You can manually define encryption keys for establishing an IPsec VPN tunnel. You define manual keys when you need to specify what the encryption or authentication key is (for example, when one of the VPN peers requires a specific key) or when you need to disable encryption and authentication.
To configure a VPN policy using Manual Key
In the Authentication Method field, select Manual Key from drop-down menu. The window shows only the Manual Key options.
Enter a name for the policy in the Name field.
Enter the host name or IP address of the remote connection in the IPsec Gateway Name or Address field.
Click Network.
Under Local Networks, select one of these options:
Under Destination Networks, select one of these:
If traffic from any local user cannot leave the firewall unless it is encrypted, select Use this VPN Tunnel as default route for all Internet traffic.
You can only configure one SA to use this setting.
Click Proposals.
Define an Incoming SPI and an Outgoing SPI. A Security Parameter Index (SPI) is hexadecimal and can range from 3 to 8 characters in length.
Each Security Association (SA) must have unique SPIs; no two SAs can share the same SPIs. However, each SA Incoming SPI can be the same as the Outgoing SPI.
The default values for Protocol, Encryption, and Authentication are acceptable for most VPN SA configurations; otherwise, select values from the drop-down menu.
The values for Protocol, Encryption, and Authentication must match the values on the remote firewall.
None
In the Encryption Key field, enter a 48-character hexadecimal encryption key or use the default value. This encryption key is used to configure the remote SonicWall encryption key, so write it down to use when configuring the remote firewall.
Valid hexadecimal characters include 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c, d, e, and f. 1234567890abcdef is an example of a valid DES or ARCFour encryption key. If you enter an incorrect encryption or authentication key, an error message is displayed at the bottom of the browser window.
In the Authentication Key field, enter a 40-character hexadecimal authentication key or use the default value. Write down the key to use while configuring the firewall settings.
Click Advanced.
Select any of the following optional settings you want to apply to your VPN policy.
Option | Definition |
---|---|
Suppress automatic Access Rules creation for VPN Policy | When not selected (default), accompanying Access Rules are created automatically. See VPN Auto-Added Access Rule Control for more information. |
Enable Windows Networking (NetBIOS) Broadcast | Select to allow access to remote network resources by browsing the Windows Network Neighborhood. |
WXA Group | Select None (default) or Group One. |
Apply NAT Policies |
Select if you want the firewall to translate traffic going over the Local network, Remote network, or both networks that are communicating through the VPN tunnel. When selected, choose a Translated Local Network or a Translated Remote Network or one of each from the two drop-down menus. Generally, if NAT is required on a tunnel, either Local or Remote should be translated, but not both. Apply NAT Policies is particularly useful in cases where both side of a tunnel use either the same or overlapping subnets. Informational videos with interface configuration examples are available online. For example, see How to Configure NAT over VPN in a Site to Site VPN with Overlapping Networks. Additional videos are available at: https://www.sonicwall.com/support/video-tutorials. |
Management via this SA | Select HTTPS, SSH, SNMP or any combination of these three to manage the local SonicWall firewall through the VPN tunnel. |
User login via this SA |
Select HTTP, HTTPS, or both to allow users to log in using the SA. HTTP user login is not allowed with remote authentication. |
Default LAN Gateway (optional) | If you want to route traffic that is destined for an unknown subnet through a LAN before entering this tunnel, select this option. For example, if you selected Use this VPN Tunnel as a default route for all Internet traffic (on the Network screen under Remote Networks) enter the router address. |
VPN Policy bound to |
Select an interface or zone from the drop-down menu. Two different WAN interfaces cannot be selected from the drop-down menu if the VPN Gateway IP address is the same for both. |
Click Accept on the NETWORK | IPSec VPN > Rules and Settings page to update the VPN Policies.