Internet. SonicWALL IP Cisco IOS IP IP Network Mask

Similar documents
Loading Internet Protocol Security (IPSec) (CDR-882/780/790/990 Cellular Router)

co Configuring PIX to Router Dynamic to Static IPSec with

Configuring Dynamic Multipoint VPN Using GRE Over IPsec With OSPF, NAT, and Cisco IOS Firewall

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

Quick Note. Configure an IPSec VPN tunnel in Aggressive mode between a TransPort LR router and a Cisco router. Digi Technical Support 7 October 2016

Table of Contents. Cisco IPSec Tunnel through a PIX Firewall (Version 7.0) with NAT Configuration Example

IPsec Anti-Replay Window Expanding and Disabling

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

IOS Router : Easy VPN (EzVPN) in Network Extension Mode (NEM) with Split tunnelling Configuration Example

Configuration Summary

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

CCNA Security PT Practice SBA

Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP

Dynamic Multipoint VPN between CradlePoint and Cisco Router Example

Configuration of an IPSec VPN Server on RV130 and RV130W

Chapter 8 Lab Configuring a Site-to-Site VPN Using Cisco IOS

L2TP IPsec Support for NAT and PAT Windows Clients

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Lab 9: VPNs IPSec Remote Access VPN

Google Cloud VPN Interop Guide

IPsec Anti-Replay Window: Expanding and Disabling

Lab Configuring Static Routes Instructor Version 2500

Configuring IOS to IOS IPSec Using AES Encryption

Support for policy-based routing applies to the Barracuda Web Security Gateway running version 6.x only.

Network Security 2. Module 4 Configure Site-to-Site VPN Using Pre-Shared Keys

Configuring LAN-to-LAN IPsec VPNs

VPN Auto Provisioning

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

VPN Connection through Zone based Firewall Router Configuration Example

VPN Ports and LAN-to-LAN Tunnels

LAN-to-LAN IPsec VPNs

Lab Troubleshooting IP Address Issues Instructor Version 2500

SonicWALL VPN with Win2K using IKE Prepared by SonicWALL, Inc. 05/01/2001

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

How to Configure Forcepoint NGFW Route-Based VPN to AWS with BGP TECHNICAL DOCUMENT

Case 1: VPN direction from Vigor2130 to Vigor2820

Static VTI R1: (previous tunnel 0 config remains the same)

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the SonicWall Firewall.

Sample Business Ready Branch Configuration Listings

Assigning a Home Address on the Home Agent

Lab Establishing and Verifying a Telnet Connection Instructor Version 2500

BiGuard C01 BiGuard VPN Client Quick Installation Guide (BiGuard series VPN enabled devices) Secure access to Company Network

Configuring Remote Access IPSec VPNs

Configuring VPN from Proventia M Series Appliance to Symantec 5310 Systems

Virtual Tunnel Interface

Table of Contents 1 IKE 1-1

Internet Key Exchange

Defining IPsec Networks and Customers

Network Security CSN11111

Quick Note. Configure an IPSec VPN tunnel between a Digi TransPort LR router and a Digi Connect gateway. Digi Technical Support 20 September 2016

Configuration Guide. How to connect to an IPSec VPN using an iphone in ios. Overview

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

VPN Between Sonicwall Products and Cisco Security Appliance Configuration Example

VPNC Scenario for IPsec Interoperability

Abstract. Avaya Solution & Interoperability Test Lab

How to Configure an IPsec VPN to an AWS VPN Gateway with BGP

Configuring Security for VPNs with IPsec

PIX/ASA 7.x and Later : Easy VPN with Split Tunneling ASA 5500 as the Server and Cisco 871 as the Easy VPN Remote Configuration Example

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

VPN Setup for CNet s CWR g Wireless Router

Cisco IOS Firewall Authentication Proxy

VPN Overview. VPN Types

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example

Integration Guide. Oracle Bare Metal BOVPN

Chapter 6 Virtual Private Networking

Fractional DS3. Version: 400. Copyright ImageStream Internet Solutions, Inc., All rights Reserved.

Efficient SpeedStream 5861

IPv6 over IPv4 GRE Tunnel Protection

IOS/CCP: Dynamic Multipoint VPN using Cisco Configuration Professional Configuration Example

CCNA Security 1.0 Student Packet Tracer Manual

Configuring VPNs in the EN-1000

Google Cloud VPN Interop Guide

Secure ACS Database Replication Configuration Example

Configuring a Hub & Spoke VPN in AOS

Securizarea Calculatoarelor și a Rețelelor 29. Monitorizarea și depanarea VPN-urilor IPSec Site-to-Site

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

VPN Tracker for Mac OS X

IPSec VPN Setup with IKE Preshared Key and Manual Key on WRVS4400N Router

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

Configuring Internet Key Exchange Security Protocol

Cisco PIX. Interoperability Guide

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2

Manual Key Configuration for Two SonicWALLs

Virtual Private Networks

Pre-Fragmentation for IPSec VPNs

Configuring Authentication Proxy

IPsec Dead Peer Detection Periodic Message Option

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Table of Contents. Cisco PIX/ASA 7.x Enhanced Spoke to Spoke VPN Configuration Example

VPN Definition SonicWall:

Securizarea Calculatoarelor și a Rețelelor 28. Implementarea VPN-urilor IPSec Site-to-Site

Contents. Introduction. Prerequisites. Background Information

Transcription:

Prepared by SonicWALL, Inc. 9/20/2001 Introduction: VPN standards are still evolving and interoperability between products is a continued effort. SonicWALL has made progress in this area and is interoperable with Cisco IOS using IKE as shown below. Advanced setups are possible but are not covered in this document. This tech-note assumes the reader has a working knowledge of Cisco IOS management tools and SonicWALL appliance configuration. This tech-note describes the required steps to set-up a compatible Security Association on both Cisco IOS and SonicWALL products. Technical Notes: SonicWALL has tested VPN interoperability with Cisco 2621 versions 12.1 and 12.2 and SonicWALL Pro 6.0.1.1 and 6.1.1.0 using the following VPN Security Association information: Keying Mode: IKE IKE Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1 ID_Type: IP Encryption and Data Integrity: ESP DES with MD5 ESP 3DES with MD5 ESP DES with SHA1 ESP 3DES with SHA1 EXAMPLE: The network configuration shown below is used in the example VPN configuration. The example will configure a VPN using 3DES encryption with MD5 and without PFS. Cisco IOS 10.0.31.132 Internet SonicWALL IP 10.0.31.102 IP 192.168.132.1 IP 192.168.170.1 Network 192.168.132.0 Mask 255.255.255.0 Network 192.168.170.0 Mask 255.255.255.0 Page 1 of 5

SonicWALL Configuration On the SonicWALL, create an SA. 1. Change the IPSec Keying Mode to IKE using pre-shared secret. 2. Name your SA. (In this example CiscoIOS) 3. Fill in the IPSec gateway (In this example 10.0.31.132) 4. Change SA Life time to 3600 5. Select Encryption Method (In this example ESP 3DES HMAC MD5) 6. Enter your Shared Secret, (In this example password) 7. Fill in the appropriate Destination Network (in this example 192.168.132.0) and Subnet Mask (in this example 255.255.255.0) A Sample Screen shot from SonicWALL firmware version 6.1.1.0 is displayed below Page 2 of 5

CISCO IOS Configuration The Cisco IOS system has a very rich and complex instruction set. Before you proceed to enter commands on the Cisco Product, you must be logged into the enable/configure terminal mode. The commands below are not a complete guide to configuring a Cisco IOS product, but are intended only to guide existing Cisco users. Refer to the Cisco documentation (www.cisco.com) for more information regarding the commands below. COMMANDS FOR CISCO IOS Command Access-list 101 permit ip 192.168.132.0 0.0.0.255 192.168.170.0 0.0.0.255 crypto isakmp policy 15 encryption 3des hash md5 authentication pre-share group 1 lifetime 3600 crypto isakmp key password address 10.0.31.102 crypto ipsec transform-set strong esp-3des esp-md5- hmac crypto map tosonicwall 15 ipsec-isakmp match address 101 set transform-set strong set peer 10.0.31.102 interface fastethernet0/1 crypto map tosonicwall Description Set ACCESS LIST Specify the inside and destination networks. This permits the IP network traffic you want to protect to pass through the router. Define IKE parameters Identify the policy to create. (Each policy is uniquely identified by the priority number you assign.) (This command puts you into the config-isakmp command mode.) To specify the encryption algorithm To specify the hash algorithm To specify the authentication To specify the Diffe-Hellman group identifier Specify the security association s lifetime To the config-isakmp command mode To configure a pre-shared authentication key. In this case the pre-shared secret is password Define IPSEC parameters Configure a transform-set. This identifies the encryption and authentication methods you want to use. Create a crypto map that binds together elements of the IPSec configuration. (This command puts you into the crypto map command mode.) To specify an extended access list for a crypto map entry To specify which transform sets can be used with the crypto map entry To specify an IPSec peer in a crypto map entry To the crypto map command mode Apply Crypto Map to an Interface Specify an interface on which to apply the crypto map. (This command puts you into the interface command mode). Please note, you need to specify the interface that you have defined as external (your WAN interface). Apply the previously defined crypto map set to an interface Exit the interface command mode Exit the global configuration mode Page 3 of 5

Example IOS Configuration file version 12.2 service timestamps debug uptime service timestamps log uptime no service password-encryption hostname IOS enable secret 5 $1$Y4Fo$Cl/oJdpHnVmIbFr/1AuaB1 enable password passwd ip subnet-zero no ip routing ip audit notify log ip audit po max-events 100 ip ssh time-out 120 ip ssh authentication-retries 3 crypto isakmp policy 15 encr 3des hash md5 authentication pre-share lifetime 3600 crypto isakmp key password address 10.0.31.102 crypto ipsec transform-set strongmd5 esp-3des esp-md5-hmac crypto map tosonicwall 15 ipsec-isakmp set peer 10.0.31.102 set transform-set strongmd5 match address 101 call rsvp-sync interface FastEthernet0/0 ip address 192.168.132.1 255.255.255.0 ip broadcast-address 192.168.132.255 no ip route-cache duplex auto speed auto interface FastEthernet0/1 ip address 10.0.31.132 255.255.0.0 ip broadcast-address 10.0.255.255 Page 4 of 5

no ip route-cache speed auto half-duplex crypto map tosonicwall ip classless ip route 0.0.0.0 0.0.0.0 10.0.0.2 no ip http server access-list 101 permit ip 192.168.132.0 0.0.0.255 192.168.170.0 0.0.0.255 dial-peer cor custom line con 0 line aux 0 line vty 0 4 password pass login line vty 5 15 password pass login no scheduler allocate end To Test the VPN tunnel: From the PC behind the Cisco IOS firewall, try to ping 192.0.0.1 From the PC behind the SonicWALL, try to ping 10.0.0.1 Trouble Shooting Tips: Use the Log Viewer on the Cisco IOS and the SonicWALL to determine if IKE negotiation has started. If IKE negotiation is complete but pings timeout, the Cisco IOS host computer may need route configuration. SA lifetimes must be the same on both boxes. Page 5 of 5