Web: Example for Configuring a Mobile User to Use the SecoClient to Access the Enterprise Network over an L2TP over IPSec VPN Tunnel (Using Pre-shared Key Authentication)
This section describes how to configure a mobile user to use the SecoClient to access the enterprise network over an L2TP over IPSec VPN tunnel.
Networking Requirement
Data Planning
Item |
Data |
---|---|
Interface |
Interface number: GigabitEthernet 1/0/1 IP address: 1.1.1.1/24 Security zone: Untrust GigabitEthernet 1/0/2 IP address: 10.1.1.1/24 Security zone: Trust |
L2TP configuration |
User name: user0001 Password: Password@123 Address pool: 172.16.1.1 to 172.16.1.100 NOTE:
If the intranet server IP address and IP address of address pool are on different subnets, configure a route to the address pool on the intranet server. Tunnel authentication password: Hello@123 |
IPSec configuration |
Setup mode: policy template Pre-shared key: Admin@123 Local ID: IP address Peer ID: any peer ID Local ID: IP address Security protocol: ESP IKE authentication algorithm: SHA2–256 IKE encryption algorithm: AES-256 ESP authentication algorithm: SHA2–256 ESP encryption algorithm: AES-256 |
Mobile user |
User name: user0001 Password: Password@123 |
Verification
- Log in to the FW, choose , and view the monitoring list. User user0001 successfully logs in.
- Check the IPSec tunnel establishment on the FW. If the following information is displayed, the IPSec tunnel is established.
- Mobile users can access resources in the enterprise intranet.
Configuration Scripts
# sysname FW # l2tp enable undo l2tp sendaccm enable l2tp domain suffix-separator @ # interface GigabitEthernet 1/0/1 undo shutdown ip address 1.1.1.1 255.255.255.0 service-manage https permit service-manage ping permit ipsec policy ipsec1651051555 # interface GigabitEthernet 1/0/2 undo shutdown ip address 10.1.1.1 255.255.255.0 service-manage https permit service-manage ping permit # ip route-static 0.0.0.0 0.0.0.0 1.1.1.2 # acl number 3000 rule 5 permit udp source-port eq 1701 # ipsec proposal prop16510515517 encapsulation-mode transport esp authentication-algorithm sha2-256 esp encryption-algorithm aes-256 # ike proposal 1 encryption-algorithm aes-256 dh group2 authentication-algorithm sha2-256 authentication-method pre-share integrity-algorithm hmac-sha2-256 prf hmac-sha2-256 # ike peer ike165105155173 undo version 2 exchange-mode auto pre-shared-key %^%#_%kCMyV]"T8IM[VjLO.#2H.R3]I~!=.2)EP>b%pB%^%# ike-proposal 1 local-id 1.1.1.1 # ipsec policy-template tpl165105155173 1 security acl 3000 ike-peer ike165105155173 proposal prop16510515517 alias ipsec scenario point-to-multi-point l2tp-user-access # ipsec policy ipsec1651051555 10000 isakmp template tpl165105155173 # ip pool pool section 0 172.16.1.1 172.16.1.100 excluded-ip-address 172.16.1.1 # aaa service-scheme l2tpSScheme_1463367117513 ip-pool pool domain default service-type l2tp # l2tp-group default-lns allow l2tp virtual-template 1 undo tunnel authentication # interface Virtual-Template1 ppp authentication-mode chap pap remote service-scheme l2tpSScheme_1463367117513 ip address 172.16.1.1 255.255.255.255 alias L2TP_LNS_1 undo service-manage enable # firewall zone trust set priority 85 add interface GigabitEthernet 1/0/2 # firewall zone untrust set priority 5 add interface GigabitEthernet 1/0/1 add interface Virtual-Template1 # security-policy rule name l2tpipsec_ul source-zone untrust destination-zone local destination-address 1.1.1.0 mask 255.255.255.0 action permit rule name l2tpipsec_lu source-zone local destination-zone untrust source-address 1.1.1.0 mask 255.255.255.0 action permit rule name l2tpipsec_ut source-zone untrust destination-zone trust source-address 172.16.1.0 mask 255.255.255.0 destination-address 10.1.2.0 mask 255.255.255.0 action permit rule name l2tpipsec_tu source-zone trust destination-zone untrust source-address 10.1.2.0 mask 255.255.255.0 destination-address 172.16.1.0 mask 255.255.255.0 action permit # The following configuration is stored in the database, but not in the configuration profile. user-manage group /default/research user-manage user user0001 parent-group /default/research password *********