You are on page 1of 9

VPN

Site-to-Site VPN Using DHCP Over VPN (SonicOS Enhanced at the Central Site)

Introduction: This document shows an example of how to configure a VPN tunnel between 2 SonicWALL firewalls, one running SonicOS Enhanced at the main site (central site) and the other one running SonicOS standard at the remote site. Remote PCs located behind the SonicWALL appliance on the remote site will obtain IP addresses automatically from a DHCP server located on the LAN zone of the Enhanced unit. Versions Used: SonicWALL recommends using the latest firmware version on the units. On this document this feature has been tested on SonicOS Enhanced 3.0.0.4-21e and SonicOS Standard 3.0.0.1-28s. Please note that SonicOS Enhanced runs on TZ170, PRO2040, PRO3060, PRO 4060 and Pro 5060 models. SonicOS Standard only runs on the TZ 150, TZ170, PRO2040, and PRO3060 models. Customers with current service/software support contracts can obtain updated versions of SonicWALL firmware from the MySonicWALL customer portal at https://www.mysonicwall.com. Updated firmware is also freely available to customers who have registered the SonicWALL device on MySonicWALL for the first 90 days Sample Diagram:

Task List Please note that this setup requires having a DHCP server correctly configured on the LAN zone of this firewall. On the SonicWALL units: At the central site: o Add and configure a VPN policy o Configure DHCP over VPN At the remote site: o Add and configure a VPN policy o Configure DHCP over VPN

Testing: Verify that the VPN tunnel comes up Verify that the DHCP client at the remote site obtains an IP address Verify that traffic flows correctly between the sites Verify that the DHCP client has access to its own network

Before You Begin: First of all make sure to have an available internet connection. If not, do so before completing any further steps. Make sure that you know the IP and MAC addresses of all static devices located on the remote site. Setup Steps: SonicWALL Central Site Configuration Go to the VPN > Settings page. Click the Add button to create a new VPN tunnel. A new pop-up screen will appear. On the General tab: From the IPSec Keying Mode drop-down, select IKE using Preshared Secret. In the Name: box, enter to remote site. In the IPSec Primary Gateway Name or Address box, enter the WAN IP address of the remote SonicWALL device. Leave the box next to IPSec Secondary Gateway Name or Address untouched. In the Shared Secret: box, enter in the Preshared key you wish to use (you will need to enter this same key on the remote SonicWALL device). Leave the Local IKE ID and Peer IKE ID options untouched.

On the Network tab: Select the address object that you wish you use as Local Network, in this example LAN Primary Subnet. Select the radio button next to Destination network obtains IP addresses using DHCP through this VPN tunnel on the Destination Networks.

On the Proposals tab: From the Phase 1 Exchange drop-down, select Main Mode. From the Phase 1 DH Group drop-down, select Group 2. From the Phase 1 Encryption drop-down, select 3DES. From the Phase 1 Authentication drop-down, select SHA1. In the Phase 1 box next to Life Time (seconds), enter 28800. From the Phase 2 Protocol: drop-down, select ESP. From the Phase 2 Authentication: drop-down, select SHA1. Do not check the box next to Enable Perfect Forward Secrecy. In the Phase 2 box next to Life Time (seconds), enter 28800.

On the Advanced tab: Select Enable Keep Alive. When done, click the OK button at the bottom to save and activate this VPN tunnel.

Your entries should look like this:

To finalize the configuration of the SonicWALL appliance at the central site, go to the VPN > DHCP over VPN page. Keep it as Central Gateway and click the Configure button. Select the checkbox Send DHCP requests to the server addresses listed below and add the IP address of your DHCP server (here: 192.168.168.254). Click OK and then Apply.

SonicWALL Remote Site Configuration Log into the Remote SonicWALL devices Management GUI and go to the VPN > Settings page. Click the Add button to create a new VPN tunnel. A new pop-up screen will appear.

On the General tab: From the IPSec Keying Mode drop-down, select IKE using Preshared Secret. In the Name: box, enter to central site. In the IPSec Primary Gateway Name or Address box, enter the WAN IP address of the Central SonicWALL device. Leave the box next to IPSec Secondary Gateway Name or Address untouched In the Shared Secret: box, enter in the Preshared key you wish to use (the same key you specified on the Central SonicWALL device). Select the radio button next to Specify destination networks below. Click on the Add button to enter in the Central SonicWALLs LAN IP network(s) and subnet mask.

On the Proposals tab: From the Phase 1 Exchange drop-down, select Main Mode. From the Phase 1 DH Group drop-down, select Group 2. From the Phase 1 Encryption drop-down, select 3DES. From the Phase 1 Authentication drop-down, select SHA1. In the Phase 1 box next to Life Time (seconds), enter 28800. From the Phase 2 Protocol: drop-down, select ESP. From the Phase 2 Authentication: drop-down, select SHA1. Do not check the box next to Enable Perfect Forward Secrecy. In the Phase 2 box next to Life Time (seconds), enter 28800. When done, click the OK button at the bottom to save and activate this VPN tunnel.

On the Advanced tab: Select Enable Keep Alive.

Your entries should look like this:

To finalize the configuration of the SonicWALL appliance at the Remote Site, go to the VPN > DHCP over VPN page. Choose Remote Gateway and click on the Configure button. The DHCP over VPN Configuration window is displayed. On the General tab: Select the VPN policy to be used for the VPN tunnel from the Relay DHCP through this VPN Tunnel menu. In our case it will be to central site. You can enter a static IP address in the Relay IP Address field. This static IP address is from the pool of specific IP addresses on the Central Gateway. It should not be available in the scope of DHCP addresses. The SonicWALL can also be managed through the Relay IP address. In this example we will leave it with zeros. Enter an IP address in the Remote Management IP Address field. This setting is used to manage the SonicWALL remotely through the VPN tunnel from behind the Central Gateway. Here we use 192.168.168.240. Leave the rest of the settings of this tab untouched.

On the Devices tab: Here you can add the IP addresses of the PCs at the remote site that have a static IP address. Click Add. The Add LAN Device Entry window is displayed. Type the IP address of the device in the IP Address field (192.168.38.190) and then enter the Ethernet Address of the device in the Ethernet Address field (00:50:FC:0D:5B:4F). Thank to this, the remote PCs that obtain an IP address of the central location will be able to communicate with the local PCs, which belong to a different IP range.

Testing On the remote PC configured to obtain an IP address automatically, open a command prompt box and type ipconfig /release and ipconfig /renew. It should obtain an IP address from the DHCP server at the central site. Type then ping 192.168.168.168, or ping 192.168.168.254. You should get a reply if not, check the settings on both devices and ensure that both sides were configured correctly. You can also log into either SonicWALLs Management GUI and verify that the tunnel is active by going to the VPN > Settings page. If the VPN tunnel is active, it will display in the Currently Active VPN Tunnels section. You can also try to manage the remote SonicWALL from the central site by opening a web browser and typing https://192.168.168.240.

You might also like