Fireware “How To” VPN Introduction
Transcription
Fireware “How To” VPN Introduction
Fireware “How To” VPN How do I set up outgoing dynamic NAT through a BOVPN tunnel? Introduction When you create a branch office VPN tunnel, especially to an outside business partner, it is sometimes helpful to use dynamic NAT through the BOVPN tunnel. Through a BOVPN tunnel, dynamic NAT acts as unidirectional NAT, and keeps the VPN tunnel open in one direction only. For example, Company A wants to create a BOVPN tunnel to one of their business partners -- Company B -- so they can access data on Company B’s database server. Company B agrees to allow Company A access to the server, but wants Company A to get access to the database server from a single IP address so it can easily monitor the connection. Company A wants to make sure that Company B cannot get to any of its resources at all. In this example, you can use a combination of BOVPN tunnel policies and dynamic NAT to meet the needs of both companies. In this case, it could be possible to meet the needs of both companies with a one-way BOVPN tunnel. However, some organizations want to make sure that all traffic through the VPN comes from one public IP address, which is possible if you use dynamic NAT. Is there anything I need to know before I start? This document shows you how to enable dynamic NAT correctly through a BOVPN tunnel between two WatchGuard Firebox devices using Fireware 8.2 or higher. The instructions below show how to configure dynamic NAT for a BOVPN tunnel from Company A to the trusted network of Company B. For more information about how to create a branch office VPN tunnel or apply BOVPN tunnel policies, see http://www.watchguard.com/support/Fireware_HowTo/HowTo_ManualBOVPN You must have this information to use configure dynamic NAT through a BOVPN tunnel: • External IP address of each VPN endpoint In this example: Company A Firebox 95.1.1.1 Company B Firebox • Trusted network address of each VPN endpoint In this example: Company A Trusted Network Company B Trusted Network 1 42.1.1.1 10.1.1.0/24 192.168.0.0/24 Configuring the VPN Endpoint - Company A In this example, Company A creates a BOVPN tunnel to the Firebox at Company B. Company A enables dynamic NAT for all traffic from Company A to Company B. 1 From Firebox A Policy Manager, select VPN > Branch Office Tunnels. Select Add to add a new BOVPN tunnel. The New Tunnel dialog box appears. 2 3 Give the BOVPN tunnel a name. For this example, use AccessToCompanyBserver. Select the New Phase 2 Proposal icon, as shown in the screenshot above. The New Gateway dialog box appears. 4 2 Create a new gateway. For this example, we use these values: Gateway Name PartnerCompany Remote Gateway Settings, Gateway IP 42.1.1.1 Remote Gateway Settings, ID Type 42.1.1.1 Configuring the VPN Endpoint - Company A Local Settings, ID Type 95.1.1.1 Pre-shared key Sh4redK3y *Must be same on both VPN endpoints Caution In this example, we keep the default Phase 1 Settings. For more information about any of the fields in the New Gateway dialog box, see http://www.watchguard.com/support/Fireware_HowTo/HowTo_ManualBOVPN. 5 Click OK to return to the New Tunnel dialog box. 6 Click Advanced. Clear all check boxes. Click OK. If you not change these Phase 2 Advanced Settings, your BOVPN tunnel will not negotiate correctly. Without this change, the second VPN endpoint will look for Firebox A’s trusted network instead of Firebox A’s external interface after you enable dynamic NAT. 7 Click Add to add a tunnel policy. 8 In this example, we create a one-way tunnel policy from the trusted network of Company A to the trusted network of Company B. To do this, type these values: Local 10.1.1.0/24 Remote 9 192.168.0.0/24 Use the Direction drop-down list to select -->. Then, select the DNAT checkbox. 10 Click OK. Save these changes to the Firebox at Company A. 4 Configuring the VPN Endpoint - Company B Configuring the VPN Endpoint - Company B Now that the Firebox at Company A is configured as a VPN endpoint, you must configure the Firebox at Company B as a VPN endpoint to complete the BOVPN tunnel between the two devices. 1 From Firebox B Policy Manager, select VPN > Branch Office Tunnels. Select Add to add a new BOVPN tunnel. The New Tunnel dialog box appears. 2 3 Give the BOVPN tunnel a name. For this example, use AccessToCompanyBserver. Select the New Phase 2 Proposal icon, as shown in the screenshot above. The New Gateway dialog box appears. 4 Create a new gateway. For this example, we use these values: Gateway Name PartnerCompany Remote Gateway Settings, Gateway IP 95.1.1.1 Remote Gateway Settings, ID Type 95.1.1.1 Local Settings, ID Type 42.1.1.1 Pre-shared key Sh4redK3y *Must be same on both VPN endpoints Caution In this example, we keep the default Phase 1 Settings. For mor e information about any of the fields in the New Gateway dialog box, see http://www.watchguard.com/support/Fireware_HowTo/HowTo_ManualBOVPN. 5 6 Click OK to return to the New Tunnel dialog box. 6 Click Add to add a tunnel policy. 7 In this example, we create a one-way tunnel policy from the trusted network of Company B toIP address of the Firebox at Company A. This is the IP address applied when DNAT is enabled for the traffic from Company A’s trusted network. To do this, type these values: Local 192.168.0.0/24 Remote 95.1.1.1 8 Use the Direction drop-down list to select <--. Do NOT select the DNAT checkbox. 9 Click OK. Save these changes to the Firebox at Company B. When the Firebox at Company B restarts, the two Fireboxes negotiate a VPN tunnel. The Firebox at Company A will apply dynamic NAT to all traffic destined for the trusted network of Company B. When this traffic reaches Company B, it will arrive as traffic that originated on the Firebox A external interface. SUPPORT: www.watchguard.com/support [email protected] U.S. and Canada +877.232.3531 7 COPYRIGHT © 2006 WatchGuard Technologies, Inc. All rights reserved. WatchGuard, the WatchGuard logo, Firebox, and Core are registered trademarks or trademarks of WatchGuard Technologies, Inc. in the United States and/or other countries. 8