最新公告 |
当前位置: 首页 > 新闻与文档 > SonicWall配置 >

sonicwall防火墙 l2tp vpn配置方法网络安全

时间:2012-04-03 20:17来源:港湾互联网络 作者:港湾网络编辑 点击:
在经过多次的sonicwall 防火墙调试的实

introduction

this document explains how to configure l2tp client access to the sonicwall groupvpn sa using the built-in l2tp server and microsoft's l2tp vpn client. access will be granted to the lan behind the sonicwall security appliance for l2tp client users, and all internet traffic for these users will also be routed through the vpn tunnel. this is not a split tunnel configuration. this guide is for sonicos enhanced 2.x, 3.x, 4.x and 5.x firmware. the guide is intended for microsoft windows xp service pack 2 (sp2) users. non-sp 2 or sp1 users may not be able to use this guide, as microsoft has recently updated the l2tp client.

sonicwall appliance configuration

follow these steps to configure the sonicwall security appliance to accept the l2tp connection:

step 1: select network > address objects.

step 2: add the following address object:

  • name: 'l2tp subnet'
  • type: network
  • network: 10.10.50.0 (the class c network address of your l2tp pool)
  • netmask: 255.255.255.0
  • zone assignment: vpn 

step 3: select users > settings and make the following configuration change:

  • authentication method: radius + local users

step 4: select vpn > l2tp server, enable the l2tp server, click configure and set the options as follows:

  • keep alive time (secs): 60
  • dns server 1: 4.2.2.2 (or use your isp's dns)
  • dns server 2: 4.2.2.1 (or use your isp's dns)
  • dns server 3: 0.0.0.0 (or use your isp's dns)
  • wins server 1: 0.0.0.0 (or use your wins ip)
  • wins server 2: 0.0.0.0 (or use your wins ip)
  • ip address provided by radius/ldap server: disabled
  • use the local l2tp ip pool: enabled
  • start ip: 10.10.50.10 *example*
  • end ip: 10.10.50.20 *example* note: use any unique private range.
  • user group for l2tp users: trusted users or everyone

step 5: select users > local users.

step 6: add a user and add these objects to the vpn access list:

  • l2tp subnet
  • wan remoteaccess networks
  • lan primary ip
  • lan subnets

note: alternatively, you can add these networks to the everyone or trusted users group. also, add any other address objects to which you require access.

step 7: select network > nat policies and add a nat policy with these settings:

  • original source: l2tp subnet
  • translated source: wan primary ip
  • original destination: any
  • translated destination: original
  • original service: any
  • translated service: original
  • inbound interface: any
  • outbound interface: wan or x1
  • comment: l2tp client nat
  • enable nat policy: enabled
  • create a reflexive policy: disabled

step 8: select vpn > settings and configure the wan groupvpn policy with the following settings:

general tab:
  • enter a shared secret.
  • proposals tab:
  • ike (phase 1) proposal
  • dh group: group 2
  • encryption: 3des
  • authentication: sha1
  • life time (seconds): 28800
  • ipsec (phase 2) proposal
  • protocol: esp
  • encryption: 3des
  • authentication: sha1
  • enable perfect forward secrecy (pfs): disabled (optional)
  • dh group: disabled (not applicable if pfs is disabled)
  • life time (seconds): 28800
  • advanced tab:
  • enable windows network (netbios) broadcast: enabled (optional)
  • enable multicast: disabled (optional)
  • management via this sa:
  • http: enabled (optional)
  • https: enabled (optional)
  • default lan gateway: public (wan) ip of the sonicwall.
  • require authentication of vpn clients via xauth: enabled
  • user group for xauth users: trusted users or everyone
  • allow unauthenticated vpn client access: disabled
  • client tab:
  • cache xauth user name and password on client: always
  • virtual adapter settings: dhcp lease
  • allow connections to: "this gateway only" or "all secured gateways" (if you need access to site-to-site vpn's).
  • set default route as this gateway: enabled
  • require global security client for this connection: disabled
  • use default key for simple client provisioning: disabled

step 9: select vpn > dhcp over vpn, choose central gateway, click configure and make the following adjustments:

  • use internal dhcp server: enabled
  • for global vpn client: enabled
  • for remote firewall: disabled
  • send dhcp requests to the server address listed below: disabled
  • relay ip address (optional): 0.0.0.0

step 10: select firewall > access rules and add this vpn to wan rule:

  • from zone: vpn
  • to zone: wan
  • source: wan remote access networks
  • destination: any
  • service: any
  • action allow
  • users: all

notes:

  • microsoft windows xp service pack (sp) 2 l2tp clients will not be able to connect with the sonicwall’s l2tp server if the appliance is behind a nat device. see the microsoft knowledge base article 885407 entitled the default behavior of ipsec nat traversal (nat-t) is changed in windows xp service pack 2 for a system registry modification that reverses this situation.
  • the l2tp client in windows xp service pack 2 utilizes an updated nat traversal implementation (nat-t v2) which is not currently supported on sonicos standard firmware.
  • (责任编辑:admin)
顶一下
(0)
0%
踩一下
(0)
0%
------分隔线----------------------------
发表评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
用户名: 验证码: 点击我更换图片
栏目列表
推荐内容
驱白巴布期片 白癜风的发病原因 复方卡力孜然酊 白癜风早期能治愈吗 北京军颐中医医院 白癜风早期能治愈吗 北京军颐中医医院 北京军颐中医医院 补骨脂注射液 白癜风症状 白癜风治疗医院 北京白癜风医院 治疗白癜风最好的方法 北京军颐中医医院 头部白癜风的症状 白癜风传染吗 白癜风的发病原因 北京白癜风医院哪家好 白癜风的危害 白癜风早期症状 白癜风的治疗 白癜风症状 白癜风治疗 专业治疗白癜风医院哪家好 白癜风早期能治愈吗 白癜风症状 白癜风能治愈吗 白癜风治疗 白癜风治疗方法 白癜风怎么治疗 儿童白癜风发病的原因 白癜风的危害 白癜风治疗要花多少钱 白癜风去哪里治疗最好 白癜风治疗医院 如何治疗白癜风好 白癜风能治愈吗 什么方法治疗白癜风好 廊坊治疗白癜风最好的专科医院 白癜风怎么治疗好 白癜风早期能治愈吗 白癜风哪里治疗好 治疗白癜风的偏方有哪些 怎么治疗白癜风好 石家庄白癜风最好的医院 怎么治疗白癜风好 治疗白癜风哪家医院好 治疗牛皮癣,北京牛皮癣医院 白癜风治疗最好医院 白癜风能治愈吗 白癜风能治愈吗 白癜风早期症状 白癜风专科医院 治疗白癜风医院 白癜风早期症状是怎么样 天津治疗白癜风哪家医院效果最好 北京白癜风军颐中医医院 白癜风治疗医院 白癜风如何治疗 白癜风医院 治疗白癜风最好医院 牛皮癣 牛皮癣治疗 牛皮癣医院 治疗白癜风多少钱 北京治疗白癜风最好医院 白癜风早期症状 治疗白癜风偏方
How To Get Rid Of Stretch Marks
How to Get Rid of Acne Scars
how to get rid of flakes
how to ask a girl out
how to get a girl to like you
How To Talk To Girls
How To Impress A Girl