2.2.31. IPsec VPN configuration example¶
2.2.31.1. Use case (IPsec VPN over the Internet)¶
2.2.31.2. Condition¶
Note
- Managed Firewall/UTM requires one global IP address.
- Since Internet Gateway is redundant with VRRP and three global IP addresses are required, it is necessary to prepare a total of four global IP addresses.Therefore, when creating a logical network, it is necessary to create it with /29 or more that can prepare 4 host addresses.
IPsec VPN can be used only in a single configuration due to Managed Firewall/UTM specifications. It can not be used with HA configuration.
2.2.31.3. Setting procedure ①-1 IPsec setting¶
Items |
Setting value |
---|---|
Interface |
port4 |
Proposal (Phase1) | Optional (Up to 9 selectable) |
DH Group (Phase 1) |
Optional (Up to 3 selectable) |
Remote Gateway | 2.2.2.4 |
Pre-Shared Key | Test@1234 (example) |
Proposal (Phase2) | Optional (Up to 9 selectable) |
DH Group (Phase 2) |
Optional (Up to 3 selectable) |
Note
The character string entered in the Pre-shared key must match the counterpart device.
At least one Proposal / DH Group value must be set to match the opposite device.
2.2.31.4. Setting procedure ② - 1 IPsec routing¶
Items |
Setting value |
---|---|
Destination IP Address |
192.168.2.0 |
Subnet Mask |
255.255.255.0 |
Blackhole Routing | Disable |
Interface |
Tunnel 1 |
Items |
Setting value |
---|---|
Destination IP Address |
192.168.2.0 |
Subnet Mask |
255.255.255.0 |
Blackhole Routing | Enable |
Note
When configuring Blackhole Routing, make sure the value of Destination IP/Subnet Mask to be entered matches the routing setting addressed to Tunnel Interface.
2.2.31.5. Setting procedure ③-1 IPsec policy¶
Items |
Setting value |
---|---|
Enable |
Presence of check |
Incoming Interface |
port5 |
Source Address |
all |
Outgoing Interface |
Tunnel 1 |
Destination Address Type |
Address Object |
Destination Address | all |
Service |
HTTP |
Action | Accept |
NAT |
Absence of check |
Log |
Any item |
Note
- In order to allow communication via Tunnel, it is necessary to set the IPsec Policy in the same way (Tenant_B) Managed Firewall/UTM as well.
- [When allowing communication from Tenant_A to Tenant_B]Tenant_A FW/UTM / Incoming Interface: port 5, Outgoing Interface: Tunnel 1, Action: Create Accept communication permission policyTenant_B FW/UTM / Incoming Interface: Tunnel 1, Outgoing Interface: port 5, Action: Create Accept communication permission policy[When allowing communication from Tenant_B to Tenant_A]Tenant_B FW/UTM / Incoming Interface: port 5, Outgoing Interface: Tunnel 1, Action: Create Accept communication permission policyTenant_A FW/UTM / Incoming Interface: Tunnel 1, Outgoing Interface: port 5, Action: Create Accept communication permission policy