Watchguard Firebox X5-W Betriebsanweisung Seite 152

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 234
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 151
Configuring Virtual Private Networks
136 Firebox X Edge e-Series
You must have an Internet connection.
The ISP for each VPN device must let IPSec go across their networks.
Some ISPs do not let you create VPN tunnels on their networks unless you upgrade your Internet
service to a level that supports VPN tunnels. Speak with the ISP to make sure they let you use these
ports and protocols:
- UDP Port 500 (Internet Key Exchange or IKE)
- UDP Port 4500 (NAT traversal)
- IP Protocol 50 (Encapsulating Security Payload or ESP)
If the other side of the VPN tunnel is a WatchGuard Firebox X and each Firebox is under
WatchGuard System Manager management, you can use the Managed VPN option. Managed
VPN is easier to configure than Manual VPN. You must get information from the administrator of
the Firebox X on the other side of the VPN to use this option.
You must know if the IP address assigned to your Firebox X Edge external interface is static or
dynamic. To learn about IP addresses, see Chapter 2, “Installing the Firebox X Edge e-Series.
Your Firebox X Edge e-Series model tells you the number of VPN tunnels that you can create on
your Edge. You can purchase a model upgrade for your Edge to make more VPN tunnels, as
described in “Enabling the Model Upgrade Option” on page 44.
If you connect two Microsoft Windows NT networks, they must be in the same Microsoft
Windows domain, or they must be trusted domains. This is a Microsoft Networking problem, and
not a limit of the Firebox X Edge e-Series.
If you want to use the DNS and WINS servers from the network on the other side of the VPN
tunnel, you must know the IP addresses of these servers.
The Firebox X Edge can give WINS and DNS IP addresses to the computers on its trusted network if those
computers get their IP addresses from the Edge using DHCP. If you want to give the computers the IP addresses of
WINS and DNS servers on the other side of the VPN, you can type those addresses into the DHCP settings in the
trusted network setup. For information on how to configure the Edge to give DHCP addresses, see “Using DHCP on
the trusted network” on page 51.
You must know the network address of the private (trusted) networks behind your Firebox X
Edge e-Series and of the network behind the other VPN device, and their subnet masks.
Note
The private IP addresses of the computers behind your Firebox X Edge cannot be the same as the IP
addresses of the computers on the other side of the VPN tunnel. If your trusted network uses the same
IP addresses as the office to which it will create a VPN tunnel, then your network or the other network
must change their IP address arrangement to prevent IP address conflicts.
Managed VPN
You can configure a VPN tunnel on the Firebox® X Edge e-Series with two procedures: Managed VPN
and Manual VPN. For information on creating a manual VPN tunnel, see “Manual VPN: Setting Up Man-
ual VPN Tunnels” on page 137.
The WatchGuard® Management Server (previously known as the DVCP Server) uses DVCP to keep the
VPN tunnel configuration. DVCP (Dynamic VPN Configuration Protocol) is the WatchGuard protocol that
you can use to create IPSec tunnels easily. We use the name Managed VPN because the Management
Server manages the VPN tunnel and sends the VPN configuration to your Firebox X Edge. An Edge
administrator must type only a small quantity of information into the Edge configuration pages.
You must have WatchGuard System Manager and a Firebox III, Firebox X Core, or Firebox X Peak to have
a Management Server. When your Firebox X Edge gets its VPN configuration from a Management
Seitenansicht 151
1 2 ... 147 148 149 150 151 152 153 154 155 156 157 ... 233 234

Kommentare zu diesen Handbüchern

Keine Kommentare