Allied Telesis VPN Network Router User Manual


 
Configuring the router > The configuration script
Page 6 | AlliedWare™ OS How To Note: VPNs with Windows 2000 clients, without NAT-T
# Firewall
enable fire
create fire poli=main
create fire poli=main dy=dynamic
add fire poli=main dy=dynamic user=ANY
add fire poli=main int=vlan1 type=private
# Dynamic private interfaces are accepted from L2TP, which are from
# IPSec only.
add fire poli=main int=dyn-dynamic type=private
add fire poli=main int=eth0 type=public
# The firewall allows for internally generated access to the Internet
# through the following NAT definition.
add fire poli=main nat=enhanced int=vlan1 gblint=eth0
# This NAT definition allows Internet access for remote VPN users by
# providing address translation.
add fire poli=main nat=enhanced int=dyn-dynamic gblint=eth0
add fire poli=main rule=1 int=eth0 action=allow prot=udp
ip=<office-Internet-address> port=500
gblip=<office-Internet-address> gblpo=500
# Rule 2 becomes the L2TP tunnel allow rule. Additional security is
# provided by only allowing traffic from IPSec tunnels.
add fire poli=main rule=2 int=eth0 action=allow prot=udp
ip=<office-Internet-address> port=1701
gblip=<office-Internet-address> gblpo=1701 encap=ipsec
create ipsec sas=1 key=isakmp prot=esp encalg=3desouter hashalg=sha
mode=transport
create ipsec sas=2 key=isakmp prot=esp encalg=3desouter hashalg=md5
mode=transport
create ipsec sas=3 key=isakmp prot=esp encalg=des hashalg=sha
mode=transport
create ipsec sas=4 key=isakmp prot=esp encalg=des hashalg=md5
mode=transport
# The ORDER of proposals is important. You should propose the strongest
# encryption first.
create ipsec bundle=1 key=isakmp string=”1 or 2 or 3 or 4”
create ipsec policy=isakmp int=eth0 action=permit lport=500 rport=500
# This is a generic IPSec policy that multiple IPSec remote PC clients
# can connect through.
create ipsec policy=to_HQ int=eth0 action=ipsec key=isakmp bundle=1
peer=any isa=keys
set ipsec policy=to_HQ transport=udp rport=1701
# The following policy allows for internally generated Internet access.
create ipsec policy=Internet int=eth0 act=permit
enable ipsec
create isakmp policy=keys peer=any key=1
set isakmp policy=keys sendd=true
enable isakmp