• Kiếm tiền với Hostinger

    Kiếm Tiền Cùng Hostinger

    Bạn đang tìm kiếm cách kiếm thêm thu nhập online? Hãy tham gia ngay chương trình Affiliate của Hostinger! Với mỗi khách hàng đăng ký thông qua liên kết của bạn, bạn sẽ nhận được khoản hoa hồng hấp dẫn.

    Hostinger cung cấp các dịch vụ lưu trữ web (hosting) chất lượng cao với mức giá cạnh tranh, giúp bạn dễ dàng giới thiệu và thu hút người dùng.

    Đừng bỏ lỡ cơ hội tuyệt vời này để tăng thêm thu nhập thụ động.

    Tham Gia Ngay

Configure Site-to-Site VPN on SonicWall firewall

TigerDao

Administrator
Thành viên BQT
This article will guide you to configure Site-to-Site VPN between the two Sonicwall Firewall device Use Main mode.

1. Create Address Objects for VPN subnet

– On SonicWall interface, select Object at the top of the page.

– Move to Match Objects|Addresses, select Add.

– On TZ 670 (Site B)


(IMG)


– On TZ 570P (Site A)


(IMG)

2. Configure VPN policy on Site A

– Select Network at the top of the page.

– Go IPSec VPN | Rules and Settingsselect Add.

– In the VPN policy window, select General tab.

– Select IKE using Preshared Secret at the menu Authentication Method.

– Name the policy in section Name.

– Enter the Wan IP address of the remote site (in this example, the Wan address of the TZ 670) in the IPSec Primary GatewayName or Address.

– Enter Shared Secret password in section Shared Secret and Confirm Shared SecretShared Secret must have at least 4 characters and include letters and numbers.

– Additionally, you can specify Local IKE ID and Peer IKE ID for Policy. By default, the IP address is used for Main Mode and the SonicWall Identifier is used for Aggressive Mode.


(IMG)


– Move to Network tab.

– Under Local Networks, select the address object (eg: LAN Subnet) you want from the section Choose local network from list.

– Under Remote Networks, select the address object (for example, TZ -670 VPN Network) from the section Choose destination network from list.


(IMG)


– Select Proposals tab.

– Under IKE (Phase 1) Proposal, select Main Mode at the menu Exchange.

– Default values for DH Group, Encryption, Authentication and Life Time are accepted for most VPN configurations. Make sure that the Phase 1 values on the opposite side of the tunnel are configured the same. You can also select AES-128, AES-192 or AES-256 from the Authentication menu instead of 3DES for increased authentication security.

– Under IPSec (Phase 2) Proposal, the default values for Protocol, Encryption, Authentication, Enable Perfect Forward Secrecy, DH Group, and Lifetime are accepted for most VPN configurations. Make sure that the Phase 2 values on opposite sides of the configured tunnel match.


(IMG)


– Select Advanced tab.

– Select enable Enable Keep Alive to use heartbeat messages between peers on VPN tunnel. If one end of the tunnel fails, the use of Keepalives will allow automatic renegotiation of the tunnel when both sides become connected again.

– Select enable feature Enable Windows Networking (NetBIOS) Broadcast to allow access to remote network resources using Windows Network Neighborhood.

– If you want to use the router on the LAN for traffic into this tunnel intended for an unknown subnet, for example, if you configure the other side to use this VPN tunnel as the default path For all Internet traffic, you should enter your router’s IP address in the field Default LAN Gateway (optional).

– Select an interface or zone from the menu VPN Policy bound. Zone WAN is the preferred choice if you are using WAN Load Balancing and you want to allow the VPN to use one of the two WAN interfaces.

– Finally choose Save.


(IMG)

3. Configure VPN policy on Site B

– Select Network at the top of the page.

– Go IPSec VPN | Rules and Settingsselect Add.

– In the VPN policy window, select General tab.

– Select IKE using Preshared Secret at the menu Authentication Method.

– Name the policy in section Name.

– Enter the Wan IP address of the remote site (in this example, the Wan address of the TZ 570) in the IPSec Primary GatewayName or Address.

– Enter Shared Secret password in section Shared Secret and Confirm Shared SecretShared Secret must have at least 4 characters and include letters and numbers.


(IMG)


– Move to Network tab.

– Under Local Networks, select the address object (eg: LAN Subnet) you want from the section Choose local network from list.

– Under Remote Networks, select the address object (for example, TZ -570 VPN Network) from the section Choose destination network from list.


(IMG)


– Select Proposals tab.

– Settings must be the same as Site A.


(IMG)


– Select Advanced tab.

– Select enable Enable Keep Alive to use heartbeat messages between peers on VPN tunnel. If one end of the tunnel fails, the use of Keepalives will allow automatic renegotiation of the tunnel when both sides become connected again.

– Select enable feature Enable Windows Networking (NetBIOS) Broadcast to allow access to remote network resources using Windows Network Neighborhood.

– If you want to use the router on the LAN for traffic into this tunnel intended for an unknown subnet, for example, if you configure the other side to use this VPN tunnel as the default path For all Internet traffic, you should enter your router’s IP address in the field Default LAN Gateway (optional).

– Select an interface or zone from the menu VPN Policy bound. Zone WAN is the preferred choice if you are using WAN Load Balancing and you want to allow the VPN to use one of the two WAN interfaces.

– Finally choose Save.


(IMG)



!!! Thank you for following the article!!!

Xem tiếp...
 
Top