10.07.2015 Views

Configuring a WatchGuard SOHO to SOHO IPSec Tunnel

Configuring a WatchGuard SOHO to SOHO IPSec Tunnel

Configuring a WatchGuard SOHO to SOHO IPSec Tunnel

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Why Create a <strong>Tunnel</strong>?Virtual Private Networking (VPN) tunnels enable you <strong>to</strong> simply and securely connectcomputers in two locations without requiring expensive, dedicated point-<strong>to</strong>-pointdata connections. With VPN, a virtual connection between two branch offices iscreated over low-cost connections <strong>to</strong> the Internet. Unlike a simple, un-encryptedInternet connection, a VPN connection eliminates the risk of data being read oraltered by outside users as it traverses the Internet.This document describes how <strong>to</strong> configure two <strong>WatchGuard</strong> <strong>SOHO</strong> Fireboxes <strong>to</strong>create <strong>IPSec</strong> VPN tunnels between branch offices. For more information on setting-upa <strong>SOHO</strong>, see the <strong>WatchGuard</strong> <strong>SOHO</strong> User Guide.What You Will Need• Two <strong>WatchGuard</strong> <strong>SOHO</strong>s installed, with VPN enabled.• The following information from your Internet Service Provider:- Static IP addresses for both <strong>SOHO</strong> Internet connections- Default gateway IP address for both <strong>SOHO</strong>s- Primary domain name service (DNS) IP address- If available, a secondary DNS address- Domain name- Network addresses and subnet masks for both branch office networks. Bydefault, the local network address is 192.168.111.0 and the subnet mask is255.255.255.0.NOTEThe internal networks on either end of the VPN tunnel must use different, network addresses.Special ConsiderationsThe following are issues you should take in<strong>to</strong> account before configuring your<strong>WatchGuard</strong> <strong>SOHO</strong> VPN network:• You can connect only two <strong>WatchGuard</strong> <strong>SOHO</strong>s <strong>to</strong>gether. To connect additionalnetworks, upgrade at least one location <strong>to</strong> a <strong>WatchGuard</strong> Firebox II configuredwith the <strong>WatchGuard</strong> VPN Manager.• Each <strong>SOHO</strong> must be able <strong>to</strong> send messages <strong>to</strong> the other <strong>SOHO</strong>. If either <strong>SOHO</strong>has a dynamically assigned Internet (IP) Address, the <strong>SOHO</strong> will not be able <strong>to</strong>find its remote counterpart.• Both <strong>SOHO</strong>s must be set <strong>to</strong> use the same encryption (DES or triple-DES) andauthentication (MD-5 or SHA-1) methods.• When connecting two Windows NT networks, the two networks must be in thesame Windows domain or be trusted domains. This is a Microsoft Networkingdesign implementation and is not a limitation of the <strong>SOHO</strong> device.To create an <strong>IPSec</strong> tunnel between <strong>SOHO</strong>s you must add information <strong>to</strong> theconfiguration files of each <strong>SOHO</strong> that is specific <strong>to</strong> the site, such as public and private2 <strong>WatchGuard</strong> <strong>SOHO</strong> with VPN Manager 2.1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!