Kerio Tech Firewall6 User Manual

Page 323

Advertising
background image

23.5 Example of Kerio VPN configuration: company with a filial office

323

sions, custom routes are used as prior. This option easily solves the problem where

a remote endpoint provides one or more invalid route(s).

Custom routes only — all routes to remote networks must be set manually at the local

endpoint of the tunnel. This alternative eliminates adding of invalid routes provided

by a remote endpoint to the local routing table. However, it is quite demanding from

the administrator’s point of view (any change in the remote network’s configuration

requires modification of custom routes).

Routes provided automatically

Unless any custom routes are defined, the following rules apply to the interchange of routing

information:

default routes as well as routes to networks with default gateways are not exchanged

(default gateway cannot be changed for remote VPN clients and/or for remote end-

points of a tunnel),

routes to subnets which are identical for both sides of a tunnel are not exchanged

(routing of local and remote networks with identical IP ranges is not allowed).

other routes (i.e. routes to local subnets at remote ends of VPN tunnels excluding the

cases described above, all other VPN and all VPN clients) are exchanged.

Note: As implied from the description provided above, if two VPN tunnels are created, com-

munication between these two networks is possible. The traffic rules can be configured so that

connection to the local network will be disabled for both these remote networks.

Update of routing tables

Routing information is exchanged:

when a VPN tunnel is connected or when a VPN client is connected to the server,

when information in a routing table at any side of the tunnel (or at the VPN server) is

changed,

periodically, once per 30 secs (VPN tunnel) or once per 1 min (VPN client). The timeout

starts upon each update (regardless of the update reason).

23.5 Example of Kerio VPN configuration: company with a filial office

This chapter provides a detailed exemplary description on how to create an encrypted tunnel

connecting two private networks using the Kerio VPN.

This example can be easily customized. The method described can be used in cases where no

redundant routes arise by creating VPN tunnels (i.e. multiple routes between individual private

Advertising