12.07.2015 Views

Mobile User VPN Administrator Guide - WatchGuard Technologies

Mobile User VPN Administrator Guide - WatchGuard Technologies

Mobile User VPN Administrator Guide - WatchGuard Technologies

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>WatchGuard</strong> ®<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>Administration <strong>Guide</strong><strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Notice to <strong>User</strong>sInformation in this guide is subject to change without notice. Companies, names, and data used inexamples herein are fictitious unless otherwise noted. No part of this guide may be reproduced ortransmitted in any form or by any means, electronic or mechanical, for any purpose, without the expresswritten permission of <strong>WatchGuard</strong> <strong>Technologies</strong>, Inc.Copyright, Trademark, and Patent InformationCopyright© 1998 - 2004 <strong>WatchGuard</strong> <strong>Technologies</strong>, Inc. All rights reserved.Complete copyright, trademark, patent, and licensing information can be found in the <strong>WatchGuard</strong> SystemManager <strong>User</strong> <strong>Guide</strong>.All trademarks or trade names mentioned herein, if any, are the property of their respective owners.WFS Software Number v7.2SafeNet Software Number v6.1.3ii<strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


ContentsCHAPTER 1 Preparing the Firebox to Use MU<strong>VPN</strong> .................1Purchasing a <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> license ..............................2Entering License Keys ......................................................2Configuring WINS and DNS Servers ..................................3Preparing <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Profiles ...................................4Defining a <strong>User</strong> for a Firebox Authenticated Group .............4Modifying an existing <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> entry ................... 6Allowing Internet access through MU<strong>VPN</strong> tunnels ........... 7Using Extended Authentication .........................................8Define an extended authentication group ......................... 9Setting Advanced Preferences ........................................11Configuring Services to Allow Incoming MU<strong>VPN</strong> Traffic ......12By individual service ..........................................................13Using the Any service ........................................................14Regenerating End-<strong>User</strong> Profiles .......................................15Saving the Profile to a Firebox ........................................15Distributing the Software and Profiles .............................15Making Outbound IPSec Connections From Behind aFirebox .....................................................................16Configuring Debugging Options for MU<strong>VPN</strong> ......................17<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong>iii


Terminating Tunnels on Optional or Trusted Interfaces ......17Terminating IPSec Connections .......................................17CHAPTER 2 MU<strong>VPN</strong> Client Preparation, Installation,and Connection.............................................19Prepare the Remote Computers ......................................20System requirements ........................................................20Windows NT operating system setup ...............................21Windows 2000 operating system setup ..........................22Windows XP operating system setup ...............................26MU<strong>VPN</strong> client requirements ..............................................29Install and Uninstall the MU<strong>VPN</strong> Client ............................30Update the end-user profile ..............................................32Uninstall the MU<strong>VPN</strong> client ...............................................33Connect and Disconnect the MU<strong>VPN</strong> Client .....................34Connecting the MU<strong>VPN</strong> Client ..........................................34The <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> client icon ......................................35Allowing the MU<strong>VPN</strong> client through the personalfirewall ...........................................................................37Disconnecting the MU<strong>VPN</strong> client ......................................38Monitor the MU<strong>VPN</strong> Client Connection ............................38The Log Viewer ...................................................................38The Connection Monitor ....................................................39CHAPTER 3 The ZoneAlarm Personal Firewall .....................41ZoneAlarm Features .......................................................42Allowing Traffic through ZoneAlarm ..................................42Shutting Down ZoneAlarm ..............................................44Uninstalling ZoneAlarm ..................................................44CHAPTER 4 Troubleshooting Tips for the MU<strong>VPN</strong> Client .......47My computer is hung up just after installing the MU<strong>VPN</strong>client... ...........................................................................47I have attempted to connect several times, but nothing ishappening... ..................................................................48I have to enter my network log in information even when I’mnot connected to the network... ..................................48I am not prompted for my user name and password when Iturn my computer on... .................................................48iv<strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Is the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> tunnel working... ........................49My mapped drives have a red X through them... ............49How to map a network drive... ..........................................49I sometimes get prompted for a password when I ambrowsing the company network... ...............................49It takes a really long time to shut down the computer afterusing <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>... ..............................................50I lost the connection to my ISP, and now I can’t use thecompany network... ......................................................50No matter what I do, I can’t use the companynetwork... .......................................................................50Index..............................................................................51<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong>v


vi<strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


CHAPTER 1Preparing the Fireboxto Use MU<strong>VPN</strong><strong>WatchGuard</strong>® <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> (MU<strong>VPN</strong>) client uses InternetProtocol Security (IPSec) to establish a secure connection overan unsecured network from a remote computer to your protectednetwork.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> (MU<strong>VPN</strong>) requires configuration of both theFirebox and the remote client computers. The Firebox administratorhas considerable control over the client configurationthrough a collection of settings called an end-user profile.MU<strong>VPN</strong> users authenticate either to the Firebox or to a WindowsNT or RADIUS authentication server. Authentication takesplace either by using shared keys or certificates.The complete procedure for using MU<strong>VPN</strong> is documented inthe rest of this guide, and in the end-user brochures distributedfor specific client operating systems. This chapter describes theFirebox procedures you need to perform before using the restof this guide. For information specific to the SOHO 6, see theSOHO 6 <strong>User</strong> <strong>Guide</strong>.NOTEIf you are creating an MU<strong>VPN</strong> tunnel to a SOHO 6,<strong>WatchGuard</strong> recommends that you obtain a static IP address.If you use a dynamically addressed SOHO 6, you must<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 1


Preparing the Firebox to Use MU<strong>VPN</strong>reconfigure your MU<strong>VPN</strong> client every time the addresschanges.Purchasing a <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> license<strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> is an optional feature of the<strong>WatchGuard</strong> Firebox System. Although the administrative toolsto configure <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> are automatically included in thePolicy Manager software, you must purchase a license for eachinstallation of the client software to activate the feature.A license is available through your local reseller or at:http://www.watchguard.com/salesEntering License KeysThe first step in configuring the Firebox for MU<strong>VPN</strong> is to enterthe license key or keys into the Firebox configuration file. TheFirebox automatically restricts the number of <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>connections to the sum of the number of seats each license keyprovides. From Policy Manager:1 Select Network > Remote <strong>User</strong>. Click the <strong>Mobile</strong> <strong>User</strong>Licenses tab.The <strong>Mobile</strong> <strong>User</strong> licenses information appears as shown below.2 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Configuring WINS and DNS Servers2 Enter the license key in the text field to the left of Add.Click Add.The license key appears in the list of client licenses configured foruse with the Firebox. Repeat the process until all your keys areadded.Encryption levelsBecause of strict export restrictions placed on exported highencryption software, <strong>WatchGuard</strong> Firebox products are packagedwith base encryption on the installation CD. You must usea higher encryption level when using MU<strong>VPN</strong> because the IPSecstandard requires at least a 56-bit (medium) encryption.Configuring WINS and DNS ServersRU<strong>VPN</strong> and MU<strong>VPN</strong> clients rely on shared Windows InternetName Server (WINS) and Domain Name System (DNS) serveraddresses. DNS translates host names into IP addresses, whileWINS resolves NetBIOS names to IP addresses. These serversmust be accessible from the Firebox trusted interface.Make sure you use only an internal DNS server. Do not useexternal DNS servers.From Policy Manager:1 Select Network > Configuration. Click the WINS/DNS tab.The information for the WINS and DNS servers appears, as shown inthe following figure.2 Enter primary and secondary addresses for the WINS andDNS servers. Enter a domain name for the DNS server.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 3


Preparing the Firebox to Use MU<strong>VPN</strong>Preparing <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> ProfilesWith <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>, the network security administrator controlsend-user profiles. Policy Manager is used to define thename of the end user and generate a profile with the extension.wgx. The .wgx file contains the shared key, user identification,IP addresses, and settings required to create a secure tunnelbetween the remote computer and the Firebox. This file isthen encrypted with a key consisting of eight characters orgreater which is known to the administrator and the remoteuser. When the .wgx file is installed in the remote client, thiskey is used to decrypt the file for use in the client software.If you want to lock the profile for mobile users by making itread-only, see “Setting Advanced Preferences” on page 11.The IPSec client allows for the deployment of the software insituations where the client does not have a static IP address—such as with a DSL connection. This is the default profile andallows for the conversion of existing profiles (with the .expextension) to the newer version (with the .wgx extension). Newkeys are generated as a part of this process; they must then bedistributed to the users in the field.Defining a <strong>User</strong> for a Firebox AuthenticatedGroupIf the new user you are defining will use the Firebox for authentication,use the following procedure to define that user. If thenew user will use a third-party authentication server for authentication,use the procedure described in “Using ExtendedAuthentication” on page 8.From Policy Manager:1 Select Network > Remote <strong>User</strong>. Click the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>tab.The <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> information appears, as shown in thefollowing figure.4 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Defining a <strong>User</strong> for a Firebox Authenticated Group2 Select Firebox Authenticated <strong>User</strong>s. Click Add. Click Next.The <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Wizard - Firebox Authenticated <strong>User</strong> appears.3 Enter a username and passphrase.4 Enter a shared key for the account.This key will be used to negotiate the encryption and/orauthentication for the MU<strong>VPN</strong> tunnel.5 If you are connecting with a Pocket PC, select theappropriate checkbox. Click Next.6 Select whether you will use the shared key or a certificatefor authentication. Click Next.7 If you specified certificates, enter the configurationpassphrase of your certificate authority. Click Next.8 Specify the network resource to which this user will beallowed access.By default, the IP address of the Trusted network appears in thefield marked Allow user access to.9 If you plan to use a virtual adapter and route all of theremote user’s Internet traffic through the IPSec tunnel,select the checkbox marked Use default gateway onremote network. This option also allows you to routeMU<strong>VPN</strong> traffic through the HTTP proxies on the Firebox.For more information on this option, see “Allowing Internetaccess through MU<strong>VPN</strong> tunnels” on page 7.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 5


Preparing the Firebox to Use MU<strong>VPN</strong>NOTEIf you want to grant access to more than one network orhost, use the procedure in the next section to modify thepolicy after finishing this wizard.10 Specify a virtual IP address for this mobile user. Click Next.This can either be an unused IP address on the network youspecified in the previous step or on a false network you havecreated.11 Select an authentication method and encryption methodfor this mobile user’s connections. Enter a key expirationtime in kilobytes or hours.AuthenticationMD5-HMAC (128-bit algorithm) or SHA1-HMAC (160-bitalgorithm)EncryptionNone (no encryption), DES-CBC (56-bit), or 3DES-CBC (168-bit)12 Click Next. Click Finish.The wizard closes and the username appears on the <strong>Mobile</strong> <strong>User</strong><strong>VPN</strong> tab. If you expand the plus signs (+) next to the entries, youcan view the information as shown in the following figure.Modifying an existing <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> entryUse the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> wizard to generate a new .exp or.wgx file every time you want to change an end-user profile.Reasons to change a profile include:6 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Defining a <strong>User</strong> for a Firebox Authenticated Group• Modifying the shared key• Adding access to additional hosts or networks• Restricting access to a single destination port, source port,or protocol• Modifying the encryption or authentication parametersFrom Policy Manager:1 Select Network > Remote <strong>User</strong>.2 In the list of usernames and groups on the <strong>Mobile</strong> <strong>User</strong><strong>VPN</strong> tab, click the username or group you want to change.3 Click Edit.The <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> wizard appears, displaying the formcontaining the user or group name and passphrase.4 Use Next to step through the wizard, modifying the enduserprofile according to your security policy preferences.5 To add access to a new network or host, proceed to theAllowed Resources and Virtual IP Address screen in the<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> wizard. Click Add.You can also use this screen to change the virtual IP addressassigned to the remote user.6 In the Advanced <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Policy Configurationdialog box, use the drop-down list to select Network orHost. Type the IP address. Use the Dst Port, Protocol, andSrc Port options to restrict access. Click OK.7 Step completely through the wizard to the final screen.Click Finish.You must click Finish to create a new .wgx file and write themodified settings to the Firebox configuration file.8 Click OK.Allowing Internet access through MU<strong>VPN</strong> tunnelsYou can enable remote users with virtual adapters to access theInternet through an MU<strong>VPN</strong> tunnel. However, this option hascertain performance implications. For better perfromance, youcan use split tunneling. Split tunneling refers to a remote useror site accessing the Internet on the same machine as the <strong>VPN</strong>connection, without placing the Internet traffic inside the tunnel.Browsing the Web occurs directly through the user’s ISP.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 7


Preparing the Firebox to Use MU<strong>VPN</strong>However, split tunneling exposes the system to attack becausethe Internet traffic is not filtered or encrypted.Despite the security risks of split tunneling, it offers a large performanceboost compared to internet access over the MU<strong>VPN</strong>tunnel. When split tunneling is not allowed or supported, Internet-boundtraffic must pass across the WAN bandwidth of theheadend twice. This creates considerable load on the <strong>VPN</strong> headend.NOTEIf you want the MU<strong>VPN</strong> client to be protected by<strong>WatchGuard</strong>’s HTTP proxies, you cannot use split tunneling. Inthis scenario, you must allow internet access over the MU<strong>VPN</strong>tunnel, as described in this procedure. For additionalinformation, see “Outgoing Configuration to allow MU<strong>VPN</strong>traffic over proxies” on page 14.One recommended solution is to allow split tunneling, butrequire that remote users have personal firewalls for machinesresiding behind the <strong>VPN</strong> endpoint.To allow internet access through the MU<strong>VPN</strong> tunnel:1 When you are running the MU<strong>VPN</strong> wizard, select thecheckbox marked Use default gateway on remote networkon the network resource screen.2 Create a dynamic NAT entry from <strong>VPN</strong> to the externalinterface. If you want to specify that only certain MU<strong>VPN</strong>users have this ability, create entries from to the external interface.3 Add services as appropriate to allow outgoing connectionsfor mobile users. Because you are allowing Internet accessthrough the tunnel, you use the Incoming tab to configureoutgoing traffic.Using Extended AuthenticationMU<strong>VPN</strong> with extended authentication allows users to authenticateto a Windows NT or RADIUS authentication server insteadof to the Firebox. Instead of validating against its own data, theFirebox validates users against the third-party server. No usernamesor passwords need to be configured on the Firebox.8 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Using Extended AuthenticationThe advantage of MU<strong>VPN</strong> with extended authentication is thatthe network administrator does not have to continually synchronizeuser login information between the Firebox and theauthentication server. MU<strong>VPN</strong> users log into the corporate networkfrom remote locations using the same username and passwordthey use when they are at their desks inside the company.If you want to use a third-party server for authentication, youmust define an extended authentication group on the Firebox.The actual usernames and passwords for MU<strong>VPN</strong> users arestored on the authentication server itself and are not maintainedby the Firebox.Define an extended authentication groupFrom Policy Manager:1 Select Network > Remote <strong>User</strong>. Click the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>tab.The <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> information appears, as shown in thefollowing figure.2 Select Extended Authentication Groups. Click Add. ClickNext.The <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Wizard - Extended Authentication Groupappears.3 Specify a name for the extended authentication group.Specify the passphrase used to encrypt the .wgx file for thisgroup. Click Next.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 9


Preparing the Firebox to Use MU<strong>VPN</strong>4 Select an authentication server for this group from thedrop-down list. Click Next.The authentication server must already be set up using theAuthentication Servers dialog box. For information on how to dothis, see the <strong>WatchGuard</strong> Firebox System <strong>User</strong> <strong>Guide</strong>.5 Select whether this group will use a shared key or acertificate for authentication. Click Next.6 If you specified certificates, enter the configurationpassphrase of your certificate authority, which is either theFirebox or a third-party CA device. Click Next.If you specify the passphrase of the Firebox, CA must be active onthe Firebox. For information on activating the CA, see Chapter 3,“Activating the Certificate Authority on the Firebox.”7 Specify the network resources to which this group will beallowed access. To add a new resource, click Add.The Advanced <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Policy Configuration dialog boxappears.8 Use the Allow Access to drop-down list to select Networkor Host. Type the IP address. Use the Dst Port, Protocol,and Src Port options to restrict access.9 If you plan to use a virtual adapter and route all of theremote users’ Internet traffic through the IPSec tunnel,select the checkbox marked Use default gateway onremote network. Click Next.10 Specify the virtual IP address pool (these can be virtual IPaddresses on a false network). To add addresses, click Addand enter an address or address range. Click Next.11 Select an authentication method and encryption methodfor this group’s connections. Enter a key expiration time inkilobytes, hours, or both.If you specify both, the key expires at whichever time occursearliest.10 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Setting Advanced PreferencesAuthenticationMD5-HMAC (128-bit algorithm) or SHA1-HMAC (160-bitalgorithm)EncryptionNone (no encryption), DES-CBC (56-bit), or 3DES-CBC (168-bit)12 Click Next. Click Finish.The wizard closes and the group name appears on the <strong>Mobile</strong> <strong>User</strong><strong>VPN</strong> tab. If you expand the plus signs (+) next to the entries, youcan view the information as shown in the following figure.Configuring the external authentication serverDefine a group on the server that has the same name as theextended authentication remote gateway. All MU<strong>VPN</strong> users thatauthenticate to the server must belong to this group.Setting Advanced PreferencesAdvanced settings include specifying a virtual adapter rule andlocking down the end-user profile so that users can view thesettings but not change them. Locking down the profile is therecommended setting, because users generally cannot make<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 11


Preparing the Firebox to Use MU<strong>VPN</strong>effective changes to the profile without making correspondingmodifications to the Firebox.1 Click Advanced on the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> tab.The Advanced Export File Preferences dialog box appears, as shownin the following figure.2 If you want to restrict mobile users such that they haveread-only access to their profile, select the checkbox markedMake the security policy read-only in the MU<strong>VPN</strong> client.3 A virtual adapter is used for assigning client IP addressesand network parameters such as WINS and DNS. Select thevirtual adapter rule for the mobile user:Disabled(Recommended) The mobile user will not use a virtualadapter to connect to the MU<strong>VPN</strong> client.PreferredIf the virtual adapter is already in use or otherwiseunavailable, address assignment is performed without it.RequiredThe mobile user must use a virtual adapter to connect to theMU<strong>VPN</strong> client.Configuring Services to Allow Incoming MU<strong>VPN</strong>TrafficBy default, MU<strong>VPN</strong> users have no access privileges through aFirebox. To allow remote users to access machines behind theFirebox (on the trusted network, for example), you must eitheradd their individual user names, extended authentication group12 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Configuring Services to Allow Incoming MU<strong>VPN</strong> Traffic(for MU<strong>VPN</strong> users authenticating to an external server), or theipsec_users group (for MU<strong>VPN</strong> users authenticating to the Firebox)to service icons in the Services Arena. Note that extendedauthentication groups must be added to services because theseusers are not members of ipsec_users.<strong>WatchGuard</strong> recommends two methods for configuring servicesfor MU<strong>VPN</strong> traffic: by individual service or by using the Any service.Configuring the Any service “opens a hole” through theFirebox, allowing all traffic to flow unfiltered between specifichosts.To allow traffic to be filtered by <strong>WatchGuard</strong>’s proxies, followthis procedure, with the slight Service modifications shown at“Outgoing Configuration to allow MU<strong>VPN</strong> traffic over proxies”on page 14.By individual serviceIn the Services Arena, double-click a service that you want toenable for your <strong>VPN</strong> users. Set the following properties on theservice:Incoming- Enabled and allowed- From: ipsec_users or extended authentication group- To: trusted interface, optional interface, network orhost IP address, or aliasOutgoing- Enabled and allowed- From: trusted interface, optional interface, network orhost IP address, or alias- To: ipsec_users or extended authentication groupAn example of how you might define incoming properties for aservice appears on the following figure.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 13


Preparing the Firebox to Use MU<strong>VPN</strong>Outgoing Configuration to allow MU<strong>VPN</strong> traffic overproxiesThe following Services configuration allows MU<strong>VPN</strong> traffic tobe filtered by <strong>WatchGuard</strong>’s proxies.- Enabled and allowed- From: ipsec_users, pptp_users, or extendedauthentication group- To: trusted interface, optional interface, network orhost IP address, or aliasUsing the Any serviceAdd the Any service with the following properties:Incoming- Enabled and allowed- From: ipsec_users or extended authentication group- To: trusted interface, optional interface, network orhost IP address, or aliasOutgoing- Enabled and allowed- From: trusted interface, optional interface, network orhost IP address, or alias14 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Regenerating End-<strong>User</strong> Profiles- To: ipsec_users or extended authentication groupNOTEYou cannot use the Any service to allow outgoing traffic Tothe external interface. Use the Outgoing service to allowoutgoing traffic To the external interface.Make sure you save your configuration file to the Firebox aftermaking these changes.Regenerating End-<strong>User</strong> ProfilesThe <strong>WatchGuard</strong> MU<strong>VPN</strong> configuration gives you the ability toregenerate end-user profiles for your existing MU<strong>VPN</strong> users. Youdo not need to create a new profile when you regenerate.Regeneration creates new end-user profiles with the same settingsfor the current MU<strong>VPN</strong> users.To generate new end-user profiles for current MU<strong>VPN</strong> users, onthe <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> tab, click Regenerate.You can now distribute these end-user profiles as necessary.Saving the Profile to a FireboxTo activate a new <strong>Mobile</strong> <strong>User</strong> profile, you must save the configurationfile to the Firebox. Select File > Save > To Firebox.Distributing the Software and Profiles<strong>WatchGuard</strong> recommends distributing end-user profiles on afloppy disk or by encrypted email. Each client machine needsthe following:• Software installation packageThe packages are located on the <strong>WatchGuard</strong> LiveSecurityService Web site at:http://www.watchguard.com/supportEnter the site using your LiveSecurity Service user name andpassword. Click the Latest Software link, click Add-ons/Upgrades on the left side, and then click the <strong>Mobile</strong> <strong>User</strong><strong>VPN</strong> link.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 15


Preparing the Firebox to Use MU<strong>VPN</strong>• The end-user profileThis file contains the user name, shared key, and settingsthat enable a remote computer to connect securely over theInternet to a protected, private computer network. The enduserprofile has the filename username.wgx• Two certificate files—if you are authenticating by way ofcertificatesThese are the .p12 file, an encrypted file containing thecertificate, and cacert.pem, which contains the rootCertificate Authority (CA) certificate.• <strong>User</strong> documentationEnd-user brochures developed by <strong>WatchGuard</strong> are locatedon the <strong>WatchGuard</strong> LiveSecurity Service Web site at:www.watchguard.com/supportEnter the site using your LiveSecurity user name andpassword. Click the Product Documentation link, and thenclick the <strong>VPN</strong> link.• Shared keyTo install the end-user profile, the user is prompted for ashared key. This key decrypts the file and imports thesecurity policy into the MU<strong>VPN</strong> client. The key is set duringthe creation of the file in Policy Manager.Making Outbound IPSec Connections FromBehind a FireboxYou may have occasions in which a user wants to make IPSecconnections to a Firebox from behind another Firebox. Forexample, if a mobile employee travels to a customer site that hasa Firebox, he or she can make IPSec connections to his or hernetwork using IPSec. For the local Firebox to properly handlethe outgoing IPSec connection, you must set up the IPSec service.(For information on enabling services, see Chapter 8, “ConfiguringFiltered Services” in the <strong>WatchGuard</strong> Firebox System<strong>User</strong> <strong>Guide</strong>.)16 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Configuring Debugging Options for MU<strong>VPN</strong>Because the IPSec service enables a tunnel to the IPSec serverand does not perform any security checks at the firewall, use ofthis service should be limited.Configuring Debugging Options for MU<strong>VPN</strong><strong>WatchGuard</strong> offers a selection of logging options that you canset to gather information and help with future troubleshooting.Because enabling these debugging options can significantlyincrease log message volume and have potentially adverseimpacts on Firebox performance, it is recommended that theybe enabled only for troubleshooting MU<strong>VPN</strong> problems.1 From Policy Manager, click Network > Remote <strong>User</strong> <strong>VPN</strong>.The Remote <strong>User</strong> setup window appears with the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>tab selected.2 Click Logging.The IPSec Logging dialog box appears.3 Click the logging options you want to activate.For a description of each option, right-click it, and then click What’sThis?. You can also refer to the “Field Definitions” chapter in theReference <strong>Guide</strong>.4 Click OK. Save the configuration file to the Firebox.Terminating Tunnels on Optional or TrustedInterfacesBecause the Firebox can accept IKE traffic (IPSec key negotiationon the optional port), the IPSec peer can be connecteddirectly to the optional port and can route traffic to the trustednetwork. To enable this feature, on the Safenet Client’s securitypolicy editor, set the IP address of the remote gateway to theFirebox’s optional IP address.Terminating IPSec ConnectionsIn order to completely terminate <strong>VPN</strong> connections, the Fireboxmust be rebooted. Merely removing the IPSec service does notsever pre-established connections.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 17


Preparing the Firebox to Use MU<strong>VPN</strong>18 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


CHAPTER 2MU<strong>VPN</strong> ClientPreparation,Installation, andConnectionThe <strong>WatchGuard</strong> MU<strong>VPN</strong> client is installed on an employee’scomputer, on the road or working from home. The employeeestablishes a standard Internet connection and activates theMU<strong>VPN</strong> client. The MU<strong>VPN</strong> client then creates an encryptedtunnel to your company’s trusted and optional networks, protectedby a <strong>WatchGuard</strong> Firebox System. The MU<strong>VPN</strong> clientallows you to provide remote access to your internal networkswithout compromising security.You should have already configured the Firebox to work withMU<strong>VPN</strong>. If you have not, see the previous chapter, “Preparingthe Firebox to Use MU<strong>VPN</strong>”.ZoneAlarm®, a personal firewall software application, isincluded as an optional feature with the MU<strong>VPN</strong> client to providefurther security for your end users.The purpose of this guide is to assist users of the <strong>WatchGuard</strong>Firebox System to set up the MU<strong>VPN</strong> client on an end-user’sremote computer and to explain the features of the personalfirewall.MU<strong>VPN</strong> BrochuresAlong with this guide, <strong>WatchGuard</strong> has compiled end-userdocumentation regarding the preparation, installation, andconnection of the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Client as well as the usage<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 19


MU<strong>VPN</strong> Client Preparation, Installation, and Connectionof the personal firewall. These brochures, customized separatelyfor the supported Windows operating systems, are available onour Web site.The brochures can be found on the <strong>WatchGuard</strong> Web site at:www.watchguard.com/documentationThe rest of this chapter describes the basic tasks involved in preparingthe remote computers to use the MU<strong>VPN</strong> client as wellas the installation and connection procedures for the client.Prepare the Remote ComputersThe MU<strong>VPN</strong> client is only compatible with the Windows operatingsystem. Every Windows system used as a MU<strong>VPN</strong> remotecomputer must have the following system requirements.System requirements• PC-compatible computer with Pentium processor orequivalent• Compatible operating systems and minimum RAM:- Microsoft Windows NT 4.0 Workstation: 32 MB- Microsoft Windows 2000 Professional: 64 MB- Microsoft Windows XP: 64 MB• The latest service packs for each operating system arerecommended, but not necessarily required.• 10 MB hard disk space• Native Microsoft TCP/IP communications protocol• Microsoft Internet Explorer 5.0 or later• An Internet Service Provider account• A Dial-Up or Broadband (DSL or Cable modem) ConnectionAdditionally, in order for Windows file and print sharing tooccur through the MU<strong>VPN</strong> client tunnel each Windows operatingsystem must have the proper components installed and configuredto use the remote WINS and DNS servers on the trustedand optional networks behind the Firebox.20 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Prepare the Remote ComputersNOTEHowever, if you plan to use the MU<strong>VPN</strong> client virtual adapter,the WINS and DNS settings are not configured on the clientcomputers, but rather on the Firebox.Windows NT operating system setupThe following networking components must be installed andconfigured on a remote computer running Windows NT in orderfor the MU<strong>VPN</strong> client to function properly.Installing Remote Access Services on Windows NTThe <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Adapter, which supports L2TP, installsonly if the Remote Access Services (RAS) network component isalready installed on the computer.Follow the Windows desktop:1 Select Start > Settings > Control Panel. Double-click theNetwork icon.2 Select the Services tab.3 Click the Add button.4 Select Remote Access Services from the list, then click theOK button.5 Enter the path to the Windows NT install files or insert yoursystem installation CD, then click the OK button.The Remote Access Setup dialog box appears.6 Click the Yes button to add a RAS capable device andenable you to add a modem.7 Click the Add button and complete the Install New Modemwizard.NOTEIf there is no modem installed, you can enable the Don'tdetect my modem; I will select it from a list checkboxthen add a Standard 28800 modem. Windows NT requires atleast one RAS device such as a modem if the RAS componentis installed. If no modems are available, a dial-up networking,serial cable between two computers can be selected.8 Select the modem added in the last step in the Add RASDevice dialog box, then click the OK button.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 21


MU<strong>VPN</strong> Client Preparation, Installation, and Connection9 Click the Continue button, then click the Close button.10 Reboot your computer.Configuring the WINS and DNS settingsYou must configure the remote computer to use the WINS andDNS servers of the trusted network behind the Firebox only ifyou do not plan to use the MU<strong>VPN</strong> client’s virtual adapter.From the Windows desktop:1 Select Start > Settings > Control Panel. Double-click theNetwork icon.The Network window appears.2 Click the Protocols tab.3 Select the TCP/IP protocol and click the Properties button.The Microsoft TCP/IP Properties window appears.4 Click the DNS tab.5 Click the Add button.6 Enter your DNS server IP address in the appropriate field.If you have multiple remote DNS servers repeat the previous threesteps.NOTEYou must list the DNS server on the Private network behindthe Firebox first.7 Click the WINS Address tab.8 Enter your WINS server IP address in the appropriate field,then click the OK button.If you have multiple remote WINS servers repeat this step.9 Click the Close button to close the Network window.The Network Settings Change dialog box appears.10 Click the Yes button to restart the computer and implementthe changes.Windows 2000 operating system setupThe following networking components must be installed andconfigured on a remote computer running Windows 2000 inorder for the MU<strong>VPN</strong> client to function properly.22 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Prepare the Remote ComputersFrom the Windows desktop:1 Select Start > Settings > Network and Dial-upConnections, then select the Dial-up connection you use toaccess the Internet.The connection window appears.2 Click the Properties button.3 Select the Networking tab.4 Verify that the following components are present andenabled:- Internet Protocol (TCP/IP)- File and Printer Sharing for Microsoft Networks- Client for Microsoft NetworksInstall these components if they are not already present.Installing the Internet Protocol (TCP/IP) networkcomponentFrom the Windows desktop:1 Select Start > Settings > Network and Dial-upConnections, then select the Dial-up connection you use toaccess the Internet.The connection window appears.2 Click the Properties button.3 Select the Networking tab and then click the Installbutton.The Select Network Component Type window appears.4 Double click the Protocol network component.The Select Network Protocol window appears.5 Select the Internet Protocol (TCP/IP) Network Protocol andthen click the OK button.Installing the File and Printer Sharing for MicrosoftNetworksFrom the Windows desktop:1 Select Start > Settings > Network and Dial-upConnections, then select the Dial-up connection you use toaccess the Internet.The connection window appears.2 Click the Properties button.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 23


MU<strong>VPN</strong> Client Preparation, Installation, and Connection3 Select the Networking tab and then click the Installbutton.The Select Network Component Type window appears.4 Double click the Services network component.The Select Network Service window appears.5 Select the File and Printer Sharing for Microsoft NetworksNetwork Service and then click the OK button.Installing the Client for Microsoft NetworksFrom the Windows desktop:1 Select Start > Settings > Network and Dial-upConnections, then select the Dial-up connection you use toaccess the Internet.The connection window appears.2 Click the Properties button.3 Select the Networking tab and then click the Installbutton.The Select Network Component Type window appears.4 Double click the Client network component.The Select Network Protocol window appears.5 Select the Client for Microsoft Networks Network Clientand then click the OK button.6 Click the Cancel button to close the Select NetworkComponent Type window.7 Click the OK button to preserve the installed components.8 Click the Cancel button to close the Dial-up connectionwindow.Configuring the WINS and DNS settingsYou must configure the remote computer to use the WINS andDNS servers of the trusted network behind the Firebox only ifyou do not plan to use the MU<strong>VPN</strong> client’s virtual adapter.From the Windows desktop:1 Select Start > Settings > Network and Dial-upConnections, then select the Dial-up connection you use toaccess the Internet.The connection window appears.2 Click the Properties button.24 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Prepare the Remote Computers3 Click the Networking tab.4 Select the Internet Protocol (TCP/IP) component, then clickthe Properties button.The Internet Protocol (TCP/IP) Properties window appears.5 Click the Advanced button.The Advanced TCP/IP Settings window appears.6 Click the DNS tab.7 Under the “DNS server addresses, in order of use” heading,click the Add button.The TCP/IP DNS Server window appears.8 Enter your DNS server IP address in the appropriate field,then click the Add button.If you have multiple remote DNS servers repeat the last two steps.NOTEYou must list the DNS server on the Private network behindthe Firebox first.9 Enable the Append these DNS suffixes (in order) option.10 Click the Add button.The TCP/IP Domain Suffix window appears.11 Enter your Domain suffix in the appropriate field.If you have multiple DNS suffixes repeat the last two steps.12 Click the WINS tab.13 Under the “WINS addresses, in order of use” heading, clickthe Add button.The TCP/IP WINS Server window appears.14 Enter your WINS server IP address in the appropriate field,then click the Add button.If you have multiple remote DNS servers repeat the last two steps.15 Click the OK button to close the Advanced TCP/IP Settingswindow.16 Click the OK button to close the Internet Protocol (TCP/IP)Properties window.17 Click the OK button to close the next window.18 Click the Cancel button again to close the Dial-upconnection window.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 25


MU<strong>VPN</strong> Client Preparation, Installation, and ConnectionWindows XP operating system setupThe following networking components must be installed andconfigured on a remote computer running Windows XP in orderfor the MU<strong>VPN</strong> client to function properly.From the Windows desktop:1 Select Start > Settings > Network Connections, then selectthe connection you use to access the Internet.The connection window appears.2 Click the Properties button.3 Select the Networking tab.4 Verify that the following components are present andenabled:- Internet Protocol (TCP/IP)- File and Printer Sharing for Microsoft Networks- Client for Microsoft NetworksInstall these components if they are not already present.Installing the Internet Protocol (TCP/IP) NetworkComponentFrom the Windows desktop:1 Select Start > Settings > Network Connections, then selectthe connection you use to access the Internet.The connection window appears.2 Click the Properties button.3 Select the Networking tab and then click the Installbutton.The Select Network Component Type window appears.4 Double click the Protocol network component.The Select Network Protocol window appears.5 Select the Internet Protocol (TCP/IP) Network Protocol andthen click the OK button.Installing the File and Printer Sharing for MicrosoftNetworksFrom the Windows desktop:1 Select Start > Settings > Network Connections, then selectthe connection you use to access the Internet.The connection window appears.26 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Prepare the Remote Computers2 Click the Properties button.3 Select the Networking tab and then click the Installbutton.The Select Network Component Type window appears.4 Double click the Services network component.The Select Network Service window appears.5 Select the File and Printer Sharing for Microsoft NetworksNetwork Service and then click the OK button.Installing the Client for Microsoft NetworksFrom the Windows desktop:1 Select Start > Settings > Network Connections, then selectthe connection you use to access the Internet.The connection window appears.2 Click the Properties button.3 Select the Networking tab and then click the Installbutton.The Select Network Component Type window appears.4 Double click the Client network component.The Select Network Protocol window appears.5 Select the Client for Microsoft Networks Network Clientand then click the OK button.6 Click the Cancel button to close the Select NetworkComponent Type window.7 Click the OK button to preserve the installed components.8 Click the Cancel button to close the Dial-up connectionwindow.Configuring the WINS and DNS settingsYou must configure the remote computer to use the WINS andDNS servers of the trusted network behind the Firebox only ifyou do not plan to use the MU<strong>VPN</strong> client’s virtual adapter.From the Windows desktop:1 Select Start > Settings > Network Connections, then selectthe Dial-up connection you use to access the Internet.The connection window appears.2 Click the Properties button.3 Click the Networking tab.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 27


MU<strong>VPN</strong> Client Preparation, Installation, and Connection4 Select the Internet Protocol (TCP/IP) component, then clickthe Properties button.The Internet Protocol (TCP/IP) Properties window appears.5 Click the Advanced button.The Advanced TCP/IP Settings window appears.6 Click the DNS tab.7 Under the “DNS server addresses, in order of use” heading,click the Add button.The TCP/IP DNS Server window appears.8 Enter your DNS server IP address in the appropriate field,then click the Add button.If you have multiple remote DNS servers repeat the last two steps.NOTEYou must list the DNS server on the Private network behindthe Firebox first.9 Enable the Append these DNS suffixes (in order) option.10 Click the Add button.The TCP/IP Domain Suffix window appears.11 Enter your Domain suffix in the appropriate field.If you have multiple DNS suffixes repeat the last two steps.12 Click the WINS tab.13 Under the “WINS addresses, in order of use” heading, clickthe Add button.The TCP/IP WINS Server window appears.14 Enter your WINS server IP address in the appropriate field,then click the Add button.If you have multiple remote WINS servers repeat the last two steps.15 Click the OK button to close the Advanced TCP/IP Settingswindow.16 Click the OK button to close the Internet Protocol (TCP/IP)Properties window.17 Click the OK button to close the next window.18 Click the Cancel button again to close the Dial-upconnection window.28 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Prepare the Remote ComputersMU<strong>VPN</strong> client requirementsIn addition to basic operating system preparation, the MU<strong>VPN</strong>client requires the following, files, documentation, and passphrases.MU<strong>VPN</strong> installation fileThe installation files—one with the personal firewall(Muvpn.exe) and one without the personal firewall(MuvpnLite.exe)—are available from the <strong>WatchGuard</strong> Website at:www.watchguard.com/supportEnter the site using your LiveSecurity user name andpassword. Click the Latest Software link, then click Addons/Upgradeson the left side, and then the <strong>Mobile</strong> <strong>User</strong><strong>VPN</strong> link.The end-user profileA file containing the user name, shared key, and settingsthat enable a remote computer to connect securely over theInternet to your trusted network. The end-user profile hasthe filename: username.wgxThe Policy Manager creates an end-user profile when youadd a new MU<strong>VPN</strong> user to the Firebox. For more instructionson creating this file, see the <strong>WatchGuard</strong> <strong>VPN</strong> <strong>Guide</strong>,Chapter 5 “Preparing to Use MU<strong>VPN</strong>”.Two certificates files—if you are authenticating by way ofcertificates.The Policy Manager creates two files when the you select toauthenticate using a certificate. These are the .p12 file, anencrypted file containing the certificate, and the cacert.pemfile, which contains the root (CA or Certificate Authority)certificate.For instructions on using certificates for authentication, seethe <strong>VPN</strong> <strong>Guide</strong>, Chapter 5, subsection “Preparing <strong>Mobile</strong><strong>User</strong> <strong>VPN</strong> Profiles.”For more information regarding using certificates, see the<strong>VPN</strong> <strong>Guide</strong>, Chapter 3, “Activate the Certificate Authority onthe Firebox.”<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 29


MU<strong>VPN</strong> Client Preparation, Installation, and Connection<strong>User</strong> documentationEnd-user brochures developed by <strong>WatchGuard</strong> are located onthe <strong>WatchGuard</strong> Web site at:www.watchguard.com/supportEnter the site using your LiveSecurity user name andpassword. Click the Product Documentation link and thenclick the <strong>VPN</strong> link.Shared KeyIn order to install the end-user profile (the .wgx file), theuser is prompted for a shared key. This key decrypts the fileand imports the security policy into the MU<strong>VPN</strong> client. Thekey is set during the creation of the file at the PolicyManager.NOTEWrite the shared key down and keep it in a secure place as itwill be needed during the final steps of the installationprocess.<strong>User</strong>name and Password—if you are authenticating by wayof Extended Authentication.You must supply the end user with the <strong>User</strong>name andPassword for their authentication account. This is defined onthe relevant authentication server.For instructions on using Extended Authentication, see“Define an extended authentication group” on page 9Install and Uninstall the MU<strong>VPN</strong> ClientThe installation process consists of two parts: installing the clientsoftware on the remote computer and importing the enduserprofile into the client.NOTEIn order to perform the installation process successfully, youmust log into the remote computer with local administratorrights.Follow these steps to install the client:1 Copy the MU<strong>VPN</strong> installation file to the remote computer.30 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Install and Uninstall the MU<strong>VPN</strong> Client2 Copy the end-user profile (the .wgx file) to the remotecomputer’s root directory.If using certificates to authenticate, copy these files to the rootdirectory as well.3 Double-click the MU<strong>VPN</strong> installation file.If at any time during the installation process you inadvertently skipa step, simply cancel the process and begin again.4 The installation welcomes you to the InstallShield Wizard.Click the Next button.During the Setup Status portion of the install procedure, theInstallShield may detect ReadOnly Files. If this occurs, click Yes foreach event in order to continue the install.5 The installation welcomes you again. Click the Next button.The Software Licence Agreement appears.6 Click the Yes button to accept the terms of the LicenseAgreement and to continue with the installation.The Setup Type window appears.7 Select the type of setup. By default, Typical is enabled—thisis the setup recommended by <strong>WatchGuard</strong>. Click the Nextbutton.8 If you are installing the client on a Windows 2000 host, theInstallShield detects the native Windows 2000 L2TPcomponent. The client uses this component and does notneed to install its own. Click the OK button to continuewith the install.The Select Components window appears.9 Keep the default components and click the Next button.The Start Copying Files window appears.10 Click the Next button to begin copying files.A command prompt window appears while the dni_vapmp file isinstalled—this is normal. When it is complete, the installation willcontinue.11 When the InstallShield Wizard is complete, click the Finishbutton.12 The InstallShield Wizard then searches for the end-userprofile (the .wgx file) at the computer’s root directory, c:\,click the Next button. If the file was not copied to thisdefault directory, you must use the Browse button to locateand select the proper folder.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 31


MU<strong>VPN</strong> Client Preparation, Installation, and Connection13 The InstallShield Wizard has completed the install of theMU<strong>VPN</strong> Client, verify that the option Yes, I want to restartmy computer now is enabled and click the Finish button.The computer reboots.NOTEThe ZoneAlarm personal firewall may interfere with regularLocal network traffic preventing access to network resources.If the remote computer is connected to the network afterreboot, this may disrupt the network logon process. If indoubt, log on to the computer locally the first time afterinstallation. For more information, see Chapter 2 “TheZoneAlarm Personal Firewall” on page 41.Importing the end-user profileOnce you have restarted the machine, the <strong>WatchGuard</strong> PolicyImport dialog box appears. Import the MU<strong>VPN</strong> end-user profile(the .wgx file) and provide the Shared Key used to decrypt thefile.1 The <strong>WatchGuard</strong> Policy Import window should locate theend-user profile (the .wgx file) in the directory specifiedduring the installation.If the <strong>WatchGuard</strong> Policy Import tool does not locate the .wgx file,click Browse and locate the file.2 Enter the Shared key in the appropriate field and click theOK button.3 You have finished setting up the MU<strong>VPN</strong> client. Click OK.The remote computer is now ready to use MU<strong>VPN</strong>.For instructions on how to reconfigure the MU<strong>VPN</strong> client with anew end-user profile, see “Update the end-user profile” onpage 32.NOTEThe ZoneAlarm personal firewall may immediately begin todisplay alerts on your Windows desktop. For moreinformation regarding ZoneAlarm see the Chapter 2 “TheZoneAlarm Personal Firewall” on page 41.Update the end-user profileAt some point, it may become necessary to reconfigure theMU<strong>VPN</strong> end-user profile (the .wgx file).32 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Install and Uninstall the MU<strong>VPN</strong> ClientFor example:- The shared key changes- The certificate files are reissued- The Extended Authentication account is changed to adifferent server. For example, from NT authenticationto RADIUS.- The network configuration changes- The remote computer is transferred to a new end-userFirst, use the Policy Manager to edit and create a new MU<strong>VPN</strong>end-user profile (the .wgx file). For more information, see “Preparingthe Firebox to Use MU<strong>VPN</strong>” on page 1.From the remote computer:1 Locate and double-click the end-user profile (the .wgx file)file.If the <strong>WatchGuard</strong> Policy Import tool does not prompt you with the.wgx file to import, click Browse and locate the file.2 Enter the Shared key in the appropriate field. Then click theOK button.3 You have finished updating the MU<strong>VPN</strong> client. Click OK.The remote computer is now ready to use MU<strong>VPN</strong>. The SecurityPolicy is automatically activated.Uninstall the MU<strong>VPN</strong> clientAt some point, it may become necessary to completely uninstallthe MU<strong>VPN</strong> client. <strong>WatchGuard</strong> recommends a complete uninstallusing the Windows Add/Remove Programs tool.First, disconnect all existing tunnels and dial-up connectionsand reboot the remote computer. Then, from the Windowsdesktop:1 Select Start => Settings => Control Panel.The Control Panel window appears.2 Double click the Add/Remove Programs icon.The Add/Remove Programs window appears.3 Select <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> and click the Change/Removebutton.The InstallShield Wizard window appears.4 Select Remove. Click the Next button.The Confirm File Deletion dialog box appears.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 33


MU<strong>VPN</strong> Client Preparation, Installation, and Connection5 Click the OK button to completely remove all of thecomponents.A command prompt window appears while the dni_vapmp file isinstalled—this is normal. When it is complete, the installation willcontinue.The Uninstall Security Policy dialog box appears.6 Click the Yes button to delete the Security Policy PersonalCertificates and Private/Public Keys.The InstallShield Wizard window appears.7 Verify that the option Yes, I want to restart my computernow is enabled and click Finish.The computer will reboot.NOTEThe ZoneAlarm personal firewall settings are preserved underthe following default directories.Windows NT and 2000: c:\winnt\internet logs\Windows XP: c:\windows\internet logsIf you wish to disregard these settings, delete the contents.8 When the computer has restarted, select Start > Programs.9 Right-click <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> and select Delete to removethis selection from your Start Menu.Connect and Disconnect the MU<strong>VPN</strong> ClientThe MU<strong>VPN</strong> client enables the remote computer to establish asecure, encrypted connection to a protected network over theInternet. To do this, you must first connect to the Internet andthen use the MU<strong>VPN</strong> client to connect to the protected network.Connecting the MU<strong>VPN</strong> Client1 First establish an Internet connection through either Dial-Up Networking or directly through a local area network(LAN) or wide area network (WAN).From the Windows desktop system tray:34 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Connect and Disconnect the MU<strong>VPN</strong> Client2 Verify the MU<strong>VPN</strong> client status—it must be activated. If it isnot, right-click the icon and select Activate Security Policy.For information on how to determine the status of the MU<strong>VPN</strong>icon, see the following section “The <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> client icon”.Then, from the Windows desktop:3 Select Start > Programs > <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> > Connect.The <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> Connect widow appears.4 Click the Yes button.At this point, if you are using Extended Authentication, you willbe prompted for the <strong>User</strong>name and Passphrase created previouslyon the authentication server. Enter these values and clickOK.For more information regarding Extended Authentication, see“Define an extended authentication group” on page 9.The <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> client iconThe <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> icon exists in the Windows desktop systemtray and displays several different status images. The followinglists these images and provides a brief description of each.DeactivatedThe MU<strong>VPN</strong> Security Policy is deactivated or the Windowsoperating system did not start a necessary <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>service properly and the remote computer must be restarted(if this continues you may need to reinstall the MU<strong>VPN</strong>client).<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 35


MU<strong>VPN</strong> Client Preparation, Installation, and ConnectionActivatedThe MU<strong>VPN</strong> client is ready to establish a secure, MU<strong>VPN</strong>tunnel connection.Activated and Transmitting Unsecured DataThe MU<strong>VPN</strong> client is ready to establish a secure, MU<strong>VPN</strong>tunnel connection. The red bar on the right of the iconindicates that the client has begun transmitting unsecureddata.Activated and ConnectedThe MU<strong>VPN</strong> client has established at least one secure,MU<strong>VPN</strong> tunnel connection but is not transmitting data.Activated, Connected and Transmitting Unsecured DataThe MU<strong>VPN</strong> client has established at least one secure,MU<strong>VPN</strong> tunnel connection. The red bar on the right of theicon indicates that the client is transmitting only unsecureddata.Activated, Connected and Transmitting Secured DataThe MU<strong>VPN</strong> client has established at least one secure,MU<strong>VPN</strong> tunnel connection. The green bar on the right ofthe icon indicates that the client is transmitting only secureddata.Activated, Connected and Transmitting both Secure andUnsecured Data36 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Connect and Disconnect the MU<strong>VPN</strong> ClientThe MU<strong>VPN</strong> client has established at least one secure,MU<strong>VPN</strong> tunnel connection. The red and green bars on theright of the icon indicate that the client is transmitting bothsecured and unsecured data.Allowing the MU<strong>VPN</strong> client through the personalfirewallThere are a couple of programs associated with the MU<strong>VPN</strong> client,which you must allow through the personal firewall in orderto establish the MU<strong>VPN</strong> tunnel:• MuvpnConnect.exe• IreIKE.exeThe personal firewall will detect the attempt of these programsto access the Internet. The New Program alert dialog boxappears requesting access for the MuvpnConnect.exe program.From the ZoneAlarm alert dialog box:1 Enable the Remember this answer the next time I use thisprogram option and click the Yes button.This enables ZoneAlarm to allow the MuvpnConnect.exe programthrough each time you attempt to make a MU<strong>VPN</strong> connection.The New Program alert dialog box appears requesting access forthe IreIKE.exe program.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 37


MU<strong>VPN</strong> Client Preparation, Installation, and Connection2 Enable the Remember this answer the next time I use thisprogram option and click the Yes button.This enables ZoneAlarm to allow the IreIKE.exe program througheach time you attempt to make a MU<strong>VPN</strong> connection.Disconnecting the MU<strong>VPN</strong> clientThe MU<strong>VPN</strong> tunnel is independent of the Internet connection.Close the MU<strong>VPN</strong> tunnels when the remote computer encounterseither of the following events.- Loses the Internet connection- No longer needs the MU<strong>VPN</strong> tunnelFrom the Windows desktop system tray:1 Right-click the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> client icon.2 Select Disconnect All.The MU<strong>VPN</strong> Client closes all tunnels. This process does not affectyour connection to the Internet. You must disconnect from theInternet separately.3 Right-click the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> client icon and selectDeactivate Security Policy.The MU<strong>VPN</strong> icon displays a red slash to indicate a deactivatedSecurity Policy.If you are using the ZoneAlarm personal firewall, deactivate thisas well.From the Windows desktop system tray:1 Right-click the ZoneAlarm icon and select ShutdownZoneAlarm.The ZoneAlarm dialog box appears.2 Click the Yes button when prompted to quit ZoneAlarm.Monitor the MU<strong>VPN</strong> Client ConnectionThere are two tools that accompany the MU<strong>VPN</strong> client whichcan be used to monitor your connection and diagnose problemsthat may occur: the Log Viewer and the Connection Monitor.The Log ViewerThe LogViewer displays the communications log, a diagnostictool that lists the negotiations that occur during the MU<strong>VPN</strong>client connection.38 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Monitor the MU<strong>VPN</strong> Client ConnectionFrom the Windows desktop system tray:1 Right-click the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> client icon.2 Select Log Viewer.The Log Viewer window appears.The Connection MonitorThe Connection Monitor displays statistical and diagnosticinformation for each active connection in the security policy.This module shows the actual security policy settings and thesecurity association (SA) information established during Phase 1IKE negotiations and Phase 2 IPSec negotiations.From the Windows desktop system tray:1 Right-click the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> client icon.2 Select Connection Monitor.The Connection Monitor window appears.An icon appears to the left of the connection name:• SA indicates that the connection has only a Phase 1 IKE SA.This occurs when connecting to a secure gateway tunnel orwhen a Phase 2 IPSec SA fails to establish or has not beenestablished yet.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 39


MU<strong>VPN</strong> Client Preparation, Installation, and Connection• A key indicates that the connection has a Phase 2 IPSec SA,or both a Phase 1 and Phase 2 SA.• A key with a black line moving below it indicates that theclient is processing secure IP traffic for that connection.• When a single Phase 1 SA to a gateway protects multiplePhase 2 SAs, there is a single Phase 1 connection with theSA icon and individual Phase 2 connections with the keyicon displayed above that entry.40 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


CHAPTER 3The ZoneAlarmPersonal FirewallA personal firewall is a barrier between your computer and theoutside world. The computer is most vulnerable at its doors,called ports. Without ports, no connection to the Internet ispossible.ZoneAlarm protects these ports by following a simple rule:Block all incoming and outgoing traffic unless you explicitlyallow it for trusted programs.When using ZoneAlarm, you often see Program Alert dialogboxes similar to the image below.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 41


The ZoneAlarm Personal FirewallThis alert appears whenever one of your programs (in this example,Internet Explorer) attempts to access the Internet or yourlocal network. This powerful feature means no informationleaves your computer unless you give it permission.If you enable the “Remember the answer each time I use thisprogram” checkbox you will only have to answer this questiononce for each program.ZoneAlarm FeaturesThe ZoneAlarm personal firewall provides a brief tutorial of theproduct immediately after installation of the MU<strong>VPN</strong> client.Carefully read each step to familiarize yourself with the application.For more information on ZoneAlarm features and configuration,please refer to the ZoneAlarm Help system. To access the Helpsystem, select Start > Programs > Zone Labs > ZoneAlarmHelp.Allowing Traffic through ZoneAlarmWhen an application requires access through the ZoneAlarmpersonal firewall, a Program Alert is displayed on the Windowsdesktop informing the user which program needs access. Often,the program associated with the application is not indicative ofthe application the user is attempting to execute.42 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Allowing Traffic through ZoneAlarmIn the example above, the Internet Explorer Web browser applicationis attempting to access the users home page. The programwhich actually needs to pass through the firewall is“IEXPLORE.EXE”.In order to allow the program access each time it is executed,enable the Remember the answer the next time I use this programcheckbox.Here is a list of a few essential programs which need accessthrough the ZoneAlarm personal firewall in order to operatesome important applications.Programs Which Must Be AllowedMU<strong>VPN</strong> clientMU<strong>VPN</strong> Connection MonitorMU<strong>VPN</strong> Log ViewerPrograms Which May be AllowedMS OutlookIreIKE.exeMuvpnConnect.exeCmonApp.exeViewLog.exeOUTLOOK.exe<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 43


The ZoneAlarm Personal FirewallMS Internet ExplorerNetscape 6 or 7Opera Web browserStandard Windows network applicationsIEXPLORE.exenetscp6.exenetscp.exeOpera.exelsass.exeservices.exesvchost.exewinlogon.exeShutting Down ZoneAlarmFrom the Windows desktop system tray:1 Right-click on the ZoneAlarm icon and selectShutdown ZoneAlarm.The ZoneAlarm dialog box appears.2 Click the Yes button when prompted to quit ZoneAlarm.Uninstalling ZoneAlarmFrom the Windows desktop:1 Select Start > Programs > Zone Labs > UninstallZoneAlarm.The Confirm Uninstall dialog box appears.2 Click the Yes button.The ZoneLabs TrueVector service dialog box appears.3 Click the Yes button to continue with uninstalling theTrueVector service and disable its Internet Security features.The Select Uninstall Method window appears.4 Verify that Automatic is selected and then click the Nextbutton.5 Click the Finish button to perform the uninstall.NOTEThe Remove Shared Component window may appear. Duringthe initial installation of ZoneAlarm, some files are installedthat other programs on the system may share. Click the Yesto All button to completely remove all of these files.44 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Uninstalling ZoneAlarm6 The Install window appears and prompts you to restart thecomputer. Click the OK button to reboot your system.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 45


The ZoneAlarm Personal Firewall46 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


CHAPTER 4Troubleshooting Tipsfor the MU<strong>VPN</strong> Client<strong>WatchGuard</strong> maintains a knowledge base on our Web site,including an In-Depth FAQ section on configuring and usingthe MU<strong>VPN</strong> client. This is available at:www.watchguard.com/supportA few of the most common issues found in installing, configuring,and using the MU<strong>VPN</strong> client are described below.My computer is hung up just after installing theMU<strong>VPN</strong> client...This is most likely due to either the ZoneAlarm personal firewallapplication interfering with regular Local network traffic or it isbecause the MU<strong>VPN</strong> client is active and is unsuccessfullyattempting to create <strong>VPN</strong> tunnels.When the MU<strong>VPN</strong> client is not in use, you should shut downZoneAlarm and deactivate the client.First, reboot your computer, then from the Windows desktopsystem tray:1 Right-click on the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> client icon and selectDeactivate Security Policy.The MU<strong>VPN</strong> client icon displays a red slash indicating that theSecurity Policy is deactivated.<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 47


Troubleshooting Tips for the MU<strong>VPN</strong> Client2 Right-click the ZoneAlarm icon and select ShutdownZoneAlarm.The ZoneAlarm dialog box appears.3 Click the Yes button when prompted to quit ZoneAlarm.I have attempted to connect several times, butnothing is happening...The MU<strong>VPN</strong> client may have misloaded the end-user profile. Tryreloading your security policy.From the Windows desktop system tray:1 Right-click the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Client icon.2 Select Reload Policy.The MU<strong>VPN</strong> client reloads the end-user profile.3 Now try to connect the client again.I have to enter my network log in information evenwhen I’m not connected to the network...When you start your computer, you are prompted to enter yourWindows network user name, password and domain. It is veryimportant that you enter this information correctly, just as youwould if you were at the office connected to the network. Windowsstores the information for use by network adapters andnetworked applications. Later, when you connect to your ISPand start the MU<strong>VPN</strong> client, your computer uses the stored username, password, and domain to connect to the company network.I am not prompted for my user name and passwordwhen I turn my computer on...This is most likely due to the ZoneAlarm personal firewall application.This program is very good at what it does: keeping yourcomputer secure from unauthorized incoming or outgoing traffic.Unfortunately, it may block your computer from broadcastingits network information and prevent the machine fromsending the necessary login information. Be certain to shutdown ZoneAlarm each time you disconnect the MU<strong>VPN</strong> connection.48 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


Is the <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> tunnel working...The <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> client icon, which appears in the Windowsdesktop system tray once it is launched, will display a key withinthe icon once the client is connected.To test the connection, ping a computer on your company network.• Select Start > Run. Type ping and the IP address of acomputer on your company network.My mapped drives have a red X through them...Windows NT, and 2000 verifies and maps networks drives automaticallywhen the computer starts. Because there is no way foryou to establish a remote session with the company networkbefore the computer actually starts, drive mapping fails duringthe boot process and a red X appears on the drive icon. Establisha MU<strong>VPN</strong> tunnel and open the network drive. The red X shoulddisappear.How to map a network drive...Due to a Windows operating system limitation, mapped networkdrives disappear when you work remotely. To remap a networkdrive from the Windows desktop:1 Right-click Network Neighborhood.2 Select Map Network Drive.The Map Network Drive dialog box appears.3 Use the drop list to select a drive letter.Either use the drop list or type a network drive path. For example:\\techsupport\share2\rodolfo4 Click OK.The mapped drive appears in the My Computer window. Even ifyou enable the “Reconnect at Logon” checkbox, the mappeddrive will not appear the next time you start your computerunless it is physically connected to the network.I sometimes get prompted for a password when Iam browsing the company network...Due to a Windows networking limitation, mobile user virtualprivate networking products only allow access to a single networkdomain. If your company is large enough to require subnetting(multiple networks connected together), you can only<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 49


Troubleshooting Tips for the MU<strong>VPN</strong> Clientbrowse your own domain. Attempts to access other domainsresult in a password prompt.It takes a really long time to shut down thecomputer after using <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>...If you open and browse a mapped network drive during aMU<strong>VPN</strong> session, the Windows operating system waits for a signalfrom the network before it times out and completes the shutdown cycle.I lost the connection to my ISP, and now I can’tuse the company network...If you lose your Internet connection long enough, MU<strong>VPN</strong> alsoloses the secure tunnel. Follow the steps to close the tunnel.Then connect to the Internet and restart the MU<strong>VPN</strong> client.No matter what I do, I can’t use the companynetwork...There may be a problem with the end-user profile (the .wgx file)or shared passwords.50 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


IndexSymbols.exp files 4.p12 file 16, 29.wgx file 29.wgx files 4AAdvanced Export File Preferencesdialog box 12Advanced <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> PolicyConfiguration dialog box 10Any serviceand MU<strong>VPN</strong> 13, 14authentication serverspecifying 10types supported 8authentication, extended. Seeextended authenticationCcacert.pem 16, 29certificatesfiles in end-user profile 16certificates, files required ifauthenticating using 29Client for Microsoft Networksinstalling on Windows 2000computers 24Connection Monitor, monitoringMU<strong>VPN</strong> client through 39Ddialog boxesAdvanced Export File Preferences12IPSec Logging 17DNS servers, configuring 3Eencryptionand MU<strong>VPN</strong> 3end-user profiledescribed 29importing 32<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 51


updating 32end-user profiles for MU<strong>VPN</strong> usersdescribed 1distributing to remote users 15locking 11preparing 4regenerating 15saving 15extended authenticationdefining groups for 8specifying authentication methodfor 10specifying server 10FFile and Printer Sharing for MicrosoftNetworksand Windows 2000 23and Windows XP 26Fireboxesconfiguring for MU<strong>VPN</strong> 1IInternetaccessing through IPSec tunnel 7accessing through tunnel 7Internet Protocol (TCP/IP) NetworkComponentand Windows 2000 23and Windows XP 26IPSec Logging dialog box 17LLogViewer, monitoring MU<strong>VPN</strong> clientthrough 38MMD5-HMAC 6<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> wizard 5, 7, 9<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>. See MU<strong>VPN</strong>MU<strong>VPN</strong>allowing Internet access through 7and virtual adapters 12authentication for 1configuring debugging options 17configuring services to allow 12configuring shared servers for 3connecting with Pocket PC 5defining new user 4described 1disconnecting 38distributing end-user profiles 15encryption levels for 3end-user profiles. See end-userprofiles for MU<strong>VPN</strong> usersentering license keys 2making outbound connectionsbehind Firebox 16modifying existing user 6preparing configuration files for 4preparing end-user profiles 4purchasing license for 2setting encryption for 6specifying authentication method 5,10system requirements for 20troubleshooting 49with extended authentication 8MU<strong>VPN</strong> clientallowing through firewall 37connecting using 34files required to install 29icon for 35installing 29, 30monitoring connection for 38removing 33Muvpn.exe 29MuvpnLite.exe 29OOutgoing service 1552 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>


PPocket PC 5RRemote Access Server, installing onWindows NT 21Sservicesconfiguring to allow MU<strong>VPN</strong> traffic12SHA1-HMAC 6shared key 30split tunneling 7described 7system requirements 20Ttroubleshooting tips 47WINS and DNS settings 24Windows NTinstalling Remote Access Server on21WINS and DNS settings 22Windows XPinstalling Client for MicrosoftNetworks on 27installing File and Printer Sharingfor Microsoft Networks on 26installing Internet Protocol (TCP/IP)Network Component on 26WINS and DNS settings 27WINS and DNS settingson Windows 2000 computers 24on Windows NT computers 22on Windows XP computers 27WINS servers, configuring 3ZZoneAlarmallowing MU<strong>VPN</strong> client through 37described 19troubleshooting 47Vvirtual adapter for MU<strong>VPN</strong> users 12<strong>VPN</strong>sdesign considerations 7split tunneling 7terminating 17WWindows 2000installing Client for MicrosoftNetworks on 24installing File and Printer Sharingfor Microsoft Networks on 23installing Internet Protocol (TCP/IP)Network Component on 23<strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong> Administration <strong>Guide</strong> 53


54 <strong>WatchGuard</strong> <strong>Mobile</strong> <strong>User</strong> <strong>VPN</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!