SonicOS 7.1 IPSec VPN
- SonicOS 7.1
- About SonicOS
- IPSec VPN Overview
- Site to Site VPNs
- VPN Auto Provisioning
- Rules and Settings
- Advanced
- DHCP over VPN
- L2TP Servers and VPN Client Access
- AWS VPN
- SonicWall Support
Configuring VPN AP Server Settings on General
To configure VPN AP server settings on the General screen
- In the Name field, type in a descriptive name for the VPN policy.
-
For Authentication Method, select either:
- Preshared Secret – Uses the VPN Auto Provisioning client ID and shared secret that you enter next. This option is selected by default. Proceed to Step 3.
-
Certificate – Uses the X.509 certificate that you select next (the certificate must have been previously stored on the appliance). Skip to Step 9.
If VPN AP Server policies are to be shared (as in hub-and-spoke deployments), SonicWall recommends using X.509 certificates to provide true authentication and prevent man-in-the-middle attacks.
-
If you selected Preshared Secret for the Authentication Method, then under SonicWall Settings, type the VPN Auto Provisioning client ID into the VPN AP Client ID field.This field is automatically populated with the value you entered into the Name field, but it can be changed.
This VPN policy value has to match at both the AP Server and AP Client side. A single AP Server policy can also be used to terminate multiple AP Clients.
-
Check the box for Use Default Provisioning Key to allow VPN AP Clients to use the default key known to all SonicWall appliances for the initial Security Association. After the SA is established, the Preshared Secret configured on the VPN AP Server is provisioned to the VPN AP Client for future use.
If this checkbox is cleared, VPN AP Clients must use the configured Shared Secret. This allows the administrator to modify the configured Shared Secret on the VPN AP Server only and then briefly allow Default Provisioning Key use to update the VPN AP Clients with the new Shared Secret value.
For best security, SonicWall recommends that the Default Provisioning Key option is only enabled for a short time during which the VPN AP Client can be provisioned with the Shared Secret while under administrative scrutiny.
-
If you want, clear the Mask Shared Secret checkbox before typing anything into the Shared Secret field. This checkbox is selected by default, which hides typed characters. If this checkbox is reselected, then the values from the Shared Secret field are automatically copied to the Confirm Shared Secret field.
-
In the Shared Secret field, type in the shared secret key. A minimum of four characters is required.
If Use Default Provisioning Key is checked, the Preshared Secret configured on the VPN AP Server is provisioned to the VPN AP Clients. If Use Default Provisioning Key is cleared, then this shared secret must also be configured on the VPN AP Clients.
- In the Confirm Shared Secret field, type in the shared secret again. It must match the value entered in the Shared Secret field.
- Go to Step 12.
-
If you selected Certificate for the Authentication Method, then under SonicWall Settings select the desired certificate from the Local Certificate drop-down menu.
-
Select one of the following from the VPN AP Client ID Type drop-down menu:
- Distinguished name (DN)
- E-Mail ID (UserFQDN)
- Domain name (FQDN)
-
IP Address (IPV4)
-
In the VPN AP Client ID Filter, type in a matching string or filter to be applied to the Certificate ID presented during IKE negotiation.
-
Continue to Configuring VPN AP Server Settings on Network.
Was This Article Helpful?
Help us to improve our support portal