Jump to:navigation, search
Wiki




































Connecting VPN networks to the same broadcast domains (IP ranges)

Last adaptation to the version: 12.6.0

New:
  • Updated to Redesign of the webinterface
notempty
This article refers to a Beta version
Access: UTM-IP:Port or UTM-URL:Port
Port as configured at Network / Appliance Settings / Webserver
Default-Port: 11115
i.e.: https://utm.ttt-point.de:11115
Default: https://192.168.175.1:11115
(1.) Firewall Packet Filter (2.) VPN IPSec

Introduction

If the same subnets are used on both sides of a VPN connection, it is normally not possible to set up this connection.
In addition, it can happen that the same networks are set up behind different remote peers.
With the NAT type NETMAP and auxiliary networks (map network) that are not set up on any of the remote peers to be connected, these connections can still be set up without completely changing the subnet on one of the sides.

  • A NETMAP is always only an auxiliary solution if none of the networks involved can be converted to another network with reasonable effort.
  • It should be avoided to use NETMAP configurations in the head office for more than one remote station.


  • NATing complete subnets with NETMAP

    Open Firewall Network objects .

    Preparations

    Edit network object UTMuser@firewall.name.fqdnFirewallNetwork object Convert network object to address  Head office &  Branch office

    notempty

    To use the NETMAP function the following conditions have to be observed:

  • The subnets of the objects involved in NETMAP must all have the same size, for example all /24.
  • notempty
    All objects involved must have entered a defined network IP address. So no interfaces may be selected'.

    No interfaces may be selected to define the network object.
    The network object of the internal network must be checked and, if necessary, the network IP of the internal network to be mapped must be entered as target:.
    In this example, the network 172.16.3.0/24 is used on both sides.


  • Initial conditions

    Head office and branch have the same subnetwork

    Datei:Netmap sz1-en.png

    In this case, the mapping must be set up on both sides of the connection.

    Local network Public IP Netmap
    Head office: 172.16.3.0/24 192.0.2.192 10.0.1.0/24
    Branch office: 172.16.3.0/24 192.0.2.193 10.0.2.0/24
  • If a local network IP is specified for the branch with which it connects to the tunnel to the head office, this must be used as the netmap IP.
  • The connection is to be established via IPSec.




    Create VPN connection

    Head office
     Head office
    Create an IPSec site to site VPN connection, as described in the Wiki in the VPN IPSec menu with the Add IPSec connection button.
  • In step 3, the local map network of the head office must be released.
    Here »10.0.1.0/24
  • Add IPSec connection UTMuser@firewall.name.fqdnVPNIPSec  Head office Step 3 with local map network of the head office
  • In step 4, the public IP of the branch is required as Remote Gateway:
    and the remote map network of the branch is required as the shared network.
    Here»10.0.2.0/24 (Replace with default network IP for the branch, if necessary.)
  • Add IPSec connection UTMuser@firewall.name.fqdnVPNIPSec  Head office Step 4 with remote map network of the branch office
    Branch office
     Branch office
    Create an IPSec site to site VPN connection, as described in the Wiki in the VPN IPSec menu with the Add IPSec connection button.
  • In step 3, the local map network of the head office must be released.
    Here »10.0.2.0/24 (Replace with default network IP for the branch, if necessary.)
  • Add IPSec connection UTMuser@firewall.name.fqdnVPNIPSec  Branch office Accessibility of hosts of the remote station
  • In step 4, the public IP of the head office is required as Remote Gateway:
    and the remote mapnetwork of the head office is required as the shared network.
    Here »10.0.1.0/24
  • Add IPSec connection UTMuser@firewall.name.fqdnVPNIPSec  Branch office Step 4 with remote map network of the head office


    Create network objects for transfer net

    Two network objects must be created in the head office with networks that are neither set up in the head office nor in the branch office.

    Firewall Packet Filter  Area Network object button Add Object

    Head office
     Head office
    * The network object for the (remote) Branch MapNet must be of Type Network (Address).
  • For IPSec-connections, the network object for the transfer net must be in the Zone external
  • When creating a SSL-VPN connection a zone VPN-SSL-Connection name is established.
    The network object must then be created with this zone.
  • Add network object UTMuser@firewall.name.fqdnFirewallNetwork object  Head office Network object in the head office for the branch network (Mapnet Remote)
    The network object for the (own) Mapnet of the central office must be located in the zone of the internal network and is given the network address 10.0.1.0/24 in our example. Add network object UTMuser@firewall.name.fqdnFirewallNetwork object  Head office Network object in the central office for your own network (Mapnet Local)
    Branch office
     Branch office
    Two network objects are also created on the branch side.
    There is the network 10.0.1.0/24, the map network of the central office located in the Zone external
    Add network object UTMuser@firewall.name.fqdnFirewallNetwork object  Branch office Network object in the branch for the own network
    and the network 10.0.2.0/24, the map network of the branch office created with the zone of the internal network internal. Add network object UTMuser@firewall.name.fqdnFirewallNetwork object  Branch office Network object in the branch for the network of the head office.


    Create a NETMAP rule

    There must be two packet filter rules must be created on each side, which perform the mapping outbound and inbound.
    Head office
     Head office
    On the side of the  Head office for outgoing mapping Add rule UTMuser@firewall.name.fqdnFirewallPacket filter  Head office NETMAP packet filter rule
    The mapnet cannot be selected as a network object if it is still associated with an interface instead of an IP address.
    Source: internal network
    Destination: netmap_remotenet_branch1 Map network of the branch
    Service: any Exceptionally, an any rule makes sense here
    Action: ACCEPT
    [ – ] NAT
    Type: NETMAP
    Network object: netmap_localnet Map network of the head office
    Service: any Exceptionally, an any rule makes sense here
    On the side of the  Head office for incoming mapping
    Source: netmap_remotenet_branch1 Map network of the branch
    Destination: internal network
    Service: any Exceptionally, an any rule makes sense here
    Action ACCEPT
    [ + ] NAT
    notempty
    No NAT of the type NETMAP is needed for this anymore
    Branch office
     Branch office
    On the side of the  Branch office for outgoing mapping Add rule UTMuser@firewall.name.fqdnFirewallPacket filter  Branch office NETMAP packet filter rule
    The mapnet cannot be selected as a network object if it is still associated with an interface instead of an IP address.
    Source internal network
    Destination: netmap_remotenet_Headoffice Map network of the head office
    Service: any Exceptionally, an any rule makes sense here
    Action: ACCEPT
    [ – ] NAT
    Type NETMAP
    Network object netmap_localnet Map network of the branch
    Service: any Exceptionally, an any rule makes sense here
    On the side of the  Branch office for incoming mapping
    Source netmap_remotenet_Headoffice Map network of the head office
    Destination: internal network
    Service: any Exceptionally, an any rule makes sense here
    Action: ACCEPT
    [ + ] NAT
    notempty
    No NAT of the type NETMAP is needed for this anymore


    Packet filter rules

    In addition to the netmap rules, other rules are needed to allow traffic between the respective local network and the respective remote network.
    Two options are available:

    Implied Rules

    Implied Rules UTMuser@firewall.name.fqdnFirewall IPSec section in the implied rules  Head office &  each branch
    Menu Firewall Implied rules → Group IpsecTraffic} → Rule Accept On
    In this case rules are created in the background, which allow all services for all computers on both sides. (Default)



    Dedicated packet filter rules
    notempty
    Recommended


    Custom packet filter rules that only allow services that are needed.
    To do this, the IpsecTraffic Accept option in the Firewall Implicit Rules -menu, section IpsecTraffic is to be disabled Off and packet filter rules are created manually.
    The example assumes that server access from the branch to the head office is required.

    A network object is required on each side for the respective remote VPN network
    Add network object UTMuser@firewall.name.fqdnFirewallNetwork object
    Network object in the  Head office for the VPN network
    Settings for the network object
    Type: VPN-Network

    Address: 10.0.2.0/24 Network IP of the branch's transfer network

    Zone: vpn-ipsec

    Add network object UTMuser@firewall.name.fqdnFirewallNetwork object
    Network object in the  Branch office for the VPN network
    Settings for the network object
    Type: VPN-Network

    Address: 10.0.1.0/24 Network IP of the head office transfer network

    Zone: vpn-ipsec


    notempty
    A connection is required for each branch.

    notempty
    No NAT of the type NETMAP is needed for this anymore
    Add rule UTMuser@firewall.name.fqdnFirewallPacket filter Packet filter rule head office for inbound IPSec VPN
    If the branch is also to be accessed from the head office, additional rules are required accordingly (e.g. in order to be able to establish VoIP connections).


     Head office Overview of packet filter rules # Source Destination: Service: NAT Action Active
    Netmap rule in head office, to map the own local network 4 internal network netmap_remotenet_branch1 any NM Accept On
    Netmap rule in head office, to map the network of the branch 5 netmap_remotenet_branch1 internal network any Accept On
    Incoming network traffic at branch head office (Exemplary packet filter rule) 6  ipsec_remotenet_Branch office1 internal network ms-rdp Accept On

     Branch office Overview of packet filter rules # Source Destination: Service: NAT Action Active
    Netmap rule in branch, to map the own local network 4 internal network netmap_remotenet_headoffice any NM Accept On
    Netmap rule in branch, to map the network of the head office 5 netmap_remotenet_headoffice internal network any Accept On
    Outbound network traffic in the branch to the head office (Exemplary packet filter rule) 6 internal-network ipsec_remotenet_Zentrale ms-rdp Accept On


    Accessibility of hosts of the remote station

    A host with the IP address 172.16.3.10 in the branch is addressed from the head office with the IP address 10.0.2.10.(Required rule is not shown in the example!)
    A host with the IP address 172.16.3.120 in the head office is addressed from the branch office with the IP address 10.0.1.120.

    Several branches have an identical subnetwork

    Datei:Netmap sz2-en.png
    Local network Public IP Netmap
    172.16.0.0/24 192.0.2.192 not required
    Branch office 1: 172.16.3.0/24 192.0.2.193 not required
    Branch office 2: 172.16.3.0/24 192.0.2.194 10.0.1.0/24


    Mapping is only set up on branches that use the same network as already has been set up on a VPN connection. No mapping is required in the head office if the internal network of the head office differs from that of the branches. One existing network can also be used without mapping in a branch.

  • It should be avoided to use NETMAP configurations in the head office for more than one remote station.



  • Create VPN connection

    Create an IPSec site to site VPN connection, as described in the Wiki in the VPN IPSec menu with the Add IPSec connection button.
     Branch office 1 not depicted
    • Branch1 retains its original local network:
  • In step 3, the local network (without mapping) must be released.
    In the example:
  • Add IPSec connection UTMuser@firewall.name.fqdnVPNIPSec
    Step 3 in  Branch 2 with local Mapnet
    Add IPSec connection UTMuser@firewall.name.fqdnVPNIPSec
    Step 4 with Remote Net
     Branch office 2 (and other branches, if applicable)
  • In step 3 the local Mapnet must be released.
    In the example: »10.0.1.0/24
  •  each branch
  • In step 4, the direct remote network of the head office (without mapping) is released.
    In the example: »172.16.0.0/24
  •  Head office
  • A connection is required for each branch.
    • In step 3, the local network must be released.
      In the example: »172.16.0.0/24
    • In step 4, the mapped remote network of the corresponding branch is released.
      In the example: »10.0.1.0/24


    Create network objects

    In  Branch 2 (and in any other branch that uses a local network also used elsewhere) a network object is needed for the central office in the zone external
    is needed, which can be used to perform the mapping.
    Add network object UTMuser@firewall.name.fqdnFirewallNetwork object
    Network object in Branch 2 for the network of the head office
    Add network object UTMuser@firewall.name.fqdnFirewallNetwork object
    Network object in branch 2 for your own map network (local). Branch 2 is mapped like this for the head office.
    In addition, a second network object is created for the local network of the respective branch, which is mapped.
    The network object for the map network in the branch must be located in the zone of the internal network internal and gets the network IP 10.0.1.0/24 in this example.
    (Further branches receive another Mapnet in this place!)
  • The Mapnet may not be used in the branch, in the head office, or on any of the other branches connected to the head office via VPN connections.
  • Create a NETMAP rule

    Packet filter rules in branch 2
    On the side of the  Branch office 2 for outgoing mapping Add rule UTMuser@firewall.name.fqdnFirewallPacket filter  Branch office 2 NETMAP Packet filter rule
    Source internal network
    Destination: netmap_remotenet_headoffice
    Service: any Exceptionally, an any rule makes sense here
    Action ACCEPT
    [ – ] NAT
    Type NETMAP
    Network object netmap_localnet_branch2
    Service: any Exceptionally, an any rule makes sense here


    Packet filter rules

    In addition to the netmap rules, other rules are needed to allow traffic between the respective local network and the respective remote network.

    Two options are available:


    Implied Rules

    Implied Rules UTMuser@firewall.name.fqdnFirewall IPSec section in the implied rules  Head office &  each branch
    Menu Firewall Implied rules → Group IpsecTraffic} → Rule Accept On
    In this case rules are created in the background, which allow all services for all computers on both sides. (Default)



    Dedicated packet filter rules

    notempty

    Recommended

    Custom packet filter rules that only allow services that are needed.
    To do this, the IpsecTraffic Accept option in the Firewall Implicit Rules -menu, section IpsecTraffic is to be disabled Off and packet filter rules are created manually.
    The example assumes that server access from the branch to the head office is required.

    A network object is required on each side for the respective remote VPN network
    Add network object UTMuser@firewall.name.fqdnFirewallNetwork object
    Network object for the branch2 in the  Head office
    Settings for the network object
    Type: VPN-Network

    Address: 10.0.2.0/24Network IP of the local network of branch2

    Zone: vpn-ipsec

    Add network object UTMuser@firewall.name.fqdnFirewallNetwork object
    Network object for the head office in  Branch2
    Settings for the network object
    Type: VPN-Network

    Address: 172.16.0.0/24Network IP of the local network of the head office

    Zone: vpn-ipsec



     Head office Overview of packet filter rules # Source Destination: Service: NAT Action Active
    Incoming network traffic at branch head office1 (Exemplary packet filter rule) 4  ipsec_remotenet_Branch office1 internal network ms-rdp Accept On
    Incoming network traffic at branch head office2 (Exemplary packet filter rule) 5  ipsec_remotenet_Branch office2 internal network ms-rdp Accept On

     Branch office1 Overview of packet filter rules # Source Destination: Service: NAT Action Active
    Outbound network traffic in the branch1 to the head office (Exemplary packet filter rule) 5 internal-network ipsec_remotenet_Zentrale ms-rdp Accept On

     Branch office2 Overview of packet filter rules # Source Destination: Service: NAT Action Active
    Netmap rule in branch2, to map the own local network 4 internal network netmap_remotenet_headoffice any NM Accept On
    Outbound network traffic in the branch2 to the head office (Exemplary packet filter rule) 5 internal-network ipsec_remotenet_Zentrale ms-rdp Accept On


    Accessibility of hosts of the remote station

    A host with the IP address 172.16.3.10 in branch 1 is addressed from the head office with exactly this IP address (172.1.6.3.10).
    A host with the IP address 172.16.3.10 in branch 2 is addressed from the head office with the mapped IP address 10.0.1.10.
    A host with the IP address 172.16.0.120 in head office is addressed from the branch office with the IP address 172.16.0.120.