec VPN > Rules and Settings page.
- For the WAN GroupVPN policy, click the Edit icon.
- Select IKE using Preshared Secret (default) from the Authentication Method drop-down menu.
- Enter a shared secret passphrase in the Shared Secret field to complete the client policy configuration.
- Click Proposals.
-
Provide the following settings for IKE (Phase 1) Proposal:
- DH Group: Group 2
- Encryption: 3DES
- Authentication: SHA1
- Life Time (seconds): 28800
-
Provide the following settings for IPsec (Phase 2) Proposal:
- Protocol: ESP
- Encryption: DES
- Authentication: SHA1
- Enable Perfect Forward Secrecy: Enabled
- Life Time (seconds): 28800
- Click Advanced.
-
Set the following options:
- Enable Multicast: Disabled
- Management via this SA: Disable all
- Default Gateway: 0.0.0.0
- Require authentication of VPN clients by XAUTH: Enabled
- User group for XAUTH users: Trusted Users
- Click Client.
-
Set the following options:
- Cache XAUTH User Name and Password on Client: Single Session or Always
- Virtual Adapter setting: DHCP Lease
- Allow Connections to: Split Tunnels
- Set Default Route as this Gateway: Disabled
- Apply VPN Access Control List: Disabled
- Use Default Key for Simple Client Provisioning: Enabled
- Click OK.
- Navigate to the NETWORK | IPSec VPN > L2TP Server page.
- Select Enable the L2TP Server.
- Click Configure.
-
Provide the following L2TP server settings:
- Keep alive time (secs): 60
- DNS Server 1: 199.2.252.10 (or use your ISPs DNS)
- DNS Server 2: 4.2.2.2 (or use your ISPs DNS)
- DNS Server 3: 0.0.0.0 (or use your ISPs DNS)
- WINS Server 1: 0.0.0.0 (or use your WINS IP)
- WINS Server 2: 0.0.0.0 (or use your WINS IP)
- Click L2TP Users.
-
Set the following options:
- IP address provided by RADIUS/LDAP Server: Disabled
- Use the Local L2TP IP Pool: Enabled
- Start IP: 10.20.0.1 (or use your own)
- End IP: 10.20.0.20 (or use your own)
- In the User Group for L2TP Users drop-down menu, select Trusted Users.
- Click Save.
- Navigate to the DEVICE | Users > Local Users & Groups page.
- Click Local Users.
- Click +Add User.
- In the Settings screen, specify a user Name and Password.
-
In the VPN Access screen, add the desired network address object(s) that the L2TP clients to the access list networks.
At the minimum add the LAN Subnets, LAN Primary Subnet, and L2TP IP Pool address objects to the access list.
You have now completed the SonicOS configuration.
- On your Google Android device, complete the following L2TP VPN Client configuration to enable secure access:
- Navigate to the APP page, and select the Settings icon. From the Settings menu, select Wireless & networks.
- Select VPN Settings, and click Add VPN.
- Select Add L2TP/IPSec PSK VPN.
- Under VPN Name, enter a VPN friendly name.
- Set VPN Server.
- Enter the public IP address of firewall.
- Set IPSec preshared key: enter the passphrase for your WAN GroupVPN policy.
- Leave L2TP secret blank.
- If you want set LAN domain setting. They are optional.
- Enter your XAUTH username and password. Click Connect.
- Verify your Google Android device is connected by navigating to the NETWORK | IPSec VPN > Rules and Settings page. The VPN client is displayed in the Currently Active VPN Tunnels section.
Was This Article Helpful?
Help us to improve our support portal