On AZTCO-FW

Begin by enabling IPsec.

  • Navigate to VPN > IPsecCheck
  • Enable IPsec
  • Click Save

Now, create a phase 1 entry.

Do not click  on this page to create a phase 1 entry. That button will not go the page needed to create a phase 1 for mobile clients but will go to a page to create a phase 1 for lan-to-lan-tunneling instead.

Navigate to the Mobile clients tab. Check Enable IPsec Mobile Client Support

Tell the client about available services. The more items entered here, the less clients have to enter manually. Enter the following values.

KeyValueRemark
IKE Exten- sionschecked 
User Au- thenti- cationsystem 
Group Au- thenti- cationsystem 
Virtual Ad- dress Poolchecked,            network: 192.168.79.0/24Enter a network here that is not in use in the LAN and preferably not in any clients’ LAN either. It can be any subnet, but don’t pick a commonly used one (e.g. don’t use 192.168.0.0/24 or 192.168.1.0/24). It will confuse the clients.
Net- work Listchecked 
Save Xauth Pass- worduncheckedCheck if using xauth and the clients should be able to save passwords locally.
DNS De- fault Do- mainCheck to supply a de- fault DNS domain for hostname resolution by clientsOptional but if a domain is present (such as Active Directory) clients will be able to resolve servers faster.
DNS ServersCheck if clients must get DNS over IPsecIf Active Directory is used, enter its DNS servers here. If it’s a home network, the IP address of the firewall, Google public DNS, OpenDNS, or any other DNS server reachable via the VPN may be used.
WINS ServersCheck if WINS is in useSuperfluous if also providing DNS but may be needed for some older domain configurations.
Phase2 PFS Groupchecked, group 2Not necessary to set here, as it may be set in the Phase 2 of the mobile IPsec tunnel settings
Login BannerOptionalClient software which honors the login banner will present this text to the user upon login. May be needed to display some legal information or any other welcome message.

When finished, click Save, then click Apply Changes.

After saving, a warning will appear Support for IPsec Mobile clients is enabled but a Phase1 definition was not found. Please click Create to define one.

Click the Create Phase1 button.

Clicking the button will load the appropriate page to create a Phase 1 for mobile clients. On the VPN: IPsec: Edit Phase 1: Mobile Client page, enter the following values:

KeyValueRemark
Disablednot checked 
InterfaceWAN 
DescriptionMobile ClientsThis can be anything, name it something appropriate.
Authentication methodMutual PSK 
Negotiation modeaggressive 
My identifierMy IP address 
Policy GenerationUniqueMight prevent traffic to the LAN if set to something else.
Proposal CheckingStrict 
Encryption algorithmAES, 256 bitsChoose any, but keep it identical on router and client.
Hash algorithmSHA1 
DH key group2 
Lifetime3600 
NAT TraversalForceMight prevent traffic to the LAN if set to something else.
Dead Peer Detectionnot checked 

Click Save.

A warning will appear: The IPsec tunnel configuration has been changed. Apply the changes for them to take effect.

Click Apply changes.

The notice for The changes have been applied successfully. may be ignored. The neurotics among us may click the

Close button but that’s optional.

With phase 1 created, we can create a phase 2.

Click  to list the Phase 2 entries under the newly created Phase 1.

Surprise! There aren’t any. Create one by clicking +  in the Phase 2 list.

This will open the VPN: IPsec: Edit Phase 2: Mobile Client page.

On the VPN: IPsec: Edit Phase 2: Mobile Client page, enter these values:

On the VPN: IPsec: Edit Phase 2: Mobile Client page, enter these values:

KeyValueRemark
Disablednot checked 
ModeTunnel 
Local workNet-LAN subnet
DescriptionPhase   2  for road warriorsEnter something appropriate.
ProtocolESP 
Encryption algorithmsselect 3DESonlyThe best is chosen at handshake time. Others will probably work too. 3DES works for me because I have a mobile application that will work only with this.
Hash rithmsalgo-Select SHA1 and MD5
PFS groupkeySet to Group 2
Lifetime3600 
Automati- cally      ping hostleave empty 

Click Save, then click Apply changes.

We’re almost done here. We need to create user accounts so someone can actually use the tunnel.

Navigate to VPN > IPsec, Pre-shared keys tab. (Screenshots may look a bit different because in-use keys have been redacted.)

There are different ways to set up pre-shared keys for users.

Click +  to create a new Pre-Shared Key.

For identifiers, e-mail addresses are commonly used as they are more unique than first or last names. Any identifier may be used so long as it is unique to the person using the account. We recommend using e-mail address format  identifiers. They don’t really need to exist, they are only used for IPsec identification.

Generate a long/random Pre-Shared Key. There are many utilities to generate random data, such as Lastpass, KeyPass, or online sites such as https://www.grc.com/passwords.htm. (Use the string in the middle: 63 random printable ASCII characters). Offline tools are preferred.

Press Save, wait for the page to load, note that the key is now in the list and press Apply changes.

Congratulations, the firewall configuration is complete