IPsec Server Setup

This is the setup for the AZTCO-FW side of the connection

Mobile Clients

  • Navigate to VPN > IPsec, Mobile Clients tab
  • Check Enable IPsec Mobile Client Support
  • Check Provide a virtual IP address to clients
  • Enter an unused subnet in the box, pick a subnet mask
  • Set any other desired options here
  • Click Save
  • Click Apply Changes
  • Click Create Phase1 (if it appears)

Phase 1 settings

  • Navigate to VPN > IPsec
  • Locate the Mobile Phase 1 in the list
  • Click   to edit the Mobile Phase 1
  • Enter the following settings:
    • Authentication method: Mutual PSK + Xauth
    • Negotiation mode: aggressive
    • My identifier:
    • My IP address
    • Peer identfier: User Distinguished Name, [email protected]
    • Pre-Shared Key: aaabbbccc (Use something much longer and more random!)
    • Policy Generation: Unique
    • Proposal Checking: Strict
    • Encryption Algorithm: AES 128
    • Hash Algorithm: SHA1
    • DH Key Group: 2
    • Lifetime: 86400
    • NAT Traversal: Force
    • Click Save

Phase 2 settings

  • Click  inside the Mobile Phase 1 to expand its Phase 2 list.
  • Click   to add a new Phase 2
    • Enter the following settings:
    • Mode: Tunnel
    • Local Network: (the local network, e.g. LAN, or 0.0.0.0/0 to send everything over VPN)
    • Protocol: ESP
    • Encryption Algorithms: AES 128 only
    • Hash Algorithms: SHA1 only
    • PFS key group: off
    • Lifetime: 28800
  • Add additional phase 2 entries for additional local networks if necessary
  • Click Save
  • Click Apply Changes

User Settings

  • Navigate to System > User Manager
  • Add a user, grant the user the User – VPN – IPsec xauth Dialin permission, or add them to a group with this permission.

Note that for xauth, the password used is the password for the user, not the “IPsec Pre-Shared Key” field. That is used for non-xauth IPsec.

Firewall Rules

Don’t forget to add firewall rules to pass traffic from clients

•    Firewall > Rules, IPsec tab
  • Add rules that match the traffic that should be allowed, or add a rule to pass any protocol/any source/any destination to allow everything.

IPsec SA Preference

  • System > Advanced, Miscellaneous tab.
  • Uncheck Prefer Old IPsec SA