Page 116 / 176 Scroll up to view Page 111 - 115
ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
6-10
Advanced Virtual Private Networking
v1.0, September 2007
FVG318 Gateway A to FVG318 Gateway B (IKE and VPN Policies)
Note
:
Use this scenario illustration and configuration screens as a model to build your configuration.
1.
Log in to the FVG318 labeled Gateway A as in the illustration.
Log in at the default address of
with the default user name of
admin
and
default password of
password
, or using whatever password and LAN address you have
chosen.
2.
Configure the WAN (Internet) and LAN IP addresses of the FVG318.
a.
Select Network Configuration > WAN Settings to access the WAN ISP Settings menu.
Note:
This scenario assumes all ports are open on the FVG318. You can verify this by
reviewing the security settings as seen in
Figure 6-5
Figure 6-5
FVG318
FVG318
Page 117 / 176
ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
Advanced Virtual Private Networking
6-11
v1.0, September 2007
b.
Configure the WAN Internet Address according to the settings above and click
Apply
to
save your settings. For more information on configuring the WAN IP settings, please see
“Manually Configuring your Internet Connection” on page 2-7
.
c.
Select Network Configuration > LAN Setup. The LAN Setup screen will display.
Figure 6-6
Figure 6-7
WAN IP
addresses
ISP provides
these addresses
Page 118 / 176
ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
6-12
Advanced Virtual Private Networking
v1.0, September 2007
d.
Configure the LAN IP address according to the settings above and click
Apply
to save
your settings. For more information on LAN TCP/IP setup topics, please see
“Configuring
LAN TCP/IP Setup Parameters” on page 8-2
.
3.
Set up the IKE Policy illustrated below on the FVG318.
a.
Select VPN > Policies. The IKE Policies screen will display. Click
Add
to display the Add
IKE Policy screen shown below.
b.
Configure the IKE Policy according to the settings in the illustration above and click
Apply
to save your settings. For more information on IKE Policy topics, please see
“IKE
Policy Automatic Key and Authentication Management” on page 6-2
.
4.
Set up the FVG318 VPN Auto Policy as illustrated below.
Note:
After you click Apply to change the LAN IP address settings, your
workstation will be disconnected from the FVG318. You will have to log
on with
which is now the address you use to connect to the
built-in Web-based configuration manager of the FVG318.
Figure 6-8
Page 119 / 176
ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
Advanced Virtual Private Networking
6-13
v1.0, September 2007
a.
Select VPN > Policies and click the VPN Policies tab. The VPN Policies screen will
display. Click
Add
to display the Add VPN Policy screen.
b.
Configure the VPN Policy according to the settings in the illustration above and click
Apply
to save your settings. For more information on VPN Policy topics, please see
“VPN
Policy Configuration for Auto Key and Manual Negotiation” on page 6-3
.
5.
After applying these changes, all traffic from the range of LAN IP addresses specified on
FVG318 A and FVG318 B will flow over a secure VPN tunnel.
Checking Your VPN Connections
You can test connectivity and view VPN status information on the FVG318 (see also
“Activating a
VPN Tunnel” on page 5-23
).
Figure 6-9
Page 120 / 176
ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
6-14
Advanced Virtual Private Networking
v1.0, September 2007
To test the Gateway A FVG318 LAN and the Gateway B LAN connection:
1.
Using our example, from a PC attached to the FVG318 on LAN A, on a Windows PC click the
Start button on the task bar and then click Run.
2.
Type
ping -t 172.23.9.1
, and then click
OK
.
3.
This will cause a continuous ping to be sent to the LAN interface of Gateway B. Within two
minutes, the ping response should change from timed out to reply.
4.
At this point the connection is established.
5.
To test connectivity between the FVG318 Gateway A and Gateway B WAN ports, follow
these steps:
a.
Using our example, log in to the FVG318 on LAN A and then select Monitoring >
Diagnostics from the menu.
b.
To test connectivity to the WAN port of Gateway B, enter
22.23.24.25
in the IP Address
field in the
Ping or Trace an IP Address
section, and then click
Ping
.
c.
This causes a ping to be sent to the WAN interface of Gateway B. Within two minutes, the
ping response should change from timed out to reply. You may have to run this test several
times before you get the reply message back from the target FVG318.
d.
At this point the connection is established.
6.
To view the FVG318 event log and status of Security Associations, follow these steps:
a.
Select the Monitoring > VPN Logs to view the VPN Log Status of the FVG318 and go to
VPN > IPSec Connection Status to view the Active IPsec SA(s) policies.
b.
The log screen displays a history of the VPN connections, and the IP Connection Status
screen will show the IPSec SA table that will report the status and data transmission
statistics of the VPN tunnels for each policy.
Note:
If you want to ping the FVG318 as a test of network connectivity, be sure the
FVG318 is configured to respond to a ping on the Internet WAN port by
checking the check box. However, to preserve a high degree of security, you
should turn off this feature when you are finished with testing.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top