Connecting NG Firewall to Kerio Control via IPsec VPN
Overview
You can enable secure VPN connectivity between a Kerio Control protected network and a network protected by NG Firewall. This type of configuration uses IPsec VPN tunneling.
Setting the inbound network policy
To enable VPN tunneling, the firewall policy for each gateway must permit IPsec traffic.
NG Firewall
For NG Firewall, the default configuration permits incoming IPsec traffic. You can confirm these settings in Config > Network > Advanced > Access Rules.
Kerio Control
To permit incoming IPsec traffic in Kerio Control, go to Configuration > Traffic Rules and enable the default rule named VPN Services.
Configuring the VPN server
NG Firewall
To enable and configure the IPsec VPN server in NG Firewall:
- In the administration, go to Apps.
- If the IPsec VPN app does not appear, click Install Apps and select IPsec VPN.
- Return to Apps and click IPsec VPN to configure the VPN server.
- In the VPN Config tab, click Enable L2TP/Xauth/IKEv2 Server.
- Set a value for the IPsec Secret. The IPsec Secret is a password, so it should be complex.
- For all other values, use the defaults or assign custom parameters as needed.
Kerio Control
To enable and configure the IPsec VPN server in Kerio Control:
- In the administration, go to Configuration > Interfaces.
- Edit the VPN server interface.
- Verify that the IPsec VPN server is enabled.
- In the IPsec VPN tab, click Use preshared key and enter a password.
- Click Ok, then Apply.
Creating the VPN tunnel
The IPsec tunnel between both firewall appliances must negotiate the following parameters:
- IPsec secret / Preshared key - A common password assigned to the VPN server
- Local ID - An identifier for the local VPN gateway
- Remote ID - An identifier for the remote VPN gateway
- Remote network - The IP subnet(s) behind the remote VPN gateway
- Local network - The IP subnet(s) behind the local VPN gateway
NG Firewall
To configure VPN tunnel parameters in NG Firewall:
- Go to the IPsec Tunnel tab in the IPsec VPN app.
- Click Add.
- Set a Description for the VPN tunnel.
- For IKE Version, choose IKEv1.
- In Remote host, enter the IP address or hostname of the Kerio Control gateway.
- In Local Identifier, set an easy to remember value (e.g. untangle).
- In Remote Identifier, set an easy to remember value (e.g. kerio).
- In Remote network, enter the IP subnet of the network behind the Kerio Control gateway.
- In Shared Secret, enter the password you set as the preshared key in Kerio Control.
- Enable Manual Configuration for both Phase 1 and Phase 2.
- Assign the Encryption as AES128 and the Hash as SHA-1 for both phases to match the corresponding cipher values in Kerio Control.
- Click Done, then Save.
Kerio Control
To configure VPN tunnel parameters in Kerio Control:
- Go to Configuration > Interfaces.
- Click Add > VPN Tunnel.
- Set a Name for the VPN tunnel.
- Confirm the Type is set to IPsec.
- Confirm the tunnel is enabled and choose Active.
- Beneath Active, enter the IP address or hostname of the NG Firewall VPN gateway.
- In the Authentication tab, choose Preshared key and enter the password you set as the IPsec Secret in NG Firewall.
- In Local ID, enter the value you set as the Remote Identifier in the corresponding VPN tunnel in NG Firewall.
- In Remote ID, enter the value you set as the Local Identifier in the corresponding VPN tunnel in NG Firewall.
- In the Remote Networks tab, click Add and enter the IP subnet of the network behind NG Firewall.
- Click Ok, then Apply.
Monitoring the VPN tunnel status
After configuring the VPN tunnel, each gateway attempts to connect immediately. In NG Firewall, the VPN connection status appears on the Status tab of the IPsec VPN app.
The VPN connection status in Kerio Control appears in the Interfaces screen.
Comments
0 comments
Please sign in to leave a comment.