Policy based virtual private networking, Virtual private networking to a dmz – RuggedCom RuggedRouter RX1000 User Manual

Page 113

Advertising
background image

Chapter 11 – Configuring The Firewall

IPSec traffic arriving at the firewall is directed to openswan, the IPSec daemon.
Openswan then decrypts the traffic and forwards it back to shorewall on the assigned
ipsecX interface. You will also need a rule to allow traffic to enter from this
interface. For example, if openswan creates interface ipsec0 when its connections are
established, and ipsec0 is in the zone vpn, you would need the following rule.

ACCEPT

vpn

loc

Note that if your firewall itself is required to communicate with the VPN you will
need rules such as the following.

ACCEPT

vpn

fw

tcp

ssh

Policy Based Virtual Private Networking

Begin configuration by creating local, network and vpn zones. Identify the network
interface that carries the encrypted IPsec traffic and make this interface part of zone
“ANY” in the interfaces menu as it will be carrying both traffic for both zones.
Visit the Zone Hosts menu and, for the network interface that carries the encrypted
IPsec traffic, create a zone host with zone VPN, the correct subnet and the IPsec zone
option checked. If you plan to have VPN tunnels to multiple remote sites ensure that
a zone host entry exists for each (or collapse them into a single subnet). Create
another zone host for the same interface with a network zone, using a wider subnet
mask such as 0.0.0.0/0. It is important that the vpn zone be declared before the net
zone since the more specific vpn zone subnet must be inspected first.

Host Zone

Interface

Subnet

IPsec Zone?

vpn

w1ppp

192.168.1.0/24

Yes

net

w1ppp

0.0.0.0/0

No

The IPsec protocol operates on UDP port 500 and using protocols ah (Authentication
Header) and Encapsulating Security Payload (ESP) protocols. The firewall must
accept this traffic in order to allow IPsec.

Action

Source-Zone Destination-Zone Protocol Dest-Port

ACCEPT

net

fw

ah

ACCEPT

net

fw

esp

ACCEPT

net

fw

udp

500

IPSec traffic arriving at the firewall is directed to openswan, the IPSec daemon.
Openswan then decrypts the traffic and forwards it back to shorewall on the same
interface that originally received it. You will also need a rule to allow traffic to enter
from this interface.

ACCEPT

vpn

loc

Virtual Private Networking To A DMZ

If the firewall is to pass the VPN traffic through to another device (e.g. a VPN device
in a DMZ) then establish a DMZ zone and install the following rules.

ACCEPT

net

dmz

ah

ACCEPT

net

dmz

esp

ACCEPT

net

dmz

udp

500

ACCEPT

dmz

net

ah

ACCEPT

dmz

net

esp

ACCEPT

dmz

net

udp

500

RuggedCom 111

Advertising