Jump to:navigation, search
Wiki






































SSL-VPN with a Roadwarrior on S2S Connections – Example Scenarios

New article: 12.2024

notempty
This article refers to a Beta version
-

Preliminary remark

The example uses the service group default-internet.
In real configurations, this group must, of course, be adjusted. If necessary, a new service group is recommended.
A rule with any should only be used if all involved networks and devices are 100% trustworthy and compromise can be ruled out.

Prerequisite

  • Configured S2S VPN
  • Configured S2E connection
RW Transfer-Netz 192.168.192.0/24
VPN Server Internal Network 192.168.175.0/24
S2S Transfer-Netz 192.168.190.0/24
VPN Client Internal Network 192.168.174.0/24

Example scenarios

Connect SSL-RW to S2S server side

Example scenario 1: Connect SSL-RW to S2S server side


Enter transfer networks

For this, the RW transfer network is entered on the S2S server side in the Server Network release:

  • VPN Server
    VPN SSL-VPN S2S Server edit desired connection in the General section, Globally release server networks: »192.168.192.0/24
  • And the S2S client network is entered in the RW Network release:
    VPN Server
    VPN SSL-VPN RW Server edit desired connection in the General section, Release server networks: »192.168.174.0/24
    In a previous version, the transfer network was incorrectly entered here
  • Restart the service to fully apply changes and push routes:
    VPN Server
    Applications Application Status the application SSL VPN stop and then start

Create packet filter rules


A total of 4 packet filter rules are required. Two on the VPN client side, which look as follows:
VPN Client

Pos. # Quelle Target Service NAT Logging Action Active
RW transfer network
Create object with zone of the S2S tunnel
internes Zielnetz default-internet
3/Min
ACCEPT On
internes Zielnetz RW transfer network
Create object with zone of the S2S tunnel
default-internet
3/Min
ACCEPT On

Two additional packet filter rules are required on the VPN server side, which look as follows:
VPN Server
RW transfer network Client-side S2S network default-internet
3/Min
ACCEPT On
Client-side S2S network RW transfer network default-internet
3/Min
ACCEPT On

Connect SSL-RW on the S2S client side

Example scenario 2: Connect SSL-RW on the S2S client side


Enter transfer networks

Die Transfernetze müssen auf den UTMs hinterlegt werden:

  • Hierzu wird das RW-Transfernetz auf der S2S-Serverseite in die Client Netzfreigabe eingetragen:
    VPN Server
    VPN SSL-VPN S2S Server Client-Gegenstellen gewünschten Client bearbeiten Clientnetzwerke freigeben: »192.168.192.0/24
  • Restart the service to fully apply changes and push routes:
    VPN Server
    Applications Application Status the application SSL VPN stop and then start

Create packet filter rules


A total of 4 packet filter rules are required. Two on the VPN client side, which look as follows:
VPN Client

# Quelle Target Service NAT Logging Action Active
RW transfer network S2S network on the server side default-internet
3/Min
ACCEPT On
S2S network on the server side RW transfer network default-internet
3/Min
ACCEPT On

Two additional packet filter rules are required on the VPN server side, which look as follows:
VPN Server
RW transfer network
Create object with zone of the S2S tunnel
internal target network default-internet
3/Min
ACCEPT On
internal target network RW transfer network
Create object with zone of the S2S tunnel
default-internet
3/Min
ACCEPT On

SSL-RW via IPSec-S2S

Example scenario 3: SSL-RW via IPSec-S2S


Enter transfer networks

  • First, enter the local network at location B, which the road warrior should ultimately be able to access, in the RW tunnel.
    Location A
    VPN SSL VPN RW Server Edit desired connection Area General Share server networks globally: »192.168.175.0/24
  • Next, a network object is created for the local network at location B (behind the IPSec connection).
    Location A
    Firewall Network Objects  button Add Object
    Name: Target Network Location B
    Important:
  • Type Network (address)
    The SSL VPN connection does not recognize that this is another VPN connection.
    Therefore, no VPN network may be selected here!
  • Zone external

    • Restart the service to fully apply changes and push routes:
      Location A
      Applications Application Status the application SSL VPN stop and then start

    Edit phase 2

    • In phase 2 of the connection, the SSL Roadwarrior IP address must be entered as a subnet.
      Location A | Location B
      VPN IPSec  Area Connections Edit phase 2 of the desired connection Phase2Subnets section Add subnet button


    • Location B
      If there is no administrative access to the remote location, an additional HideNat rule must be created at the local Location A.
      There are separate instructions for this own instructions. Please note: The local location here is “Location B”!

    Create packet filter rule

    In addition, the following packet filter rules must be created. The wiki article on

    Reaching IPSec S2S destinations with SSL VPN may be useful here.

    # Quelle Target Service NAT Logging Action Active
    RW network Target network location B default-internet
    3/Min
    ACCEPT On
    Target network location B RW network default-internet
    3/Min
    ACCEPT On

    SSL-RW via WG-S2S (SP to SP)

    Example scenario 4: SSL-RW via WG-S2S (SP to SP)

    The SSL-RW is located at site A and wants to access a device at site B.

  • Both sites use Securepoint hardware (otherwise see Scenario 5)

  • Enter transfer networks

    Location A

    • First, the local network from location B, which the road warrior should ultimately be able to access, is entered in the RW tunnel.
      VPN SSL VPN RW Server Edit desired connection Area General Share server networks globally: »192.168.175.0/24
    • Restart the service to fully apply changes and push routes:
      Applications Application Status the application SSL VPN stop and then start


    • In addition, the SSL-RW transfer network is entered into the WireGuard server networks at location A.
      VPN WireGuard Edit desired connection Share server networks globally: »192.168.192.0/24
    • Then Wiregard Restart

    Location B

    • At location B, the SSL-RW transfer network is also entered—but in the WireGuard Peer networks.
      VPN WireGuard Peers Edit desired peer Share peer networks: »192.168.192.0/24
    • Then Wiregard Restart


    Create packet filter rules

    In addition, packet filter rules must be created.
    Location A
    # Quelle Target Service NAT Logging Action Active
    RW transfer network WireGuard network
    the remote station (location B)
    default-internet
    3/Min
    ACCEPT On
    Location B
    RW transfer network
    in the zone of the WG tunnel to location A
    internal-network default-internet
    3/Min
    ACCEPT On

    If a local device on the Roadwarrior client (e.g., a printer) or the Roadwarrior itself is to be accessible from the target network, an additional rule is required:
    Location B
    internal-network RW transfer network
    in the zone of the WG tunnel to location A
    default-internet
    3/Min
    ACCEPT On



    SSL-RW via WG-S2S (SP to external)

    Example scenario 5: SSL-RW via WG-S2S (SP to external)

    The SSL-RW is located at site A and wants to access a device at site B.

  • Location A uses Securepoint hardware and location B uses third-party hardware (otherwise, see Scenario 4).

  • Enter transfer networks

    • First, the local network from location B, which the road warrior should ultimately be able to access, is entered in the RW tunnel.
      VPN SSL VPN RW Server Edit desired connection Area General Share server networks globally: »192.168.175.0/24
    • Restart the service to fully apply changes and push routes:
      Location A
      Applications Application Status the application SSL VPN stop and then start
    • In addition, the SSL-RW transfer network is entered into the WireGuard server networks at location A.
      VPN WireGuard Edit desired connection Share server networks globally: »192.168.192.0/24

    Create packet filter rules

    # Quelle Target Service NAT Logging Action Active
    RW transfer network WireGuard network
    the remote station (location B)
    default-internet HN
    with internal interface
    3/Min
    ACCEPT On