Jump to:navigation, search
Wiki








































Information on VPN configuration - Adaptive Secure Connect (ASC) - in the USC

Last adaptation to the version: 2.9

New:
notempty
This article refers to a Beta version
-
Access: portal.securepoint.cloud  Unified Security Console VPN configuration

Prerequisite

notempty
VPN configurations in the USC require a UTM v14.0 or higher.
notempty
Falls unverwaltete Geräte in der VPN-Konfiguration ASC verwendet werden sollen, so beschreiben folgende Wiki-Artikeln deren Konfiguration:

Introduction

  • The VPN configuration enables simple networking of UTMs via a star-shaped network topology
  • At the center is a core UTM, which acts as a central node.
    From here, several locations can be securely connected to each other via satellite UTMs.
  • In addition, groups of mobile end devices can be connected as road warriors

First configuration steps:

  1. Selection of the company headquarters as the core UTM.
    It forms the center of the star topology.
  2. Connection of further UTMs from other locations as satellites
  3. Configuration of the Roadwarrior for mobile devices



Configuration of the Core-UTM

Add Core UTM

 Add Core now Opens the dialog for adding a core UTM.
Appearance of the VPN configuration if no core UTM has been configured yet.
It is possible to have several core UTMs. Each core UTM is assigned to a topology Topology 1
Default designation and it is numbered consecutively
.
  • with Rename the selected topology can be renamed
  • with the topologies can be sorted

If a further Core-UTM and thus a further topology is to be added, this is done with the button Add topology

  • UTMs that have already been selected as core UTMs or satellite UTMs cannot be selected as new core UTMs
  • Caption Value Description
    Dialog box for adding a core UTM
    Typ UTM Als Typ UTM auswählen
    Name
    Mandatory field
    Name Name of the topology

    Dialog box for adding a core UTM

    UTM TTT-Point AG V List of available UTMs that can be selected as core UTMs. Only UTMs that have a public IP address, are connected to the portal and are online are available for selection. UTMs that are connected to the portal but are offline, or whose version is not compatible, are listed in the not available list section.
    The next steps are only displayed after a UTM has been selected.
    Alias
    Mandatory field
    LG1 An alias must be assigned for the core UTM in order to be able to assign generated objects to this UTM.
    Interface
    Mandatory field
    eth0 (203.113.0.113) The interface of the core UTM to be used for establishing the connection.
    ‘’'By default'‘’ the first interface that is connected to the Internet is used.
    Hostname/ public IP address
    Mandatory field
    203.113.0.113 The host name, or the public IP address, which is used to establish the connection.
    ‘’'By default'‘’ the public IP address of the Internet interface of the UTM is used.
    Transfer network
    Mandatory field
    192.168.20.0/24 Private IPv4 or IPv6 address to be used as the transfer network.
     (Optional) DNS-Einstellungen für Roadwarrior
    Hier kann festgelegt werden, welche DNS-Server für die Roadwarrior VPN-Verbindungen verwendet werden sollen.
    Die Anfragen werden grundsätzlich über den Tunnel geleitet. Dadurch kann beispielsweise die Namensauflösung von Servern im verwendeten internen Netzwerk ermöglicht werden.
    Primary DNS server (optional) Add DNS Server DNS servers in the network of the core UTM can be selected here so that the name resolution works for the Roadwarrior clients.
    Rules are automatically created in the Roadwarrior pools.
    Dialogfenster für das Hinzufügen eines DNS-Servers
    Core as DNS The core UTM is used as the DNS server
    notempty
    Wenn die Core-UTM als DNS-Server gesetzt wird, werden die DNS-Anfragen automatisch über den Namensserver der UTM aufgelöst.
    Network object
    Nicht bei Core als DNS
    Please select a Network object Selection of a network object that is assigned to a DNS server.

    If no suitable network object is available, a new one can be created using the Add button .

    Name Name Name to be given to the network object.
    Host Type of the network object. '‘'Host’ is selected by default, alternatively ‘'Network’' is possible.
    Address IP address IPv4 or IPv6 address that the network object is to use as the transfer network.
    Zone Select a zone Zone in which the network object should be located. If no suitable zone exists, one must be created in the UTM.
    Network Group Select Network Group Adds this network object to an existing network group.
    Service
    Nicht bei Core als DNS
    dns Selection of the service or service group that makes DNS possible.

    If no suitable service is available, a new one can be created using the Add button .

    Name Name of the Service Name of the Service.
    Service group name Service group name Adds the service to an existing service group.
    Protocol Select protocol Protocol that the service should have.
    Split-DNS für iOS Profile aktivieren
    Only appears when a DNS server has been selected notempty
    New as of: 2.8
       Wenn aktiviert    kann Split-DNS für iOS Profile verwendet werden.

    Es wird zwischen internen und externen aufzulösenden Domains unterschieden.

    Split DNS configuration
    Wird erst eingeblendet, wenn Split-DNS für iOS Profile aktiviert    ist notempty
    New as of: 2.8
    Add domains
    • This is how a VPN configuration can be used in combination with Cloud Shield
    The DNS server is added with the  Add DNS button.
    Adds the UTM as a core UTM. The  Add UTM button only becomes active once all entries have been completed
    This configuration must then be made usable with the  Publish button.


    Edit core UTM

    An active, connected core UTM can be edited via the wrench button .
    Caption Value Description
    Dialog box for editing a core UTM
    Name Name Name of the topology

    Dialog box for adding a core UTM

    UTM TTT-Point AG IV The UTM, which serves as the core UTM, cannot be changed retrospectively.
    Alias
    Mandatory field
    LG1 An alias must be assigned for the core UTM in order to be able to assign generated objects to this UTM.
    Port 51820 Display of the port used by the VPN service. Cannot be changed.
    Interface eth0 (203.113.0.113) The interface used to establish the connection.
    Hostname/ public IP address 203.113.0.113 The host name or public IP address used to establish the connection.
    Transfer network 192.168.20.0/24 IPv4 or IPv6 address to be used as the transfer network.
     (Optional) DNS-Einstellungen für Roadwarrior
    Hier kann festgelegt werden, welche DNS-Server für die Roadwarrior VPN-Verbindungen verwendet werden sollen.
    Die Anfragen werden grundsätzlich über den Tunnel geleitet. Dadurch kann beispielsweise die Namensauflösung von Servern im verwendeten internen Netzwerk ermöglicht werden.
    Primary DNS server (optional) Add DNS Server DNS servers in the network of the core UTM can be selected here so that the name resolution works for the Roadwarrior clients.
    Rules are automatically created in the Roadwarrior pools.
    Dialogfenster für das Hinzufügen eines DNS-Servers
    Core as DNS The core UTM is used as the DNS server
    notempty
    Wenn die Core-UTM als DNS-Server gesetzt wird, werden die DNS-Anfragen automatisch über den Namensserver der UTM aufgelöst.
    Network object
    Nicht bei Core als DNS
    Please select a Network object Selection of a network object that is assigned to a DNS server.

    If no suitable network object is available, a new one can be created using the Add button .

    Name Name Name to be given to the network object.
    Host Type of the network object. '‘'Host’ is selected by default, alternatively ‘'Network’' is possible.
    Address IP address IPv4 or IPv6 address that the network object is to use as the transfer network.
    Zone Select a zone Zone in which the network object should be located. If no suitable zone exists, one must be created in the UTM.
    Network Group Select Network Group Adds this network object to an existing network group.
    Service
    Nicht bei Core als DNS
    dns Selection of the service or service group that makes DNS possible.

    If no suitable service is available, a new one can be created using the Add button .

    Name Name of the Service Name of the Service.
    Service group name Service group name Adds the service to an existing service group.
    Protocol Select protocol Protocol that the service should have.
    Split-DNS für iOS Profile aktivieren
    Only appears when a DNS server has been selected notempty
    New as of: 2.8
       Wenn aktiviert    kann Split-DNS für iOS Profile verwendet werden.

    Es wird zwischen internen und externen aufzulösenden Domains unterschieden.

    Split DNS configuration
    Wird erst eingeblendet, wenn Split-DNS für iOS Profile aktiviert    ist notempty
    New as of: 2.8
    Add domains
    • This is how a VPN configuration can be used in combination with Cloud Shield
    This configuration must then be made usable with the  Publish button.

    Configuration of the satellite UTMs

    Add Satellite-UTM

    To add a UTM as a Satellite UTM, click on the  Satellite / Roadwarrior button for an active, connected Core UTM.
    A dialog window opens in which the new Satellite UTM is configured.
    Caption Value Description
    Dialog box for adding a Satellite UTM to the UNC
    Type Staellite (UTM) Satellite is selected as the type
    UTM TTT-Point AG V Selection of the UTM that is to connect to the core UTM via VPN. The configurations are assigned to the UTMs as soon as this is published.
    Only UTMs that are connected to the portal and online are available for selection. UTMs that are connected to the portal but are offline or whose version is not compatible are listed in the Not available list section.
    Alias
    Mandatory field
    LG2 Alias for the Satellite UTM to make it easier to assign generated objects to this UTM.
    The  Add button only becomes active once all entries have been completed and this UTM is then added above them.
    This configuration must then be transferred using the  Publish button.


    Edit Satellite-UTM

    An active, connected Satellite UTM can be edited using the button.
    Caption Value Description
    Dialog box for editing a Satellite UTM
    Type Staellite (UTM) The type cannot be +changed with a Satellite UTM.
    UTM TTT-Point AG II The UTM used as the satellite UTM cannot be changed.
    Alias
    Mandatory field
    LG2 Assign an alias for the Satellite UTM to make it easier to assign generated objects on this UTM.
    This configuration must then be transferred using the  Publish button.

    Add Satellite-UTM rule

    Caption Value Description
    Dialog window for adding a packet filter rule to a Satellite UTM
    Richtung  Satellite-UTM  Core-UTM Shows the direction of the packet filter rule, i.e. the source to the destination. The direction is changed with the change button .
    Source Please select a network object Selection of an existing network object. Existing network groups and network objects are listed.

    If no suitable network object is available, a new one can be created using the Add button .

    Name Name Name to be given to the network object.
    Type Host Type of the network object. Host is selected by default, alternatively Network is possible.
    Address IP address IPv4 or IPv6 address that the network object is to use as the transfer network.
    Zone Select a zone Zone in which the network object should be located. If no suitable zone exists, one must be created in the UTM.
    Network Group Select Network Group Adds this network object to an existing network group.
    Target Please select a network object Selection of an existing network object. Existing network groups and network objects are listed.

    If no suitable network object is available, a new one can be created using the Add button .

    Name Name Name to be given to the network object.
    Type Host Type of the network object. Host is selected by default, alternatively Network is possible.
    Address IP address IPv4 or IPv6 address that the network object is to use as the transfer network.
    Zone Select a zone Zone in which the network object should be located. If no suitable zone exists, one must be created in the UTM.
    Network Group Select Network Group Adds this network object to an existing network group.
    Service Select a service Selection of an existing service. Existing service groups and services are listed.
  • A service can only be selected once a destination has been selected.
  • If no suitable service is available, a new one can be created using the Add button .

    Name Name of the service Name of the service.
    Service group name Service group name Adds the service to an existing service group.
    Protocol Select protocol Protocol that the service should have.

    Configuration of the Roadwarrior

    Add Roadwarrior

    To add a Roadwarrior, click the  Satellit / Roadwarrior button on an active, connected core UTM.
    A dialog window will open where the new Roadwarrior can be configured
    Caption Value Description
    Dialog window for adding a Roadwarrior
    Type Roadwarrior Select Roadwarrior as the type
    Name RW_General The name to be used for this Roadwarrior
    Transfer network 10.0.2.0/24 Enter a private IPv4 or IPv6 address to be used as the transfer network.
    Profile
     Android RW  iOS RW  Windows VPN RW Profile selection.
    Possible options are

    Devices from these profiles can be connected to this network after the configuration is published.
    Multiple profiles can be selected.

    Only when all fields are filled in does the  Add button become active, and the Roadwarrior can then be added using it.
    Finally, this configuration must be applied using the  Publish button.

    Edit Roadwarrior

    A Roadwarrior can be edited via the button
    Caption Value Description
    Dialog window for editing a Roadwarrior
    Type Roadwarrior The type of a Roadwarrior cannot be changed
    Name RW-Smartphones The Name used for this Roadwarrior.
    Transfer network 10.0.2.0/24 IPv4- or IPv6 address, to be used as the transfer network
    Profile
     Android RW  iOS RW  Windows VPN RW Profile selection.
    Possible options are

    Devices from these profiles can be connected to this network after the configuration is published.
    Multiple profiles can be selected.

    Finally, this configuration must be applied using the  Publish button.

    Add Roadwarrior rule

    Caption Value Description
    Dialog window for adding a packet filter rule for an address pool
    Direction  Roadwarrior  Core-UTM Indicates the direction of the packet filter rule (Source → Destination)
    Source Roadwarrior | 10.0.2.0/24 The source of the packet filter rule is always the address pool of the transfer network in which the Roadwarriors are located. (Cannot be changed)
    Destination Please select a network object Selection of an existing network object. Existing network groups and network objects are listed.

    If no suitable network object is available, a new one can be created via the button.

    Name Name Name to be assigned to the network object
    Type Host Type of the network object. By Default, Host is selected, altenatively, Network can be chosen.
    Address IP address IPv4 or IPv6 address that the network object should use as the transfer network.
    Zone Select a Zone Zone in which the network object should be located. If no appropriate zone is available, one must be created in the UTM.
    Network Group Select Network Group Adds this network object to an existing network group.
    Service Select a service Selection of an existing service. Existing service groups and services are listed.
  • A service can only be selected after a destination has been choosen.
  • Name Service name Service name.
    Service group name Service group name Adds the service to an existing service group.
    Protocol Select protocol Protocol to be used for the service.

    Overview

    General options

    Button Description
    Buttons for general configuration above the table.
    Topology 1 The number of Core-UTMs and their topologies.
    With Add topology another Core-UTM can be added.
    Further information in section Add Core-UTM.
     Discard changes Changes that have not yet been published can be undone again
     Publish Changes made and new configurations are published and thus activated and made usable

    Configuration options

    The existing configurations are displayed: The core UTMs and their associated satellite UTMs and roadwarriors.
    These are displayed with their respective associated information.
    Different actions are available depending on the object.

    Actions Description
    An overview of an exemplary VPN configuration with one Core UTM, two Satellite UTMs and two Roadwarriors.
    This overview is only visible once a core UTM has been added.
    Edit Opens the dialog to edit the object
    Delete Deletes the respective object and all subordinate objects
    When the core UTM is deleted, all satellite UTMs and road warriors are also deleted
    Open menu
    Core or Satellite
      UTM details Opens the detailed display for this UTM in the menu  Unified Security ConsoleUTMs
      Exchange UTM Replaces the core or satellite UTM of the existing VPN configuration. Further information on this can be found in the section Exchange UTM.
      Update Updates the view of the stored information
      Websession Opens the dialog to start the administrative web interface of the UTM. Further information can be found in the following

    Wiki article.

     Satellite / Roadwarrior
    Core-UTM
    Adds a new Satellite UTM or a new Roadwarrior. For more information, see the sections Add Satellite UTM and Add Road Warrior.
     Rule
    Satellite or Roadwarrior
    Adds a new packet filter rule. For more information, see Add satellite UTM rule.
    Adds a new packet filter rule. For more information, see Add roadwarrior rule.
    Profiles
    Roadwarrior
    Displays the Roadwarrior profiles that are connected to the Core-UTM. Click on the profile to edit it.

    Show status

    Different status displays are shown depending on the object. If you hover over the status display, further information is displayed.
    Status display Description
     Not published Indicates that the object has been added but has not yet been published
     Not published Indicates that there have been changes to the object that have not yet been published
     Not published Indicates that the object has been deleted but not yet published
     Publish... Indicates that the configuration is in the process of being published. This process may take some time.
    Indicates that the core UTM is connected
     Offline Indicates that the core UTM is not connected
    Indicates that the Satellite UTM is connected
     Offline Indicates that the Satellite UTM is not connected
    This address pool is linked and there are no changes to be published
    This address pool is not connected
      Shows which profile type (Android or iOS) this address pool belongs to. If you hover over the status label, the name of the profile is displayed.

    Exchange UTM

    This function offers the option of replacing the core and satellite UTM in an existing VPN configuration without losing settings or even having to create a new VPN configuration.

    This makes it possible, for example, to replace a faulty UTM in a VPN configuration so that this configuration works again.

    It is irrelevant whether the UTM to be replaced is online or not.
    It is not possible to exchange a satellite UTM directly with a core UTM and vice versa. This requires another third UTM as a ‘'placeholder UTM’'.
    notempty
    Before the new UTM can be exchanged, strongly recommends to create a new backup of the old UTM!
    It is irrelevant whether it is a manual backup (further information in this Wiki article), or a Cloudbackup.
    Procedure for replacing a UTM:
    • Check that the backup of the new UTM is up-to-date
    •   Exchange UTM Select the core/satellite UTM to be replaced
    • the new UTM is selected in the Replace Core-UTM or Replace Satellite-UTM dialog box for the UTM option
    • if desired, the core/satellite UTM can be edited, see Edit_Core-UTM, or Edit_Satellite-UTM
    •  Save and then click  Publish to publish the change to the VPN configuration

    Further information can be found in the Wiki article Exchange core/satellite UTMs


    Display on the UTM

    General rules

    In general, several rules are automatically generated on the relevant UTMs. These rules are marked in the ‘'Models’' column, the rules overview on the UTM, so that it is clear where they come from. In addition, these rules can only be edited, deleted or copied using the portal and not on the UTM itself.

    Outgoing data traffic is automatically permitted. Incoming packets on the core UTM that do not correspond to the configured service/port are discarded.

    It should also be noted that services are always newly created in order to avoid possible interference with existing services, which may then be changed.

    Presentation of the satellite rules

    Pos. # Source Destination Service NAT Logging Action Cloud Active
    Generated rules of the Core-UTM for an example rule from a satellite UTM to the core UTM:
    LG2-rules
    -
    2 On
    LG2-internal-networks vpn-netzwerk default-internet
    -
    ACCEPT On
    vpn-netzwerk LG2-internal-networks LG2-auto-service
    -
    ACCEPT On
    Generated rules of the Satellite-UTM for an example rule from a satellite UTM to the core UTM:
    LG1-rules
    -
    1 On
    internal-networks LG1-auto-network LG1-auto-service
    -
    ACCEPT On
    When generating a rule between a satellite UTM and the core UTM, a total of three packet filter rules are generated. Two on the destination UTM and one on the source UTM.

    On the target UTM (here Core-UTM), this includes an inbound rule with the selected service and an Any rule for outbound data to the source UTM (here Satellite-UTM).
    An outbound rule, i.e. an Any rule, is created on the source UTM.

    Presentation of the Roadwarrior rules

    Generated rules on the Core-UTM for a Roadwarrior rule:
    RW-Smartphones-rules-2
    -
    2 On
    RW-Smartphones-address_pool rw-network default-internet
    -
    ACCEPT On
    rw-network RW-Smartphones-auto-network RW-Smartphones-auto-service
    -
    ACCEPT On
    When creating a rule between a Roadwarrior network and the Core-UTM, two packet filter rules are generated on the Core-UTM.

    These include an inbound rule with the corresponding service and an outbound rule, i.e. an ‘'Any’' rule.

    Display of network objects

    There are two different types of network objects that are created by the VPN configuration. On the one hand, there are those that refer to another object in the configuration and are generated completely automatically when a rule is created (here, for example, LG2-any-network-v4). On the other hand, there are those that are created on the UTM itself by the user using the button (here, for example, vpn-network). Network objects UTMuser@firewall.name.fqdnFirewall Update rules Generated network objects on the Core-UTM