How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (2024)

  • Last updated on

The Barracuda CloudGen Firewall can establish IPsec VPN tunnels to any standard-compliant, third-party IKEv1 IPsec VPN gateway. The Site-to-Site IPsec VPN tunnel must be configured with identical settings on both the CloudGen Firewall and the third-party IPsec gateway. The Barracuda CloudGen Firewall supports authentication with a shared passphrase as well as X.509 certificate-based (CA-signed as well as self-signed) authentication. To allow traffic into the VPN tunnel, an access rule is required.

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (1)

Before You Begin

  • If you are using a dynamic WAN IP address, go to CONFIGURATION > Configuration Tree> Box > Assigned Services > VPN-Service > VPN Settings. In the left navigation bar, clickIPSec. EnableUse IPSec dynamic IPs. Click Send ChangesandActivate. This will create an IPsec VPN listener on 0.0.0.0/0.
  • If no already present, configure theDefault Server CertificateinCONFIGURATION > Configuration Tree> Box > Assigned Services > VPN-Service > VPN Settings. For more information, seeVPN Settings

Step 1. Configure the VPN Service Listeners

Configure the IPv4 and IPv6 listener addresses for the VPN service.

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Service Properties.
  2. Click Lock.
  3. From the Service Availability list, select the source for the IPv4 listeners of the VPN service.

  4. Click + to add an entry to the Explicit IPv6 Service IPs.
  5. Select an IPv6 listener from the list of configured explicit IPv6 service IP addresses.
    How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (2)
  6. Click Send Changes andActivate.

Step 2. Create an IKEv1 IPsec Tunnel on the CloudGen Firewall

  1. Go to CONFIGURATION > Configuration Tree > Box > Assigned Services > VPN-Service > Site to Site.
  2. Click the IPSEC IKEv1 Tunnels tab.
  3. Click Lock.
  4. Right-click the table and select New IPSec IKEv1 tunnel. The IPsec Tunnel window opens.
  5. Enter a Name for the tunnel.
  6. (IPv6 only) If IPv6 addresses are used, click the IPv6 check box.
    How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (3)
  7. Select the Phase 1 settings:
    • Encryption – Select the encryption algorithm: AES,AES256, 3DES,CAST,Blowfish or DES.
    • Authentication – Select the hashing algorithm: MD5, SHA, SHA256, or SHA512.
    • DH-Group – Select the Diffie-Hellman Group. The Barracuda CloudGen Firewall supports Group1 to Group 18.
    • Lifetime [sec] Enter the phase 1 lifetime in seconds. Default: 28800
    • Min. Lifetime [sec] – Enter the phase 1 minimum lifetime in seconds. Default: 25200
    • Max. Lifetime [sec] Enter the phase 1 maximum lifetime in seconds. Default: 32400

  8. Select the Phase 2 settings:
    • Encryption – Select the encryption algorithm: AES,AES256, 3DES,CAST,Blowfish, DES, or Null.
    • Authentication – Select the hashing algorithm: MD5, SHA, SHA256, or SHA512.
    • DH-Group – Select the Diffie-Hellman Group. The Barracuda CloudGen Firewall supports Group1 to Group 18.
    • Lifetime [sec] Enter the phase 1 lifetime in seconds. Default: 3600
    • Min. Lifetime [sec] – Enter the phase 1 minimum lifetime in seconds. Default: 1200
    • Max. Lifetime [sec] Enter the phase 1 maximum lifetime in seconds. Default: 4800

    • Enable Perfect Forward Secrecy – Enable if the remote VPN gateway supports perfect forward secrecy (PFS).
    How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (4)
  9. Click the Local Networks tab and configure the following settings:
    • Initiates Tunnel – Select Yes (active IKE) for the Barracuda CloudGen Firewall to initiate the VPN Tunnel.
    • Local IKE Gateway – Enter the IPv4 or IPv6 address the VPN service is listening on. If you are using a dynamic WAN IP address, enter 0.0.0.0 , or ::0.

    • ID-type – Select the IPsec ID-type. For more information, see IPsec IKEv1 Tunnel Settings.
    • Network Address – Add the local networks you want to reach through the VPN tunnel, and click Add.
    How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (5)
  10. Click the Remote Networks tab, and configure the following settings:
    • Remote IKE Gateway
      You have two options to configure the remote IKE Gateway:
      • Main mode – Enter the hostname. If the remote appliance is using dynamic IP addresses, the hostname will be periodically resolved and the last dynamic assigned IP address of the remote gateway will be used.
      • Aggressive mode – Enter the IPv4 or IPv6 address the third-party appliance is listening on. If the remote appliance is using dynamic IP addresses, you can also enter0.0.0.0/0 or ::0/0. In this case, you must use aggressive mode.
    • ID-type – Select the IPsec ID-type. For more information, see IPsec IKEv1 Tunnel Settings.
    • Network Address – Add the IP address of the remote network,and enable Advertise Route if you want to propagate it via RIP, OSPF, or BGP. (e.g., 10.0.81.0/24). Enter the address and then click Add.
    How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (6)
  11. Click the Peer Identification tab, and enter the shared passphrase in the Shared Secret field. The passphrase may containany printable ASCII characters except the hash (#) sign.
    How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (7)
  12. If the remote IPsec gateway does not support Dead Peer Detection (DPD), disable it:
    1. Click the Advanced tab.
    2. In the DPD interval (s) field, enter 0
  13. Switch to aggressive mode if the remote IP address is unknown and you are using a Shared Secret to authenticate.
    1. Click the Identity tab.
    2. From the Mode list, select Aggressive
    3. Enter the Aggressive-ID.
  14. Click OK.
  15. Click Send Changes and Activate.

Step 3. Create an IPsec Tunnel on the Remote Appliance

C onfigure the remote CloudGen Firewall or third-party appliance as passive tunnel partner. The remote VPN gateway must be configured with the same encryption settings. Only the local and remote networks and the IP address for the remote VPN gateway must be mirrored.

Step 4. Create Access Rules for VPN Traffic

To allow traffic in and out of the VPN tunnel, create a PASS access rule on the CloudGen Firewall. For more information, see How to Create Access Rules for Site-to-Site VPN Access.

Monitoring a VPN Site-to-Site Tunnel

To verify that the VPN tunnel was initiated successfully and traffic is flowing, go to VPN-Service > Site-to-SiteorVPN-Service > Status.

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (8)

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (9)

Troubleshooting

  • Ping a host in the remote network. If the network host is unavailable, attempt to ping the IP address of the remote IPsec gateway.
  • Go to the FIREWALL > Live page and ensure that network traffic is matching the access rule created in Step 3.

Most of the IPsec implementations represent a single IP address as a network address in combination with a subnet mask (255.255.255.255). The IKE protocol is difficult to debug. Therefore, Barracuda CloudGen Admin displays a warning message if IPsec networks contain single IP addresses. If the IPsec connection cannot be established and the error no compatible proposals chosen is displayed,

  • Verify that the IPsec settings on both IPsec peers match. (encryption, hash method, etc...).
  • If you are using single IP addresses as the local or remote network, try to use network addresses (using netmask 255.255.255.252) for the local and remote network settings. If the tunnel can be be established, the third-party IPsec implementation most likely is not compatible with the use of single IP addresses. In this case, use a larger network as the remote and local network.

Checklist for Connecting to Third-party IPsec VPN Gateways

  • Tunnel partners must be active at one end and passive at the other end.
  • Phase 1 and Phase 2 settings must be identical on both VPN gateways.
  • Do not use identical or overlapping remote networks when using multiple IPSec tunnels because the remote network is used for authentication.

When creating IPsec tunnels between CloudGen Firewall and third-party gateways, consider the following:

  • Phase 1 and Phase 2 settings must match the requirements of the remote peer.
  • Configure lifetimes, also known astunnel rekeying times, in seconds and not as KB-values.
  • The Phase 1 and Phase 2 lifetime must be different.
  • Only use Dead Peer Detection if the remote VPN gateway also supports this feature.
  • Supernetting is not supported
  • Do not use IPsec-SA bundling.

I am a seasoned expert in network security, specializing in VPN technologies, with a wealth of hands-on experience in configuring and managing VPN solutions. My expertise extends to products like the Barracuda CloudGen Firewall, and I have an in-depth understanding of the concepts and protocols involved in IPsec VPNs.

The information provided in the article outlines the configuration steps for establishing a Site-to-Site IPsec VPN tunnel using the Barracuda CloudGen Firewall. Let's break down the key concepts discussed:

  1. IPsec VPN Tunnels:

    • The Barracuda CloudGen Firewall can establish IPsec VPN tunnels to standard-compliant, third-party IKEv1 IPsec VPN gateways.
    • Site-to-Site IPsec VPN tunnels require identical settings on both the CloudGen Firewall and the third-party IPsec gateway.
  2. Authentication Methods:

    • The Barracuda CloudGen Firewall supports authentication using a shared passphrase and X.509 certificate-based authentication (CA-signed or self-signed).
  3. Access Rule for VPN Traffic:

    • An access rule is required to allow traffic into the VPN tunnel.
  4. Dynamic WAN IP Address Configuration:

    • If using a dynamic WAN IP address, there are steps to enable IPSec dynamic IPs.
  5. VPN Service Listeners Configuration:

    • Configuration of IPv4 and IPv6 listener addresses for the VPN service.
  6. IKEv1 IPsec Tunnel Configuration:

    • Configuration of Phase 1 and Phase 2 settings, including encryption algorithms, authentication methods, Diffie-Hellman Groups, and lifetimes.
    • Perfect Forward Secrecy (PFS) can be enabled if supported by the remote VPN gateway.
    • Configuration of local and remote networks, as well as shared passphrase and Dead Peer Detection (DPD).
  7. Remote Appliance Configuration:

    • Steps to configure the remote CloudGen Firewall or third-party appliance as a passive tunnel partner with matching encryption settings.
  8. Access Rules for VPN Traffic:

    • Creation of access rules to permit traffic in and out of the VPN tunnel.
  9. Monitoring and Troubleshooting:

    • Verification of the VPN tunnel initiation and traffic flow.
    • Troubleshooting steps, including ping tests and monitoring network traffic.
  10. Checklist for Connecting to Third-party IPsec VPN Gateways:

    • Guidelines for ensuring compatibility and successful connection with third-party IPsec VPN gateways, covering aspects like identical Phase 1 and Phase 2 settings, non-overlapping remote networks, and configuration of lifetimes.

This comprehensive guide demonstrates a thorough understanding of configuring IPsec VPN tunnels using the Barracuda CloudGen Firewall and provides valuable insights into troubleshooting and best practices for connecting to third-party gateways.

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel (2024)

FAQs

How to configure site-to-site IPsec VPN? ›

Configure IPSec VPN Tunnels (Site-to-Site)
  1. Create a Security Policy Rule.
  2. Track Rules Within a Rulebase.
  3. Enforce Security Rule Description, Tag, and Audit Comment.
  4. Move or Clone a Security Rule or Object to a Different Virtual System.
  5. Test Security Rules.

How to configure IKEv2 IPsec VPN? ›

Go to Settings -> Network & internet -> VPN, then tap the "+" button. Enter a name for the VPN profile. Select IKEv2/IPSec RSA from the Type drop-down menu. Enter Your VPN Server IP (or DNS name) in the Server address field.

When configuring IKEv1 for a site-to-site VPN which of the following are differences between main mode and aggressive mode? ›

IKEv1 aggressive mode only requires three messages to establish the security association. It's quicker than main mode since it adds all the information required for the DH exchange in the first two messages. Main mode is considered more secure since identification is encrypted, aggressive mode does this in clear-text.

How to create a site-to-site VPN tunnel? ›

For more information, see Tunnel options for your Site-to-Site VPN connection.
  1. Step 1: Create a customer gateway. ...
  2. Step 2: Create a target gateway. ...
  3. Step 3: Configure routing. ...
  4. Step 4: Update your security group. ...
  5. Step 5: Create a VPN connection. ...
  6. Step 6: Download the configuration file.

How to configure site-to-site IKEv2 IPsec VPN using pre shared key authentication? ›

Add an IPsec connection
  1. Go to Site-to-site VPN > IPsec and click Add.
  2. Select IPv4.
  3. Select Create firewall rule.
  4. Set Connection type to Site-to-site.
  5. Set Gateway type to Initiate the connection.
  6. Set Profile to Branch office (IKEv2).
  7. Set Authentication type to Preshared key.
Mar 14, 2024

What is the difference between IKEv1 and IKEv2? ›

IKEv2 provides the following benefits over IKEv1: IKEv2 mode is considered to be more secure,reliable and faster. In IKEv2 Tunnel endpoints exchange fewer messages to establish a tunnel. IKEv2 uses four messages; IKEv1 uses either six messages (in the main mode) or three messages (in aggressive mode).

Is IKEv2 the same as IPsec? ›

IPSec / IKEv2

Internet key exchange version 2 (IKEv2) is often used in combination with Internet Protocol Security (IPSec). IKEv2 forges a secure tunnel connecting the user to the VPN server, while IPSec provides the encryption and authentication.

What ports are needed for IKEv2 IPsec? ›

What port is IKEv2? IKEv2 uses UDP port 500 for the initial key exchange and port 4500 for communication.

How to configure VPN tunneling? ›

  1. Overview.
  2. Step 1: Create a VPN Gateway.
  3. Step 2: Create a Customer Gateway.
  4. Step 3: Create a VPN Tunnel.
  5. Step 4: Load the Configuration of the Local Gateway.
  6. Step 5: Configure a Routing Table.
  7. Step 6: Activate a VPN Tunnel.
Jan 9, 2024

What is IKEv1 VPN? ›

IKEv1 and IKEv2 are two versions of the IKE protocol that have different ways of implementing the two phases. IKEv1 uses two modes for phase 1: main mode and aggressive mode. Main mode has six messages, three from each peer, and provides more security and privacy.

What are the authentication methods for IKEv1? ›

IKEv1 supports several types of authentication: preshared keys, certificates, RSA encrypted nonces (don't ask). And, in IKEv1, both sides must authenticate themselves (unlike, say, TLS, where the server must authenticate itself, but the client may be anonymous).

Which solution allows you to create a site to site VPN tunnel? ›

Site-to-site VPN Protocols

GRE (Generic Routing Encapsulation) is sometimes used with IPsec for creating tunnels, although GRE by itself does not provide encryption. OpenVPN is also capable of creating secure point-to-point connections in routed or bridged configurations.

What is site to site IPsec VPN tunnel? ›

A site-to-site Virtual Private Network (VPN) provides this by creating an encrypted link between VPN gateways located at each of these sites. A site-to-site VPN tunnel encrypts traffic at one end and sends it to the other site over the public Internet where it is decrypted and routed on to its destination.

What is the difference between site to site VPN and VPN tunnel? ›

A site-to-site VPN does not provide additional security to the networks that it connects; the secure tunnel it establishes just protects data in transit between two or more networks.

Is IPSec a site-to-site VPN? ›

IPsec VPN securely interconnects entire networks (site-to-site VPN) OR remote users with a particular protected area such as a local network, application, or the cloud.

What ports for IPSec VPN site-to-site? ›

IPSec VPN. IPSec VPN is a layer 3 protocol that communicates over IP protocol 50, Encapsulating Security Payload (ESP). It might also require UDP port 500 for Internet Key Exchange (IKE) to manage encryption keys, and UDP port 4500 for IPSec NAT-Traversal (NAT-T).

Top Articles
Free 70% Rule Calculator | Landlord Studio
5 Tips to Run Your Best 5K
Dunhams Treestands
7 Verification of Employment Letter Templates - HR University
Brgeneral Patient Portal
83600 Block Of 11Th Street East Palmdale Ca
Where's The Nearest Wendy's
Tamilblasters 2023
Crusader Kings 3 Workshop
Industry Talk: Im Gespräch mit den Machern von Magicseaweed
The Banshees Of Inisherin Showtimes Near Regal Thornton Place
Conan Exiles Thrall Master Build: Best Attributes, Armor, Skills, More
N2O4 Lewis Structure & Characteristics (13 Complete Facts)
Download Center | Habasit
Parent Resources - Padua Franciscan High School
Plan Z - Nazi Shipbuilding Plans
Walgreens Alma School And Dynamite
Kaitlyn Katsaros Forum
St Clair County Mi Mugshots
Jeffers Funeral Home Obituaries Greeneville Tennessee
Plost Dental
Synergy Grand Rapids Public Schools
Tuw Academic Calendar
Cable Cove Whale Watching
Motorcycle Blue Book Value Honda
Craigslist Boerne Tx
Deepwoken: Best Attunement Tier List - Item Level Gaming
A Grade Ahead Reviews the Book vs. The Movie: Cloudy with a Chance of Meatballs - A Grade Ahead Blog
First Light Tomorrow Morning
Pokemmo Level Caps
Beaver Saddle Ark
How does paysafecard work? The only guide you need
Weekly Math Review Q4 3
Waffle House Gift Card Cvs
Ewwwww Gif
Radical Red Doc
Empire Visionworks The Crossings Clifton Park Photos
Myfxbook Historical Data
Bbc Gahuzamiryango Live
One Main Branch Locator
Shane Gillis’s Fall and Rise
Three V Plymouth
Tgirls Philly
Joey Gentile Lpsg
Pink Runtz Strain, The Ultimate Guide
Sour OG is a chill recreational strain -- just have healthy snacks nearby (cannabis review)
What to Do at The 2024 Charlotte International Arts Festival | Queen City Nerve
Phmc.myloancare.com
Dragon Ball Super Card Game Announces Next Set: Realm Of The Gods
Minecraft: Piglin Trade List (What Can You Get & How)
Where To Find Mega Ring In Pokemon Radical Red
Cbs Scores Mlb
Latest Posts
Article information

Author: Kelle Weber

Last Updated:

Views: 6196

Rating: 4.2 / 5 (73 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Kelle Weber

Birthday: 2000-08-05

Address: 6796 Juan Square, Markfort, MN 58988

Phone: +8215934114615

Job: Hospitality Director

Hobby: tabletop games, Foreign language learning, Leather crafting, Horseback riding, Swimming, Knapping, Handball

Introduction: My name is Kelle Weber, I am a magnificent, enchanting, fair, joyous, light, determined, joyous person who loves writing and wants to share my knowledge and understanding with you.