Home

Gateway Security v3x

image

Contents

1. 1 E VPN ready Phase 2 Configuration In the lower left pane right click the gateway name that was added then select Add Phase 2 In the right pane enter the following parameters Name lt A name for the network gt VPN Client address 0 0 0 0 Address Type Subnet address Remote LAN address lt The internal subnet gt Subnet mask lt The internal subnet mask gt Encryption 3DES Authentication SHA Mode Tunnel PFS Checked Group DH1024 Click P2 Advanced Enter the IP addresses of your internal DNS and or WINS servers if any then click OK Repeat Phase1 amp Phase steps for any other internal networks that you want to connect to In the upper left pane click Parameters In the right pane in the Check interval sec text box under Dead Peer Detection DPD type 28800 Click Save amp Apply then close the TheGreenBow VPN configuration dialog box 4 3 Open IPSec VPN tunnels IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 7 13 THEGREENBOW SE wid VPN version 4 x Once both Symantec Gateway Security v3 0x router and TheGreenBow IPSec VPN Client software have been configured accordingly you are ready to open VPN tunnels First make sure you enable your firewall with IPSec traffic 1 Click on Save amp Apply to take into account all modifications we ve made on your VPN Client configurat
2. Ce TheGreenBow IPSec VPN Client Configuration Guide Symantec Gateway Security v3 0x WebSite http www thegreenbow com Contact support thegreenbow com Configuration Guide written by Writer Symantec Company www symantec com IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 1 13 Doc Ref tgbvpn_ug Symantec gateway 3_en THEGREENBOW Doc version 1 0 Feb 2009 Z VPN version 4 x Table of contents 1 DEE EEeEeEeee 3 2 Introduction E 4 2 1 Goal tthis OCIA EE 4 2 2 VPN Network ASO ee 4 2 3 Symantec Gateway Security v3 0x Hestrcione EEN 4 2 4 Symantec Gateway Security v3 0x VPN Gateway AEN 4 25 Symantec Gateway Security v3 0x VPN Gateway product Info 4 3 Symantec Gateway Security v3 0x VPN Configuration ENEE 5 4 TheGreenBow IPSec VPN Client Configuration ENEE 6 4 1 VPN Client Phase 1 IKE Contgouraton cecessessssessecseseeseesessensetestensetessenseeeassnseteasssateesneaeeneaeenees 6 4 2 VPN Client Phase 2 IPSec Configuration AEN 7 AS Open IPSec SERIES 7 5 Tools icase ON OUBIEN eee EE E 9 5 1 A good network analyser En 9 6 VPN IPSec Troubleshooting BE 10 6 1 PAYLOAD MALFORMED error wrong Phase 1 IA 10 6 2 amp INVALID COOKIE w eege 10 6 3 x n keystate CIO siinsesse aueia aia iein iabea aa aeaa et eataa en aia aa Ea 10 6 4 e received remote ID other than expected OLTO sececsecececsesecesseseeeese
3. 3 0 205363 192 168 1 3 192 168 1 2 ISAKMP Identity Protection Main Mode 4 0 257505 192 168 1 2 192 168 1 3 ISAKMP Identity Protection Main Mode 5 0 300882 192 168 1 3 192 168 1 2 ISAKMP Identity Protection Main Mode 6 0 310186 192 168 1 2 192 168 1 3 ISAKMP Identity Protection Main Mode 7 0 313742 192 168 1 3 192 168 1 2 ISAKMP Quick Mode 8 0 321913 192 168 1 2 192 168 1 3 ISAKMP Quick mode 9 0 323741 192 168 1 3 192 168 1 2 ISAKMP Quick mode 10 0 334980 192 168 1 2 192 168 1 3 ISAKMP Quick mode 11 0 691160 192 168 1 3 192 168 1 2 ESP ESP SPI 0x919bfabc 12 1 692568 192 168 1 3 192 168 1 2 ESP ESP SPI 0x919bfabc 13 1 693164 192 168 1 2 192 168 1 3 ESP ESP SPI 0x53a5925e 14 2 693600 192 168 1 3 192 168 1 2 ESP ESP SPI 0x9L9bfabec 15 2 694026 192 168 1 2 192 168 1 3 ESP ESP CSPI 0x53a5925e Frame 1 142 bytes on wire 142 bytes captured ethernet II Src 00 50 04 ad f2 73 Dst 00 10 b5 07 2f fF IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 9 13 Doc Ref tgbvpn_ug Symantec gateway 3_en Doc version 1 0 Feb 2009 THEGREENBOW VPN version 4 x 6 VPN IPSec Troubleshooting 6 1 PAYLOAD MALFORMED error wrong Phase 1 SA 114920 Default SA CNXVPN1 P1 SEND phase 1 Main Mode SA VID 114920 Default SA CNXVPN1 P1 BECH phase 1 Main Mode NOTIFY 114920 Default exchange_run exchange_validate failed 114920 Default dropped message f
4. User Guide and knowledge base for the Symantec Gateway Security v3 0x VPN Gateway can be found on the Symantec Gateway Security v3 0x website www symantec com Symantec SGS Product page __http Avww symantec com avcenter security Content Product Product_SGS html IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 4 13 Doc Ref tgbvpn_ug Symantec gateway 3_en THEGREENBOW Doc version 1 0 Feb 2009 E VPN version 4 x 3 Symantec Gateway Security v3 0x VPN configuration This section describes how to build an IPSec VPN configuration with your Symantec Gateway Security v3 0x VPN router Once connected to your Symantec Gateway Security v3 0x VPN gateway you must select VPN in the left pane of the SGM On the Tunnels tab double click your Client VPN tunnel In the Tunnel Properties click the check mark button beside the Remote Endpoint user group In the User Group Properties on the VPN Authentication tab check to make sure that e Authentication Scheme is set to none e Enforce Client Compliance is set to Ignore If either the Authentication Scheme or Enforce Client Compliance is set differently disable those options or create another user group for use with TheGreenBow IPSec VPN Client IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 5 13 D
5. OTIFY with INVALID_ID_INFORMATION error 122626 Default RECV Informational HASH DEL 122626 Default CNXVPN1 P1 deleted H you have an INVALID ID INFORMATION error check if Phase 2 ID local address and network address is correct and match what is expected by the remote endpoint Check also ID type Subnet address and Single address If network mask is not check you are using a IPV4_ADDR type and not a IPV4_SUBNET type 6 7 I clicked on Open tunnel but nothing happens Read logs of each VPN tunnel endpoint IKE requests can be dropped by firewalls An IPSec Client uses UDP port 500 and protocol ESP protocol 50 6 8 The VPN tunnel is up but I can t ping If the VPN tunnel is up but you still cannot ping the remote LAN here are a few guidelines e Check Phase 2 settings VPN Client address and Remote LAN address Usually VPN Client IP address should not belong to the remote LAN subnet e Once VPN tunnel is up packets are sent with ESP protocol This protocol can be blocked by firewall Check that every device between the client and the VPN server does accept ESP e Check your VPN server logs Packets can be dropped by one of its firewall rules e Check your ISP support ESP IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 11 13 Doc Ref tgbvpn_ug Symantec gateway 3_en THEGREENBOW Doc version 1 0 Feb 2009 Vig V
6. PN version 4 x e f you still cannot ping follow ICMP traffic on VPN server LAN interface and on LAN computer interface with Wireshark for example You will have an indication that encryption works e Check the default gateway value in VPN Server LAN A target on your remote LAN can receive pings but does not answer because there is a no Default gateway setting e You cannot access to the computers in the LAN by their name You must specify their IP address inside the LAN e We recommend you to install Wireshark http www wireshark org on one of your target computer You can check that your pings arrive inside the LAN IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 12 13 Doc Ref tgbvpn_ug Symantec gateway 3_en THEGREENBOW Doc version 1 0 Feb 2009 VPN version 4 x 7 Contacts News and updates on TheGreenBow web site http www thegreenbow com Technical support by email at support thegreenbow com Sales contacts by email at sales thegreenbow com IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 13 13
7. any errors in this Configuration Guide HowTo we apologize to you in advance and would like you to post a request to our techsupport so we can take the appropriate action IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 3 13 Doc Ref tgbvpn_ug Symantec gateway 3_en THEGREENBOW Doc version 1 0 Feb 2009 E VPN version 4 x 2 Introduction 2 1 Goal of this document This configuration guide describes how to configure TheGreenBow IPSec VPN Client with a Symantec Gateway Security v3 0x VPN router 2 2 VPN Network topology In our VPN network example diagram hereafter we will connect TheGreenBow IPSec VPN Client to the LAN behind the Symantec Gateway Security v3 0x router The VPN client is connected to the Internet with a DSL connection or through a LAN All the addresses in this document are given for example purpose IPSec VPN Client 192 168 0 3 Remote mygateway dyndns org 192 168 0 1 192 168 0 78 IPSec VPN Client as seen on the LAN 2 3 Symantec Gateway Security v3 0x Restrictions No known restriction 2 4 Symantec Gateway Security v3 0x VPN Gateway Tests and VPN configuration have been conducted with Symantec Gateway Security firmware release v3 0 and v3 0 1 2 5 Symantec Gateway Security v3 0x VPN Gateway product info It is critical that users find all necessary information about Symantec Gateway Security v3 0x VPN Gateway All product info
8. down box choose KEY ID In the text box next to the Remote ID dropdown box type the custom Phase 1 ID You may use either Preshared Certificates USB Tokens or X Auth for User Authentication with the Symantec Gateway Security v3 0x router This configuration is one example of can be accomplished in term of User Authentication You may want to refer to either the Symantec Gateway Security v3 0x router user guide or TheGreenBow IPSec VPN Client User Guide for more details on User Authentication options IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 6 13 Doc Ref tgbvpn_ug Symantec gateway 3_en THEGREENBOW Doc version 1 0 Feb 2009 Z VPN version 4 x 4 2 VPN Client Phase 2 IPSec Configuration Fe TheGreenBow VPN Chen mt ed Eile VPN Configuration View Tools 2 You may define a static virtual IP address here If you use 0 0 0 0 you will have Feo error Local ID is missing It SB Console em does not prevent you from S Parameters establishing a tunnel SS Connections 2 i Configuration Address type Subnet address D GG ES gatewayl DEE Enter the IP address 0 tunnell and subnet mask ES gateway2 SubnetMask 255 255 255 0 of the remote LAN RESA Encryption aes 128 v P2 Advanced Authentication SHA Scripts Mode Tunnel IT PFS Group None z Open Tunnel Save amp Apply Tune B
9. eeseseeeteteseenestensseeteensteneneeneees 10 6 5 NO PROPOSAL ME EEeedEetete Eeer 11 6 6 e INVALID ID INFORMATION 1r0l ceseescseeseesecseseseeeeeseseeeenesneeeeessneeteassneeeeessneneeissneneeteeieaneneeeeanaes 11 6 7 clicked on Open tunnel but nothing happens AA 11 6 8 The VPN tunnel is up but can t ping se cccsceteestatencscectcetecces tees cotexantccheretlenbucdarorantucpizacsbehunccieemecoutenbeats 11 T Contadina Gre eae ee E ead 13 IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 2 13 Doc Ref tgbvpn_ug Symantec gateway 3_en THEGREENBOW Doc version 1 0 Feb 2009 Z VPN version 4 x 1 Disclaimer These instructions are provided for your convenience only Remember that TheGreenBow has NO legal right on the set of instructions to configure the Symantec Appliance listed in this document This document is basically a copy of a Symantec web page called How to connect a tunnel to a Symantec Gateway Security v3 0 1 appliance using TheGreenBow VPN that you can google easily here http www google com search q How to connect a tunnel to a Symantec Gateway Security v3 0 1 applia nce using TheGreenBow VPN Certification of the Symantec Gateway Security v3 0x appliance has NOT been processed by TheGreenBow However we assume Symantec did certify it with TheGreenBow IPSec VPN Client before issuing their HowTo webpage In any case if you detect
10. er id c364cd72 195 100 205 114 sre 195 100 205 112 dst 195 100 205 114 115915 Default SA CNXVPN1 CNXVPN1 P2 SEND phase 2 Quick Mode SA KEY ID HASH NONCE 115915 Default RECV Informational HASH NOTIFY with NO_PROPOSAL_ CHOSEN error 115915 Default RECV Informational HASH DEL 115915 Default CNXVPN1 P1 deleted If you have an NO PROPOSAL CHOSEN error check that the Phase 2 encryption algorithms are the same on each side of the VPN Tunnel Check Phase 1 algorithms if you have this 115911 Default SA CNXVPN1 P1 SEND phase 1 Main Mode SA VID 115911 Default RECV Informational NOTIFY with NO_PROPOSAL_CHOSEN error 6 6 INVALID ID INFORMATION error 122623 Default SA CNXVPN1 P1 SEND phase 1 Main Mode SA VID 122625 Default SA CNXVPN1 P1 BECH phase 1 Main Mode SA VID 122625 Default SA CNXVPN1 P1 SEND phase 1 Main Mode KEY NONCE 122626 Default SA CNXVPN1 P1 BECH phase 1 Main Mode KEY NONCE 122626 Default SA CNXVPN1 P1 SEND phase 1 Main Mode ID HASH NOTIFY 122626 Default SA CNXVPN1 P1 BECH phase 1 Main Mode ID HASH NOTIFY 122626 Default phase 1 done initiator id c364cd70 195 100 205 112 responder id c364cd72 195 100 205 114 sre 195 100 205 112 dst 195 100 205 114 122626 Default SA CNXVPN1 CNXVPN1 P2 SEND phase 2 Quick Mode SA KEY ID HASH NONCE 122626 Default RECV Informational HASH N
11. error 120348 Default SA CNXVPN1 P1 SEND phase 120349 Default SA CNXVPN1 P1 BECH phase 120349 Default SA CNXVPN1 P1 SEND phase R S Main Mode SA VID 120351 Default SA CNXVPN1 P1 1 1 Main Mode SA VID 1 Main Mode KEY NONCE ECV phase 1 Main Mode KEY NONCE 1 1 c 120351 Default SA CNXVPN1 P1 END phase 120351 Default SA CNXVPN1 P1 BECH phase 120351 Default ike_phase_l_recv_ID r support thegreenbow fr Main Mode ID HASH NOTIFY Main Mode ID HASH NOTIFY ived remot ID other than expected The Remote ID value see Advanced Button does not match what the remote endpoint is expected IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 10 13 Doc Ref tgovpn_ug Symantec gat ER THEGREENBOW Doc version 1 0 Feb 2009 ee VPN version 4 x 6 5 NO PROPOSAL CHOSEN error 115911 Default SA CNXVPN1 P1 SEND phase 1 Main Mode SA VID 115913 Default SA CNXVPN1 P1 BECH phase 1 Main Mode SA VID 115913 Default SA CNXVPN1 P1 SEND phase 1 Main Mode KEY NONCE 115915 Default SA CNXVPN1 P1 BECH phase 1 Main Mode KEY NONCE 115915 Default SA CNXVPN1 P1 SEND phase 1 Main Mode ID HASH NOTIFY 115915 Default SA CNXVPN1 P1 BECH phase 1 Main Mode ID HASH NOTIFY 115915 Default phase 1 done initiator id c364cd70 195 100 205 112 respond
12. ion 2 Click on Open Tunnel or generate traffic that will automatically open a secure IPSec VPN Tunnel e g ping IE browser 3 Select Connections to see opened VPN Tunnels 4 Select Console if you want to access to the IPSec VPN logs and adjust filters to display less IPSec messaging The following example shows a successful connection between TheGreenBow IPSec VPN Client and a Symantec Gateway Security v3 0x VPN router IPSec VPN Router Configuration Property of TheGreenBow Sistech SA Sistech 2001 2009 8 13 Doc Ref tgbvpn_ug Symantec gateway 3_en THEGREENBOW Doc version 1 0 Feb 2009 VPN version 4 x 5 Tools in case of trouble Configuring an IPSec VPN tunnel can be a hard task One missing parameter can prevent a VPN connection from being established Some tools are available to find source of troubles during a VPN establishment 5 1 A good network analyser Wireshark Wireshark is a free software that can be used for packet and traffic analysis It shows IP or TCP packets received on a network card This tool is available on website http www wireshark org It can be used to follow protocol exchange between two devices For installation and use details read its specific documentation http www wireshark org docs fe fae fence rain roca ps 0 000000 ap iP 2 a r ISAKMP Identity Protection Main Mode 2 0 153567 CPR Leg 3 ISAKMP Identity Protection Main mode
13. oc Ref tgbvpn_ug Symantec gateway 3_en THEGREENBOW Doc version 1 0 Feb 2009 Ws VPN version 4 x 4 TheGreenBow IPSec VPN Client configuration This section describes the required configuration to connect to a Symantec Gateway Security v3 0x VPN router To download the latest release of TheGreenBow IPSec VPN Client software please go to http www thegreenbow com vpn_down html 4 1 VPN Client Phase 1 IKE Configuration SCH TheGreenBow VPN Clien THEGREENBOW z The remote VPN A Comoe Phase 1 Authentication Gateway IP address is ae either an explicit IP Fromm Ser Me address or a DNS z Connections Interface Any z Nlama a Configuration Remote Gateway mycompany dyndns org gatewayl ex tunnell C Preshared Key abcdefah SS gateway Confirm abcdefgh Certificate Certificates Import IKE Encryption AES 128 P1 Advanced Authentication SHA sl Key Group DH1024 gt Save amp Apply Tunnel Phase 1 configuration Phase1 Authentication settings must be as followed e Encryption 3DES e Authentication SHA e Key Group DH1024 Click P1 Advanced In the NAT T drop down box select Disabled Check Aggressive Mode In the Local ID dropdown box choose KEY ID In the text box next to the Local ID dropdown box type the username If your Security Gateway Network Entity has a custom phase 1 ID then in the Remote ID drop
14. rom 195 100 205 114 port 500 due to notification type PAYLOAD_MALFORMED 114920 Default SEND Informational NOTIFY with PAYLOAD MALFORMED error H you have an PAYLOAD MALFORMED error you might have a wrong Phase 1 SA check if the encryption algorithms are the same on each side of the VPN tunnel 6 2 INVALID COOKIE error 115933 Default message_recv invalid cookie s 5918ca0c2634288f 7364e36486e49105 115933 Default dropped message from 195 100 205 114 port 500 due to notification type INVALID_COOKIE 115933 Default SEND Informational NOTIFY with INVALID_COOKIE error If you have an INVALID COOKIE error it means that one of the endpoint is using a SA that is no more in use Reset the VPN connection on each side 6 3 no keystate error 115315 Default SA CNXVPN1 P1 1 Main Mode SA VID 115317 Default SA CNXVPN1 P1 ECV phase 1 Main Mode SA VID al 1 SEND phase RI 115317 Default SA CNXVPN1 P1 SEND phase Main Mode KEY NONCE R SI 115319 Default SA CNXVPN1 P1 ECV phase Main Mode KEY NONCE 115319 Default SA CNXVPN1 P1 END phase 1 Main Mode ID HASH NOTIFY 115319 Default ipsec_get_keystate no keystate in ISAKMP SA 00B57C50 Check if the preshared key is correct or if the local ID is correct see Advanced button You should have more information in the remote endpoint logs 6 4 received remote ID other than expected

Download Pdf Manuals

image

Related Search

Related Contents

Whirlpool ET16TK User's Manual  ZERO 662V  Franke Swivel Spout  株式会社 StrapyaNext  ANFALUM Comunica Nº6 – “Luminarias empotradas”  Panasonic AG-HMC74 Camcorder User Manual  Havis-Shields C-3330-800 MW-800 User's Manual  Frigidaire FFTW1001PW Product Specifications Sheet  

Copyright © All rights reserved.
Failed to retrieve file