NAKSHA TECHNOLOGIES INC. Sunnyvale,CA-USA IPSEC-Tunneling Mode Using NetGear Prosafe VPN Firewall Disclaimer: Information in this publication is subject to change without notice and does not represent a commitment on the part of Naksha Technologies Inc(NTI). The information contained here in is the proprietary and confidential information of NTI. The procedures described in this application note are deliberately broad and generic. Your specific design might require procedures that are slightly different from those described here. Revision Index: 1.1 Initial Version to setup the NETGEAR VPN ----- (June-15-2009) IPSEC-Tunnel Mode using Netgear VPN Required Equipment: 1) Three pc's. One of them should act as a gateway & the remaining two are end peers 2) For the gate way machine we need o have 2 Ethernet cards. 3) Netgear prosafe Vpn firewall (model: FVS318) Software Requirements: 1) Gate way machine is expected to have a minimum of 2.6.23 linux kernal & a setkey version of >=0.5. For additional details on setting up the kernel modules please refer Twiki. 2) Remaining two machines which are acting as peers can be of any OS. Basic Setup for VPN: 1) login to Netgear VPN. (By default the IP will be 192.168.0.1 , user-name: admin , Passwd: password. 2) Go to “Basic Settings” option Internet IP Address --> Use Static IP Address IP Address : 192.168.1.1 IP Subnet Mask : 255.255.255.0 Gateway IP Address :192.168.1.2 Domain Name Server (DNS) Address --> Use These DNS Servers Primary DNS : 4.2.2.1 (You can choose any DNS) Click “APPLY” 3) Go to Security --> Rules your OUTBOUND services action should be ALLOW Always Now you have to Modify the INBOUND Services Please Create one INBOUND services Service --> It could be SFTP or SSH or ICMP (You can have all three of them individually) Action --> ALLOW always Send to LAN Server --> 192.168.0.3 WAN Users --> Any Click “APPLY” 4) Go to “VPN Policies” option Add Manual policy General --> Policy Name --> manual_1 Remote VPN End point --> Address Type --> IP Address Address Data --> 192.168.1.2 Traffic Selector --> Local IP --> subnet address Start IP Address : 192.168.0.0 Finish IP Address: 0.0.0.0 Subnet Mask : 255.255.255.0 Remote IP --> Subnet Address Start IP Address : 192.168.2.0 Finish IP Address: 0.0.0.0 Subnet Mask : 255.255.255.0 ESP Configuration --> SPI-Incoming --> 201 SPI-Outgoing --> 301 Enable Encryption --> 3DES Key IN --> 111111112222222233333333 Key OUT--> 111111112222222233333333 Enable Authentication --> MD5 Key IN --> 1111222222223333 Key Out --> 1111222222223333 Click “APPLY” 4) Go to Maintenance --> Router Status (please follow step-5 to reflect step-4 values) Your LAN PORT should reflect the following values IP Address : 192.168.0.1 DHCP : ON IP Subnet Mask : 255.255.255.0 5) Go to Advanced --> LAN Setup LAN TCP/IP Setup IP Address : 192.168.0.1 IP Subnet Mask : 255.255.255.0 RIP Direction : None RIP Version : Disabled LAN IP Address Management --> Use Router as DHCP Server DHCP Server Info Starting IP Address : 192.162.0.2 Ending IP Address : 192.168.0.51 DNS Server Address --> Router is DNS Proxy Now we have configured the VPN for our custom test. Basic Structure: Please follow the following ethernet settings for your PC's . We have already set the config for VPN in the previous step. PC1-----(port1)VPN(internet)----------------------(Eth1)PC2(Eth0)--------PC3 Eth0-----Manual Config-------------------------------------Eth0---------------Eth0 192.168.0.3 192.168.0.1 192.168.2.1 192.168.2.2 Internet Eth1 192.168.1.1<----------------------------------->192.168.1.2 SETKEY Conf file for PC2: please have the following conf file in PC2 #!/sbin/setkey -f #the SAD and SPD flush; spdflush; # ESP SAs doing encryption using 192 bit long keys (168 + 24 parity) # and authentication using 128 bit long keys add 192.168.1.2 192.168.1.1 esp 0x201 -m tunnel -E 3des-cbc "111111112222222233333333" -A hmac-md5 "1111222222223333"; add 192.168.1.1 192.168.1.2 esp 0x301 -m tunnel -E 3des-cbc "111111112222222233333333" -A hmac-md5 "1111222222223333"; # Security policies spdadd 192.168.0.0/24 192.168.2.0/24 any -P in ipsec esp/tunnel/192.168.1.1-192.168.1.2/require; spdadd 192.168.2.0/24 192.168.0.0/24 any -P out ipsec esp/tunnel/192.168.1.2-192.168.1.1/require; Save the serkey_tunnel.conf file in /etc folder. Testing the Tunnel Mode Environment: Cmd: setkey -f /etc/setkey_tunnel.conf (In PC2) Please ping from the PC1 ping 192.168.2.2 Please ping from the PC2 ping 192.168.0.1