VNS3 to Windows RRAS Instructions. Windows 2012 R2 RRAS Configuration Guide

Similar documents
VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 5.2

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2

VNS3 IPsec Configuration. Connecting VNS3 Side by Side via IPsec

Proxy Protocol Support for Sophos UTM on AWS. Sophos XG Firewall How to Configure VPN Connections for Azure

Configuration of an IPSec VPN Server on RV130 and RV130W

AWS VPC Cloud Environment Setup

How to Configure Forcepoint NGFW Route-Based VPN to AWS with BGP TECHNICAL DOCUMENT

Integration Guide. Oracle Bare Metal BOVPN

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

Virtual Tunnel Interface

VPN Ports and LAN-to-LAN Tunnels

How to Configure an IPsec VPN to an AWS VPN Gateway with BGP

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

VPNC Scenario for IPsec Interoperability

Table of Contents 1 IKE 1-1

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

How to Configure an IKEv1 IPsec Site-to-Site VPN to the Static Microsoft Azure VPN Gateway

Configuring VPNs in the EN-1000

Virtual Private Cloud. User Guide. Issue 03 Date

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

IPSec VPN Setup with IKE Preshared Key and Manual Key on WRVS4400N Router

Configuring VPN from Proventia M Series Appliance to Symantec 5310 Systems

Virtual Private Network. Network User Guide. Issue 05 Date

VNS3 Configuration. Quick Launch for first time VNS3 users in Azure

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

VNS3 Configuration. IaaS Private Cloud Deployments

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

How to Configure an IPsec Site-to-Site VPN to a Windows Azure VPN Gateway

VMware Cloud on AWS Networking and Security. 5 September 2018 VMware Cloud on AWS

Site-to-Site VPN with SonicWall Firewalls 6300-CX

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Configuration Guide. How to connect to an IPSec VPN using an iphone in ios. Overview

VNS3 version 4. Free and Lite Edition Reset Overlay Subnet

VNS3 Configuration. Google Compute Engine

KB How to Configure IPSec Tunneling in Windows 2000

CenturyLink Cloud Configuration. CenturyLink Setup for VNS3

Microsoft Azure Configuration. Azure Setup for VNS3

How to Configure IPSec Tunneling in Windows 2000

Cloud Security Best Practices

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

Google Cloud VPN Interop Guide

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

VMware Cloud on AWS Getting Started. 18 DEC 2017 VMware Cloud on AWS

Quick Note. Configure an IPSec VPN tunnel between a Digi TransPort LR router and a Digi Connect gateway. Digi Technical Support 20 September 2016

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

Virtual Tunnel Interface

FAQ about Communication

Google Cloud VPN Interop Guide

DFL-210, DFL-800, DFL-1600 How to setup IPSec VPN connection with DI-80xHV

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

VPN-Cubed 2.x vpcplus Free Edition

VNS3 4.0 Configuration Guide

Efficient SpeedStream 5861

VNS3 Configuration. ElasticHosts

Configuring a Hub & Spoke VPN in AOS

HOW TO CONFIGURE AN IPSEC VPN

This version of the des Secure Enterprise MAC Client can be used on Mac OS X 10.7 Lion platform.

How to configure IPSec VPN between a Cradlepoint router and a SRX or J Series Juniper router

Application Note 11. Main mode IPSec between a Windows 2000 / XP (responder) and a Digi Transport Router (initiator)

VPN-Cubed 2.x vpcplus Enterprise Edition

VNS3 3.x Trial Edition Configuration Instructions

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

Amazon Virtual Private Cloud. Network Administrator Guide

S2S VPN with Azure Route Based

Quick Note 65. Configure an IPSec VPN tunnel between a TransPort WR router and an Accelerated SR router. Digi Technical Support 7 June 2018

Case 1: VPN direction from Vigor2130 to Vigor2820

Chapter 6 Virtual Private Networking

Service Managed Gateway TM. How to Configure and Debug Generic Routing Encapsulation (GRE)

VPN-Cubed Datacenter Connect IBM Trial Edition v201102

Top 30 AWS VPC Interview Questions and Answers Pdf

Firepower Threat Defense Site-to-site VPNs

NCP Secure Enterprise macos Client Release Notes

Release Notes. NCP Secure Enterprise Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

VPN Configuration Guide. NETGEAR FVS318v3

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the SonicWall Firewall.

PPTP Server: This guide will show how an IT administrator can configure the VPN-PPTP server settings.

Google Cloud VPN Interop Guide

Configuring LAN-to-LAN IPsec VPNs

VPN Overview. VPN Types

VPN-Cubed 2.1 UL for Terremark Datacenter Connect or Cloud Only

Example: Configuring a Policy-Based Site-to-Site VPN using J-Web

SD-WAN Deployment Guide (CVD)

Windows 2000 Pre-shared IKE Dialup VPN Setup Procedures

VPN Setup for CNet s CWR g Wireless Router

Example: Configuring a Hub-and-Spoke VPN between 3 SRXs using J-Web

VPN-Cubed 2.x Datacenter Connect ElasticHosts

SAM 8.0 SP2 Deployment at AWS. Version 1.0

VPN Configuration Guide. NETGEAR FVG318 / FVS318G / FVS336G / FVS338 / DGFV338 FVX538 / SRXN3205 / SRX5308 / ProSecure UTM Series

NCP Secure Client Juniper Edition Release Notes

Data Sheet. NCP Secure Enterprise macos Client. Next Generation Network Access Technology

VPN Auto Provisioning

Proxicast VPN Client v6.x

The EN-4000 in Virtual Private Networks

NCP Secure Client Juniper Edition (Win32/64) Release Notes

VPN-Cubed 2.x Datacenter Connect SME Edition

Configuring IPsec and ISAKMP

Establishing secure connectivity between Oracle Ravello and Oracle Cloud Infrastructure Database Cloud ORACLE WHITE PAPER DECEMBER 2017

Transcription:

VNS3 to Windows RRAS Instructions Windows 2012 R2 RRAS Configuration Guide 2018

Site-to-Site IPsec Tunnel IPsec protocol allows you to securely connect two sites together over the public internet using cryptographically secured services. IPsec ensure private and secure communication between two devices. This type of VPN has many use-cases. We will focus on the Site-to-Site or LAN-to-LAN setup most often used with VNS3 to build Hybrid Clouds. Public Cloud Overlay Network Subnet: 172.16.1.0/24 Many network hardware devices support IPsec tunneling functionality. Check your device's data sheet to see if it is compatible with VNS3. The requirements are: IKE1 or IKE2 AES256 or AES128 or 3DES SHA1 or MD5 NAT-Traversal capability (some clouds require NAT-Traversal encapsulation - AWS Generic EC2, Microsoft Azure, etc.) A diagram of the typical secure hybrid cloud setup using VNS3 is provided on the right. The IPsec tunnel provides secure and encrypted connectivity between the office subnet (10.0.2.0/26) and the VNS3 Overlay Network (172.16.1.0/24). Windows RRAS Cloud Server Overlay IP: 172.16.1.1 VNS3 public IP: 54.54.54.131 overlay IP: 172.16.1.253 Active IPsec tunnel 10.0.2.0/26-172.16.1.0/24 This guide will provide steps to setup the Windows 2012 R2 RRAS side of the IPsec configuration. The most important thing in any IPsec configuration is to make sure all settings match on both devices that are going to connect to each other. Mismatches are the primary cause for tunnel failure or instability. Server A LAN IP: 10.0.2.1 Server B LAN IP: 10.0.2.2 Customer Remote Office Remote subnet: 10.0.2.0/26 2

Update Windows Network Adapter Settings This step may be required depending on the Windows server deployment environment. We recommend you take this step if the Windows server is deployed to a public cloud environment like AWS EC2. To update your adapter settings: 1. Open the Control Panel 2. Click View network status and tasks under the Network and Internet setting category 3. Click the Ethernet connection listed under the active networks 4. Click Properties on the resulting Ethernet Status window 5. Click Configure on the resulting Ethernet Properties window 6. Disable the IPv4 Checksum Offload, TCP Checksum Offload (IPv4), and UDP Checksum Offload (IPv4) properties, and then click OK 3

Install RRAS 4

Installing RRAS Before configuring an IPsec tunnel, RRAS needs to be installed and configured on the Windows 2012 R2 server. 1. Open Server Manager from the start menu 2. Click Manage 3. Click Add Roles and Features 4. Click Role-based or feature-based installation 5. Click Next 6. Click on your Windows 2012 R2 server, and then click Next 5

Installing RRAS 7. Click Network Policy and Access Services in the list and in the popup window, click Add Features 8. Click Remote Access 9. Click Next 10. On the Select features page, click Next 6

Installing RRAS 11. On the Network Policy and Access Services page, click Next 12. Leave Network Policy Server selected, and click Next 7

Installing RRAS 13. On the Remote Access page, click Next 14. On the next page, select DirectAccess and VPN (RAS) and in the popup window, click Add Features 15. Click Routing 16. Click Next 8

Installing RRAS 17. On the Web Server Role (IIS) page, click Next 18. Leave the default selection, and click Next 19. Click Install 9

Configure RRAS 10

Configuring RRAS 1. From the Server Manager Dashboard, click Remote Access Manager from the Tools menu. 2. On the resulting Remote Access Management Console window click DirectAccess and VPN under the Configuration left column menu item. 3. Then Click Run the Getting Started Wizard 4. Choose Deploy VPN only 11

Configuring RRAS 5. In the Routing and Remote Access dialog box, select the server name, click Action, and click Configure and Enable Routing and Remote Access 6. In the Routing and Remote Access Server Setup Wizard, click Next 7. On the Configuration page, select Custom Configuration and click Next 8. Select LAN routing 9. Click Next 10. Click Finish 11. When prompted by the Routing and Remote Access dialog box, click Start service 12

Create Policy-based IPsec VPN Tunnel 13

Create tunnel: create tunnel rule 1. Open Server Manager, click Tools, and select Windows Firewall with Advanced Security 2. Select Connection Security Rules, click the Action menu, and click New Rule 3. From the New Connection Security Rule wizard Rule Type page, select Tunnel, and then click Next 14

Create tunnel: type and requirements 4. On the Tunnel Type page, under What type of tunnel would you like to create, select Custom configuration 5. Under Would you like to exempt IPsec-protected connections from this tunnel, leave the default value checked of No, and click Next 6. On the Requirements page, select Require authentication for inbound connections and click Next 15

Create tunnel: endpoint and tunnel definition 7. On Tunnel Endpoints page, enter the local subnet CIDR (10.0.2.0/26 in our example) and Windows IP address in the Endpoint 1 sections shown in the screenshot 8. Enter the remote subnet CIDR (172.16.1.0/24 in our example) and remote endpoint IP in the Endpoint 2 sections show in the screenshot 9. Click Next 16

Create tunnel: PSK authentication 10. On the Authentication Method page, select Advanced, and then click Customize 11. Click Add under the first authentication section 12. Select Preshared key, enter the pre-shared key value, and click OK 13. Click Next 17

Create tunnel: open Windows firewall 14. On the Profile page, select all three checkboxes for each Windows Firewall profile (Domain, Private, and Public), and click Next 15. On the Name page, enter a name for your connection rule and click Finish 18

Enable perfect forward secrecy (PFS) 19

Enable PFS: command line only We recommend using PFS when creating IPsec tunnels but this step is optional. NOTE: any settings included in the following command will be used for the phase2/ipsec security association regardless of settings specified later in the configuration. Also these settings will not be editable or viewable via the UI so take extra care when running this to record the choices. Also the data lifetime value is required so we set it to some large number that is accepted by Windows. Run the following command via the command prompt and replace "rule_name" with the name given to the connection rule on page 17. netsh advfirewall consec set rule name="rule_name" new QMPFS=dhgroup14 QMSecMethods=ESP:SHA1-AES256+60min+10000000kb 20

Phase1 and Phase2 settings 21

Phase1 settings To edit the tunnel's phase1 and phase2 settings, open the Windows Firewall window via the Server Manager. Click on the Tools menu > Windows Firewall with Advanced Security and then click Actions > Properties on the resulting window. 1. From the IPsec Settings tab, under IPsec exemptions, verify that Exempt ICMP from IPsec is No (default). Verify that IPsec tunnel authorization is None. 2. Click Customize next to the IPsec defaults section 3. Under Key exchange (Main Mode), select Advanced and then click Customize 4. Remove any default settings in the Security methods section, then click Add and select the following: Integrity algorithm: SHA-1 Encryption algorithm: AES-CBC-256 Key exchange algorithm: Diffie-Hellman Group 14 5. Click OK 6. Under Key lifetimes, verify that Minutes is 60 and Sessions is 0 7. Under Key exchange options, select Use Diffie-Hellman for enhanced security, and then click OK 22

Phase2 settings 8. From the Customize IPsec Defaults window, under Data protection (Quick Mode), select Advanced, and then click Customize 9. Select Require encryption for all connection security rules that use these settings 10. Remove any default settings in the Data integrity and encryption section, then click Add and select the following: ESP Encryption algorithm : AES-CBC-256 Integrity algorithm: SHA-1 Key lifetime: 480 minutes 11. Choose OK to return to the Customize IPsec Settings dialog box and click OK to save the configuration 23

Enable Dead Peer Detection (DPD) 24

Enable DPD We recommend using DPD when creating IPsec tunnels but this step is optional. 1. From the Registry Editor click HKEY_LOCAL_MACHINE > SYSTEM > CurrentControlSet > Services > Tcpip > Parameters 2. Click on the Edit menu, then click New and select DWORD (32-bit) Value 3. Enter the name EnableDeadGWDetect 4. Select EnableDeadGWDetect, and click Modify from the Edit menu 5. In Value data, enter 1, and then click OK 6. Close the Registry Editor and reboot the server 25

Configure VNS3 26

VNS3 settings based on RRAS options Given the tunnel definition options available in RRAS, the recommended configuration is shown in this document. To match those configuration settings, use the following IPsec endpoint setup for VNS3 1. Name: enter any name. 2. IP: public IP of the Windows 2012 R2 server (this can be a NATed IP if necessary) 3. PSK: use the same PSK from page 17 4. NAT IP: the private IP of the Windows 2012 server if it is not directly accessible via the Internet 5. PFS: enabled (but optional depending on if you followed the steps outlined on page 20) 6. Extra configuration parameters: phase1=aes256-sha1-dh14 phase2=aes256-sha1 pfsgroup=dh14 27

VNS3 Document Links VNS3 Product Resources - Documentation Add-ons VNS3 Configuration Guide Instructions and screenshots for configuring a VNS3 Controller in a single or multiple Controller topology. Specific steps include, initializing a new Controller, generating clientpack keys, setting up peering, building IPsec tunnels, and connecting client servers to the Overlay Network. VNS3 Administration Guide VNS3 Troubleshooting Troubleshooting document that provides explanation issues that are more commonly experienced with VNS3. 28