Allied Telesis AR440S manual # Firewall configuration

Page 41

Headquarters

# FIREWALL configuration

enable firewall

create firewall policy=hq

enable firewall policy=hq icmp_f=all

#Define a firewall dynamic definition to work with dynamic

#interfaces. This provides for the dynamic PPP/L2TP interfaces that

#incoming Windows VPN connections use.

create firewall policy=hq dy=roaming

add firewall policy=hq dy=roaming user=any

#Specify the private and public interfaces. The roaming interface is

#private - you can trust it because it comes from an authenticated

#Windows VPN connection.

add firewall policy=hq int=dyn-roaming type=private

add firewall policy=hq int=vlan1 type=private

add firewall policy=hq int=eth0 type=public

#Create a NAT definition for traffic from the headquarters LAN to

#use when accessing the Internet.

add firewall poli=hq nat=enhanced int=vlan1 gblin=eth0

#Create another NAT definition for roaming VPN clients to use when

#accessing the Internet via the headquarters router.

add firewall poli=hq nat=enhanced int=dyn-roaming gblin=eth0

#Create a rule to allow incoming ISAKMP negotiation to pass through

#the firewall.

add firewall poli=hq ru=1 ac=allo int=eth0 prot=udp po=500 ip=200.200.200.1 gblip=200.200.200.1 gblp=500

#Create a rule to support NAT-T. If there is a NAT gateway in the

#VPN path, NAT-T "port floats" IKE to port 4500, and also

#encapsulates IPsec inside the same port.

add firewall poli=hq ru=2 ac=allo int=eth0 prot=udp po=4500 ip=200.200.200.1 gblip=200.200.200.1 gblp=4500

#Create a rule for the roaming VPN clients. Windows uses L2TP (port

#1701) inside IPsec. This rule allows traffic that comes from IPsec

#and uses port 1701.

add firewall poli=hq ru=3 ac=allo int=eth0 prot=udp po=1701 ip=200.200.200.1 gblip=200.200.200.1 gblp=1701 enc=ips

#Create a pair of rules to allow office-to-office payload traffic to

#pass through the firewall without applying NAT.

#The rule for the public interface uses encapsulation=ipsec to

#identify incoming VPN traffic.

add firewall poli=hq ru=4 ac=non int=eth0 prot=all enc=ips

#The rule for the private interface uses both source and destination

#addresses to identify outgoing VPN traffic.

add firewall poli=hq ru=5 ac=non int=vlan1 prot=all ip=192.168.140.1-192.168.140.254

set firewall poli=hq ru=5 rem=192.168.141.0-192.168.144.254

Page 41 AlliedWare™ OS How To Note: VPNs for Corporate Networks

Image 41
Contents Introduction ContentsRelated How To Notes L2TP About IPsec modes tunnel and transportInternet Background NAT-T and policies5 AlliedWare OS How To Note VPNs for Corporate Networks Vlan How to configure VPNs in typical corporate networksATM Dslam Before you startConfigure general system and user settings How to configure the headquarters VPN access concentratorConfigure remote management access, if desired Configure IP for internet accessCapture status information remotely, if desired Configure dynamic PPP over L2TP connectionsCheck feature licences Enable Isakmp Configure the firewall’s basic settings Configure the firewall’s access rules Save your configuration How to configure the AR440S router at branch office Configure IP Configure Adsl for internet accessConfigure PPP for PPPoA 18 AlliedWare OS How To Note VPNs for Corporate Networks Create ip pool=roaming ip=192.168.144.1-192.168.144.50 Create ipsec pol=internet int=ppp0 ac=permit Add firewall policy=branch1 int=vlan1 type=private 22 AlliedWare OS How To Note VPNs for Corporate Networks 23 AlliedWare OS How To Note VPNs for Corporate Networks Set system name=Branch2 Configure PPP for PPPoE 26 AlliedWare OS How To Note VPNs for Corporate Networks Configure the VPNs for connecting to the headquarters office Enable isakmp 29 AlliedWare OS How To Note VPNs for Corporate Networks How to make voice traffic high priority Reduce the MTU Create classifiersFor roaming clients, set L2TP TOS reflection For site-to-site VPNs, apply the SQoS policy to the tunnelsSet int=ppp0 mtu=256 34 AlliedWare OS How To Note VPNs for Corporate Networks Apply the SQoS policy to the tunnel LANs are How to test your VPN solutionBefore you use these scripts Configuration scripts for headquarters and branch officesHeadquarters VPN access concentrators configuration # SSH configuration # Dhcp configuration# Log configuration # Ipsec configuration# Isakmp Configuration # Firewall configuration # Classifier configuration if prioritising VoIP # INT configuration if prioritising VoIP# Software QoS configuration if prioritising VoIP # Trigger configuration if prioritising VoIP# PPP configuration for PPPoA # ATM configuration# Adsl configuration 44 AlliedWare OS How To Note VPNs for Corporate Networks 45 AlliedWare OS How To Note VPNs for Corporate Networks 46 AlliedWare OS How To Note VPNs for Corporate Networks Set int=ppp0 mtu=256 Set int=ppp0 frag=yes # PPP configuration for PPPoE # ETH configuration49 AlliedWare OS How To Note VPNs for Corporate Networks 50 AlliedWare OS How To Note VPNs for Corporate Networks 51 AlliedWare OS How To Note VPNs for Corporate Networks # PPP configuration ISPs PPPoE access concentrator configuration# PPP templates configuration # Firewall configuration enable firewall Hotels NAT gateway firewall configuration
Related manuals
Manual 54 pages 52.17 Kb

AR440S specifications

Allied Telesis offers a range of advanced routers designed to meet the connectivity and operational needs of modern enterprises. Among its extensive lineup, the AR450S, AR441S, AR415S, AR442S, and AR440S models stand out for their robust features and technologies, making them ideal solutions for various networking environments.

The Allied Telesis AR450S is a high-performance router tailored for service providers and large enterprises. It supports advanced routing protocols, including IPv4 and IPv6, ensuring compatibility with both legacy and modern networks. The AR450S boasts substantial throughput capabilities, making it suitable for bandwidth-intensive applications. Its versatile WAN options, including Ethernet and cellular connectivity, allow seamless integration into diverse network architectures.

Next in the lineup is the AR441S, which focuses on providing enhanced security and reliability. With built-in firewall capabilities and VPN support, this model ensures secure communication over the internet. The AR441S also features numerous Ethernet ports for flexible connectivity, enabling organizations to scale their networks as needed. Its user-friendly interface facilitates straightforward configuration and management.

The AR415S is designed for branch offices and small to medium-sized enterprises. This router offers a balance of performance and affordability, equipped with essential features like Quality of Service (QoS) and traffic shaping. The AR415S supports multiple WAN connections, which helps in maintaining reliable internet access by auto-failing to backup connections when necessary.

The AR442S incorporates advanced networking technologies, including dynamic routing protocols and deep packet inspection. This model enhances performance by optimizing traffic flow and improving bandwidth utilization. Its support for VoIP and other multimedia applications makes it an excellent choice for organizations seeking to maximize their communication capabilities.

Lastly, the AR440S is engineered for high availability and redundancy. It includes dual power supplies and hot-swappable components, ensuring that network services remain uninterrupted during maintenance. The AR440S is particularly valuable in mission-critical environments where downtime can lead to significant business disruption.

In summary, the Allied Telesis AR series routers—AR450S, AR441S, AR415S, AR442S, and AR440S—offer a rich set of features tailored to various operational needs. With their advanced routing capabilities, security features, and reliable performance, these routers represent the cutting edge of networking technology for businesses looking to enhance their connectivity and operational efficiency.