Last adaptation to the version: 12.7.0
- Updated to Redesign of the webinterface
This article includes descriptions of third-party software and is based on the status at the time this page was created.
Changes to the user interface on the part of the manufacturer are possible at any time and must be taken into account accordingly in the implementation.
All information without warranty.
Preliminary note
- An AVM Fritz!Box is required
- The remote station equipped with a Securepoint appliance must have a static IP address
Configuration of the Fritz!Box
Importing a new firmware version
The manufacturer's homepage can be used to check whether new firmware is available for the Fritz!Box.
For more information, see the section Adjust the configuration file.
Enable DynDNS
To be able to use a DynDNS in the VPN configuration, this function must be set up beforehand. This requires that an account with a DynDNS service provider is available (Use Securepoint Dynamic DNS Host ).
- In the interface of the Fritz!Box open ➊ ➋
- Go to the DynDNS ➌ dialog
- Activation of the checkbox Use DynDNS ➍
- Enter the login data of the DynDNS provider used:
Caption | Value | Description |
---|---|---|
Update-URL | https://update.spdyn.de/nic/update?... | The update-URL of the DynDNS provider |
Domainname | d-vpn.spdns.de | The domain name for the Fritz!Box with the DynDNS provider |
Username | d-vpn.spdns.org | The username of the account For spDyn with reseller account also the hostname |
Password | **** | The password of the account For spDyn with reseller account the token |
- With the button made changes are saved.
Change internal network
According to the default settings of the Fritz!Box VPN Assistant, the factory-set internal network 192.168.178.0/24 may not be used for VPN.
Therefore, the internal network must be changed.
- In the interface of the Fritz!Box go to Home network → Network and switch to the dialog Network Settings
- In the IP Addresses section, click the button.
- Enter the following under Home network:
Caption | Value | Description |
---|---|---|
IPv4 address | 192.168.100.1 | The new IPv4 address for the Fritz!Box |
Subnet mask | 255.255.255.0 | The subnet mask for the new IPv4 address of the Fritz!Box |
Enable DHCP server and enter the following: | ||
from | 192.168.100.20 | The beginning of the span of DHCP IPv4 addresses |
to | 192.168.100.200 | The end of the span of DHCP IPv4 addresses. |
Validity | 10Days | The validity of the DHCP IPv4 addresses |
- With the button made changes are saved. A new login to the new IP address of the Fritz!Box is then necessary
Create VPN configuration
The configuration of the VPN connection is not done via the configuration interface in the browser, but is imported to the Fritz!Box as a file. The configuration file is created with an application software, which is downloaded from the website of the manufacturer AVM. The application software is called Configure Fritz!Box VPN Connection.
Two files are created by the wizard, only one is imported into the Fritz!Box. In this example, this is the file: fritzbox_fritz_lokal.spdyn.de.cfg.
- Open this file in any editor
Adjust the configuration file
The configuration file created above will be adjusted.
Entries marked in green are individual configurations.
Necessary manual changes are additionally marked with .
vpncfg { connections { enabled = yes; conn_type = conntype_lan; name = "Securepoint"; // Name of the connection in the configuration interface always_renew = yes; reject_not_encrypted = no; dont_filter_netbios = yes; localip = 0.0.0.0; local_virtualip = 0.0.0.0; remoteip = 192.0.2.192; // static IP address of the Securepoint appliance remote_virtualip = 0.0.0.0; localid { fqdn = "fritz_lokal.spdyn.de"; // spdyn DNS name of the Fritz!Box //ipaddr = xxx.xxx.xxx.xxx; // static IP address of the Fritz!Box, if available } remoteid { ipaddr = 192.0.2.192; // static IP address of the Securepoint appliance } mode = phase1_mode_idp; // Main-Mode phase1ss = "dh15/aes/sha"; // Proposals for Phase 1 (DH15, AES, SHA). keytype = connkeytype_pre_shared; key = "secret"; // VPN Password (Preshared Key) cert_do_server_auth = no; use_nat_t = no; / yes; // Is a site behind a NAT router yes = yes; no = no; use_xauth = no; use_cfgmode = no; phase2localid { ipnet { ipaddr = 192.168.100.0; // internal network of the Fritz!Box mask = 255.255.255.0; } } phase2remoteid { ipnet { ipaddr = 192.168.175.0; // internal network of the Securepoint appliance mask = 255.255.255.0; } } phase2ss = "esp-all-all/ah-none/comp-all/pfs"; // with compression accesslist = "permit ip any 192.168.175.0 255.255.255.0"; // internal network of the Securepoint appliance } ike_forward_rules = "udp 0.0.0.0:500 0.0.0.0:500", "udp 0.0.0.0:4500 0.0.0.0:4500"; } // EOF
The so modified configuration file is saved again as fritzbox_fritz_lokal.spdyn.de.cfg.
Add additional networks
If further networks are to be added to the Securepoint appliance, the parameter accesslist in the configuration file is adjusted accordingly.
The networks 192.168.82.0/24 to 192.168.92.0/24 should be accessible via VPN.
This means that only the specified network mask is adjusted in the accesslist parameter:
accesslist = "permit ip any 192.168.82.0 255.255.240.0";
In addition to the network 192.168.175.0/24, the network 192.168.82.0/24 should also be accessible via VPN.
This additional network is added in the accesslist parameter:
accesslist = "permit ip any 192.168.175.0 255.255.255.0", "permit ip any 192.168.82.0 255.255.255.0";
Upload configuration file
In the logged-in Interace of the Fritz!Box, Internet ➊ → Permit Access ➋ → VPN (IPSec) ➌ on the ➍ is clicked.
In the VPN Connection window, Import a VPN configuration from a VPN settings file ➎ is selected from the four setup options.
Continue with Next ➏.
Via the ➐ the configuration file that was created is selected.
If the file is encrypted, this setting will be enabled. Under Password the password is then entered.
Finally, click on Apply ➑.
Under System → Event Log the connection establishment is logged.
Set up Securepoint Appliance
Subsequently, the settings on the Securepoint appliance must be configured:
- A site-to-site IPSec connection is established. notemptyUse IKE version 1 and the same preshared key as in the configuration file of the Fritz!Box
- If necessary, create a network object for the IPSec VPN network of the remote station and create the corresponding firewall rules, if they are not created automatically by the wizard
- Adjust the settings of the phases of the IPSec connection. notemptyUse Phase 2 PFS
Establish IPSec S2S connection
Configure IKEv1 phases
notempty
These default values are not supported by the Fritz!Box.
The manufacturer AVM informs which encryption methods and algorithms are supported by the Fritz!Box.
Configure IKEv1 phase 1 | |||
Under Connections, click on for the created IPSec S2S connection and switch to the IKE tab in the Edit Phase 1 dialog. | Area|||
Caption | Value | Description | UTMuser@firewall.name.fqdnVPNIPSec ![]() |
---|---|---|---|
Encryption: | Set aes256 as the encryption. You can also select a different one.notempty If the Fritz!Box does not support the set encryption, select aes128.
| ||
Authentication: | Set sha2_512 as authentication. You can also select a different one. notempty If the Fritz!Box does not support the set authentication, select sha1.
| ||
Diffie-Hellman Group: | Set modp3072 (DH15) as the Diffie-Hellman Group. notempty If the Fritz!Box does not support the set Diffie-Hellman Group, select modp1024 (DH2).
| ||
Display weak algorithms: | Off | Is activated if weaker algorithms are required, such as for Authentication: and Diffie-Hellman Group: . | |
Strict: | Off | If activated, only the configured parameters and no other proposals are used. | |
IKE Lifetime: | Default |
The IKE Lifetime can be customized. | |
Rekeying: | Default |
The number of rekeying can be adjusted. | |
The changes made are saved with the | button.|||
Configure IKEv1 phase 2 | |||
Under Connections, click on for the created IPSec S2S connection. notempty The set parameters must be identical to those of phase 1.
| Tab |||
Caption | Value | Description | UTMuser@firewall.name.fqdnVPNIPSec ![]() |
Encryption: | Set aes256 as the encryption. You can also select a different one.notempty If the Fritz!Box does not support the set encryption, select aes128.
| ||
Authentication: | Set sha2_512 as authentication. You can also select a different one. notempty If the Fritz!Box does not support the set authentication, select sha1.
| ||
Diffie-Hellman Group: | Set modp3072 (DH15) as the Diffie-Hellman Group. notempty If the Fritz!Box does not support the set Diffie-Hellman Group, select modp1024 (DH2).
| ||
Display weak algorithms: | Off | Is activated if weaker algorithms are required, such as for Authentication: and Diffie-Hellman Group: . | |
Key life time: | Default |
The key life time can be adjusted. | |
Restart after abort: | Off | If activated, the connection is re-established in the event of an unexpected disconnection. | |
DHCP: | Off | When activated, the clients receive IP addresses from a local network. Further configurations are required for this, see wiki article on DHCP for IPSec. | |
The changes made are saved with the | button.|||
Firewall-Rules
# | Source | Destination | Service | NAT | Action | Active | |||
![]() |
HNE | ACCEPT | On | ||||||
![]() |
ACCEPT | On |
Initiate IPSec connection

Establish the connection from the Securepoint appliance:
- Switch to Connections Area
- Click the ➊ button on the connection you just created to load the connection data.
- To initiate the connection, click the ➋ button

- To view the status of the connection on the Fritz!Box, in the interface of the Fritz!Box go to Internet ➌ → Permit Access ➍
- Switch to the dialog VPN (IPSec) ➎
- In the lower area VPN Connections you can see the created connection
- In the column Status a green circle ➏ is displayed when a connection is established
In this case, a downgrade of the Fritz!Box firmware version, configuration of the Fritz!Box without 2-factor authentication and a renewed update of the Fritz!Box firmware may help.
Nevertheless, the settings made should first be checked, especially for IKEv1.