You can enable secure VPN connectivity between a Kerio Control protected network and a network protected by NG Firewall. This type of configuration uses IPsec VPN tunneling.
Setting the inbound network policy
To enable VPN tunneling, the firewall policy for each gateway must permit IPsec traffic.
For NG Firewall, the default configuration permits incoming IPsec traffic. You can confirm these settings in Config > Network > Advanced > Access Rules.
To permit incoming IPsec traffic in Kerio Control, go to Configuration > Traffic Rules and enable the default rule named VPN Services.
Configuring the VPN server
To enable and configure the IPsec VPN server in NG Firewall:
- In the administration, go to Apps.
- If the IPsec VPN app does not appear, click Install Apps and select IPsec VPN.
- Return to Apps and click IPsec VPN to configure the VPN server.
- In the VPN Config tab, click Enable L2TP/Xauth/IKEv2 Server.
- Set a value for the IPsec Secret. The IPsec Secret is a password, so it should be complex.
- For all other values, use the defaults or assign custom parameters as needed.
To enable and configure the IPsec VPN server in Kerio Control:
- In the administration, go to Configuration > Interfaces.
- Edit the VPN server interface.
- Verify that the IPsec VPN server is enabled.
- In the IPsec VPN tab, click Use preshared key and enter a password.
- Click Ok, then Apply.
Creating the VPN tunnel
The IPsec tunnel between both firewall appliances must negotiate the following parameters:
- IPsec secret / Preshared key - A common password assigned to the VPN server
- Local ID - An identifier for the local VPN gateway
- Remote ID - An identifier for the remote VPN gateway
- Remote network - The IP subnet(s) behind the remote VPN gateway
- Local network - The IP subnet(s) behind the local VPN gateway
To configure VPN tunnel parameters in NG Firewall:
- Go to the IPsec Tunnel tab in the IPsec VPN app.
- Click Add.
- Set a Description for the VPN tunnel.
- For IKE Version, choose IKEv1.
- In Remote host, enter the IP address or hostname of the Kerio Control gateway.
- In Local Identifier, set an easy to remember value (e.g. untangle).
- In Remote Identifier, set an easy to remember value (e.g. kerio).
- In Remote network, enter the IP subnet of the network behind the Kerio Control gateway.
- In Shared Secret, enter the password you set as the preshared key in Kerio Control.
- Enable Manual Configuration for both Phase 1 and Phase 2.
- Assign the Encryption as AES128 and the Hash as SHA-1 for both phases to match the corresponding cipher values in Kerio Control.
- Click Done, then Save.
To configure VPN tunnel parameters in Kerio Control:
- Go to Configuration > Interfaces.
- Click Add > VPN Tunnel.
- Set a Name for the VPN tunnel.
- Confirm the Type is set to IPsec.
- Confirm the tunnel is enabled and choose Active.
- Beneath Active, enter the IP address or hostname of the NG Firewall VPN gateway.
- In the Authentication tab, choose Preshared key and enter the password you set as the IPsec Secret in NG Firewall.
- In Local ID, enter the value you set as the Remote Identifier in the corresponding VPN tunnel in NG Firewall.
- In Remote ID, enter the value you set as the Local Identifier in the corresponding VPN tunnel in NG Firewall.
- In the Remote Networks tab, click Add and enter the IP subnet of the network behind NG Firewall.
- Click Ok, then Apply.
Monitoring the VPN tunnel status
After configuring the VPN tunnel, each gateway attempts to connect immediately. In NG Firewall, the VPN connection status appears on the Status tab of the IPsec VPN app.
The VPN connection status in Kerio Control appears in the Interfaces screen.