To configure the WAN GroupVPN using a preshared secret key
Click the Edit icon for the WAN GroupVPN policy.
On the General tab, IKE using Preshared Secret is the default setting for Authentication Method. A shared secret code is automatically generated by the firewall and written in the Shared Secret field. You can generate your own shared secret. A self-defined shared secret code must be a minimum of four characters.
You cannot change the name of any GroupVPN policy.
Click Proposals to continue the configuration process.
In the IKE (Phase 1) Proposal section, select the following settings:
Select Group 2 (default) from the DH Group drop-down menu.
The Windows XP L2TP client only works with DH Group 2.
In the Encryption drop-down menu, select DES, 3DES (default), AES-128, AES-192, or AES-256.
From the Authentication drop-down menu, select the desired authentication method: MD5, SHA1 (default), SHA256, SHA384, or SHA512.
In the Life Time (seconds) field, enter a value. The default setting of 28800 forces the tunnel to renegotiate and exchange keys every 8 hours.
In the IPsec (Phase 2) Proposal section, select the following settings:
Click Advanced.
Select any of the following optional settings you want to apply to your GroupVPN policy:
Advanced Settings | |
---|---|
Disable IPsec Anti-Replay | Stops packets with duplicate sequence numbers from being dropped. |
Enable Multicast | Enables IP multicasting traffic, such as streaming audio (including VoIP) and video applications, to pass through the VPN tunnel. |
Accept Multiple Proposals for Clients | Allows multiple proposals for clients, such as the IKE (Phase 1) Proposal or the IKE (Phase 2) Proposal, to be accepted. |
Enable IKE Mode Configuration | Allows SonicOS to assign internal IP address, DNS Server, or WINS Server to third-party clients, like iOS devices or Avaya IP phones. |
Management via this SA: | If using the VPN policy to manage the firewall, select the management method, either HTTP, SSH, or HTTPS.
NOTE: SSH is valid for IPv4 only. |
Default Gateway | Allows you to specify the IP address of the default network route for incoming IPsec packets for this VPN policy. Incoming packets are decoded by the firewall and compared to static routes configured in the firewall. As packets can have any IP address destination, it is impossible to configure enough static routes to handle the traffic. For packets received through an IPsec tunnel, the firewall looks up a route. If no route is found, the security appliance checks for a Default Gateway. If a Default Gateway is detected, the packet is routed through the gateway. Otherwise, the packet is dropped. |
Client Authentication | |
Require Authentication of VPN Clients via XAUTH | Requires that all inbound traffic on this VPN tunnel is from an authenticated user. Unauthenticated traffic is not allowed on the VPN tunnel. The Trusted users group is selected by default. You can select another user group or Everyone from User Group for XAUTH users from the User group for XAUTH users menu. |
Allow Unauthenticated VPN Client Access | Allows you to enable unauthenticated VPN client access. If you clear Require Authentication of VPN Clients via XAUTH, the Allow Unauthenticated VPN Client Access menu is activated. Select an Address Object or Address Group from menu of predefined options, or select Create new address object or Create new address group to create a new one. |
Click Client.
Select any of the following settings you want to apply to your GroupVPN policy.
Cache XAUTH User Name and Password on Client |
Allows the Global VPN Client to cache the user name and password:
|
Virtual Adapter Settings |
The use of the Virtual Adapter by the Global VPN Client (GVC) is dependent upon a DHCP server, either the internal SonicOS or a specified external DHCP server, to allocate addresses to the Virtual Adapter. In instances where predictable addressing is a requirement, obtain the MAC address of the Virtual Adapter and to create a DHCP lease reservation. To reduce the administrative burden of providing predictable Virtual Adapter addressing, you can configure the GroupVPN to accept static addressing of the Virtual Adapter's IP configuration. This feature requires the use of SonicWall GVC. Select one of the following: Choose None if a Virtual Adapter is not used by this GroupVPN connection. This is the default. Choose DHCP Lease if the Virtual Adapter obtains its IP configuration from the DHCP Server only, as configured in the VPN > DHCP over VPN page. Choose DHCP Lease or Manual Configuration when the GVC connects to the firewall, the policy from the firewall instructs the GVC to use a Virtual Adapter, but the DHCP messages are suppressed if the Virtual Adapter has been manually configured. The configured value is recorded by the firewall so it can proxy ARP for the manually assigned IP address. By design, the Virtual Adapter currently has no limitations on IP address assignments. Only duplicate static addresses are not permitted. |
Allow Connections to |
Client network traffic that matches the destination networks of each gateway is sent through the VPN tunnel of that specific gateway. Select one of the following:
|
Set Default Route as this Gateway | Select this checkbox if all remote VPN connections access the Internet through this VPN tunnel. You can only configure one VPN policy to use this setting. By default, this option is not enabled. |
Apply VPN Access Control List | Select this checkbox to apply the VPN access control list. When this option is enabled, specified users can access only those networks configured for them. This option is not enabled by default. |
Use Default Key for Simple Client Provisioning | Uses Aggressive mode for the initial exchange with the gateway, and VPN clients uses a default Preshared Key for authentication. This option is not enabled by default. |
Click OK.
Click ACCEPT on the NETWORK | IPSec VPN > Rules and Settings page to update the VPN Policies.