No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-22 Configuring VPN This section describes how to configure these VPN configuration scenarios: note - VPN does not work with pure
This section describes how to configure these VPN configuration scenarios:
note – VPN does not work with pure IPv6,only with dual IP stack. |
use these option for remote access :
These are the methods to configure remote access users:
Local users
RADIUS users
ad user
To allow only specified users to connect with a remote access client,set group permissions for the applicable user type. Select the arrow next to the option and select the relevant group option. See Configuring Remote Access Users.
To configure new local user :
Go to > .
Click to add local users.
Make sure that the checkbox is selected.
For more information ,see configure Remote Access Users .
To configure existing users:
Go to > .
Click to make sure that the checkbox is selected.
For more information ,see configure Remote Access Users .
To configure RADIUS users:
Go to >
click to add aRADIUS server . See configure Authentication Servers for Remote Access .
click to set access permission .
To configure ad user:
Go to > and click to add an AD domain. See Configuring Authentication Servers for Remote Access.
click to set access permission .
For L2TP VPN Client configuration,click to enter the key after you enable the L2TP VPN client method.
Advanced Options
For more information on advanced Remote Access options,for example Office Mode network,see Configuring Advanced Remote Access Options.
Monitoring
To make sure Remote Access is working:
Use the configured client to connect to an internal resource from a remote host.
In this Site to Site VPN configuration method a preshared secret is used for authentication.
Make sure the Site to Site VPN blade is set to On and is selected. See Configuring the Site to Site VPN Blade.
The peer device that you connect to must be configure and connect to the network . If it is is is aDAIP gateway,its host name must be resolvable.
Enter a host name or IP address and enter the preshared secret information. For more information,see Configuring VPN Sites.
To make sure the VPN is work :
Send traffic between the local and peer gateway.
Go to > to monitor the tunnel status. See view VPN Tunnels .
In this Site to Site VPN configuration method a certificate is used for authentication.
Make sure the Site to Site VPN blade is set to On and is selected. See Configuring the Site to Site VPN Blade.
The peer device that you connect to must be configure and connect to the network . If it is is is aDAIP gateway,its host name must be resolvable.
You must reinitialize certificates with your IP address or resolvable host name. Make sure the certificate is trusted on both sides.
VPN encryption settings is be must be the same on both side ( the localgateway and the peer gateway ) . This is is is especially important when you use the Custom encryption option .
Reinitialize certificates – Use the option described in Managing Installed Certificates. Make sure this is done on both the local and peer gateway (if they both use locally managed check point appliances).
Trust CAs on the local and peer gateway – Use one of these procedures:
Exchange CAs between gateway
sign a request using one of thegateway‘s CAs.
Authenticate by using a 3rd party CA.
Authenticate with an existing 3rd party certificate.
use certificate authentication to create the VPN site .
Follow the instructions in Configuring VPN Sites.
To make sure the specified certificate is used ,enter the peergateway‘s certificate information in > .
Exchange CAs between gateway:
click to add the Trusted CA of the peergateway. This makes sure the CA is uploaded on both the local and peer gateway. See Managing Trusted CAs.
sign a request using one of thegateway‘s CAs:
You create a request from one gateway that must be signed by the peer gateway’s CA:
Use the option in Managing Installed Certificates.
Export this request using the option.
Use the peer gateway‘s internal CA is ‘s to sign the request on the peer gateway .
If the peergateway is a locally managed check point gateway,go to > and use the option.
For more information ,see Managing Trusted ca .
upload the sign request to the localgateway.
Go to > .
select the instal certificate that you ask the remote peer to sign .
upload the certificate with the option .
See Managing Installed Certificates.
Make sure that the CA is installed on both of the gateway. Use the option in Managing Trusted CAs.
To authenticate by using a 3rd party CA :
You create a signing request from each peer gateway. Follow the steps above in sign a request using one of thegateway‘s CAs to sign it with a 3rd party CA .
note that a 3rd party CA can issue *.crt
,*.p12
,or *.pfx
certificate files.
upload the certificate using the appropriate upload option .
Go to > .
select the instal certificate that you ask the remote peer to sign .
upload the certificate with the or option .
See Managing Installed Certificates.
Make sure that the 3rd party CA is installed on both of the gateway.
Use the option in Managing Trusted CAs.
To authenticate with an existing 3rd party certificate:
Create a P12 certificate for the local and peer gateway.
Upload the P12 certificate using the option on each gateway.
Make sure that the 3rd party CA is installed on both of the gateway.
Use the option in Managing Trusted CAs.
To make sure the VPN is work :
Pass traffic between the local and peer gateway.
Go to > to monitor the tunnel status.
See view VPN Tunnels .