Configuring the router > The configuration script

#Firewall enable fire

create fire poli=main

create fire poli=main dy=dynamic

add fire poli=main dy=dynamic user=ANY add fire poli=main int=vlan1 type=private

#Dynamic private interfaces are accepted from L2TP, which are from

#IPSec only.

add fire poli=main int=dyn-dynamic type=private add fire poli=main int=eth0 type=public

#The firewall allows for internally generated access to the Internet

#through the following NAT definition.

add fire poli=main nat=enhanced int=vlan1 gblint=eth0

#This NAT definition allows Internet access for remote VPN users by

#providing address translation.

add fire poli=main nat=enhanced int=dyn-dynamic gblint=eth0 add fire poli=main rule=1 int=eth0 action=allow prot=udp

ip=<office-Internet-address> port=500 gblip=<office-Internet-address> gblpo=500

#Rule 2 becomes the L2TP tunnel allow rule. Additional security is

#provided by only allowing traffic from IPSec tunnels.

add fire poli=main rule=2 int=eth0 action=allow prot=udp ip=<office-Internet-address> port=1701 gblip=<office-Internet-address> gblpo=1701 encap=ipsec

create ipsec sas=1 key=isakmp prot=esp encalg=3desouter hashalg=sha mode=transport

create ipsec sas=2 key=isakmp prot=esp encalg=3desouter hashalg=md5 mode=transport

create ipsec sas=3 key=isakmp prot=esp encalg=des hashalg=sha mode=transport

create ipsec sas=4 key=isakmp prot=esp encalg=des hashalg=md5 mode=transport

#The ORDER of proposals is important. You should propose the strongest

#encryption first.

create ipsec bundle=1 key=isakmp string=”1 or 2 or 3 or 4”

create ipsec policy=isakmp int=eth0 action=permit lport=500 rport=500

#This is a generic IPSec policy that multiple IPSec remote PC clients

#can connect through.

create ipsec policy=to_HQ int=eth0 action=ipsec key=isakmp bundle=1 peer=any isa=keys

set ipsec policy=to_HQ transport=udp rport=1701

#The following policy allows for internally generated Internet access. create ipsec policy=Internet int=eth0 act=permit

enable ipsec

create isakmp policy=keys peer=any key=1 set isakmp policy=keys sendd=true enable isakmp

Page 6 AlliedWare™ OS How To Note: VPNs with Windows 2000 clients, without NAT-T

Page 6
Image 6
Allied Telesis VPN manual Configuring the router The configuration script

VPN specifications

Allied Telesis is a prominent brand in the field of networking technology, known for providing innovative solutions that cater to various business needs. One of its key offerings is the Virtual Private Network (VPN) solution, designed to ensure secure and efficient communication over the internet. The Allied Telesis VPN solution is characterized by its robust security features, ease of management, and compatibility with a wide range of devices.

One of the main features of the Allied Telesis VPN is its strong encryption capabilities. It utilizes advanced encryption standards such as IPsec (Internet Protocol Security) and SSL (Secure Sockets Layer) protocols. These encryption methods are pivotal for safeguarding sensitive data as it travels across public networks, ensuring that information remains confidential and protected from eavesdropping.

Another significant aspect of the Allied Telesis VPN is its scalability. Businesses of all sizes can benefit from the solution due to its flexible architecture. Whether a small enterprise or a large corporation, the VPN can accommodate varying user loads and network demands. This scalability is coupled with comprehensive management tools that allow IT administrators to monitor performance, configure settings, and manage user access efficiently.

Allied Telesis also emphasizes ease of use in its VPN solution. The deployment process is streamlined, allowing organizations to establish their VPN connections quickly and without extensive technical expertise. Furthermore, the VPN client software is designed to be user-friendly, simplifying the connection process for remote workers and enabling them to access corporate resources securely from any location.

Moreover, the VPN incorporates features such as support for remote access, site-to-site connectivity, and automatic failover. Remote access enables employees to connect to the corporate network securely from remote locations, while site-to-site connectivity allows multiple office locations to communicate securely over the internet. Automatic failover ensures continuous connectivity and minimizes disruptions in case of network failures.

In addition to its technical capabilities, Allied Telesis places a high priority on customer support and service. They provide comprehensive documentation, online resources, and responsive support teams to assist clients in implementing and troubleshooting their VPN solutions.

Ultimately, the Allied Telesis VPN is a powerful tool for organizations looking to enhance their network security, ensure efficient remote access, and achieve seamless connectivity across multiple sites. With its strong encryption, scalability, ease of use, and robust support services, Allied Telesis continues to be a trusted choice for businesses aiming to secure their online communications.