To use this guide you need to be familiar with your computer’s
operating system. If you have questions about navigating in your
computer’s environment, please refer to your system user manual.
The following conventions are used in this guide.
ConventionIndication
Bold typeMenu commands, dialog box options, Web page
options, Web page names. For example: “On the
System Information page, select Disabled.”
NOTEImportant information, a helpful tip or additional
instructions.
iiMUVPN Client
Page 3
Notice to Users
Information in this guide is subject to change without notice. Companies, names, and data
used in examples herein are fictitious unless otherwise noted. No part of this guide may be
reproduced or transmitted in any form or by any means, electronic or mechanical, for any
purpose, without the express written permission of WatchGuard Technologies, Inc.
Microsoft®, Internet Explorer®, Windows® 95, Windows® 98, Windows NT® and
Windows® 2000 are either registered trademarks or trademarks of Microsoft Corporation
in the United States and/or other countries.
Netscape and Netscape Navigator are registered trademarks of Netscape Communications
Corporation in the United States and other countries.
RealNetworks, RealAudio, and RealVideo are either a registered trademark or trademark of
RealNetworks, Inc. in the United States and/or other countries.
Java and all Jave-based marks are trademarks or registered trademarks of Sun
Microsystems, Inc. in the United States and other countries. All right reserved.
1. Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.
MUVPN Clients Guideiii
Page 4
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the
following acknowledgment: "This product includes software developed by the OpenSSL
Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"
4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or
promote products derived from this software without prior written permission. For written
permission, please contact openssl-core@openssl.org.
5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL"
appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This
product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit
(http://www.openssl.org/)"
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL
PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com). This product includes software written by Tim
Hudson (tjh@cryptsoft.com).
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the copyright notice, this list of conditions and
the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the
following acknowledgement: "This product includes cryptographic software written by Eric
Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the routines from the
library being used are not cryptographic related :-).
4. If you include any Windows specific code (or a derivative thereof) from the apps directory
(application code) you must include an acknowledgement: "This product includes software
written by Tim Hudson (tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The licence and distribution terms for any publicly available version or derivative of this
code cannot be changed. i.e. this code cannot simply be copied and put under another
distribution licence [including the GNU Public Licence.]
The mod_ssl package falls under the Open-Source Software label because it's distributed
under a BSD-style license. The detailed license information follows.
Copyright (c) 1998-2001 Ralf S. Engelschall. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the
following acknowledgment:
MUVPN Clients Guidev
Page 6
"This product includes software developed by Ralf S. Engelschall <rse@engelschall.com>
for use in the mod_ssl project (http://www.modssl.org/)."
4. The names "mod_ssl" must not be used to endorse or promote products derived from this
software without prior written permission. For written permission, please contact
rse@engelschall.com.
5. Products derived from this software may not be called "mod_ssl" nor may "mod_ssl"
appear in their names without prior written permission of Ralf S. Engelschall.
6. Redistributions of any form whatsoever must retain the following acknowledgment: "This
product includes software developed by Ralf S. Engelschall <rse@engelschall.com> for use
in the mod_ssl project (http://www.modssl.org/)."
THIS SOFTWARE IS PROVIDED BY RALF S. ENGELSCHALL ``AS IS'' AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL RALF S.
ENGELSCHALL OR HIS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
The Apache Software License, Version 1.1
Copyright (c) 2000 The Apache Software Foundation. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are
permitted provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of
conditions and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. The end-user documentation included with the redistribution, if any, must include the
following acknowledgment:
"This product includes software developed by the Apache Software Foundation (http://
www.apache.org/)." Alternately, this acknowledgment may appear in the software itself, if
and wherever such third-party acknowledgments normally appear.
4. The names "Apache" and "Apache Software Foundation" must not be used to endorse or
promote products derived from this software without prior written permission. For written
permission, please contact apache@apache.org.
viMUVPN Client
Page 7
5. Products derived from this software may not be called "Apache", nor may "Apache" appear
in their name, without prior written permission of the Apache Software Foundation.
THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR
ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF
THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
This software consists of voluntary contributions made by many individuals on behalf of the
Apache Software Foundation. For more information on the Apache Software Foundation,
please see <http://www.apache.org/>.
Portions of this software are based upon public domain software originally written at the
National Center for Supercomputing Applications, University of Illinois, Urbana-Champaign
All other trademarks or trade names mentioned herein, if any, are the property of their
respective owners.
Part No
MUVPN Clients Guidevii
Page 8
viiiMUVPN Client
Page 9
Contents
CHAPTER 1 Configure the SOHO 6.............................. 1
Redeem your SOHO 6 Upgrade Options.......................... 2
Configure the SOHO 6 for MUVPN Clients........................ 3
CHAPTER 2 Preparation, Installation, and Connection7
Prepare the Remote Computers....................................... 7
Install the MUVPN Client................................................ 19
Connect and Disconnect the MUVPN Client.................... 27
Monitor the MUVPN Client Connection........................... 31
System requirements..................................................... 8
Windows 98/ME operating system setup........................... 8
Windows NT operating system setup.............................. 11
Windows 2000 operating system setup........................... 13
Windows XP operating system setup.............................. 16
Configuring the MUVPN Client...................................... 21
Uninstall the MUVPN client........................................... 25
Connecting the MUVPN Client...................................... 27
The Mobile User VPN client icon.................................... 27
Allowing the MUVPN client through the personal firewall.... 29
Disconnecting the MUVPN client................................... 30
The Log Viewer.......................................................... 31
MUVPN Client Guideix
Page 10
The Connection Monitor...............................................31
CHAPTER 3 The ZoneAlarm Personal Firewall...........33
Copyright and Patent Information................................... 59
xMUVPN Client
Page 11
CHAPTER 1Configure the SOHO 6
This guide applies to both the SOHO 6TM and the SOHO 6tcTM–the name
SOHO 6 is used to refer to both these devices throughout the guide. The
only difference between them is the ability to create and use a Virtual
Private Network (VPN) other than the MUVPN client. This VPN option
can be added to the SOHO 6, while the SOHO 6tc comes with the VPN
option already installed and is used to create a Branch Office VPN tunnel
between two IPSec compliant devices allowing data from an entire
network rather than a single remote user.
This chapter describes how to configure a SOHO 6 for use with the
Watch Guard
® Mobile User VPN (MUVPN)™ client.
Redeem your SOHO 6 Upgrade Options
When you purchase a SOHO 6, the software for all upgrade options is
provided with the unit regardless of whether you have actually
purchased any of those options. The Feature Key that enables these
software options is stored within the SOHO 6. Once you purchase an
upgrade option and redeem it at the LiveSecurity Service Web site, you
will receive a Feature Key, which you can then copy and paste into a
SOHO 6 configuration page, to activate the software upgrade.
MUVPN Client Guide1
Page 12
CHAPTER 1: Configure the SOHO 6
For information on registering your SOHO 6 with the LiveSecurity
Service, see “Register your SOHO 6 and Activate the LiveSecurity
Service” in the WatchGuard Firebox SOHO 6 User Guide.
Follow these steps to redeem your upgrade option license key:
1With your Web browser, go to:
2Click the LiveSecurity link at the top of the page and log into the site.
3Follow the instructions provided on the site to redeem your upgrade
license key.
4Copy the Feature Key displayed at the LiveSecurity Service Web site.
5With your Web browser, go to the System Status page using the
Trusted IP address of the SOHO 6.
For example, if using the default IP address, go to: http://192.168.111.1
6From the navigation bar on the left side, select Administration =>
Upgrade.
The Upgrade page appears.
http://www.watchguard.com/upgrade
7Paste the Feature Key in the appropriate field.
8Click Submit.
2MUVPN Client
Page 13
Configure the SOHO 6 for MUVPN Clients
Configure the SOHO 6 for MUVPN Clients
Flow these steps to configure your SOHO 6:
1With your Web browser, go to the System Status page using the
Trusted IP address of the SOHO 6.
For example, if using the default IP address, go to: http://192.168.111.1
2From the navigation bar on the right side, select VPN => MUVPN
Clients.
The MUVPN Clients page appears.
3Click the Add button.
The Add MUVPN Client page appears.
MUVPN Client Guide3
Page 14
CHAPTER 1: Configure the SOHO 6
4Enter a Username in the appropriate field.
This Username will be used as the E-mail Address when setting up the MUVPN
client. In our example, Helmdog.
5Enter a Passphrase in the appropriate field.
This passphrase will be used as the Pre-Shared Key when setting up the MUVPN
client. In our example, pL4n3phr34k
6Enter the Virtual IP address which will be used by the MUVPN
computer when connecting to the SOHO 6 in the appropriate field.
In our example, 192.168.111.4.
7Select the Authentication Algorithm.
In our example, SHA1-HMAC.
8Select the Encryption Algorithm.
In our example, 3DECS-CBC.
9Click the Submit button.
4MUVPN Client
Page 15
CHAPTER 2Preparation, Installation, and
Connection
Watch Guard® Mobile User VPN (MUVPN)™ client uses Internet Protocol
Security (IPSec) to establish a secure connection over an unsecured
network from a remote computer to your protected network.
For example, the MUVPN client is installed on an employee’s computer,
on the road or working from home. The employee establishes a standard
Internet connection and activates the MUVPN client. The MUVPN client
then creates an encrypted tunnel to your trusted network, protected
behind a SOHO 6. The MUVPN client allows you to provide remote
access to your internal networks without compromising security.
®
ZoneAlarm
optional feature with the MUVPN client to provide further security for
your end users.
, a personal firewall software application, is included as an
The purpose of this guide is to assist users of the SOHO 6 to set up the
MUVPN client on an end-user’s remote computer and to explain the
features of the personal firewall.
MUVPN Client Guide7
Page 16
CHAPTER 2: Preparation, Installation, and Connection
Prepare the Remote Computers
The MUVPN client is only compatible with the Windows operating
system. Every Windows system used as a MUVPN remote computer must
have the following system requirements.
System requirements
•PC-compatible computer with Pentium processor or equivalent
•Compatible operating systems and minimum RAM:
- Microsoft Windows 98: 32 MB
- Microsoft Windows ME: 64 MB
- Microsoft Windows NT 4.0 Workstation: 32 MB
- Microsoft Windows 2000 Professional: 64 MB
- Microsoft Windows XP: 64 MB
•The latest service packs for each operating system are recommended,
but not necessarily required.
•10 MB hard disk space
•Native Microsoft TCP/IP communications protocol
•Microsoft Internet Explorer 5.0 or later
•An Internet Service Provider account
•A Dial-Up or Broadband (DSL or Cable modem) Connection
Additionally, in order for Windows file and print sharing to occur
through the MUVPN client tunnel each Windows operating system must
have the proper components installed and configured to use the remote
WINS and DNS servers on the trusted and optional networks behind the
Firebox.
N
OTE
However, if you plan to use the MUVPN client virtual adapter, the WINS
not
and DNS settings are
on the Firebox.
8MUVPN Client
configured on the client computers, but rather
Page 17
Windows 98/ME operating system setup
The following networking components must be configured and installed
on a remote computer running Windows 98/ME in order for the MUVPN
client to function properly.
Configuring networking names
From the Windows desktop:
1Select Start => Settings => Control Panel. Double-click the Network
icon.
The Network window appears.
2Verify that the Client for Microsoft Networks is installed.
If Client for Microsoft Networks is not installed, you
instructions, see the following section, “Installing the Client for Microsoft
Networks”.
3Click the Identification tab.
4Enter a name for the remote computer.
This
must
be a unique name on the remote network.
5Enter the domain name you are connecting to.
This should be the same as the Logon to Windows NT domain value.
6Enter a description for your computer (optional).
7Click OK. Click OK to close and save changes to the Network control
panel.
Click Cancel if you do not want to save any changes.
8Reboot the machine.
Prepare the Remote Computers
must
install it. For
Installing the Client for Microsoft Networks
From the Networks window:
1Click the Configuration tab. Click Add.
The Select Network Component Type window appears.
2Select Client. Click Add.
The Select Network Client window appears.
3Select Microsoft from the list on the left. Select Client for Microsoft
Networks from the list on the right. Click OK.
4Select Client for Microsoft Networks.
5Click Properties.
6Enable the Log on to Windows NT domain option.
MUVPN Client Guide9
Page 18
CHAPTER 2: Preparation, Installation, and Connection
7In the Windows NT Domain field, type the domain name.
For example, your domains might be sales, office, and warehouse.
8Enable the Logon and Restore Network Connections option.
Installing Dial-Up Networking
The Mobile User VPN Adapter, which supports L2TP, installs only if Dialup Networking is already installed on your computer. If Dial-up
Networking is not installed, follow these instructions.
From the Windows desktop:
1Select Start => Settings => Control Panel. Double-click the Add/
Remove Programs icon.
The Add/Remove Properties window appears.
2Click the Windows Setup tab.
The Windows Setup dialog box appears and searches for installed components.
3Enable the Communications checkbox and click the OK button.
The Copying Files dialog box appears and copies the necessary files.
4The Dial-Up Networking Setup dialog box appears and prompts you
to restart the computer. Click the OK button.
The computer reboots.
Further, Windows 98 requires that the Dial-up Networking component be
updated with the 1.4 patch. Please see the Microsoft Web site to receive
this free update.
Configuring the WINS and DNS settings
Yo u must configure the remote computer to use the WINS and DNS
servers of the trusted network behind the Firebox only if you do not plan
to use the MUVPN client’s virtual adapter.
From the Windows desktop:
1Select Start => Settings => Control Panel. Double-click the Network
icon.
The Network window appears.
2Select the network component TCP/IP => Dial-Up Adapter, then click
the Properties button.
The TCP/IP Properties Information dialog box appears.
3Click the OK button.
10MUVPN Client
Page 19
Prepare the Remote Computers
4Click the DNS Configuration tab.
Verify that the Enable DNS option has been enabled.
5Under the “DNS Server Search Order” heading, enter your DNS
server IP address, then click the Add button.
If you have multiple remote DNS servers repeat this step.
N
OTE
Yo u
must
list the DNS server on the Private network behind the Firebox
first.
6Click the WINS Configuration tab.
7Verify that the Enable WINS Resolution option has been enabled.
8Under the “WINS Server Search Order” heading, enter your WINS
server IP address, then click the Add button.
If you have multiple remote WINS servers repeat this step.
9Click the OK button to close the TCP/IP Properties window.
10 Click the OK button to close the Network window.
The System Settings Change dialog box appears.
11 Click the Ye s button to restart the computer and implement the
changes.
Windows NT operating system setup
The following networking components must be installed and configured
on a remote computer running Windows NT in order for the MUVPN
client to function properly.
Installing Remote Access Services on Windows NT
The Mobile User VPN Adapter, which supports L2TP, installs only if the
Remote Access Services (RAS) network component is already installed on
the computer.
Follow the Windows desktop:
1Select Start => Settings => Control Panel. Double-click the Network
icon.
2Select the Services tab.
3Click the Add button.
MUVPN Client Guide11
Page 20
CHAPTER 2: Preparation, Installation, and Connection
4Select Remote Access Services from the list, then click the OK button.
5Enter the path to the Windows NT install files or insert your system
installation CD, then click the OK button.
The Remote Access Setup dialog box appears.
6 Click the Ye s button to add a RAS capable device and enable you to
add a modem.
7Click the Add button and complete the Install New Modem wizard.
If there is no modem installed, you can enable the Don't detect my modem;
I will select it from a list checkbox then add a Standard 28800 modem.
Windows NT requires at least one RAS device such as a modem if the
RAS component is installed. If no modems are available, a dial-up
networking, serial cable between two computers can be selected.
8Select the modem added in the last step in the Add RAS Device dialog
box, then click the OK button.
9Click the Continue button, then click the Close button.
10 Reboot your computer.
N
OTE
Configuring the WINS and DNS settings
Yo u must configure the remote computer to use the WINS and DNS
servers of the trusted network behind the Firebox only if you do not plan
to use the MUVPN client’s virtual adapter.
From the Windows desktop:
1Select Start => Settings => Control Panel. Double-click the Network
icon.
The Network window appears.
2Click the Protocols tab.
3Select the TCP/IP protocol and click the Properties button.
The Microsoft TCP/IP Properties window appears.
4Click the DNS tab.
5Click the Add button.
6Enter your DNS server IP address in the appropriate field.
If you have multiple remote DNS servers repeat the previous three steps.
12MUVPN Client
Page 21
N
OTE
Yo u
must
list the DNS server on the Private network behind the Firebox
first.
7Click the WINS Address tab.
8Enter your WINS server IP address in the appropriate field, then click
the OK button.
If you have multiple remote WINS servers repeat this step.
9Click the Close button to close the Network window.
The Network Settings Change dialog box appears.
10 Click the Ye s button to restart the computer and implement the
changes.
Windows 2000 operating system setup
The following networking components must be installed and configured
on a remote computer running Windows 2000 in order for the MUVPN
client to function properly.
From the Windows desktop:
1Select Start => Settings => Network and Dial-up Connections, then
select the Dial-up connection you use to access the Internet.
The connection window appears.
2Click the Properties button.
3Select the Networking tab.
4Verify that the following components are present and enabled:
- Internet Protocol (TCP/IP)
- File and Printer Sharing for Microsoft Networks
- Client for Microsoft Networks
Prepare the Remote Computers
Install these components if they are not already present.
Installing the Internet Protocol (TCP/IP) network component
From the Windows desktop:
1Select Start => Settings => Network and Dial-up Connections, then
select the Dial-up connection you use to access the Internet.
The connection window appears.
MUVPN Client Guide13
Page 22
CHAPTER 2: Preparation, Installation, and Connection
2Click the Properties button.
3Select the Networking tab and then click the Install button.
The Select Network Component Type window appears.
4Double click the Protocol network component.
The Select Network Protocol window appears.
5Select the Internet Protocol (TCP/IP) Network Protocol and then click
the OK button.
Installing the File and Printer Sharing for Microsoft Networks
From the Windows desktop:
1Select Start => Settings => Network and Dial-up Connections, then
select the Dial-up connection you use to access the Internet.
The connection window appears.
2Click the Properties button.
3Select the Networking tab and then click the Install button.
The Select Network Component Type window appears.
4Double click the Services network component.
The Select Network Service window appears.
5Select the File and Printer Sharing for Microsoft Networks Network
Service and then click the OK button.
Installing the Client for Microsoft Networks
From the Windows desktop:
1Select Start => Settings => Network and Dial-up Connections, then
select the Dial-up connection you use to access the Internet.
The connection window appears.
2Click the Properties button.
3Select the Networking tab and then click the Install button.
The Select Network Component Type window appears.
4Double click the Client network component.
The Select Network Protocol window appears.
5Select the Client for Microsoft Networks Network Client and then
click the OK button.
6Click the Cancel button to close the Select Network Component Type
window.
7Click the OK button to preserve the installed components.
14MUVPN Client
Page 23
8Click the Cancel button to close the Dial-up connection window.
Configuring the WINS and DNS settings
Yo u must configure the remote computer to use the WINS and DNS
servers of the trusted network behind the Firebox only if you do not plan
to use the MUVPN client’s virtual adapter.
From the Windows desktop:
1Select Start => Settings => Network and Dial-up Connections, then
select the Dial-up connection you use to access the Internet.
The connection window appears.
2Click the Properties button.
3Click the Networking tab.
4Select the Internet Protocol (TCP/IP) component, then click the
Properties button.
The Internet Protocol (TCP/IP) Properties window appears.
5Click the Advanced button.
The Advanced TCP/IP Settings window appears.
6Click the DNS tab.
7Under the “DNS server addresses, in order of use” heading, click the
Add button.
The TCP/IP DNS Server window appears.
8Enter your DNS server IP address in the appropriate field, then click
the Add button.
If you have multiple remote DNS servers repeat the last two steps.
N
OTE
Yo u
must
list the DNS server on the Private network behind the Firebox
first.
Prepare the Remote Computers
9Enable the Append these DNS suffixes (in order) option.
10 Click the Add button.
The TCP/IP Domain Suffix window appears.
11 Enter your Domain suffix in the appropriate field.
If you have multiple DNS suffixes repeat the last two steps.
12 Click the WINS tab.
MUVPN Client Guide15
Page 24
CHAPTER 2: Preparation, Installation, and Connection
13 Under the “WINS addresses, in order of use” heading, click the Add
button.
The TCP/IP WINS Server window appears.
14 Enter your WINS server IP address in the appropriate field, then click
the Add button.
If you have multiple remote DNS servers repeat the last two steps.
15 Click the OK button to close the Advanced TCP/IP Settings window.
16 Click the OK button to close the Internet Protocol (TCP/IP) Properties
window.
17 Click the OK button to close the next window.
18 Click the Cancel button again to close the Dial-up connection
window.
Windows XP operating system setup
The following networking components must be installed and configured
on a remote computer running Windows XP in order for the MUVPN
client to function properly.
From the Windows desktop:
1Select Start => Control Panel => Network Connections, then select the
connection you use to access the Internet.
The connection window appears.
2Click the Properties button.
3Select the Networking tab.
4Verify that the following components are present and enabled:
- Internet Protocol (TCP/IP)
- File and Printer Sharing for Microsoft Networks
- Client for Microsoft Networks
Install these components if they are not already present.
Installing the Internet Protocol (TCP/IP) Network Component
From the Windows desktop:
1Select Start => Control => Network Connections, then select the
connection you use to access the Internet.
The connection window appears.
16MUVPN Client
Page 25
Prepare the Remote Computers
2Click the Properties button.
3Select the Networking tab and then click the Install button.
The Select Network Component Type window appears.
4Double click the Protocol network component.
The Select Network Protocol window appears.
5Select the Internet Protocol (TCP/IP) Network Protocol and then click
the OK button.
Installing the File and Printer Sharing for Microsoft Networks
From the Windows desktop:
1Select Start => Control => Network Connections, then select the
connection you use to access the Internet.
The connection window appears.
2Click the Properties button.
3Select the Networking tab and then click the Install button.
The Select Network Component Type window appears.
4Double click the Services network component.
The Select Network Service window appears.
5Select the File and Printer Sharing for Microsoft Networks Network
Service and then click the OK button.
Installing the Client for Microsoft Networks
From the Windows desktop:
1Select Start => Control => Network Connections, then select the
connection you use to access the Internet.
The connection window appears.
2Click the Properties button.
3Select the Networking tab and then click the Install button.
The Select Network Component Type window appears.
4Double click the Client network component.
The Select Network Protocol window appears.
5Select the Client for Microsoft Networks Network Client and then
click the OK button.
6Click the Cancel button to close the Select Network Component Type
window.
7Click the OK button to preserve the installed components.
MUVPN Client Guide17
Page 26
CHAPTER 2: Preparation, Installation, and Connection
8Click the Cancel button to close the Dial-up connection window.
Configuring the WINS and DNS settings
Yo u must configure the remote computer to use the WINS and DNS
servers of the trusted network behind the Firebox only if you do not plan
to use the MUVPN client’s virtual adapter.
From the Windows desktop:
1Select Start => Control Panel => Network Connections, then select the
Dial-up connection you use to access the Internet.
The connection window appears.
2Click the Properties button.
3Click the Networking tab.
4Select the Internet Protocol (TCP/IP) component, then click the
Properties button.
The Internet Protocol (TCP/IP) Properties window appears.
5Click the Advanced button.
The Advanced TCP/IP Settings window appears.
6Click the DNS tab.
7Under the “DNS server addresses, in order of use” heading, click the
Add button.
The TCP/IP DNS Server window appears.
8Enter your DNS server IP address in the appropriate field, then click
the Add button.
If you have multiple remote DNS servers repeat the last two steps.
Yo u
must
list the DNS server on the Private network behind the Firebox
first.
N
OTE
9Enable the Append these DNS suffixes (in order) option.
10 Click the Add button.
The TCP/IP Domain Suffix window appears.
11 Enter your Domain suffix in the appropriate field.
If you have multiple DNS suffixes repeat the last two steps.
12 Click the WINS tab.
18MUVPN Client
Page 27
13 Under the “WINS addresses, in order of use” heading, click the Add
button.
The TCP/IP WINS Server window appears.
14 Enter your WINS server IP address in the appropriate field, then click
the Add button.
If you have multiple remote WINS servers repeat the last two steps.
15 Click the OK button to close the Advanced TCP/IP Settings window.
16 Click the OK button to close the Internet Protocol (TCP/IP) Properties
window.
17 Click the OK button to close the next window.
18 Click the Cancel button again to close the Dial-up connection
window.
Install the MUVPN Client
Install the SOHO 6 MUVPN client software on each remote computer.
The MUVPN installation files are available at the WatchGuard Web site:
http://www.watchguard.com/support
Install the MUVPN Client
The installation process consists of two parts: installing the client software
on the remote computer and configuring the client.
N
OTE
In order to perform the installation process successfully, you
the remote computer with local administrator rights.
Follow these steps to install the client:
must
log into
1Copy the MUVPN installation file to the remote computer.
2Double-click the MUVPN installation file.
If at any time during the installation process you inadvertently skip a step, simply
cancel the process and begin again.
3The installation welcomes you to the InstallShield Wizard. Click the
Next button.
During the Setup Status portion of the install procedure, the InstallShield may
detect ReadOnly Files. If this occurs, click Yes for each event in order to continue
the install.
MUVPN Client Guide19
Page 28
CHAPTER 2: Preparation, Installation, and Connection
4The installation welcomes you again. Click the Next button.
The Software Licence Agreement appears.
5Click the Ye s button to accept the terms of the License Agreement and
to continue with the installation.
The Setup Type window appears.
6Select the type of setup. By default, Typical is enabled–this is the
setup recommended by WatchGuard. Click the Next button.
7If you are installing the client on a Windows 2000 host, the
InstallShield detects the native Windows 2000 L2TP component. The
client uses this component and does not need to install its own. Click
the OK button to continue with the install.
The Select Components window appears.
8Keep the default components and click the Next button.
The Start Copying Files window appears.
9Click the Next button to begin copying files.
A command prompt window appears while the dni_vapmp file is installed—this
is normal. When it is complete, the installation will continue.
10 When the InstallShield Wizard is complete, click the Finish button.
11 The InstallShield Wizard then searches for a User Profile file, click the
Next button as this step is not necessary.
An Information dialog box appears.
12 Click the OK button to continue with the installation.
13 The InstallShield Wizard has completed the install of the SOHO 6
MUVPN client, verify that the option Yes, I want to restart my computer now is enabled and click the Finish button.
The computer reboots.
The ZoneAlarm personal firewall may interfere with regular Local
network traffic preventing access to network resources. If the remote
computer is connected to the network after reboot, this may disrupt the
network logon process. If in doubt, log on to the computer locally the first
time after installation. For more information regarding ZoneAlarm, see
Chapter 3 “The ZoneAlarm Personal Firewall” on page 33.
N
OTE
20MUVPN Client
Page 29
Configuring the MUVPN Client
Once you have restarted the machine, the WatchGuard Policy Import
dialog box appears. Click the Cancel button as this step is not necessary.
From the Windows desktop system tray:
1Right-click on the Mobile User VPN client icon.
The Security Policy Editor window interface appears.
2Select Edit => Add => Connection.
A New Connection will appear under the My Connections folder within the Network
Security Policy field on the left side of the Editor.
The ZoneAlarm personal firewall may immediately begin to display alerts
on your Windows desktop. For more information regarding ZoneAlarm
see “The ZoneAlarm Personal Firewall” on page 33.
N
Install the MUVPN Client
OTE
3Under the Connection Security header on the right side of the Security
Policy Editor window, enable the Secure option.
4Under the Remote Party Identity and Addressing header, select IP
Subnet from the ID Type drop list.
MUVPN Client Guide21
Page 30
CHAPTER 2: Preparation, Installation, and Connection
5Enter the network IP Address of the Trusted Network behind the
SOHO 6 in the field labeled “Subnet”.
In our example, 192.168.111.0.
6Enter the Subnet Mask of the Trusted Network behind the SOHO 6 in
the field labeled “Mask”.
In our example, 255.255.255.0.
7From the Protocol drop list, verify that All has been selected.
8Enable the Connect using checkbox and select Secure Gateway
Tunnel from the drop list.
9From the ID Type drop list, select IP Address.
10 Enter the External IP Address of the SOHO 6 in the appropriate field.
In our example, 206.253.208.100.
11 From the Network Security Policy on the left, expand New
Connection.
My Identity and Security Policy should appear below New Connection.
12 From the Network Security Policy, select Security Policy.
13 From the Select Phase 1 Negotiation Mode header, enable the
Aggressive Mode option.
14 Select My Identity.
22MUVPN Client
Page 31
Install the MUVPN Client
15 Click the Pre-Shared Key button.
The Pre-Shared Key window appears.
16 Click the Enter Key button.
17 Enter the same Passphrase configured on the SOHO 6 in the
appropriate field.
In our example, pL4n3phr34k.
18 From the Select Certificate drop list, verify that None has been
selected.
19 From the ID Type drop list, select E-mail Address.
20 Enter the same Username configured on the SOHO 6.
In our example, Helmdog.
N
OTE
Both the Pre-Shared Key and the E-mail Address,
must
exactly match the
System Passphrase and System Administrator Name configured on the
SOHO 6 or the connection will fail.
MUVPN Client Guide23
Page 32
CHAPTER 2: Preparation, Installation, and Connection
21 From the Virtual Adapter drop list, verify that Disabled has been
selected.
22 From the Network Security Policy expand Security Policy, then
expand Key Exchange (Phase 2).
My Identity and Security Policy should appear below New Connection.
23 Select Proposal 1.
My Identity and Security Policy should appear below New Connection.
24 Verify that the Encapsulation Protocol (ESP) check box is enabled.
25 Set the Encrypt Alg and Hash Alg drop lists to the same values
configured on the SOHO 6.
The “Hash Alg” setting refers to the “Authentication Algorithm” and the
“Encrypt Alg” setting refers to the “Encryption Algorithm” settings on the SOHO
6. In our example, Triple DES and MD5.
N
OTE
These two setting
must
exactly match those on the SOHO 6 or the
connection will fail.
24MUVPN Client
Page 33
26 Select File => Save Changes.
Uninstall the MUVPN client
At some point, it may become necessary to completely uninstall the
MUVPN client. WatchGuard recommends a complete uninstall using the
Windows Add/Remove Programs tool.
First, disconnect all existing tunnels and dial-up connections and reboot
the remote computer. Then, from the Windows desktop:
1Select Start => Settings => Control Panel.
The Control Panel window appears.
2Double click the Add/Remove Programs icon.
The Add/Remove Programs window appears.
3Select Mobile User VPN and click the Change/Remove button.
The InstallShield Wizard window appears.
4Select Remove. Click the Next button.
The Confirm File Deletion dialog box appears.
5Click the OK button to completely remove all of the components.
A command prompt window appears while the dni_vapmp file is installed—this
is normal. When it is complete, the installation will continue.
The Uninstall Security Policy dialog box appears.
6Click the Ye s button to delete the Security Policy Personal Certificates
and Private/Public Keys.
The InstallShield Wizard window appears.
7Verify that the option Yes, I want to restart my computer now is
enabled and click Finish.
The computer will reboot.
The ZoneAlarm personal firewall settings are preserved under the
following default directories.
N
Install the MUVPN Client
OTE
Windows 98:
c:\windows\internet logs\
Windows NT and 2000: c:\winnt\internet logs\
Windows XP: c:\windows\internet logs
If you wish to disregard these settings, delete the contents.
8When the computer has restarted, select Start => Programs.
MUVPN Client Guide25
Page 34
CHAPTER 2: Preparation, Installation, and Connection
9Right-click Mobile User VPN and select Delete to remove this
selection from your Start Menu.
Connect and Disconnect the MUVPN Client
The MUVPN client enables the remote computer to establish a secure,
encrypted connection to a protected network over the Internet. To do this,
you must first connect to the Internet and then use the MUVPN client to
connect to the protected network.
Connecting the MUVPN Client
1First establish an Internet connection through either Dial-Up
Networking or directly through a local area network (LAN) or wide
area network (WAN).
From the Windows desktop system tray:
2Verify the MUVPN client status–it must be activated. If it is not,
right-click the icon and select Activate Security Policy.
For information on how to determine the status of the MUVPN icon, see the
following section “The Mobile User VPN client icon”.
Then, from the Windows desktop:
3Select Start => Programs => Mobile User VPN => Connect.
The WatchGuard Mobile User Connect widow appears.
4Click the Ye s button.
The Mobile User VPN client icon
The Mobile User VPN icon exists in the Windows desktop system tray
and displays several different status images. The following lists these
images and provides a brief description of each.
Deactivated
The MUVPN Security Policy is deactivated or the Windows
operating system did not start a necessary Mobile User VPN
26MUVPN Client
Page 35
Connect and Disconnect the MUVPN Client
service properly and the remote computer must be restarted (if
this continues you may need to reinstall the MUVPN client).
Activated
The MUVPN client is ready to establish a secure, MUVPN tunnel
connection.
Activated and Transmitting Unsecured Data
The MUVPN client is ready to establish a secure, MUVPN tunnel
connection. The red bar on the right of the icon indicates that the
client has begun transmitting unsecured data.
Activated and Connected
The MUVPN client has established at least one secure, MUVPN
tunnel connection but is not transmitting data.
Activated, Connected and Transmitting Unsecured Data
The MUVPN client has established at least one secure, MUVPN
tunnel connection. The red bar on the right of the icon indicates
that the client is transmitting only unsecured data.
Activated, Connected and Transmitting Secured Data
The MUVPN client has established at least one secure, MUVPN
tunnel connection. The green bar on the right of the icon indicates
that the client is transmitting only secured data.
Activated, Connected and Transmitting both Secure and Unsecured
Data
MUVPN Client Guide27
Page 36
CHAPTER 2: Preparation, Installation, and Connection
The MUVPN client has established at least one secure, MUVPN
tunnel connection. The red and green bars on the right of the icon
indicate that the client is transmitting both secured and unsecured
data.
Allowing the MUVPN client through the personal firewall
There are a couple of programs associated with the MUVPN client, which
you must allow through the personal firewall in order to establish the
MUVPN tunnel:
•MuvpnConnect.exe
•IreIKE.exe
The personal firewall will detect the attempt of these programs to access
the Internet. The New Program alert dialog box appears requesting access
for the MuvpnConnect.exe program.
From the ZoneAlarm alert dialog box:
1Enable the Remember this answer the next time I use this program
option and click the Yes button.
This enables ZoneAlarm to allow the MuvpnConnect.exe program through each
time you attempt to make a MUVPN connection.
28MUVPN Client
Page 37
The New Program alert dialog box appears requesting access for the
IreIKE.exe program.
2Enable the Remember this answer the next time I use this program
option and click the Yes button.
This enables ZoneAlarm to allow the IreIKE.exe program through each time you
attempt to make a MUVPN connection.
Disconnecting the MUVPN client
The MUVPN tunnel is independent of the Internet connection. Close the
MUVPN tunnels when the remote computer encounters either of the
following events.
- Loses the Internet connection
- No longer needs the MUVPN tunnel
From the Windows desktop system tray:
1Right-click the Mobile User VPN client icon.
2Select Disconnect All.
The MUVPN Client closes all tunnels. This process does not affect your connection
to the Internet. You
3Right-click the Mobile User VPN client icon and select Deactivate
Security Policy.
The MUVPN icon displays a red slash to indicate a deactivated Security Policy.
If you are using the ZoneAlarm personal firewall, deactivate this as well.
must
disconnect from the Internet separately.
Monitor the MUVPN Client Connection
From the Windows desktop system tray:
1Right-click the ZoneAlarm iconand select Shutdown
ZoneAlarm.
The ZoneAlarm dialog box appears.
2Click the Ye s button when prompted to quit ZoneAlarm.
Monitor the MUVPN Client Connection
There are two tools that accompany the MUVPN client which can be used
to monitor your connection and diagnose problems that may occur: the
Log Viewer and the Connection Monitor.
MUVPN Client Guide29
Page 38
CHAPTER 2: Preparation, Installation, and Connection
The Log Viewer
The LogViewer displays the communications log, a diagnostic tool that
lists the negotiations that occur during the MUVPN client connection.
From the Windows desktop system tray:
1Right-click the Mobile User VPN client icon.
2Select Log Viewer.
The Log Viewer window appears.
The Connection Monitor
The Connection Monitor displays statistical and diagnostic information
for each active connection in the security policy. This module shows the
actual security policy settings and the security association (SA)
information established during Phase 1 IKE negotiations and Phase 2
IPSec negotiations.
From the Windows desktop system tray:
1Right-click the Mobile User VPN client icon.
2Select Connection Monitor.
The Connection Monitor window appears.
30MUVPN Client
Page 39
Monitor the MUVPN Client Connection
An icon appears to the left of the connection name:
•SA indicates that the connection has only a Phase 1 IKE SA. This
occurs when connecting to a secure gateway tunnel or when a Phase 2
IPSec SA fails to establish or has not been established yet.
•A key indicates that the connection has a Phase 2 IPSec SA, or both a
Phase 1 and Phase 2 SA.
•A key with a black line moving below it indicates that the client is
processing secure IP traffic for that connection.
•When a single Phase 1 SA to a gateway protects multiple Phase 2 SAs,
there is a single Phase 1 connection with the SA icon and individual
Phase 2 connections with the key icon displayed above that entry.
MUVPN Client Guide31
Page 40
CHAPTER 2: Preparation, Installation, and Connection
32MUVPN Client
Page 41
CHAPTER 3The ZoneAlarm Personal
Firewall
A personal firewall is a barrier between your computer and the outside
world. The computer is most vulnerable at its doors, called ports. Without
ports, no connection to the Internet is possible.
ZoneAlarm protects these ports by following a simple rule: Block all
incoming and outgoing traffic unless you explicitly allow it for trusted
programs.
When using ZoneAlarm, you often see Program Alert dialog boxes
similar to the image below.
MUVPN Client Guide33
Page 42
CHAPTER 3: The ZoneAlarm Personal Firewall
This alert appears whenever one of your programs (in this example,
Internet Explorer) attempts to access the Internet or your local network.
This powerful feature means no information leaves your computer unless
you give it permission.
If you enable the “Remember the answer each time I use this program”
checkbox you will only have to answer this question once for each
program.
ZoneAlarm Features
The ZoneAlarm personal firewall provides a brief tutorial of the product
immediately after installation of the MUVPN client. Carefully read each
step to familiarize yourself with the application.
There are five buttons on the ZoneAlarm personal firewall panel. These
are described in detail below.
The Alerts Panel
The Alert messages generated by ZoneAlarm contain information on
what ZoneAlarm is blocking.
Up and Down Graphs
Notice the two sets of UP and DN (Up and Down) graphs on the
ZoneAlarm Panel. Whenever data is being sent to the Internet, red bars
are displayed inside the two UP graphs. Whenever data is being received,
green bars are displayed inside the DN graphs. If there is no activity to or
from the Internet, ZoneAlarm will display "ZA" on a red and yellow
background.
•The two graphs in the top portion of the icon display Internet traffic as
it occurs.
34MUVPN Client
Page 43
•The two graphs in the lower portion of the icon display a
chronological history of Internet traffic as it is generated on your
machine.
•Whenever red or green flashing bars appear in the Alerts icon, the
application receiving or sending traffic is shown as a blinking icon
inside the Programs icon.
You might also notice traffic being displayed when you are not on the
Internet. This is local broadcast traffic from your computer.
Expanded Alert Panel
Click on the button to display the entire Alerts panel.
At the top of the panel, Today's Summary shows the total amount of data
sent and received by all applications. The middle portion of the panel
details Current Alerts. In the Alert Settings area, at the bottom of the
panel, there are options to display and save alerts.
N
ZoneAlarm Features
OTE
MUVPN Client Guide35
Page 44
CHAPTER 3: The ZoneAlarm Personal Firewall
Pressing the “More Info” button launches the Zone Labs Alert Analyzer
Web page which provides additional information on traffic blocked by
ZoneAlarm.
The Lock Panel
The purpose of the lock to is block all network activity inbound and
outbound from your computer. Therefore, only use the lock during
extended inactivity of your PC.
A locked or unlocked padlock is displayed in the middle of the icon. To
immediately turn Internet access on or off for all the applications installed
on your machine that are not set to bypass the lock, click directly on the
padlock.
36MUVPN Client
Page 45
ZoneAlarm Features
•When the bar below the Lock button is green, the Internet Lock is not
on. This means that ZoneAlarm is allowing Internet traffic in and out
of your computer.
If the bar displays a countdown timer, this is the time remaining before
the Automatic Lock will engage.
•When the bar is red, the lock is closed and no Internet traffic is
allowed. When the lock is closed, the countdown timer counts
upwards, showing the amount of time the lock has been active.
Expanded Lock Panel
Click on the button to display the entire Lock panel.
MUVPN Client Guide37
Page 46
CHAPTER 3: The ZoneAlarm Personal Firewall
The Automatic Lock will activate at whatever set intervals you select. You
can program the Automatic Lock to activate in the following situations:
•Whenever your computer has not been used for a preset number of
minutes
•Whenever the screen saver takes control of your desktop
N
OTE
If Internet access is locked when the screen saver activates, it will be
unlocked when the screen saver is deactivated.
The option “Pass Lock programs may access the Internet” allows Internet
activity for applications that have been given rights to bypass the lock.
Using this bypass feature, you can allow programs like your email client
to check for mail during intervals when the Automatic Lock is in effect for
all your other applications.
38MUVPN Client
Page 47
The High Security setting will stop all applications' Internet activity
regardless of the program's access settings. Please see the section of this
document titled, “The Programs Panel” for more information.
Undoing an Inactivity Lock
If you have activated the Automatic Lock using the minutes-of-inactivity
option, unlock the lock by clicking on the padlock inside the Lock icon.
After clicking on the padlock to deactivate the lock, the bar under the
padlock will be set to green. This means that the lock is no longer
stopping Internet traffic.
The Stop Button
Clicking on the STOP button immediately stops all network traffic. This
includes local traffic as well, regardless if you are on a LAN, WAN, or
stand-alone workstation. The only reason to use this button is if you are
monitoring activity and encounter a compromise in progress.
ZoneAlarm Features
The STOP button overrides the Pass Lock settings in the Programs panel.
This is useful for stopping Trojan horses and other malicious programs
that want to gain access to the Internet from your PC. To reactivate
Internet access, press the stop button again.
N
OTE
Using the emergency stop button completely cuts off connections to the
Internet. Connections and data transfer by all programs on your computer
must
be restarted.
The Security Panel
The Security panel is used to regulate ZoneAlarm's protection levels.
MUVPN Client Guide39
Page 48
CHAPTER 3: The ZoneAlarm Personal Firewall
The Local and Internet Zone each have a security level selector, that you
drag up and down to change the security level. Local Zone security is
displayed in green, and Internet Zone security in blue.
The default security settings are medium for the Local Zone and high for
the Internet Zone.
For all three security levels, the application privileges in the Program
panel are enforced. The following is a description of the three security
levels:
Low
This is the minimal security setting. The Internet Lock feature
allows only application traffic, not server traffic (that is, traffic
outbound from the computer but not inbound from the network).
All local network access to and from your computer and server
applications are allowed, such as Windows file and print shares.
Medium
This is the recommended setting for computers connected to the
Internet through a LAN or WAN. The Internet Lock feature blocks
all traffic. All local network access to and from your computer and
server application is allowed, such as Windows file and print
shares.
High
This is the maximum security setting. The Internet Lock feature
blocks all traffic. All local network access to and from your
computer and server application is blocked, such as Windows file
and print shares. All ports not is use are hidden.
40MUVPN Client
Page 49
ZoneAlarm Features
Use the block servers checkbox for each zone to prevent all programs
from acting as servers for that zone. By checking this option, no
application will be allowed to listen for incoming connections in that
zone, even if you've checked the Allow Server option in the Programs
panel.
Definition of Zones
ZoneAlarm divides traffic into two separate zones: the Local Zone and the
Internet Zone.
The purpose of the Local Zone is to enable ZoneAlarm to recognize what
you as the user, deem as permissible traffic.
The Local Zone is made up of the computers and resources you have
defined as trusted. These are usually resources on your local network but
they can include any resource of your choosing. Use the Advanced button
on the Security panel to define and modify the components of the Local
Zones.
MUVPN Client Guide41
Page 50
CHAPTER 3: The ZoneAlarm Personal Firewall
The members of the Internet Zone are defined as all computers and
addresses you have not included in your trusted Local Zone for
protection.
Members of the Local Zone can include hosts, Web sites, trusted IP
Addresses, IP Subnets, and IP Ranges.
Configuring the Local Zone
Click on thebutton in the Security panel to display the Local
Zone Properties.
Use the Local Zone Properties to add the following:
•Web sites
•IP addresses or ranges of IPs
•Subnets
Click the Add button to add any of these elements and the Remove button
to remove items from your Local Zone list. Click on the Properties button
to modify the name or IP address of any element of your Local Zone
properties.
The Adapter Subnets section lists all the Network Interface Cards (NICs)
on your machine. Checking an adapter automatically adds the network
adapter's local subnet to the Local Zone.
If you are on a local area network, checking an adapter automatically
adds any computers and other devices such as printers using that subnet
to your Local Zone. On a LAN or WAN using multiple subnets, you
would need to add these individually.
42MUVPN Client
Page 51
ZoneAlarm Features
To add items to the Local Zone, follow these instructions:
1At the Security panel, click the Advanced button.
The Local Zone Properties window appears.
2Click Add and select Host/Site (where you have the URL of the
remote server Web site rather than the IP address), IP address, IP
Range or Subnet.
3Under Description, enter a name for the entry. This description can be
anything and has no bearing on functionality. It is intended to help
you distinguish multiple entries in the Local Zone.
4Enter the name of the Host/Site, IP Address, IP Range, or Subnet.
For example, www.addhostsite.com or 10.10.10.1
5Click the OK (or Next if adding a Host/Site) button.
6Click Finish (if adding a Host/site).
7Click the OK button to close the Local Zone Properties window.
N
OTE
The MUVPN client should add the VPN destinations contained within the
configuration file (.wgx) to the Local Zone by default.
MUVPN Client Guide43
Page 52
CHAPTER 3: The ZoneAlarm Personal Firewall
The Programs Panel
The programs panel displays programs that have attempted to access the
Internet.
The extended portion of the Programs panel is the Program List. This is
the list of programs installed on your machine that have attempted to
connect to the Internet. Use the checkboxes in this panel to control the
connection behavior of any program on the list or to specify each
program's access rights for the Local Zone or the Internet Zone.
The same functions are available by bringing up the popup menu by
right-clicking on a program name in the Program list.
In the Program List, the Allow server column allows you to control which
applications can perform server functions. The Allow connect column
allows you to control which applications make outgoing connections to
the Internet or the Local Zone. Run your mouse pointer over the
Programs List or right-click on an entry in the list to see more statistics.
44MUVPN Client
Page 53
Using the Panel
Go to the Allow connect column in the main body of the panel to change a
program's permissions. Click directly on the dots within the column to
change the access level.
In the same way, you can change the settings in the Allow server column.
•The question mark indicates that ZoneAlarm will prompt you each
time that particular program attempts to pass traffic to or from the
either the Internet or Local zones.
•The checkmark indicates that ZoneAlarm will allow that program
access to the selected zone.
•The red X indicates that ZoneAlarm will deny that program access to
the selected zone.
ZoneAlarm Features
•The column labeled “Allow connect” is for a program which is
attempting to make a connection out to the Internet.
•The column labeled “Allow server” is for a program which is
attempting to make a connection in to your computer.
•The column labeled “Pass Lock” allows an exception to the Internet
lock feature.
In the Program column, the program's name and version number are
displayed. Run your mouse over the program name to see more statistics:
-Product name
- The name of the file used to access the Internet
- The location of the file
- Product version
- Creation date and file size
MUVPN Client Guide45
Page 54
CHAPTER 3: The ZoneAlarm Personal Firewall
See the section of this document titled, “Allowing Traffic through
ZoneAlarm” for more information on allowing a few common
applications and all of their necessary programs through the ZoneAlarm
personal firewall.
The Configuration Panel
Use the configuration panel to set the basic operational characteristics for
ZoneAlarm.
Click the button to display the Configuration panel. This
button is located directly below the Help button in the top right corner of
ZoneAlarm. Use the checkboxes and buttons in the Configuration Panel
to determine the following:
•ZoneAlarm should be displayed on top of other applications on your
computer screen when Internet activity is selected.
•The Desk Band Tool bar should be displayed (applies to Windows 98
and NT 4 only).
•ZoneAlarm should load when you start your computer.
•To check for product updates.
•To change the registration information you've submitted to Zone
Labs.
46MUVPN Client
Page 55
ZoneAlarm Features
The first checkbox on the Configuration Panel is On top during Internet
activity. This checkbox controls whether or not ZoneAlarm will be
displayed on top of other applications whenever Internet activity is
detected.
The Load ZoneAlarm at Startup checkbox is selected by default. This
causes ZoneAlarm to be loaded when you start your computer. If you
disable this checkbox, Internet traffic monitoring will not begin until you
start ZoneAlarm on your machine.
N
OTE
The ZoneAlarm personal firewall may interfere with regular Local
network traffic. Please see the troubleshooting item in this document
titled, “Why am I not prompted for my user name and password when I
turn my computer on?”
Older versions of Windows NT (those without the Windows Shell
Update) allow you to choose a "Show shell toolbar" option. Under newer
MUVPN Client Guide47
Page 56
CHAPTER 3: The ZoneAlarm Personal Firewall
versions and Windows 98/ME or Windows 2000, this option is part of the
Windows Shell.
The Check for update button contacts the web for ZoneAlarm product
updates.
The Change Registration button allows you to review and change your
ZoneAlarm registration information
Frequently Asked Questions about ZoneAlarm
What is Internet Traffic?
ZoneAlarm keeps an eye on all Internet traffic.
Internet traffic includes all data movement to and from the
Internet. It also includes all connection attempts from your
machine to the Internet and vice versa.
The ZoneAlarm personal firewall only stops undesired traffic.
When it does stop an instance of traffic, ZoneAlarm will issue an
alert. The alert can be displayed and stored in a number of places.
Data movement and connection attempts that are allowed
according to your rules in ZoneAlarm, will be allowed to pass
through the firewall.
What is an Internet Alert?
An alert is basically a blocked Internet connection. When
ZoneAlarm blocks some kind of inbound or outbound Internet
traffic, an alert is produced based on the rules you've set up in the
various ZoneAlarm panels.
By going to the Alerts panel, you can easily find out the basic
information behind an alert.
What Will ZoneAlarm Block?
What ZoneAlarm blocks is the result of how selections are made
in ZoneAlarm panels in these two ways:
- Default settings that were installed with the product that you
did not change.
48MUVPN Client
Page 57
ZoneAlarm Features
- Modifications made to those settings by you or your system
administrator.
The higher the security setting in a zone, the more ZoneAlarm
will block. In the Security panel, if you allow overall security for
the Internet Zone to be set to high, the firewall will block, and
create an alert, for the three events shown in the lower part of the
example below.
What Are the Red and Green Traffic Indicators
The most visible Internet traffic indicators are the red and green
bars you can see at any time inside the first box on the left side of
the DeskBand Toolbar.
Red bars indicate data being sent; green bars indicate data being
received. These indicators don't indicate alerts or illegal traffic,
but simply that Internet traffic is occurring.
When you open the product, you see a larger version of these
indicators on the Alerts icon:
MUVPN Client Guide49
Page 58
CHAPTER 3: The ZoneAlarm Personal Firewall
Whenever red or green flashing bars appear in the Alerts icon, the
application receiving or sending traffic is shown as a blinking icon
inside the Programs icon.
How Do I View My Internet Traffic?
If you really want to see Internet traffic every single time it occurs,
make sure the first checkbox below, located on the Configuration
panel, is enabled.
This means that, in addition to being able to view the red and
green bars, you will also see the main ZoneAlarm panel displayed
on top of all the other applications on your desktop.
This will make it obvious that Internet traffic is occurring. Since so
much Internet traffic can occur when you have a live Internet
connection, many ZoneAlarm users disable this checkbox and rely
on the red and green bars only.
How Do I Know How Many Bytes Are Sent and Received?
About Internet traffic, you can always view how many bytes have
been sent to your PC and how many have been received since you
launched ZoneAlarm. These statistics are available at the top of
the Alerts panel as shown below.
Why Did I Get That Alert?
Just below the Bytes received area in the Alerts panel, statistics are
always available immediately after your ZoneAlarm personal
firewall detects an Internet connection attempt that it is being
blocked by the firewall rules you've set up throughout
ZoneAlarm.
The example below shows that a connection attempt by Internet
Explorer was blocked.
50MUVPN Client
Page 59
ZoneAlarm Features
A number of rules could be responsible for this alert. One
possibility is that, in the Allow connect column of the Programs
panel, you have established a rule to block Internet Explorer's
access to the Zone where the IP address mentioned in the alert.
In this case, the IP address would be in the Internet zone, because
the Red X is in the Internet Zone area.
How Do I Get More Info about a Particular Alert
Clicking on the More Info button, located to the right of the alert
description, gives you access to the Alert Analyzer, located on the
Zone Labs web site.
How Do I Control ZoneAlarm for Displaying Alerts?
The area at the bottom of the Alerts panel allows you to control
whether you want the Alert Log to be created, and whether or not
you want alert popups to be displayed each time there is an alert.
MUVPN Client Guide51
Page 60
CHAPTER 3: The ZoneAlarm Personal Firewall
If you enable the second checkbox, you'll get a display like the
example below each time firewall rules trigger an alert.
Allowing Traffic through ZoneAlarm
When an application requires access through the ZoneAlarm personal
firewall, a Program Alert will be displayed on the Windows desktop
informing the user which particular program needs access. Often, the
program associated with the application is not readily indicative of the
application the user is attempting to execute.
In the example above, the Internet Explorer Web browser application has
been launched and is attempting to access the users home page. The
52MUVPN Client
Page 61
ZoneAlarm Features
program which actually needs to pass through the firewall is
“IEXPLORE.EXE”.
In order to allow this program access each time the application is
executed, enable the Remember the answer each time I use this program
checkbox.
Here is a list of a few essential programs which will need access through
the ZoneAlarm personal firewall in order to operate some important
applications.
Programs Which
Must
Be Allowed
MUVPN client
MUVPN Connection Monitor
MUVPN Log Viewer
Programs Which
May
be Allowed
MS Outlook
MS Internet Explorer
Netscape 6.1netscp6.exe
Opera Web browser
Standard Windows network applications
Shutting Down ZoneAlarm
From the Windows desktop system tray:
1Right-click on the ZoneAlarm iconand select Shutdown
ZoneAlarm.
The ZoneAlarm dialog box appears.
2Click the Ye s button when prompted to quit ZoneAlarm.
IreIKE.exe
MuvpnConnect.exe
CmonApp.exe
ViewLog.exe
OUTLOOK.exe
IEXPLORE.exe
Opera.exe
lsass.exe
services.exe
svchost.exe
winlogon.exe
MUVPN Client Guide53
Page 62
CHAPTER 3: The ZoneAlarm Personal Firewall
Uninstalling ZoneAlarm
From the Windows desktop:
1Select Start => Programs => Zone Labs => Uninstall ZoneAlarm.
The Confirm Uninstall dialog box appears.
2Click the Ye s button.
The ZoneLabs TrueVector service dialog box appears.
3Click the Ye s button to continue with uninstalling the TrueVector
service and disable its Internet Security features.
The Select Uninstall Method window appears.
4Veri f y that Automatic is selected and then click the Next button.
5Click the Finish button to perform the uninstall.
The Remove Shared Component window may appear. During the initial
installation of ZoneAlarm, some files were installed that could be shared
by other programs on the system. Click the Ye s t o A ll button to completely
remove all of these files.
6The Install window appears and prompts you to restart the computer.
Click the OK button to reboot your system.
N
OTE
54MUVPN Client
Page 63
CHAPTER 4Troubleshooting Tips
WatchGuard maintains a knowledge base on our Web site, including an
In-Depth FAQ section on configuring and using the MUVPN client. This
is available at:
www.watchguard.com/support
A few of the most common issues found in installing, configuring, and
using the MUVPN client are described below.
My computer is hung up just after installing the MUVPN
client...
This is most likely due to either the ZoneAlarm personal firewall
application interfering with regular Local network traffic or it is because
the MUVPN client is active and is unsuccessfully attempting to create
VPN tunnels.
When the MUVPN client is not in use, ZoneAlarm should be shutdown
and the client deactivated.
From the Windows desktop system tray:
1First, reboot your computer.
2Right-click on the Mobile User VPN client icon.
MUVPN Client Guide55
Page 64
CHAPTER 4: Troubleshooting Tips
3Select Disconnect All.
The MUVPN client closes all VPN tunnels.
4Right-click on the Mobile User VPN client icon and select Deactivate
Security Policy.
The MUVPN icon will display a red slash to indicate that the Security Policy has
been deactivated.
5Right-click on the ZoneAlarm iconand select Shutdown
ZoneAlarm.
The ZoneAlarm dialog box appears.
6Click the Ye s button when prompted to quit ZoneAlarm.
I have to enter my network log in information even when
I’m not connected to the network...
When you start your computer, you are prompted to enter your Windows
network user name, password and domain. It is very important that you
enter this information correctly, just as you would if you were at the office
connected to the network. Windows stores the information for use by
network adapters and networked applications. Later, when you connect
to your ISP and start the MUVPN client, your computer uses the stored
user name, password, and domain to connect to the company network.
I am not prompted for my user name and password when I
turn my computer on...
This is most likely due to the ZoneAlarm personal firewall application.
This program is very good at what it does: keeping your computer secure
from unauthorized incoming or outgoing traffic. Unfortunately, it may
block your computer from broadcasting its network information thereby
preventing the machine from sending the necessary login information.
You should be certain to shut down ZoneAlarm each time you disconnect
the MUVPN connection.
Is the Mobile User VPN tunnel is working...
The Mobile User VPN client icon, which appears in the Windows desktop
system tray once it has been launched, will display a key within the icon
once the client has connected.
To test the connection, ping a computer on your company network.
56MUVPN Client
Page 65
•Select Start => Run. Type ping and the IP address of a computer on
your company network.
My mapped drives have a red X through them...
Windows 98/ME, NT, and 2000 verifies and maps networks drives
automatically when the computer starts. Because there is no way for you
to establish a remote session with the company network before the
computer actually starts, drive mapping fails during the boot process and
a red X appears on the drive icon. Establish a MUVPN tunnel and open
the network drive. The red X should disappear.
How to map a network drive
Due to a Windows operating system limitation, mapped network drives
disappear when you work remotely. To remap a network drive from the
Windows desktop:
1Right-click on Network Neighborhood.
2Select Map Network Drive.
The Map Network Drive dialog box appears.
3Use the drop list to select a drive letter.
Either use the drop list or type a network drive path. For example:
\\techsupport\share2\rodolfo
4Click OK.
The mapped drive appears in the My Computer window. Even if you
enable the “Reconnect at Logon” checkbox, the mapped drive will not
appear the next time you start your computer unless it is physically
connected to the network.
I sometimes get prompted for a password when I am
browsing the company network...
Due to a Windows networking limitation, remote user virtual private
networking products only allow access to a single network domain. If
your company is large enough to require subnetting (multiple networks
connected together), you will only be able to browse your own domain.
Attempts to access other domains will result in a password prompt.
Unfortunately, even providing the correct information will not open these
additional networks.
MUVPN Client Guide57
Page 66
CHAPTER 4: Troubleshooting Tips
It takes a really long time to shut down the computer after
using Mobile User VPN...
If you open and browse a mapped network drive during a MUVPN session,
the Windows operating system waits for a signal from the
times out and completes the shut down cycle.
I lost the connection to my ISP, and now I can’t use the
company network...
If you lose Internet connection long enough, MUVPN also loses the secure
tunnel. Follow the steps to close the tunnel. Then connect to the Internet
and restart the MUVPN client.
trademarks or trademarks of WatchGuard Technologies, Inc. in the United States
and other countries. This product is covered by one or more pending patent
applications.
Microsoft®, Internet Explorer®, Windows® 95, Windows® 98, Windows NT®
and Windows® 2000 are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
All other trademarks and tradenames are the property of their respective owners.
Printed in the United States of America.
Part No: 1200016
network before it
58MUVPN Client
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.