This chapter gives some background information on firewalls and explains how to get started
with the NBG-460N’s firewall.
13.1 Introduction to ZyXEL’s Firewall
13.1.1 What is a Firewall?
Originally, the term “firewall” referred to a construction technique designed to prevent the
spread of fire from one room to another. The networking term "firewall" is a system or group
of systems that enforces an access-control policy between two networks. It may also be
defined as a mechanism used to protect a trusted network from a network that is not trusted. Of
course, firewalls cannot solve every security problem. A firewall is one of the mechanisms
used to establish a network security perimeter in support of a network security policy. It
should never be the only mechanism or method employed. For a firewall to guard effectively,
you must design and deploy it appropriately. This requires integrating the firewall into a broad
information-security policy. In addition, specific policies must be implemented within the
firewall itself.
13.1.2 Stateful Inspection Firewall
Stateful inspection firewalls restrict access by screening data packets against defined access
rules. They make access control decisions based on IP address and protocol. They also
"inspect" the session data to assure the integrity of the connection and to adapt to dynamic
protocols. These firewalls generally provide the best speed and transparency; however, they
may lack the granular application level access control or caching that some proxies support.
Firewalls, of one type or another, have become an integral part of standard security solutions
for enterprises.
13.1.3 About the NBG-460N Firewall
The NBG-460N firewall is a stateful inspection firewall and is designed to protect against
Denial of Service attacks when activated (click the General tab under Firewall and then click
the Enable Firewall check box). The NBG-460N's purpose is to allow a private Local Area
Network (LAN) to be securely connected to the Internet. The NBG-460N can be used to
prevent theft, destruction and modification of data, as well as log events, which may be
important to the security of your network.
NBG-460N User’s Guide
153
Chapter 13 Firewall
The NBG-460N is installed between the LAN and a broadband modem connecting to the
Internet. This allows it to act as a secure gateway for all data passing between the Internet and
the LAN.
The NBG-460N has one Ethernet WAN port and four Ethernet LAN ports, which are used to
physically separate the network into two areas.The WAN (Wide Area Network) port attaches
to the broadband (cable or DSL) modem to the Internet.
The LAN (Local Area Network) port attaches to a network of computers, which needs security
from the outside world. These computers will have access to Internet services such as e-mail,
FTP and the World Wide Web. However, "inbound access" is not allowed (by default) unless
the remote host is authorized to use a specific service.
13.1.4 Guidelines For Enhancing Security With Your Firewall
1 Change the default password via web configurator.
2 Think about access control before you connect to the network in any way, including
attaching a modem to the port.
3 Limit who can access your router.
4 Don't enable any local service (such as SNMP or NTP) that you don't use. Any enabled
service could present a potential security risk. A determined hacker might be able to find
creative ways to misuse the enabled services to access the firewall or the network.
5 For local services that are enabled, protect against misuse. Protect by configuring the
services to communicate only with specific peers, and protect by configuring rules to
block packets for the services at specific interfaces.
6 Protect against IP spoofing by making sure the firewall is active.
7 Keep the firewall in a secured (locked) room.
13.2 Triangle Routes
If an alternate gateway on the LAN has an IP address in the same subnet as the NBG-460N’s
LAN IP address, return traffic may not go through the NBG-460N. This is called an
asymmetrical or “triangle” route. This causes the NBG-460N to reset the connection, as the
connection has not been acknowledged.
You can have the NBG-460N permit the use of asymmetrical route topology on the network
(not reset the connection).
Allowing asymmetrical routes may let traffic from the WAN go directly to the LAN without
passing through the NBG-460N. A better solution is to use IP alias to put the NBG-460N and
the backup gateway on separate subnets.
13.2.1 Triangle Routes and IP Alias
You can use IP alias instead of allowing triangle routes. IP Alias allow you to partition your
network into logical sections over the same interface.
By putting your LAN and Gateway A in different subnets, all returning network traffic must
pass through the NBG-460N to your LAN. The following steps describe such a scenario.
154
NBG-460N User’s Guide
Chapter 13 Firewall
1 A computer on the LAN initiates a connection by sending a SYN packet to a receiving
server on the WAN.
2 The NBG-460N reroutes the packet to Gateway A, which is in Subnet 2.
3 The reply from the WAN goes to the NBG-460N.
4 The NBG-460N then sends it to the computer on the LAN in Subnet 1.
Figure 96 Using IP Alias to Solve the Triangle Route Problem
13.3 General Firewall Screen
Click Security > Firewall to open the General screen. Use this screen to enable or disable the
NBG-460N’s firewall, and set up firewall logs.
Figure 97 Security > Firewall > General l
The following table describes the labels in this screen.
Table 57 Security > Firewall > General
LABELDESCRIPTION
Enable FirewallSelect this check box to activate the firewall. The NBG-460N performs access
Packet DirectionThis is the direction of travel of packets.
control and protects against Denial of Service (DoS) attacks when the firewall is
activated.
Firewall rules are grouped based on the direction of travel of packets to which they
apply.
NBG-460N User’s Guide
155
Chapter 13 Firewall
Table 57 Security > Firewall > General
LABELDESCRIPTION
LogSelect whether to create a log for packets that are traveling in the selected
ApplyClick Apply to save the settings.
ResetClick Reset to start configuring this screen again.
direction when the packets are blocked (Log All) or forwarded (Log Forward). Or
select Not Log to not log any records.
To log packets related to firewall rules, make sure that Access Control under Log
is selected in the Logs > Log Settings screen.
13.4 Services Screen
Click Security > Firewall > Services. The screen appears as shown next.
If an outside user attempts to probe an unsupported port on your NBG-460N, an ICMP
response packet is automatically returned. This allows the outside user to know the NBG460N exists. Use this screen to prevent the ICMP response packet from being sent. This keeps
outsiders from discovering your NBG-460N when unsupported ports are probed.
You can also use this screen to enable service blocking, enter/delete/modify the services you
want to block and the date/time you want to block them.
Figure 98 Security > Firewall > Services
The following table describes the labels in this screen.
Table 58 Security > Firewall > Services
LABELDESCRIPTION
ICMPInternet Control Message Protocol is a message control and error-reporting
Respond to Ping onThe NBG-460N will not respond to any incoming Ping requests when Disable is
protocol between a host server and a gateway to the Internet. ICMP uses Internet
Protocol (IP) datagrams, but the messages are processed by the TCP/IP software
and directly apparent to the application user.
selected. Select LAN to reply to incoming LAN Ping requests. Select WAN to reply
to incoming WAN Ping requests. Otherwise select LAN & WAN to reply to all
incoming LAN and WAN Ping requests.
156
NBG-460N User’s Guide
Chapter 13 Firewall
Table 58 Security > Firewall > Services
LABELDESCRIPTION
Do not respond to
requests for
unauthorized
services
Firewall Rule
#This is your firewall rule number. The ordering of your rules is important as rules
ActiveThis icon is green when the rule is turned on. The icon is grey when the rule is
Service NameThis field displays the services and port numbers to which this firewall rule applies.
IPThis field displays the IP address(es) the rule applies to.
ScheduleThis field displays the days the firewall rule is active.
LogThis field shows you whether a log will be created when packets match the rule
ModifyClick the Edit icon to modify an existing rule setting in the fields under the Add
AddClick the Add button to display the screen where you can configure a new firewall
MoveThe Move button moves a rule to a different position. In the first text box enter the
Misc setting
Bypass Triangle
Route
Max NAT/Firewall
Session Per User
ApplyClick Apply to save the sett ings.
ResetClick Reset to start configuring this screen again.
Select this option to prevent hackers from finding the NBG-460N by probing for
unused ports. If you select this option, the NBG-460N will not respond to port
request(s) for unused ports, thus leaving the unused ports and the NBG-460N
unseen. By default this option is not selected and the NBG-460N will reply with an
ICMP Port Unreachable packet for a port probe on its unused UDP ports, and a
TCP Reset packet for a port probe on its unused TCP ports.
Note that the probing packets must first traverse the NBG-460N's firewall
mechanism before reaching this anti-probing mechanism. Therefore if the firewall
mechanism blocks a probing packet, the NBG-460N reacts based on the firewall
policy, which by default, is to send a TCP reset packet for a blocked TCP packet.
You can use the command "sys firewall tcprst rst [on|off]" to change this policy.
When the firewall mechanism blocks a UDP packet, it drops the packet without
sending a response packet.
are applied in turn. Use the Move button to rearrange the order of the rules.
turned off.
(Match) or not (No).
Firewall Rule screen.
Click the Remove icon to delete a rule. Note that subsequent firewall rules move
up by one when you take this action.
rule. Modify the number in the textbox to add the rule before a specific rule
number.
number of the rule you wish to move. In the second text box enter the number of
the rule you wish to move the first rule to and click the Move button.
Select this check box to have the NBG-460N firewall ignore the use of triangle
route topology on the network.
Type a number ranging from 1 to 2048 to limit the number of NAT/firewall sessions
that a host can create.
13.4.1 The Add Firewall Rule Screen
If you click Add or the Modify icon on an existing rule, the Add Firewall Rule screen is
displayed. Use this screen to add a firewall rule or to modify an existing one.
ActiveSelect this check box to turn the rule on.
Address TypeDo you want your rule to apply to packets with a particular (single) IP, a range of
IP AddressEnter the single IP address here. This field is only available when Single IP is
Start IP AddressEnter the starting IP address in a range here. This field is only available when IP
End IP AddressEnter the ending IP address in a range here. This field is only available when IP
IP Pool ListAdd an IP address from the IP Pool List to the Selected IP List by highlighting an
Service Setup
IP addresses (for example 192.168.1.10 to 192.169.1.50), a pool of IP address or
any IP address? Select an option from the drop-down list box that includes: Any IP, Single IP, IP Range and IP Pool.
selected as the Address Type.
Range is selected as the Address Type.
Range is selected as the Address Type.
IP address and clicking Add. To delete an IP address from the Selected IP List
highlight an IP address and click the Remove button. These fields are only
available when IP Pool is selected as the Address Type.
The IP Pool list gathers its IPs from entries in the ARP table. The ARP table
contains the IP addresses and MAC addresses of the devices that have sent
traffic to the NBG-460N.
Blocked ServicesThis is a list of services (ports) that will be inaccessible to computers on your LAN
Custom PortA custom port is a service that is not available in the pre-defined Available
TypeChoose the IP port (TCP or UDP) that defines your customized port from the drop
Port NumberEnter the port number range that defines the service. For example, if you want to
AddSelect a service from the Available Services drop-down list and then click Add to
DeleteSelect a service from the Blocked Services list and then click Delete to remove
Clear AllClick Clear All to empty the Blocked Services.
Schedule to Block
Day to Block:Select a check box to configure which days of the week (or everyday) you want
Time of Day to
Block (24-Hour
Format)
Log
Active (Log
packets match
this rule)
Misc setting
Bypass Triangle
Route
Max NAT/Firewall
Session Per User
ApplyClick Apply to save the sett ings.
ResetClick Reset to start configuring this screen again.
CancelClick Cancel to return to the Services screen without saving any changes.
This is a list of pre-defined services (ports) you may prohibit your LAN computers
from using. Select the port you want to block using the drop-down list and click
Add to add the port to the Blocked Services field.
once you enable service blocking.
Services list and you must define using the next two fields.
down list box.
define the Gnutella service, then select TCP type and enter a port range from
6345 to 6349.
add a service to the Blocked Services
this service from the list.
service blocking to be active.
Select the time of day you want service blocking to take effect. Configure blocking
to take effect all day by selecting All Day. You can also configure specific times by
selecting From and entering the start time in the Start (hour) and Start (min)
fields and the end time in the End (hour) and End (min) fields. Enter times in 24hour format, for example, "3:00pm" should be entered as "15:00".
Select this to log packets that match this rule. Go to the Log Settings page and
select the Access Control logs category to have the NBG-460N record these
logs.
Select this check box to have the NBG-460N firewall ignore the use of triangle
route topology on the network.
Type a number ranging from 1 to 2048 to limit the number of NAT/firewall sessions
that a host can create.
NBG-460N User’s Guide
159
Chapter 13 Firewall
160
NBG-460N User’s Guide
CHAPTER14
Content Filtering
This chapter provides a brief overview of content filtering using the embedded web GUI.
14.1 Introduction to Content Filtering
Internet content filtering allows you to create and enforce Internet access policies tailored to
your needs. Content filtering is the ability to block certain web features or specific URL
keywords.
14.2 Restrict Web Features
The NBG-460N can block web features such as ActiveX controls, Java applets, cookies and
disable web proxies.
14.3 Days and Times
The NBG-460N also allows you to define time periods and days during which the NBG-460N
performs content filtering.
14.4 Filter Screen
Click Security > Content Filter to open the Filter screen.
NBG-460N User’s Guide
161
Chapter 14 Content Filtering
Figure 100 Security > Content Filter > Filter
The following table describes the labels in this screen.
Table 60 Security > Content Filter > Filter
LABELDESCRIPTION
Trusted Computer
IP Address
Restrict Web
Features
ActiveX A tool for building dynamic and active Web pages and distributed object
JavaA programming language and development environment for building
CookiesUsed by Web servers to track usage and provide service based on ID.
Web ProxyA server that acts as an intermediary between a user and the Internet to provide
Keyword Blocking
Enable URL
Keyword Blocking
To enable this feature, type an IP address of any one of the computers in your
network that you want to have as a trusted computer. This allows the trusted
computer to have full access to all features that are configured to be blocked by
content filtering.
Leave this field blank to have no trusted computers.
Select the box(es) to restrict a feature. When you download a page containing a
restricted feature, that part of the web page will appear blank or grayed out.
applications. When you visit an ActiveX Web site, ActiveX controls are
downloaded to your browser, where they remain in case you visit the site again.
downloadable Web components or Internet and intranet business applications of
all kinds.
security, administrative control, and caching service. When a proxy server is
located on the WAN it is possible for LAN users to circumvent content filtering by
pointing to this proxy server.
The NBG-460N can block Web sites with URLs that contain certain keywords in
the domain name or IP address. For example, if the keyword "bad" was enabled,
all sites containing this keyword in the domain name or IP address will be
blocked, e.g., URL http://www.website.com/bad.html would be blocked. Select
this check box to enable this feature.
162
NBG-460N User’s Guide
Table 60 Security > Content Filter > Filter
LABELDESCRIPTION
KeywordType a keyword in this field. You may use any character (up to 64 characters).
Keyword ListThis list displays the keywords already added.
Add Click Add after you have typed a keyword.
DeleteHighlight a keyword in the lower box and click Delete to remove it. The keyword
Clear AllClick this button to remove all of the listed keywords.
Denied Access
Message
ApplyClick Apply to save your changes.
ResetClick Reset to begin configuring this screen afresh
14.5 Schedule
Chapter 14 Content Filtering
Wildcards are not allowed. You can also enter a numerical IP address.
Repeat this procedure to add other keywords. Up to 64 keywords are allowed.
When you try to access a web page containing a keyword, you will get a
message telling you that the content filter is blocking this request.
disappears from the text box after you click Apply.
Enter a message to be displayed when a user tries to access a restricted web
site. The default message is “Please contact your network administrator!!”
Use this screen to set the day(s) and time you want the NBG-460N to use content filtering.
Click Security > Content Filter > Schedule. The following screen displays.
Figure 101 Security > Content Filter > Schedule
The following table describes the labels in this screen.
Table 61 Security > Content Filter > Schedule
LABELDESCRIPTION
Day to BlockSelect check boxes for the days that you want the NBG-460N to perform
Time of Day to Block
(24-Hour Format)
content filtering. Select the Everyday check box to have content filtering
turned on all days of the week.
Time of Day to Block allows the administrator to define during which time
periods content filtering is enabled. Time of Day to Block restrictions only
apply to the keywords (see above). Restrict web server data, such as ActiveX,
Java, Cookies and Web Proxy are not affected.
Select All Day to have content filtering always active on the days selected in
Day to Block with time of day limitations not enforced.
Select From and enter the time period, in 24-hour format, during which
content filtering will be enforced.
NBG-460N User’s Guide
163
Chapter 14 Content Filtering
Table 61 Security > Content Filter > Schedule
LABELDESCRIPTION
ApplyClick Apply to save your customized settings and exit this screen.
ResetClick Reset to begin configuring this screen afresh
14.6 Customizing Keyword Blocking URL Checking
You can use commands to set how much of a website’s URL the content filter is to check for
keyword blocking. See the appendices for information on how to access and use the command
interpreter.
14.6.1 Domain Name or IP Address URL Checking
By default, the NBG-460N checks the URL’s domain name or IP address when performing
keyword blocking.
This means that the NBG-460N checks the characters that come before the first slash in the
URL.
For example, with the URL www.zyxel.com.tw/news/pressroom.php
searches for keywords within www.zyxel.com.tw
14.6.2 Full Path URL Checking
Full path URL checking has the NBG-460N check the characters that come before the last
slash in the URL.
For example, with the URL www.zyxel.com.tw/news/pressroom.php
searches for keywords within www.zyxel.com.tw/news/
Use the ip urlfilter customize actionFlags 6 [disable | enable]
command to extend (or not extend) the keyword blocking search to include the URL's full
path.
14.6.3 File Name URL Checking
Filename URL checking has the NBG-460N check all of the characters in the URL.
For example, filename URL checking searches for keywords within the URL
www.zyxel.com.tw/news/pressroom.php
Use the ip urlfilter customize actionFlags 8 [disable | enable]
command to extend (or not extend) the keyword blocking search to include the URL's
complete filename.
, content filtering only
.
, full path URL checking
.
.
164
NBG-460N User’s Guide
CHAPTER15
IPSec VPN
15.1 IPSec VPN Overview
A virtual private network (VPN) provides secure communications between sites without the
expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption,
authentication, access control and auditing. It is used to transport traffic over the Internet or
any insecure network that uses TCP/IP for communication.
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for
secure data communications across a public network like the Internet. IPSec is built around a
number of standardized cryptographic techniques to provide confidentiality, data integrity and
authentication at the IP layer.
The following figure provides one perspective of a VPN tunnel.
Figure 102 IPSec VPN: Overview
The VPN tunnel connects the NBG-460N (X) and the remote IPSec router (Y). These routers
then connect the local network (A) and remote network (B).
15.1.1 What You Can Do in the IPSec VPN Screens
Use the General Screen (Section 15.2 on page 167) to display and manage the NBG-460N’s
VPN rules (tunnels).
Use the SA Monitor Screen (Section 15.3 on page 184) to display and manage active VPN
connections.
NBG-460N User’s Guide
165
Chapter 15 IPSec VPN
15.1.2 What You Need To Know About IPSec VPN
A VPN tunnel is usually established in two phases. Each phase establishes a security
association (SA), a contract indicating what security parameters the NBG-460N and the
remote IPSec router will use. The first phase establishes an Internet Key Exchange (IKE) SA
between the NBG-460N and remote IPSec router. The second phase uses the IKE SA to
securely establish an IPSec SA through which the NBG-460N and remote IPSec router can
send data between computers on the local network and remote network. The following figure
illustrates this.
Figure 103 VPN: IKE SA and IPSec SA
In this example, a computer in network A is exchanging data with a computer in network B.
Inside networks A and B, the data is transmitted the same way data is normally transmitted in
the networks. Between routers X and Y, the data is protected by tunneling, encryption,
authentication, and other security features of the IPSec SA. The IPSec SA is established
securely using the IKE SA that routers X and Y established first.
15.1.3 IKE SA (IKE Phase 1) Overview
The IKE SA provides a secure connection between the NBG-460N and remote IPSec router.
It takes several steps to establish an IKE SA. The negotiation mode determines the number of
steps to use. There are two negotiation modes--main mode and aggressive mode. Main mode
provides better security, while aggressive mode is faster.
Note: Both routers must use the same negotiation mode.
These modes are discussed in more detail in Negotiation Mode on page 188. Main mode is
used in various examples in the rest of this section.
15.1.3.1 IP Addresses of the NBG-460N and Remote IPSec Router
In the NBG-460N, you have to specify the IP addresses of the NBG-460N and the remote
IPSec router to establish an IKE SA.
You can usually provide a static IP address or a domain name for the NBG-460N. Sometimes,
your NBG-460N might also offer another alternative, such as using the IP address of a port or
interface.
166
NBG-460N User’s Guide
You can usually provide a static IP address or a domain name for the remote IPSec router as
well. Sometimes, you might not know the IP address of the remote IPSec router (for example,
telecommuters). In this case, you can still set up the IKE SA, but only the remote IPSec router
can initiate an IKE SA.
15.1.4 IPSec SA (IKE Phase 2) Overview
Once the NBG-460N and remote IPSec router have established the IKE SA, they can securely
negotiate an IPSec SA through which to send data between computers on the networks.
Note: The IPSec SA stays connected even if the underlying IKE SA is not available
anymore.
This section introduces the key components of an IPSec SA.
15.1.4.1 Local Network and Remote Network
In an IPSec SA, the local network consists of devices connected to the NBG-460N and may be
called the local policy. Similarly, the remote network consists of the devices connected to the
remote IPSec router and may be called the remote policy.
Chapter 15 IPSec VPN
Note: It is not recommended to set a VPN rule’s local and remote network settings
both to 0.0.0.0 (any). This causes the NBG-460N to try to forward all access
attempts (to the local network, the Internet or even the NBG-460N) to the
remote IPSec router. In this case, you can no longer manage the NBG-460N.
15.2 The General Screen
Click Security > VPN to display the Summary screen. This is a read-only menu of your VPN
rules (tunnels). Edit a VPN rule by clicking the Edit icon.
Figure 104 Security > VPN > General
NBG-460N User’s Guide
167
Chapter 15 IPSec VPN
The following table describes the fields in this screen.
Table 62 Security > VPN > General
LABELDESCRIPTION
#This is the VPN policy index number.
ActiveThis field displays whether the VPN policy is active or not.
Local Addr.This displays the beginning and ending (static) IP addresses or a (static) IP address
Remote Addr.This displays the beginning and ending (static) IP addresses or a (static) IP address
Encap.This field displays Tunnel or Transport mode (Tunnel is the default selection).
AlgorithmThis field displays the security protocol, encrypti on algorithm and authentication
GatewayThis is the static WAN IP address or URL of the remote IPSec router. This field
ModifyClick the Edit icon to go to the screen where you can edit the VPN rule.
Windows
Networking
(NetBIOS over
TCP/IP)
Allow NetBIOS
Traffic Through
IPSec Tunnel
ApplyClick Apply to save your changes back to the NBG-460N.
ResetClick Reset to begin configuring this screen afresh.
This icon is turned on when the rule is enabled.
and a subnet mask of computer(s) on your local network behind your NBG-460N.
and a subnet mask of computer(s) on the remote network behind the remote IPSec
router.
This field displays 0.0.0.0 when the Secure Gateway Address field displays 0.0.0.0.
In this case only the remote IPSec router can initiate the VPN.
algorithm used for an SA.
displays 0.0.0.0 when you configure the Secure Gateway Address field in the Rule Setup screen to 0.0.0.0.
Click the Remove icon to remove an existing VPN rule.
NetBIOS (Network Basic Input/Output System) are TCP or UDP packets that enable
a computer to find other computers. It may sometimes be necessary to allow
NetBIOS packets to pass through VPN tunnels in order to allow local computers to
find computers on the remote network and vice versa.
Select this check box to send NetBIOS packets through the VPN connection.
15.2.1 VPN Rule Setup (Basic)
Click the Edit icon in the General screen to display the Rule Setup screen.
This figure helps explain the main fields.
168
NBG-460N User’s Guide
Figure 105 IPSec Fields Summary
Use this screen to configure a VPN rule.
Figure 106 Security > VPN > General > Rule Setup: IKE (Basic)
Chapter 15 IPSec VPN
NBG-460N User’s Guide
169
Chapter 15 IPSec VPN
The following table describes the labels in this screen.
Table 63 SECURITY > VPN > Rule Setup: IKE (Basic)
LABELDESCRIPTION
Property
ActiveSelect this check box to activate this VPN policy.
Keep AliveSelect this check box to have the NBG-460N automatically reinitiate the SA after
NAT TraversalSelect this check box to enable NAT traversal. NAT traversal allows you to set up
IPSec Keying
Mode
DNS Server (for
IPSec VPN)
Local PolicyLocal IP addresses must be static and correspond to the remote IPSec router's
Local AddressFor a single IP address, enter a (static) IP address on the LAN behind your NBG-
Local Address End
/Mask
the SA lifetime times out, even if there is no traffic. The remote IPSec router must
also have keep alive enabled in order for this feature to work.
a VPN connection when there are NAT routers between the two IPSec routers.
Note: The remote IPSec router must also have NAT traversal
enabled.
You can use NAT traversal with ESP protocol using Transport or Tunnel mode,
but not with AH protocol nor with manual key management. In order for an IPSec
router behind a NAT router to receive an initiating IPSec packet, set the NAT
router to forward UDP ports 500 and 4500 to the IPSec router behind the NAT
router.
Select IKE or Manual from the drop-down list box. IKE provides more protection
so it is generally recommended. Manual is a useful option for troubleshooting if
you have problems using IKE key management.
If there is a private DNS server that services the VPN, type its IP address here.
The NBG-460N assigns this additional DNS server to the NBG-460N's DHCP
clients that have IP addresses in this IPSec rule's range of local addresses.
A DNS server allows clients on the VPN to find other computers and servers on
the VPN by their (private) domain names.
configured remote IP addresses.
Two active SAs can have the same configured local or remote IP address, but not
both. You can configure multiple SAs between the same local and remote IP
addresses, as long as only one is active at any time.
In order to have more than one active rule with the Secure Gateway Address
field set to 0.0.0.0, the ranges of the local IP addresses cannot overlap between
rules.
If you configure an active rule with 0.0.0.0 in the Secure Gateway Address field
and the LAN’s full IP address range as the local IP address, then you cannot
configure any other active rules with the Secure Gateway Address field set to
0.0.0.0.
460N.
For a specific range of IP addresses, enter the beginning (static) IP address, in a
range of computers on your LAN behind your NBG-460N.
To specify IP addresses on a network by their subnet mask, enter a (static) IP
address on the LAN behind your NBG-460N.
When the local IP address is a single address, type it a second time here.
When the local IP address is a range, enter the end (static) IP address, in a range
of computers on the LAN behind your NBG-460N.
When the local IP address is a subnet address, enter a subnet mask on the LAN
behind your NBG-460N.
Remote PolicyRemote IP addresses must be static and correspond to the remote IPSec router's
Remote AddressFor a single IP address, enter a (static) IP address on the network behind the
Remote Address
End /Mask
Authentication
Method
My IP Address Enter the NBG-460N's static WAN IP address (if it has one) or leave the field set
Local ID TypeSelect IP to identify this NBG-460N by its IP address.
Local ContentWhen you select IP in the Local ID Type field, type the IP address of your
configured local IP addresses. The remote fields do not apply when the Secure Gateway IP Address field is configured to 0.0.0.0. In this case only the remote
IPSec router can initiate the VPN.
Two active SAs cannot have the local and remote IP address(es) both the same.
Two active SAs can have the same local or remote IP address, but not both. You
can configure multiple SAs between the same local and remote IP addresses, as
long as only one is active at any time.
remote IPSec router.
For a specific range of IP addresses, enter the beginning (static) IP address, in a
range of computers on the network behind the remote IPSec router.
To specify IP addresses on a network by their subnet mask, enter a (static) IP
address on the network behind the remote IPSec router.
When the remote IP address is a single address, type it a second time here.
When the remote IP address is a range, enter the end (static) IP address, in a
range of computers on the network behind the remote IPSec router.
When the remote IP address is a subnet address, enter a subnet mask on the
network behind the remote IPSec router.
to 0.0.0.0.
The NBG-460N uses its current WAN IP address (static or dynamic) in setting up
the VPN tunnel if you leave this field as 0.0.0.0. If the WAN connection goes
down, the NBG-460N uses the dial backup IP address for the VPN tunnel when
using dial backup or the LAN IP address when using traffic re dire ct.
Otherwise, you can enter one of the dynamic domain names that you have
configured (in the DDNS screen) to have the NBG-460N use that dynamic
domain name's IP address.
The VPN tunnel has to be rebuilt if My IP Address changes after setup.
Select Domain Name to identify this NBG-460N by a domain name.
Select E-mail to identify this NBG-460N by an e-mail address.
computer in the Local Content field. The NBG-460N automatically uses the IP
address in the My IP Address field (refer to the My IP Address field description)
if you configure the Local Content field to 0.0.0.0 or leave it blank.
It is recommended that you type an IP address other than 0.0.0.0 in the LocalContent field or use the Domain Name or E-mail ID type in the following
situations.
•When there is a NAT router between the two IPSec routers.
•When you want the remote IPSec router to be able to distinguish between
VPN connection requests that come in from IPSec routers with dynamic WAN
IP addresses.
When you select Domain Name or E-mail in the Local ID Type field, type a
domain name or e-mail address by which to identify this NBG-460N in the LocalContent field. Use up to 31 ASCII characters including spaces, although tra iling
spaces are truncated. The domain name or e-mail address is for identification
purposes only and can be any string.
Type the WAN IP address or the domain name (up to 31 characters) of the IPSec
router with which you're making the VPN connection. Set this field to 0.0.0.0 if the
remote IPSec router has a dynamic WAN IP address (the IPSec Keying Mode
field must be set to IKE).
In order to have more than one active rule with the Secure Gateway Address
field set to 0.0.0.0, the ranges of the local IP addresses cannot overlap between
rules.
If you configure an active rule with 0.0.0.0 in the Secure Gateway Address field
and the LAN’s full IP address range as the local IP address, then you cannot
configure any other active rules with the Secure Gateway Address field set to
0.0.0.0.
Note: You can also enter a remote secure gateway’s domain
name in the Secure Gateway Address field if the remote
secure gateway has a dynamic WAN IP address and is
using DDNS. The NBG-460N has to rebuild the VPN tunnel
each time the remote secure gateway’s WAN IP address
changes (there may be a delay until the DDNS servers are
updated with the remote gateway’s new WAN IP address).
Peer ID TypeSelect IP to identify the remote IPSec router by its IP address.
Select Domain Name to identify the remote IPSec router by a domain name.
Select E-mail to identify the remote IPSec router by an e-mail address.
Peer ContentThe configuration of the peer content depends on the peer ID type.
For IP, type the IP address of the computer with which you will make the VPN
connection. If you configure this field to 0.0.0.0 or leave it blank, the NBG-46 0N
will use the address in the Secure Gateway Address field (refer to the Secure Gateway Address field description).
For Domain Name or E-mail, type a domain name or e-mail address by which to
identify the remote IPSec router. Use up to 31 ASCII characters including spaces,
although trailing spaces are truncated. The domain name or e-mail address is for
identification purposes only and can be any string.
It is recommended that you type an IP address other than 0.0.0.0 or use the
Domain Name or E-mail ID type in the following situations:
•When there is a NAT router between the two IPSec routers.
•When you want the NBG-460N to distinguish between VPN connection
requests that come in from remote IPSec routers with dynamic WAN IP
addresses.
IPSec Algorithm
Encapsulation
Mode
IPSec ProtocolSelect the security protocols used for an SA.
Select Tunnel mode or Transport mode from the drop-down list box.
Both AH and ESP increase processing requ irements and communications
latency (delay).
If you select ESP here, you must select options from the Encryption Algorithm
and Authentication Algorithm fields (described below).
Pre-Shared KeyType your pre-shared key in this field. A pre-shared key identifies a
Encryption
Algorithm
Authentication
Algorithm
Advanced...Click Advanced... to configure more detailed settings of your IKE key
ApplyClick Apply to save your changes back to the NBG-460N.
ResetClick Reset to begin configuring this screen afresh.
CancelClick Cancel to exit the screen without makin g any changes.
communicating party during a phase 1 IKE negotiation. It is called "pre-shared"
because you have to share it with another party before you can communicate
with them over a secure connection.
Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal
("0-9", "A-F") characters. You must precede a hexadecimal key with a "0x” (zero
x), which is not counted as part of the 16 to 62 character range for the key. For
example, in "0x0123456789ABCDEF", “0x” denotes that the key is hexadecimal
and “0123456789ABCDEF” is the key itself.
Both ends of the VPN tunnel must use the same pre-shared key. You will receive
a “PYLD_MALFORMED” (payload malformed) packet if the same pre-shared key
is not used on both ends.
Select which key size and encryption algorithm to use for data communications.
Choices are:
DES - a 56-bit key with the DES encryption algorithm
3DES - a 168-bit key with the DES encryption algorithm
The NBG-460N and the remote IPSec router must use the same algorithms and
key , which can be used to encrypt and decrypt the message or to generate and
verify a message authentication code. Longer keys require more processing
power, resulting in increased latency and decreased throughput.
Select which hash algorithm to use to authenticate packet data. Choices are
SHA1 and MD5. SHA1 is generally considered stronger than MD5, but it is also
slower.
management.
15.2.2 VPN Rule Setup (Advanced)
Click the Advanced... button in the Rule Setup screen to open this screen.
Use this screen to configure a VPN rule.
NBG-460N User’s Guide
173
Chapter 15 IPSec VPN
Figure 107 Security > VPN > General > Rule Setup: IKE (Advanced)
174
NBG-460N User’s Guide
Chapter 15 IPSec VPN
The following table describes the labels in this screen.
Table 64 Security > VPN > Rule Setup: IKE (Advanced)
LABELDESCRIPTION
Property
ActiveSelect this check box to activate this VPN policy.
Keep AliveSelect this check box to have the NBG-460N automatically reinitiate the SA
NAT TraversalSelect this check box to enable NAT traversal. NAT traversal allows you to set
after the SA lifetime times out, even if there is no traffic. The remote IPSec
router must also have keep alive enabled in order for this feature to work.
up a VPN connection when there are NAT routers between the two IPSec
routers.
Note: The remote IPSec router must also have NAT traversal
enabled.
You can use NAT traversal with ESP protocol using Transport or Tunnel
mode, but not with AH protocol nor with manual key management. In order for
an IPSec router behind a NAT router to receive an initiating IPSec packet, set
the NAT router to forward UDP ports 500 and 4500 to the IPSec router behind
the NAT router.
IPSec Keying ModeSelect IKE or Manual from the drop-down list box. IKE provides more
Protocol NumberEnter 1 for ICMP, 6 for TCP, 17 for UDP, etc. 0 is the default and signifies any
Enable Replay
Detection
DNS Server (for
IPSec VPN)
Local PolicyLocal IP addresses must be static and correspond to the remote IPSec router's
Local AddressFor a single IP address, enter a (static) IP address on the LAN behind your
protection so it is generally recommended. Manual is a useful option for
troubleshooting if you have problems using IKE key management.
protocol.
As a VPN setup is processing intensive, the system is vulnerable to Denial of
Service (DoS) attacks The IPSec receiver can detect and reject old or duplicate
packets to protect against replay attacks. Select Yes from the drop-down menu
to enable replay detection, or select No to disable it.
If there is a private DNS server that services the VPN, type its IP address here.
The NBG-460N assigns this additional DNS server to the NBG-460N's DHCP
clients that have IP addresses in this IPSec rule's range of local addresses.
A DNS server allows clients on the VPN to find other computers and servers on
the VPN by their (private) domain names.
configured remote IP addresses.
Two active SAs can have the same configured local or remote IP address, but
not both. You can configure multiple SAs between the same local and remote IP
addresses, as long as only one is active at any time.
In order to have more than one active rule with the Secure Gateway Address
field set to 0.0.0.0, the ranges of the local IP addresses cannot overlap between
rules.
If you configure an active rule with 0.0.0.0 in the Secure Gateway Address
field and the LAN’s full IP address range as the local IP address, then you
cannot configure any other active rules with the Secure Gateway Address field
set to 0.0.0.0.
NBG-460N.
For a specific range of IP addresses, enter the beginning (static) IP address, in
a range of computers on your LAN behind your NBG-460N.
To specify IP addresses on a network by their subnet mask, enter a (static) IP
Local Port Start 0 is the default and signifies any port. Type a port number from 0 to 65535.
Local Port End Enter a port number in this field to define a port range. This port number must
Remote PolicyRemote IP addresses must be static and correspond to the remote IPSec
Remote AddressFor a single IP address, enter a (static) IP address on the network behind the
Remote Address
End /Mask
Remote Port Start 0 is the default and signifies any port. Type a port number from 0 to 65535.
Remote Port End Enter a port numb er in this field to define a port range. This port number must
Authentication
Method
My IP Address Enter the NBG-460N's static WAN IP address (if it has one) or leave the field
Local ID TypeSelect IP to identify this NBG-460N by its IP address.
When the local IP address is a single address, type it a second time here.
When the local IP address is a range, enter the end (static) IP address, in a
range of computers on the LAN behind your NBG-460N.
When the local IP address is a subnet address, enter a subnet mask on the
LAN behind your NBG-460N.
Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80,
HTTP; 25, SMTP; 110, POP3.
be greater than that specified in the previous field. If Local Port Start is left at
0, Local Port End will also remain at 0.
router's configured local IP addresses. The remote fields do not apply when the
Secure Gateway IP Address field is configured to 0.0.0.0. In this case only the
remote IPSec router can initiate the VPN.
Two active SAs cannot have the local and remote IP address(es) both the
same. Two active SAs can have the same local or remote IP address, but not
both. You can configure multiple SAs between the same local and remote IP
addresses, as long as only one is active at any time.
remote IPSec router.
For a specific range of IP addresses, enter the beginning (static) IP address, in
a range of computers on the network behind the remote IPSec router.
To specify IP addresses on a network by their subnet mask, enter a (static) IP
address on the network behind the remote IPSec router.
When the remote IP address is a single address, type it a second time here.
When the remote IP address is a range, enter the end (static) IP address, in a
range of computers on the network behind the remote IPSec router.
When the remote IP address is a subnet address, enter a subnet mask on the
network behind the remote IPSec router.
Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80,
HTTP; 25, SMTP; 110, POP3.
be greater than that specified in the previous field. If Remote Port Start is left at
0, Remote Port End will also remain at 0.
set to 0.0.0.0.
The NBG-460N uses its current WAN IP address (static or dynamic) in setting
up the VPN tunnel if you leave this field as 0.0.0.0. If the WAN connection goes
down, the NBG-460N uses the dial backup IP address for the VPN tunnel when
using dial backup or the LAN IP address when using traffic redirect.
Otherwise, you can enter one of the dynamic domain names that you have
configured (in the DDNS screen) to have the NBG-460N use that dynamic
domain name's IP address.
The VPN tunnel has to be rebuilt if My IP Address changes after setup.
Select Domain Name to identify this NBG-460N by a domain name.
Select E-mail to identify this NBG-460N by an e-mail address.
Local ContentWhen you select IP in the Local ID Type field, type the IP address of your
Secure Gateway
Address
computer in the Local Content field. The NBG-460N automatically uses the IP
address in the My IP Address field (refer to the My IP Address field
description) if you configure the Local Content field to 0.0.0.0 or leave it blank.
It is recommended that you type an IP address other than 0.0.0.0 in the LocalContent field or use the Domain Name or E-mail ID type in the following
situations.
•When there is a NAT router between the two IPSec routers.
•When you want the remote IPSec router to be able to distinguish between
VPN connection requests that come in from IPSec routers with dynamic
WAN IP addresses.
When you select Domain Name or E-mail in the Local ID Type field, type a
domain name or e-mail address by which to identify this NBG-460N in the LocalContent field. Use up to 31 ASCII characters including spaces, although trailing
spaces are truncated. The domain name or e-mail address is for identification
purposes only and can be any string.
Type the WAN IP address or the domain name (up to 31 characters) of the
IPSec router with which you're making the VPN connection. Set this field to
0.0.0.0 if the remote IPSec router has a dynamic WAN IP address (the IPSec
Keying Mode field must be set to IKE).
In order to have more than one active rule with the Secure Gateway Address
field set to 0.0.0.0, the ranges of the local IP addresses cannot overlap between
rules.
If you configure an active rule with 0.0.0.0 in the Secure Gateway Address
field and the LAN’s full IP address range as the local IP address, then you
cannot configure any other active rules with the Secure Gateway Address field
set to 0.0.0.0.
Note: You can also enter a remote secure gateway’s domain
name in the Secure Gateway Address field if the remote
secure gateway has a dynamic WAN IP address and is
using DDNS. The NBG-460N has to rebuild the VPN
tunnel each time the remote secure gateway’s WAN IP
address changes (there may be a delay until the DDNS
servers are updated with the remote gateway’s new WAN
IP address).
Peer ID TypeSelect IP to identify the remote IPSec router by its IP address.
Select Domain Name to identify the remote IPSec router by a domain name.
Select E-mail to identify the remote IPSec router by an e-mail address.
Peer ContentThe configuration of the peer content depends on the peer ID type.
IKE Phase 1
Negotiation ModeSelect Main or Aggressive from the drop-down list box. Multiple SAs
Encryption Algorithm Select which key size and encryption algorithm to use in the IKE SA. Choices
Authentication
Algorithm
SA Life Time
(Seconds)
Key GroupSelect which Diffie-Hellman key group (DHx) you want to use for encryption
Pre-Shared KeyType your pre-shared key in this field. A pre-shared key identifies a
IKE Phase 2
Encapsulation Mode Select Tunnel mode or Transport mode.
For IP, type the IP address of the computer with which you will make the VPN
connection. If you configure this field to 0.0.0.0 or leave it blank, the NBG-460N
will use the address in the Secure Gateway Address field (refer to the SecureGateway Address field description).
For Domain Name or E-mail, type a domain name or e-mail address by which
to identify the remote IPSec router. Use up to 31 ASCII characters including
spaces, although trailing spaces are truncated. The domain name or e-mail
address is for identification purposes only and can be any string.
It is recommended that you type an IP address other than 0.0.0.0 or use the
Domain Name or E-mail ID type in the following situations:
•When there is a NAT router between the two IPSec routers.
•When you want the NBG-460N to distinguish between VPN connection
requests that come in from remote IPSec routers with dynamic WAN IP
addresses.
connecting through a secure gateway must have the same negotiation mode.
are:
DES - a 56-bit key with the DES encryption algorithm
3DES - a 168-bit key with the DES encryption algorithm
The NBG-460N and the remote IPSec router must use the same algorithms and
keys. Longer keys require more processing power, resulting in increased
latency and decreased throughput.
Select which hash algorithm to use to authenticate packet data in the IKE SA.
Choices are SHA1 and MD5. SHA1 is generally considered stronger than MD5,
but it is also slower.
Define the length of time before an IKE SA automatically renegotiates in this
field. It may range from 180 to 3,000,000 seconds (almost 35 days).
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
keys. Choices are:
DH1 - use a 768-bit random number
DH2 - use a 1024-bit random number
communicating party during a phase 1 IKE negotiation. It is called "pre-shared"
because you have to share it with another party before you can communicate
with them over a secure connection.
Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62
hexadecimal ("0-9", "A-F") characters. You must precede a hexadecimal key
with a "0x” (zero x), which is not counted as part of the 16 to 62 character range
for the key. For example, in "0x0123456789ABCDEF", “0x” denotes that the key
is hexadecimal and “0123456789ABCDEF” is the key itself.
Both ends of the VPN tunnel must use the same pre-shared key. You will
receive a “PYLD_MALFORMED” (payload malformed) packet if the same preshared key is not used on both ends.
IPSec ProtocolSelect the security protocols used for an SA.
Both AH and ESP increase processing requirements and communications
latency (delay).
If you select ESP here, you must select options from the Encryption Algorithm
and Authentication Algorithm fields (described below).
Encryption Algorithm Select which key size and encryption algorithm to use in the IKE SA. Choices
Authentication
Algorithm
SA Life Time Define the length of time before an IPSec SA automatically renegotiates in this
Perfect Forward
Secrecy (PFS)
Basic...Click Basic... to go to the previous VPN configuration screen.
ApplyClick Apply to save the changes.
ResetClick Reset to begin configuring this screen afresh.
CancelClick Cancel to exit the screen without making any changes.
are:
DES - a 56-bit key with the DES encryption algorithm
3DES - a 168-bit key with the DES encryption algorithm
The NBG-460N and the remote IPSec router must use the same algorithms and
keys. Longer keys require more processing power, resulting in increased
latency and decreased throughput.
Select which hash algorithm to use to authenticate packet data in the IPSec SA.
Choices are SHA1 and MD5. SHA1 is generally considered stronger than MD5,
but it is also slower.
field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Select whether or not you want to enable Perfect Forward Secrecy (PFS) and, if
you do, which Diffie-Hellman key group to use for encryption. Choices are:
None - disable PFS
DH1 - enable PFS and use a 768-bit random number
DH2 - enable PFS and use a 1024-bit random number
PFS changes the root key that is used to generate encryption keys for each
IPSec SA. It is more secure but takes more time.
15.2.3 VPN Rule Setup (Manual)
Use this screen to configure VPN rules (tunnels) that use manual keys. Manual key
management is useful if you have problems with IKE key management.
Select Manual in the IPSec Keying Mode field on the Rule Setup screen to open the screen
as shown in Figure 108 on page 181.
15.2.3.1 IPSec SA Using Manual Keys
You might set up an IPSec SA using manual keys when you want to establish a VPN tunnel
quickly, for example, for troubleshooting. You should only do this as a temporary solution,
however, because it is not as secure as a regular IPSec SA.
NBG-460N User’s Guide
179
Chapter 15 IPSec VPN
In IPSec SAs using manual keys, the NBG-460N and remote IPSec router do not establish an
IKE SA. They only establish an IPSec SA. As a result, an IPSec SA using manual keys has
some characteristics of IKE SA and some characteristics of IPSec SA. There are also some
differences between IPSec SA using manual keys and other types of SA.
15.2.3.2 IPSec SA Proposal Using Manual Keys
In IPSec SA using manual keys, you can only specify one encryption algorithm and one
authentication algorithm. There is no DH key exchange, so you have to provide the encryption
key and the authentication key the NBG-460N and remote IPSec router use.
Note: The NBG-460N and remote IPSec router must use the same encryption key
and authentication key.
15.2.3.3 Authentication and the Security Parameter Index (SPI)
For authentication, the NBG-460N and remote IPSec router use the SPI, instead of pre-shared
keys, ID type and content. The SPI is an identification number.
Note: The NBG-460N and remote IPSec router must use the same SPI.
180
NBG-460N User’s Guide
Loading...
+ 70 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.