Basic ViPNet VPN Deployment Schemes

Basic ViPNet VPN
Deployment Schemes
Supplement to ViPNet Documentation
© 1991–2015 Infotecs Americas. All rights reserved.
Version: 00121-04 90 01 ENU
This document is included in the software distribution kit and is subject to the same terms and conditions as the software itself.
No part of this publication may be reproduced, published, stored in an electronic database, or transmitted, in any form or by any means
— electronic, mechanical, recording, or otherwise — for any purpose, without the prior written consent of Infotecs Americas Inc.
ViPNet® is a registered trademark of Infotecs Americas Inc., New York, USA.
All brands and product names that are trademarks or registered trademarks are the property of their owners.
Global contacts page http://www.vipnet.com/
Contents
Introduction .................................................................................................................................................................. 5
About This Document ............................................................................................................................................... 6
Audience .............................................................................................................................................................. 6
Document Conventions ................................................................................................................................. 6
Feedback ......................................................................................................................................................................... 8
Guidelines ....................................................................................................................................................................... 9
Basic ViPNet VPN Deployment Schemes ......................................................................................................... 10
Before You Begin ....................................................................................................................................................... 11
Chapter 1. Connection between a Remote Client and an Office .................................................................. 13
Overview ....................................................................................................................................................................... 14
Configuring Network Structure in ViPNet Network Manager ................................................................. 15
Creating a ViPNet Network......................................................................................................................... 15
Configuring a ViPNet Network .................................................................................................................. 15
Checking Settings on a Firewall ........................................................................................................................... 18
Checking Settings on a Coordinator ................................................................................................................. 19
Checking Settings on Clients in the Office ...................................................................................................... 20
Checking Settings on a Remote Client ............................................................................................................. 22
Chapter 2. Remote Client to Remote Client ....................................................................................................... 24
Overview ....................................................................................................................................................................... 25
Configuring Network Structure in ViPNet Network Manager ................................................................. 26
Checking Settings on a Firewall and a Coordinator .................................................................................... 27
Checking Settings on a Remote Client ............................................................................................................. 28
Chapter 3. Office to Office Connection ............................................................................................................... 29
Overview ....................................................................................................................................................................... 30
Configuring Network Structure in ViPNet Network Manager ................................................................. 31
Checking Settings on Firewalls and Coordinators in Both Offices ........................................................ 33
Checking Settings on Clients in Both Offices ................................................................................................. 34
Chapter 4. Office to Office Connection with Tunneling .................................................................................. 35
Overview ....................................................................................................................................................................... 36
Configuring Network Structure in ViPNet Network Manager ................................................................. 37
Checking Settings on Firewalls and Coordinators in Both Offices ........................................................ 40
Checking Routing Settings on Tunneled Hosts ............................................................................................ 42
Checking Settings on a Remote Client ............................................................................................................. 44
Chapter 5. Mobile Device to Office Connection ............................................................................................... 45
Overview ....................................................................................................................................................................... 46
Configuring a Network in ViPNet Network Manager ................................................................................. 48
Configuring a Coordinator for Windows ......................................................................................................... 50
Verifying Settings on an External Firewall ....................................................................................................... 52
Configuring Mobile Devices ................................................................................................................................. 53
Configuring an Apple Mobile Device ..................................................................................................... 53
Configuring an Android Mobile Device ................................................................................................. 53
Chapter 6. Office to Office Connection Both with the ViPNet and IPsec Technologies ......................... 55
Overview ....................................................................................................................................................................... 56
Configuring Network in ViPNet Network Manager..................................................................................... 57
Settings Check on a Remote Gateway .............................................................................................................. 60
Introduction
About This Document
6
Feedback
8
Guidelines
9
Basic ViPNet VPN Deployment Schemes
10
Before You Begin
11
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 5
About This Document
This document is a supplement to “ViPNet VPN. User’s Guide.” It contains 6 basic schemes of deploying a
protected ViPNet VPN network. Each scheme is attended with step-by-step instructions helping you to
create and configure a network in ViPNet Network Manager and then, on your ViPNet hosts, check
whether the settings you made in ViPNet Network Manager are correct.
Audience
This document is intended for the network administrators intending to deploy and configure ViPNet VPN
virtual private networks in their organizations.
You don't have to be an IT professional to read and understand this document. However, you should
have a general idea of computer networks, IP protocols, firewalls, tunneling, and cryptography.
Document Conventions
This document uses the following conventions:
Table 1. Document conventions
Icon
Description
Warning: Indicates an obligatory action or information that may be critical for
continuing user operations.
Note: Indicates a non-obligatory, but desirable action or information that may be
helpful for users.
Tip: Contains additional information.
Table 2. Conventions for highlighted information
Icon
Description
Name
The name of an interface element. For instance, the name of a window, a
box, a button, or a key.
Key+Key
Shortcut keys. To use the shortcut keys, press and hold the first key and
press other keys.
Menu > Submenu >
Command
A hierarchical sequence of elements. For instance, menu items or sections
in the navigation pane.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 6
Icon
Description
Code
A file name, path, text file (code) fragment or a command executed from
the command line.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 7
Feedback
Finding Additional Information
For more information about Infotecs products and technologies, see the following resources:

ViPNet documentation web portal http://www.vipnet.com/redir/doc_vipnet/.

Information about current Infotecs products http://www.vipnet.com/redir/products/.

Information about Infotecs solutions http://www.vipnet.com/redir/solutions/.
Contacting Infotecs
We value any feedback from you. If you have any questions concerning Infotecs products and solutions,
any suggestions, complains or other feedback, feel free to contact us by means of the following:

Global contacts page http://www.vipnet.com/

Telephone (Germany): +49 (0) 30 206 43 66 0

Telephone (USA): +1 (646) 589-8571
Errata
Infotecs makes every effort to ensure that there are no errors or misprints in the text of all documents
supplied with ViPNet software. However, no one is perfect, and mistakes do occur. If you find an error in
one of our documents, like a spelling mistake or some inaccuracy in describing user scenarios or system
features, we would be very grateful for your feedback. By sending in errata you may save other reader
hours of frustration, and at the same time you will be helping us provide documentation of even higher
quality.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 8
Guidelines
Here are the guidelines of working with the document:
1
Choose a scheme that fits the required logical network structure (see Basic ViPNet VPN Deployment
Schemes on page 10).
If you want to connect two offices of your organization through a protected network, we
recommend you to create a single corporate ViPNet network including computers of both offices. If
you need to establish secure connection between two different organizations, we recommend you
to create two different ViPNet networks and establish partner network connection between them
(see “ViPNet VPN. User's Guide”, chapter 6).
Warning: In this document, we will consider communication between head and branch
offices’ hosts via a single corporate ViPNet network.
2
On a ViPNet administrator's workstation, you should first install ViPNet Network Manager and then
ViPNet Client or ViPNet Coordinator (see “ViPNet VPN. User's Guide”, chapter 2, “Deploying the
ViPNet Network Administrator's Workstation”).
3
In ViPNet Network Manager, create logical network structure according to the recommendations in
this document, and then create key sets for ViPNet hosts.
4
On the hosts that will function as coordinators, install the ViPNet Coordinator software (see “ViPNet
VPN. User's Guide”, chapter 2, “Installing ViPNet Coordinator on ViPNet Network Servers”) and
install the key sets created in ViPNet Network Manager.
5
On ViPNet users' computers, including remote ones, install the ViPNet Client software (see “ViPNet
VPN. User's Guide”, chapter 2, “Deploying the ViPNet Network User's Workstations”) and install the
key sets created in ViPNet Network Manager.
6
Check connection between coordinators and remote clients, between different remote users,
between coordinators from different networks.
7
If connection has not been established, follow the recommendations in this document to check
ViPNet Coordinator and ViPNet Client program settings on ViPNet hosts.
Note: To change any settings for a coordinator or a client, in ViPNet Network Manager:
 In the navigation pane, choose a ViPNet host, whose settings you are going to
change.
 Go through the tabs in the view pane and make the required settings.
 Create key sets, copy them to a removable drive, and manually update keys on
ViPNet hosts.
8
Check connection again.
If the connection is still not established, the failure may be caused by wrong firewall configuration or
incompatible software. Contact Infotecs technical support.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 9
Basic ViPNet VPN Deployment
Schemes
Below, we describe six typical network schemes you can deploy with ViPNet VPN:
1
Connection between a remote client and an office (on page 13)
Follow these steps to deploy a ViPNet network and establish a protected connection between a
remote user and an office. A remote user is a laptop user connecting to the Internet from different
locations: home, workplace, a Wi-Fi cafe, and so on. It could also be a desktop PC in a branch office
or at home (or in some other place from where a coordinator is not accessible directly).
2
Remote client to remote client (on page 24)
Follow these steps to deploy a ViPNet network with two remote clients and establish a direct clientto-client connection between them.
3
Office to office connection (on page 29)
Follow these steps to deploy a ViPNet network and establish a protected point-to-point connection
between two ViPNet hosts located in two different offices of an organization.
4
Office to office connection with tunneling (on page 35)
Follow these steps to deploy a ViPNet network and establish a protected connection between such
network devices located in two different offices of an organization, where you can't install the
ViPNet software for some reasons. These hosts can be computers with Apple Mac OS, network
devices like printers, VoIP appliances, NAS, surveillance cameras, and other.
5
Mobile Device to Office Connection (on page 45)
Follow these steps to deploy a ViPNet network and establish connection between Apple or Android
mobile users and an office.
6
Office to office connection both with the ViPNet and IPsec technologies (on page 55)
Follow these steps to deploy a ViPNet network and establish connection with another ViPNet
network.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 10
Before You Begin
Decide beforehand, where your will install the ViPNet Coordinator software (those hosts will be ViPNet
network servers) and the ViPNet Client software (one of those hosts will be the ViPNet network
administrator's workstation). A coordinator must always be accessible to its clients. This means, a
coordinator host must always be online with ViPNet Coordinator software running on it. Static port
forwarding should be enabled on the firewall used by this coordinator to access public (Internet)
resources.
On the ViPNet network administrator's workstation, run the ViPNet VPN setup program and first install
ViPNet Network Manager, then ViPNet Client or ViPNet Coordinator (see ViPNet VPN. User's Guide,”
chapter 2, “Deploying the ViPNet Network Administrator's Workstation”). ViPNet Network Manager
allows you to create, configure and maintain a protected ViPNet network that may include hosts located
in the head office, branch offices, and remote computers.
To establish connection between head office computers and branch office computers, partner company
computers or remote users, there should be at least one coordinator in a ViPNet network which is always
accessible from outside by either an external (public) static IP address or a DNS name. In the first two
scenarios described in this document, there is only one coordinator on the network, while in the last two
scenarios, the described functions are performed by a coordinator located in the head office. In the first
two and the second two scenarios described in this document, there is only one coordinator on the
network, while in the third and the fourth scenarios, the described functions are performed by a
coordinator located in the head office.
If your coordinator does not have a public static IP address, use the dynamic DNS service, which
translates your firewall’s public dynamic addresses to a specified DNS name (for example, you may use a
www.dynDNS.com http://www.dynDNS.com service).
Warning: Before configuring settings on ViPNet hosts, check network parameters, as
described below.
Check network parameters on the computers functioning as coordinators and on the firewalls:

Make sure the coordinator's network interface connected to the firewall has a static local IP address.

Make sure you know the public static IP address or the DNS name of the head office coordinator.

Make sure the following filtering rules are configured on the firewalls behind which your
coordinators are located: allow all traffic incoming to the UDP port specified in coordinator's options
(55777 by default) and forward it to the coordinator's local IP address;
To learn the number of your coordinators’ UDP packets encapsulation port:
o
In the ViPNet Coordinator Monitor main window, on the Service menu, click Options.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 11
Figure 1. Viewing the UDP packets encapsulation port number
o
In the Private Network section, in the UDP packets encapsulation port box, check the specified
port number.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 12
1
Connection between
a Remote Client and an Office
Overview
14
Configuring Network Structure in ViPNet Network Manager
15
Checking Settings on a Firewall
18
Checking Settings on a Coordinator
19
Checking Settings on Clients in the Office
20
Checking Settings on a Remote Client
22
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 13
Overview
This chapter describes a scheme of establishing connection between a remote user and the head office
using the ViPNet VPN software. A remote user is a laptop user connecting to the Internet from different
locations (home, workplace, a Wi-Fi cafe, and so on), or a desktop PC user working at any place from
where he or she can't connect to the coordinator directly.
Figure 2. Connection between a remote client and an office
Suppose there are a coordinator and several clients in the head office. The clients use the coordinator as
a firewall. The coordinator is located behind a firewall with static NAT. Port forwarding rules (see
Checking Settings on a Firewall on page 18) for the coordinator are configured on the firewall. A remote
ViPNet user establishes connection to the office over the Internet (see. figure 2 on page 14).
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 14
Configuring Network Structure
in ViPNet Network Manager
Creating a ViPNet Network
Create the initial ViPNet network structure using the ViPNet Network Creation Wizard (see “ViPNet VPN.
User’s Guide,” chapter 3, section “Creating a ViPNet Network”):
1
Specify the required number of coordinators and clients. To implement the scheme of connecting a
remote user to an office (see. figure 2 on page 14), you need one coordinator.
2
Choose how your ViPNet hosts will be linked with each other.
3
Edit the created network structure and links if necessary.
4
To configure access parameters for the coordinator, select the Using a firewall Internet connection
type (see the “Configuring Access to a Coordinator” section, the “Configuring Access to a
Coordinator behind a Firewall” topic) and specify the firewall's IP addresses or DNS name.
If you want to configure the firewall parameters later, select the Configure in ViPNet Network
Manager main window option.
Note: With the ViPNet Network Creation Wizard, you may configure access
parameters only for the first created coordinator (where the ViPNet administrator's
workstation is registered by default). If you need to set up access parameters for
another coordinator, use the main ViPNet Network Manager window.
5
Configure random password options.
6
On the last page of the Wizard, clear the Create key sets upon completing ViPNet Network
Creation Wizard check box and click Close.
Configuring a ViPNet Network
To configure ViPNet hosts:
1
In the navigation pane of the main ViPNet Network Manager window, select the coordinator to be
used for communication with external hosts. Click the Access IP addresses tab.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 15
Figure 3. Assigning an IP address for a coordinator
If you have configured access options for the coordinator (see Creating a ViPNet Network on page
15) when creating a network, then the firewall is already configured.
To add an IP address or DNS name, in the corresponding group, click Add. In the IP Address or DNS
name window, add a new IP address or DNS name and click OK.
Figure 4. Adding an IP address
2
Click the Firewall tab.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 16
Figure 5. Configuring firewall parameters
If you have configured access options for the coordinator (see Creating a ViPNet Network on page
15) when creating a network, then the required firewall parameters are already specified.
Otherwise, follow the steps below:
o
Select the Use firewall check box.
o
In the Firewall type list, select With static address translation.
3
In the navigation pane, choose the client. Open the Links tab and make sure that the list includes all
ViPNet hosts this client should communicate with.
4
On the Tools menu, select Keys, and then click Save Key Sets. Copy the created key sets to a
removable drive and use them to install the ViPNet keys on the coordinator and clients.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 17
Checking Settings on a Firewall
We recommend that the firewall (or another NAT device) has a static public IP address. If the firewall does
not have a public static IP address, use the dynamic DNS service, which translates your firewall’s public
dynamic addresses to a specified DNS name (for example, you may use a www.dynDNS.com service).
On the firewall, configure the following rules:
1
Specify the UDP access port to exchange protected traffic with any networks.
Note: By default, the ViPNet software uses port number 55777, but you can change it if
needed.
2
Create the following port forwarding rule for incoming and outgoing UDP traffic: allow any UDP
traffic incoming to the specified port and forward it to the corresponding coordinator.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 18
Checking Settings on a Coordinator
Make sure the coordinator has been configured correctly. To do this:
1
In the main window of the ViPNet Coordinator program, on the Service menu, click Options. The
Options dialog box will be displayed.
Figure 6. Checking settings on a coordinator
2
Make sure that, in the Private Network section, the Use external firewall check box is selected.
3
Make sure that, in the Firewall type list, With static NAT is selected.
4
Make sure that, in the UDP packets encapsulation port box, the same port number is specified as
the one in port forwarding rules on the firewall.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 19
Checking Settings on Clients
in the Office
To check settings on clients located in the office:
1
In the ViPNet Client Monitor program, log on as an administrator.
2
On the Tools menu, click Options. The Options dialog box will be displayed.
3
In the Options dialog box, make sure that, in the Private Network section, a coordinator installed in
the office is selected as the coordinator for connections.
Figure 7. Private network settings
4
Click OK.
5
In the navigation pane of the main ViPNet Client window, select the Private Network section.
6
In the Private Network section, in the hosts list, double-click the coordinator chosen as this client's
coordinator for connections. The ViPNet Host Properties dialog box will be displayed.
7
In the ViPNet Host Properties dialog box, click the IP Addresses tab.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 20
Figure 8. Viewing coordinator's IP addresses
8
Make sure that, in the IP Addresses list, in the Real IP addresses column, the correct coordinator's
address is specified.
If DNS names are used, make sure that the Use DNS name check box is selected and, in the DNS
name list, the correct coordinator's DNS name is specified.
9
Check connection to the coordinator. To do this, in the Private Network section, select the
coordinator and, on the toolbar, click Connection or press F5.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 21
Checking Settings on a Remote
Client
To check settings on a remote client:
1
In the ViPNet Client Monitor program, log on as an administrator.
2
On the Tools menu, click Options. The Options dialog box will be displayed.
3
In the Options dialog box, make sure that, in the Private Network section, a coordinator installed in
the office is selected as the coordinator for connections.
4
Click OK.
5
In the navigation pane of the main ViPNet Client window, select the Private Network section.
6
In the Private Network section, in the hosts list, double-click the coordinator chosen as this client's
coordinator for connections. The ViPNet Host Properties dialog box will be displayed.
7
In the ViPNet Host Properties dialog box, click the Firewall tab.
Figure 9. Access IP addresses
8
In the Access IP addresses list, a public IP address of the firewall behind which the coordinator is
installed must be specified. If the firewall has no static public IP address, verify its DNS name (step
12).
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 22
9
In the ViPNet Host Properties dialog box, click the IP Addresses tab (see. figure 8 on page 21).
10 Make sure that, in the IP Addresses list, in the Real IP addresses column, the correct coordinator's
address is specified.
If DNS names are used, make sure that the Use DNS name check box is selected and, in the DNS
name list, the correct DNS name of the firewall behind which the coordinator is installed is specified.
11 Check connection to the coordinator. To do this, in the Private Network section, select the
coordinator and, on the toolbar, click Connection or press F5.
If all the settings have been configured correctly, connection between a remote client and the head office
will be established.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 23
2
Remote Client to Remote
Client
Overview
25
Configuring Network Structure in ViPNet Network Manager
26
Checking Settings on a Firewall and a Coordinator
27
Checking Settings on a Remote Client
28
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 24
Overview
This chapter describes a scheme of establishing connection between two remote users using the ViPNet
VPN software.
Figure 10. Remote client to remote client connection
This scheme has much in common with the previous one (see Connection between a Remote Client and
an Office on page 13). Suppose there are a coordinator and several clients in the head office. The
coordinator is installed behind a firewall with static NAT. Port forwarding rules (see Checking Settings on
a Firewall on page 18) for the coordinator are configured on the firewall. A remote ViPNet user and a
home ViPNet user establish connection with each other and with the office over the Internet.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 25
Configuring Network Structure
in ViPNet Network Manager
First, create the required ViPNet network structure, as described in Creating a ViPNet Network (on page
15). To implement the above-described scheme (see figure on page 25), create one coordinator, the
required number of clients that will work in the office, and two more clients that will work remotely.
To configure the created network structure, in ViPNet Network Manager:
1
In the navigation pane of the main ViPNet Manager window, select the coordinator to be used for
communication with external hosts. Open the Access IP addresses (see figure on page 16) tab.
If you have configured access options for the coordinator (see Creating a ViPNet Network on page
15) when creating a network, the IP address of the coordinator is already specified. If you didn't
specify the IP address in the IP addresses group, click Add. In the IP Address window, add the
coordinator's address and click OK.
If the firewall is accessible from the Internet by a DNS name (for example, the dynDNS service is
used), in the DNS names group, click Add and type the DNS name of the firewall.
2
Click the Firewall tab (see figure on page 17).
If you have configured access options for the coordinator (see Creating a ViPNet Network on page
15) when creating a network, the firewall parameters are already specified.
Otherwise, follow the steps below:
o
Select the Use firewall check box.
o
In the Firewall type list, select With static address translation.
3
In the navigation pane, choose the client. Open the Links tab and make sure that the list includes all
ViPNet hosts this client should communicate with.
4
Repeat steps 3 and 4 to configure the other remote client.
5
On the Tools menu, select Keys, and then click Save Key Sets. Copy the created key sets to a
removable drive and use them to install the ViPNet keys on the coordinator and clients.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 26
Checking Settings on a Firewall
and a Coordinator
Make sure that the firewall has a static public IP address or a DNS name provided by a dynamic DNS
service. Port forwarding rules (see Checking Settings on a Firewall on page 18) must be configured on
the firewall.
On the computer that functions as the coordinator, check the ViPNet Monitor settings (see Checking
Settings on a Coordinator on page 19).
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 27
Checking Settings on a Remote
Client
Note: All remote clients of the ViPNet network should be configured as follows.
To check settings on a remote client:
1
In the ViPNet Client Monitor program, log on as an administrator.
2
On the Service menu, click Options. The Options dialog box will be displayed.
3
In the Options dialog box, make sure that, in the Private Network section (see figure on page 20), a
coordinator installed in the office is selected as the coordinator for connections.
4
Click OK.
5
In the navigation pane of the main ViPNet Client window, select the Private Network section.
6
In the Private Network section, in the hosts list, double-click the coordinator chosen as this client's
coordinator for connections. The ViPNet Host Properties dialog box will be displayed.
7
In the ViPNet Host Properties dialog box, click the Firewall tab (see figure on page 22).
8
In the Access IP addresses table, check that a public IP address of the firewall, behind which the
coordinator is located, is specified. If the firewall has no static public IP address, verify its DNS name
(step 12).
9
In the ViPNet Host Properties dialog box, click the IP Addresses tab (see figure on page 21).
10 Make sure that, in the IP Addresses list, in the Real IP addresses column, the correct coordinator's
address is specified.
If DNS names are used, make sure that the Use DNS name check box is selected and, in the DNS
name list, the correct DNS name of the firewall behind which coordinator A is installed is specified.
11 Make sure that, in the Private Network section, the other remote user and other ViPNet hosts your
client should communicate with are included in the hosts list.
12 Check connection to the office coordinator and the other remote client. To do this, in the Private
Network section, select the required ViPNet host and, on the toolbar, click Connection or press F5.
If all the settings have been configured correctly, connection between remote clients with each other and
between remote clients and the head office will be established.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 28
3
Office to Office Connection
Overview
30
Configuring Network Structure in ViPNet Network Manager
31
Checking Settings on Firewalls and Coordinators in Both Offices
33
Checking Settings on Clients in Both Offices
34
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 29
Overview
This chapter describes a scheme of establishing protected connection between the head office and the
branch office using the ViPNet VPN software.
Figure 11. Office to office connection
Suppose there are two offices in an organization: head and branch. A corporate ViPNet network includes
hosts in both offices. Coordinator A located in the head office and Coordinator B located in the branch
office establish a protected connection to each other over the Internet. Coordinator A is located behind a
firewall on which a static port forwarding rule is configured for protected traffic exchange. Coordinator B
is located behind a firewall with no specially configured settings for protected traffic exchange. Clients in
the head office (one of them functions as a ViPNet network administrator's workstation) use coordinator
A as a firewall. Clients in the branch office use coordinator B as a firewall.
Only one office (in our example, the head office) should be accessible from the outside either by a public
static IP address or by a DNS name (see Before You Begin on page 11).
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 30
Configuring Network Structure
in ViPNet Network Manager
First, create the required ViPNet network structure, as described in Creating a ViPNet Network (on page
15). To implement the above-described scheme (see figure on page 30), create two coordinators. On
coordinator A, register the clients intended to be installed in the head office. On coordinator B, register
the clients intended to be installed in the branch office.
In ViPNet Network Manager, configure each coordinator:
1
In the main ViPNet Network Manager window, in the navigation pane, select coordinator A and click
the Access IP addresses tab.
Figure 12. Assigning an IP address for a coordinator
If you have configured access options for the coordinator (see Creating a ViPNet Network on page
15) when creating a network, the IP address of the coordinator is already specified. If you didn't
specify the IP address in the IP addresses group, click Add. In the IP Address window, type the IP
address of the coordinator A (in this example, it is 192.168.134.11) and click OK.
If Coordinator A is accessed from the Internet by its DNS name (for example, the dynDNS service is
used), in the DNS names group, click Add and type the DNS name of the coordinator.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 31
2
Click the Firewall tab.
If you have configured access options for the coordinator A (see Creating a ViPNet Network on
page 15) when creating a network, the firewall parameters are already specified.
Otherwise, follow the steps below:
o
Select the Use firewall check box.
o
In the Firewall type list, select With static address translation.
3
In the navigation pane of the main ViPNet Network Manager window, select coordinator B, open the
Access IP addresses tab and, in the IP addresses group, click Add. In the IP Address window, type
the local IP address of the coordinator B (in this example, it is 192.168.187.19) and click OK.
4
Click the Firewall tab:
5
o
Select the Use firewall check box.
o
In the Firewall type list, select With dynamic address translation.
o
In the Coordinator to manage connections with external hosts list, select coordinator A.
o
Make sure that the Direct all VPN traffic with external hosts through the coordinator check
box is cleared.
On the Tools menu, select Keys, and then click Save Key Sets. Copy the created key sets to a
removable drive and use them to install the ViPNet keys on the coordinator and clients.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 32
Checking Settings on Firewalls
and Coordinators in Both Offices
Make sure that the head office firewall is accessible by a static public IP address or a DNS name provided
by a dynamic DNS service. On this firewall, a port forwarding rule (see Checking Settings on a Firewall on
page 18) must be configured for the local IP address of coordinator A (UDP, 55777). On the branch office
firewall, no additional settings are required.
To make sure both coordinators are configured correctly, on each coordinator:
1
In the ViPNet Coordinator main window, on the Service menu, click Options.
2
Make sure that, in the Private Network section, the Use external firewall check box is selected.
3
Make sure that, in the Firewall type list, on coordinator A, With static address translation is
selected, while on coordinator B, the With dynamic address translation firewall type is selected.
4
Make sure that, on coordinator A, in the UDP packets encapsulation port box, the same port
number is specified as the one in port forwarding rules on the firewall.
5
Make sure that, on coordinator B, in the Connection server list, coordinator A is selected.
6
On coordinator B, in the navigation pane of the main ViPNet Coordinator window, select Private
Network.
7
In the view pane of the Private Network section, double-click coordinator A. The ViPNet Host
Properties dialog box will be displayed.
8
If coordinator A is accessible by a static public IP address:
8.1 In the ViPNet Host Properties dialog box, click the Firewall tab (see figure on page 22).
8.2 In the Access IP addresses list, a static public IP address must be specified for the firewall
behind which the coordinator of the other office is installed (in this example, it is 129.48.161.19).
9
If the head office firewall does not have a static public IP address, make sure that the firewall's DNS
name is specified.
In the ViPNet Host Properties dialog box, click the IP Addresses tab (see figure on page 21). Make
sure that the Use DNS name check box is selected and, in the DNS name list, the correct DNS name
of the firewall behind which the coordinator of the other office is installed is specified.
10 On coordinator B, check connection to coordinator A. To do this, in the Private Network section,
select coordinator A and, on the toolbar, click Connection or press F5.
If all the settings have been configured correctly, connection between the coordinators of the head and
branch offices will be established.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 33
Checking Settings on Clients in Both
Offices
Note: You should check the settings on every client in the head and branch offices as
follows.
To check the settings on a client:
1
In the ViPNet Client Monitor program, log on as an administrator.
2
On the Tools menu, click Options. The Options dialog box will be displayed.
3
In the Options dialog box, make sure that, in the Private Network (see figure on page 20) section, a
coordinator installed in the office is selected as the coordinator for connections.
4
Click OK.
5
In the navigation pane of the main ViPNet Client window, select the Private Network section.
6
In the Private Network section, in the hosts list, double-click the coordinator chosen as this client's
coordinator for connections. The ViPNet Host Properties dialog box will be displayed.
7
In the ViPNet Host Properties dialog box, click the IP Addresses tab (see figure on page 21).
8
Make sure that, in the IP Addresses list, in the Real IP addresses column, the correct coordinator's
address is specified (in the head office: 192.168.134.11, in the branch office: 192.168.87.19).
9
Check connection to the coordinator of the office where this client is installed. To do this, in the
Private Network section, select the coordinator and, on the toolbar, click Connection or press F5.
10 Check connection to any ViPNet host in the other office.
If all the settings have been configured correctly, connection between the head office and the branch
office will be established. If there is no connection, the problem may be in the firewall or some
incompatible software. Contact Infotecs technical support.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 34
4
Office to Office Connection
with Tunneling
Overview
36
Configuring Network Structure in ViPNet Network Manager
37
Checking Settings on Firewalls and Coordinators in Both Offices
40
Checking Routing Settings on Tunneled Hosts
42
Checking Settings on a Remote Client
44
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 35
Overview
This chapter describes a scheme of establishing protected connection between the head office and the
branch office using the ViPNet VPN software and the tunneling technology.
Tunneling is a method of protecting traffic passing through unprotected communications channels. IP
packets go unencrypted between a tunneled host and a coordinator, and encrypted between a
coordinator and other ViPNet hosts.
A tunneled host is a network host without ViPNet software installed that should be accessible from an
external network through a coordinator via a protected communications channel. It may be any device
connected to the network that has an IP address: an Apple PC, a network printer, a Network Attached
Storage (NAS), a VoIP device, IP-based manufacturing equipment, and so on.
Figure 13. Office to office connection with tunneling
Suppose there are two offices in an organization: head and branch. The corporate ViPNet network
includes two coordinators, a network control center (ViPNet Network Manager host), and a remote
ViPNet host. Coordinator A located in the head office and coordinator B located in the branch office
establish a protected connection to each other over the Internet. Coordinator A is located behind a
firewall on which a static port forwarding rule is configured for protected traffic exchange. Coordinator B
is located behind a firewall where no special settings for protected traffic exchange have been made.
Coordinator A tunnels several unprotected (without ViPNet software installed) computers and network
devices located in the head office. Coordinator B tunnels several unprotected computers and network
devices in the branch office. The remote client establishes connection to tunneled hosts in both offices.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 36
Configuring Network Structure
in ViPNet Network Manager
First, create the required ViPNet network structure as described in chapter 1 (see Creating a ViPNet
Network on page 15). To implement the above-described scheme (see figure on page 36), create two
coordinators and two clients (a ViPNet network administrator's workstation and a remote ViPNet host).
Note: You may create more clients if you need more protected hosts to be used in
offices or remotely.
In ViPNet Network Manager, configure each coordinator:
1
In the main ViPNet Network Manager window, in the navigation pane, select the coordinator A and
click the Access IP addresses tab (see figure on page 31).
If you have configured access options for the coordinator A (see Creating a ViPNet Network on
page 15) when creating a network, the IP address of the network adapter directly connected to the
firewall is already specified.
To assign an IP address, under IP addresses click Add. In the IP Address window, type the local IP
address of the coordinator and click OK.
If the coordinator is accessible from the Internet by a DNS name (for example, the dynDNS service is
used), under DNS names, click Add. Then, specify the coordinator's DNS name.
2
Click the Firewall tab (see figure on page 17).
If you have configured access options for the coordinator A (see Creating a ViPNet Network on
page 15) when creating a network, the firewall parameters are already specified.
Otherwise, follow the steps below:
o
Select the Use firewall check box.
o
In the Firewall type list, select With static address translation.
3
In the navigation pane of the main ViPNet Network Manager window, select the coordinator B.
Then, click the Access IP addresses tab and click Add. In the IP Address window, type a local IP
address of the coordinator and click OK.
4
Click the Firewall tab:
o
Select the Use firewall check box.
o
In the Firewall type list, select With dynamic address translation.
o
In the Coordinator for incoming traffic list, select coordinator A.
o
Make sure that the Direct all VPN traffic with external hosts through the coordinator check
box is cleared.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 37
For each coordinator:
5
Click the Tunnel tab.
Figure 14. Specifying IP addresses of tunneled hosts
o
On the Tunnel tab, specify the IP addresses of the computers and network devices to be
tunneled by this coordinator. We recommend that a coordinator and its tunneled hosts are
located in the same network segment.
Note: For our recommendations on the case when a coordinator and its tunneled hosts
are placed in different network segments, see the document “Common Scenarios of
ViPNet VPN Administering. Supplement to ViPNet Documentation.”
To specify an IP address:

Click Add. The IP Address or Range window will be displayed.

If you want to add a single tunneled IP address, select IP address and type the required IP
address in the box.

If you want to add a range of tunneled IP addresses, select Range and type the starting and
the ending IP addresses of the range in the boxes.

Click OK.
To configure a remote client:
1
In the navigation pane, select the client that is intended to be used remotely.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 38
2
Open the Links tab and make sure that the list includes all ViPNet hosts this client should
communicate with. Links with tunneled hosts are always allowed. These hosts are not listed.
On the Tools menu, select Keys, and then click Save Key Sets. Copy the created key sets to a removable
drive and use them to install the ViPNet keys on the coordinator and clients.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 39
Checking Settings on Firewalls
and Coordinators in Both Offices
Make sure that the head office firewall is accessible by a static public IP address or a DNS name provided
by a dynamic DNS service. On this firewall, a port forwarding rule (see Checking Settings on a Firewall on
page 18) must be configured for the local IP address of coordinator A (UDP, 55777). On the branch office
firewall, no additional settings are required.
To make sure both coordinators are configured correctly, on each coordinator:
1
In the main window of the ViPNet Coordinator program, on the Service menu, click Options.
2
Make sure that, in the Private Network section, the Use external firewall check box is selected.
3
Make sure that, in the Firewall type list, on coordinator A, With static address translation is
selected, while on coordinator B, the With dynamic address translation firewall type is selected.
4
Make sure that, on coordinator A, in the UDP packets encapsulation port box, the same port
number is specified as the one in port forwarding rules on the firewall.
5
Make sure that, on coordinator B, in the Connection server list, coordinator A is selected.
6
For each coordinator: In the Options dialog box, select Tunneling.
Figure 15. Checking tunneled IP addresses
Check tunneled hosts' IP addresses. A coordinator and its tunneled hosts must be located in the
same subnetwork.
7
On coordinator B, in the navigation pane of the main ViPNet Coordinator window, select Private
Network.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 40
8
In the view pane of the Private Network section, double-click coordinator A. The ViPNet Host
Properties dialog box will be displayed.
9
If coordinator A is accessible by a static public IP address:
o
In the ViPNet Host Properties dialog box, click the Firewall tab (see figure on page 22).
o
In the Access IP addresses list, the firewall's static public IP address must be specified.
10 If the head office firewall does not have a static public IP address, make sure that the firewall's DNS
name is specified.
In the ViPNet Host Properties dialog box, click the IP Addresses tab (see figure on page 21). Make
sure that the Use DNS name check box is selected and, in the DNS name list, the correct DNS name
of the firewall behind which the coordinator of the other office is installed is specified.
11 In the ViPNet Host Properties dialog box, click the Tunnel tab.
Figure 16. Checking IP addresses tunneled by the other coordinator
Make sure that, on the Tunnel tab, the Use IP addresses for tunneling check box is selected and IP
addresses tunneled by the other coordinator are specified.
If similar IP addresses are used in the head and branch offices, select the Use virtual IP addresses
check box. This allows avoiding a conflict of IP addresses.
12 On coordinator B, check connection to coordinator A. To do this, in the Private Network section,
select coordinator A and, on the toolbar, click Connection or press F5.
If all the settings have been configured correctly, connection between the coordinators of the head and
branch offices will be established.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 41
Checking Routing Settings
on Tunneled Hosts
We recommend you that each tunneled host should use its tunneling coordinator as its default gateway.
In this case, no additional routing settings are required.
On the hosts where you can't set the coordinator as the default gateway, add static routes to forward all
traffic to be tunneled to the branch office through the coordinator.
Figure 17. Viewing a virtual address
To add a static route, in Windows Command Prompt, enter the following command:
route add <destination IP address> mask <subnet mask> <gateway> -p,
where:
<destination IP address> is the virtual IP address of the destination subnetwork.
<subnet mask> is a destination subnet mask value.
<gateway> is the coordinator's local IP address.
-p identifies that the route is static and will be the saved after each reboot.
To learn the destination subnetwork IP address:
1
On the coordinator installed in the tunneled host's LAN, in the main ViPNet Coordinator Monitor
window, click Private Network.
2
In the list of ViPNet hosts, double-click the coordinator of the other office. The ViPNet Host
Properties dialog box will be displayed.
3
Click the Tunnel tab and make sure that the Use virtual IP addresses check box is selected. Use the
network addresses displayed in the Virtual IP addresses column to set a static route (in our
example, network 11).
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 42
For example, a tunneled host in the branch office should connect to tunneled hosts in the head office.
Tunneled hosts of the head office are accessible by virtual IP addresses that belong to the 11.0.0.0
network (see figure on page 42). The local IP address of the branch office coordinator is 192.168.1.1. To
set a static route on the branch office host, use the following command:
route add 11.0.0.0 mask 255.0.0.0 192.168.1.1 -p
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 43
Checking Settings on a Remote
Client
To check the settings on a remote client:
1
In the ViPNet Client Monitor program, log on as an administrator.
2
On the Tools menu, click Options. The Options dialog box will be displayed.
3
In the Options dialog box, make sure that, in the Private Network (see figure on page 20) section, a
coordinator installed in the office is selected as the coordinator for connections.
4
Click OK.
5
In the navigation pane of the main ViPNet Client window, select the Private Network section.
6
In the view pane of the Private Network section, double-click coordinator A. The ViPNet Host
Properties dialog box will be displayed.
7
In the ViPNet Host Properties dialog box, click the Firewall tab (see figure on page 22).
8
In the Access IP addresses list, a static public IP address of the firewall behind which coordinator A
is installed must be specified. If the firewall has no static public IP address, verify its DNS name (step
10).
9
In the ViPNet Host Properties dialog box, click the IP Addresses tab (see figure on page 21).
10 Make sure that, in the IP addresses list, in the Real IP addresses column, the correct local address of
coordinator A is specified.
If DNS names are used, make sure that the Use DNS name check box is selected and, in the DNS
name list, the correct DNS name of the firewall behind which coordinator A is installed is specified.
11 In the ViPNet Host Properties dialog box, click the Tunnel tab (see figure on page 41).
Make sure that the Use IP addresses for tunneling check box is selected and the IP addresses
tunneled by coordinator A are specified.
12 In the view pane of the Private Network section, double-click coordinator B. In the ViPNet Host
Properties dialog box, click the Tunnel tab. Make sure that the Use IP addresses for tunneling
check box is selected and the IP addresses tunneled by this coordinator are specified.
13 Check connection to each coordinator. To do this, in the Private Network section, select the
coordinator and, on the toolbar, click Check connection or press F5.
14 Try to connect to some tunneled host using its IP address (for example, by executing the ping
command).
If all the settings have been configured correctly, connection between remote clients and tunneled hosts
will be established. If there is no connection, the problem may be in the firewall or some incompatible
software. Contact Infotecs technical support.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 44
5
Mobile Device to Office
Connection
Overview
46
Configuring a Network in ViPNet Network Manager
48
Configuring a Coordinator for Windows
50
Verifying Settings on an External Firewall
52
Configuring Mobile Devices
53
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 45
Overview
This chapter describes a connection scheme within a ViPNet VPN network, where Apple and Android
device users establish connection to the office.
Figure 18. Connection between office and mobile devices
Your mobile device connects to a protected ViPNet host through a coordinator functioning as an IPsecViPNet gateway. The mobile device establishes connection to the coordinator over the IPsec protocol.
Thus, there is a protected tunnel from this device to the coordinator. On the coordinator, an IP address
from the specified range (in the scheme, it is 10.0.0.5) is assigned to the mobile device.
The coordinator is configured to tunnel the range of the IP addresses assigned to IPsec hosts (mobile
devices) using the ViPNet technology. Thus, an IPsec host is accessible for ViPNet hosts either by the
address the coordinator has assigned for it (10.0.0.5 in the scheme), or by the corresponding virtual IP
address of the tunneled host. ViPNet hosts will be accessible to the IPsec host by their visibility addresses
on the coordinator (in the scheme, the visibility address is 192.168.2.10).
When IPsec and ViPNet hosts communicate as described in the scheme, no advanced route setup is
required.
The IP packets are transferred as follows. IP packets from mobile devices are sent over the IPsec protocol.
On the coordinator, the packets are decrypted. Then, the ViPNet driver encrypts the packets again. The
coordinator forwards the packets to the destination host in the ViPNet network. Response IP packets are
transferred in the same way.
The coordinator functioning as an IPsec server should meet the following requirements:

Use a coordinator of one of the two following types:
o
ViPNet Coordinator HW/VA coordinator.
o
ViPNet Coordinator for Windows deployed on a computer with the operating system Windows
Server 2008 R2.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 46
Note: The feature of an IPsec gateway can be also implemented by a computer working
under Windows Server 2003 operating system. However, in this document, we cover
configuration of an IPsec gateway only for Windows Server 2008 R2.
For help on configuring an IPsec gateway for Windows Server 2003, contact Infotecs
technical support (see Feedback on page 8).
The coordinator must be accessible on the Internet by its IP address or DNS name (the name can be
registered in the dynamic DNS service).
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 47
Configuring a Network
in ViPNet Network Manager
First, create the required ViPNet network structure, as described in Creating a ViPNet Network (on page
15). To implement this scheme, you need a network with a coordinator, clients, and mobile clients.
This section describes a general workflow on configuring an IPsec gateway deployed on a coordinator
running Windows OS or on a ViPNet Coordinator HW/VA coordinator. We recommend you to use a
ViPNet Coordinator HW/VA coordinator because it requires few settings. You can configure a ViPNet
Coordinator HW/VA host in ViPNet Network Manager only if your ViPNet Network Manager license
allows it.
In ViPNet Network Manager, make the following settings (for more information, see the document
“ViPNet VPN. User's Guide”, the chapter “Configuring IPsec Connection to Mobile Devices and Other
Networks”):
1
Choose or create a coordinator (ViPNet Coordinator Windows or ViPNet Coordinator HW/VA) that
will function as an IPsec gateway.
2
On the IPsec connection tab, configure IPsec connection to the coordinator.
Figure 19. Configuring IPsec connection parameters
3
If you want to provide access for mobile devices to ViPNet hosts, specify the range of tunneled IP
addresses for the mobile clients.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 48
4
Add a mobile client to the coordinator and, on the Profile tab, configure an IPsec profile for the
mobile client.
Though only the iOS option is available on the Mobile client type list, you should make other
settings even if the mobile device you are connecting runs Android. This is required because the
IPsec gateway coordinator also uses these settings.
Figure 20. Mobile client parameters
5
If the mobile client is an Apple device, send the configured profile to the mobile device.
6
If a coordinator for Windows is chosen as an IPsec gateway, save the profile configured on the IPsec
connection tab of the coordinator.
7
If you choose a ViPNet Coordinator HW/VA coordinator as an IPsec gateway, send the keys to the
ViPNet Coordinator HW/VA coordinator.
If no key set has been installed on the coordinator, create a key set for it and give it to the
coordinator host's administrator together with the hwinit_set.xml file.
Next, if you use a ViPNet Coordinator HW/VA coordinator, start configuring the mobile device (see
Configuring Mobile Devices on page 53). If you use a coordinator for Windows, first configure the
coordinator (see Configuring a Coordinator for Windows on page 50), then start configuring the mobile
device.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 49
Configuring a Coordinator
for Windows
On a coordinator running Windows Server 2008 R2, do the following:
1
In the Server Manager snap-in, run the Add Roles Wizard and set the Network Policy and Access
Services role, selecting the Routing and Remote Access Services component.
Figure 21. Selecting services to be installed
2
In the Server Manager snap-in, enable the Routing and Remote Access service by choosing the
Remote access (dial-up or VPN) configuration in the wizard.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 50
Figure 22. Choosing a configuration
3
On the coordinator, apply the IPsec profile you created for it in ViPNet Network Manager. To do
this, run the run.bat file on it.
4
In ViPNet Coordinator, configure a public network local filter, allowing you to connect mobile
devices over the IPsec technology. Also:
5
o
as a destination, specify My ViPNet host and the coordinator's network interface connected to
the Internet;
o
add the 50-ESP IP protocol and the UDP protocols 500-isakmp and 4500.
If you need to ensure access of mobile devices to application servers and information resources
located right on the coordinator, you should configure a local network filter for a public network, so
that the traffic transferred over certain protocols and ports was allowed. Also:
o
as sources, specify the IP addresses range, from which addresses are distributed for mobile
devices when they connect to the coordinator and which you specified in ViPNet Network
Manager when configuring the IPsec gateway's profile;
o
as a destination, specify My ViPNet host;
o
add the TCP protocol 80-http.
6
After you configure the filters, in ViPNet Coordinator, in the Local Public Network Filters section,
click Apply all.
7
To provide access to ViPNet hosts for mobile devices by DNS names, install and configure a DNS
server on the coordinator and register DNS names of ViPNet hosts on it (see the document “ViPNet
VPN. User's Guide”, the chapter “Configuring and Using DNS and WINS Services in ViPNet
Networks”).
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 51
Verifying Settings on an External
Firewall
If the coordinator is connected to the Internet via an external firewall, on this firewall (or a DSL router),
you need to configure a rule for UDP packets transferred when the connection is established over the
IPsec or L2TP technology.
Do one of the following:

Make sure that, on the device functioning as a firewall, the L2TP Passthrough and IPsec
Passthrough modes are enabled (if such parameters are available on your device).
No additional configuring is required after that.
Figure 23. Router settings

If the L2TP Passthrough and IPsec Passthrough parameters are not available on your device,
configure the rule manually specifying the following parameter values:
o
The IP address of the server with the ViPNet Coordinator software installed to which ports will
be redirected.
o
Protocol: UDP.
o
Ports: 500 and 4500.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 52
Configuring Mobile Devices
Configuring an Apple Mobile Device
After you create an IPsec profile for a mobile client in ViPNet Network Manager, you should install it on
your Apple device. To do this:
1
On your iPad or iPhone, open the email message with the attached IPsec profile (a file with the
.mobileconfig extension).
2
Choose the attached file. The profile setup window will be displayed.
3
Click Install. When you are warned that the profile is not signed, click Install once again.
4
Type the user password specified for the mobile client in ViPNet Network Manager. This password
should be received from the ViPNet network administrator.
5
The profile installation is finished. Click Finish.
6
To configure the parameters of the installed profile, open the Settings program and, in the
navigation pane, choose VPN.
7
In the view pane, select the installed IPsec profile.
8
In the profile properties window, in the Proxy section, choose Off.
9
Click Save.
The profile is installed and configured.
To connect to the ViPNet network, on your device go to Settings > > General > Network > VPN. Then
switch VPN to
.
To get access to hosts in the protected network, in your browser or other application, type the IP address
or DNS name of the protected ViPNet host.
Configuring an Android Mobile Device
To connect an Android device to protected corporate resources:
1
On your Android device, add an IPsec profile:
1.1 Open the Settings application and tap Wireless & Networking > VPN.
1.2 Add a new VPN profile.
1.3 Specify the connection type L2TP/IPSec PSK.
1.4 To specify the server address, type the IP address or DNS name of the ViPNet Coordinator
HW/VA host you specified in ViPNet Network Manager, on the IPsec connection tab.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 53
1.5 To specify the IPsec pre-shared key, type the pre-shared key you specified on the IPsec
connection tab.
1.6 Save the VPN profile.
2
Tap the created VPN profile. User credentials will be requested:
2.1 Type the user name you specified in ViPNet Network Manager, on the mobile client's properties
tab.
2.2 Type the password you specified on the mobile client's properties tab.
2.3 Tap Connect.
Note: On your Android device, the names and positions of the options described in this
section may be different.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 54
6
Office to Office Connection
Both with the ViPNet
and IPsec Technologies
Overview
56
Configuring Network in ViPNet Network Manager
57
Settings Check on a Remote Gateway
60
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 55
Overview
This chapter describes a workflow for configuring connection between a ViPNet VPN network and a
network, where the ViPNet technology isn't used.
Assume that your corporate network is protected with ViPNet software. You need to create a protected
communication channel with your partner company, but they do not use the ViPNet technology.
In this case, you may establish a tunnel between the two corporate networks over the IPsec protocol. An
IPsec tunnel is an encrypted traffic channel established between the two IPsec gateways deployed in each
of the two networks. There is a variety of IPsec gateway software servers and appliances (Cisco
appliances, servers running Linux, FreeBSD, Windows Server, and others).
You may use a ViPNet Coordinator HW host as your network's IPsec gateway.
Note: You can't configure a coordinator for Windows as a ViPNet–IPsec gateway in
ViPNet Network Manager.
You configure a ViPNet Coordinator HW/VA coordinator as an IPsec gateway in ViPNet Network
Manager. You can do it only if your ViPNet Network Manager license allows it.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 56
Configuring Network
in ViPNet Network Manager
First, do the following:
1
Create the required ViPNet network structure as described in Creating a ViPNet Network (on page
15).
2
Make sure that your ViPNet Network Manager license allows you to use a ViPNet Coordinator
HW/VA coordinator in the network. Otherwise, contact a representative of Infotecs and make a
request for a new license.
3
Create keys for the ViPNet Coordinator HW/VA coordinator and install them.
In the navigation pane of the ViPNet Network Manager main window, select the ViPNet Coordinator
HW/VA coordinator and do the following:
1
In the view pane, click the IPsec connection tab.
2
In the Network interface name list, select the network interface of the ViPNet Coordinator HW/VA
host, which is accessible from the Internet.
3
Select the Use coordinator to establish protected IPsec connection for other networks check box.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 57
Figure 24. Adding an IPsec channel to another network
4
To configure a new IPsec connection to a remote network, click Add. The IPsec Gateway New
window will be displayed.
5
On the Connection tab, in the Remote gateway name box, specify a unique name for the remote
network connection.
Figure 25. Specifying remote IPsec gateway properties
6
In the Remote gateway IP address box, type the access IP address of the remote IPsec gateway.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 58
7
Click Add and then, in the Local and Remote Network Addresses window, specify the IP addresses
of the two networks that will be connected over the IPsec channel. The network addresses should be
specified in the CIDR notation, for example: 172.16.0.0/24.
Figure 26. Specifying local and remote networks
If necessary, repeat this step to add more pairs of local and remote networks.
8
Click the Encryption tab and specify the connection encryption parameters:
o
In the Pre-shared Key box, type a string (8 to 63 characters) that will be used as the password
for connection authentication.
Warning: The pre-shared key should not contain the following characters: the question
mark (?), the backslash (\), and the single quote (').
o
If necessary, in other boxes, specify encryption and hashing algorithms, the Diffie–Hellman
parameter value, and key lifetime.
Figure 27. Specifying encryption parameters
Warning: Inform the administrator of the remote network that the same encryption
parameters should be specified on the remote gateway.
9
In the view pane, on the Keys tab, click Send Keys to transfer the IPsec connection settings to the
ViPNet Coordinator HW/VA host.
10 Then send key set updates to the ViPNet Coordinator HW/VA host and configure a forward rule
allowing traffic exchange between the ViPNet network and the remote network.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 59
Settings Check on a Remote
Gateway
Contact the remote network administrator to make sure that the encryption parameters (pre-shared key,
encryption and hashing algorithms, and others) specified on the remote gateway are the same as the
IPsec connection settings in the ViPNet Network Manager program.
Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation | 60