User manual ZYXEL THEGREENBOW VPN-CLIENT
Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!
If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Lastmanuals provides you a fast and easy access to the user manual ZYXEL THEGREENBOW VPN-CLIENT. We hope that this ZYXEL THEGREENBOW VPN-CLIENT user guide will be useful to you.
Lastmanuals help download the user guide ZYXEL THEGREENBOW VPN-CLIENT.
You may also download the following manuals related to this product:
ZYXEL THEGREENBOW VPN-CLIENT BROCHURE (198 ko)
Manual abstract: user guide ZYXEL THEGREENBOW VPN-CLIENT
Detailed instructions for use are in the User's Guide.
[. . . ] Doc. Ref Doc. version VPN version
TgbVpn25x_en 1. 2 Nov. 2004 2. 50
TheGreenBow VPN Client User Manual
WebSite : Contact : http://www. thegreenbow. com support@thegreenbow. com
IPSec VPN Client User Manual
Property of Sistech SA - © Sistech 2004
1/1
Doc. Ref Doc. version VPN version
TgbVpn25x_en 1. 2 Nov. 2004 2. 50
Table of Content
1 2 3 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. 1 Software installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2. 2 Evaluation Period. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Software manipulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. 1 System Tray. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 3. 2 Hidden User interface. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3. 3 Main window . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3. 3. 1 Main menus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3. 3. 2 Status bar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3. 3. 3 Window 'About'. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 4. 1 USB Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 4. 1. 1 How to set " USB mode " on ?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 4. 1. 2 How to enable the USB Stick?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 4. 1. 3 How to open tunnels automatically when an USB stick is plugged in ?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 4. 2 Configuration Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 4. 2. 1 Step 1 of 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 4. 2. 2 Step 2 of 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 4. 2. 3 Step 3 of 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4. 3 Tunnel configuration (main window). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4. 3. 1 How to create a tunnel?. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4. 3. 2 Several Authentication or IPSec Configuration Phases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4. 3. 3 Active or Non Active phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4. 4 Authentication or Phase 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 4. 4. 1 Settings description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4. 4. 2 Advanced configuration ("Advanced" Button) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4. 4. 3 Settings description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4. 5 IPSec Configuration or Phase 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 4. 5. 1 Settings description. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 4. 6 Certificate management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 4. 6. 1 How configuring IPSec VPN Client with certificates? [. . . ] Therefore, one computer can establish IPSec VPN connections with several gateways or other computers (peer to peer). Similarly, several IPSec Configuration (phase 2) can be created for a same Authentication Phase (Phase 1).
4. 3. 3
Active or Non Active phase
A phase can be either "active" or "non active". If a phase is "non active", its settings will not be applied. This feature can be used with a configuration composed of several VPN tunnels that do not need to be enabled simultaneously. Changing "active" to "non activate" state for a specific Phase can be achieved by a right-click on the phase name: Active (or Non active) All active Active Only Enable or disable the phase Enable all phases Disable every phase except the phase selected with the mouse.
4. 4 Authentication or Phase 1
'Authentication' window will concern settings for Authentication Phase or Phase 1. It is also called IKE Negotiation Phase.
IPSec VPN Client User Manual
Property of Sistech SA - © Sistech 2004
11/11
Doc. Ref Doc. version VPN version
TgbVpn25x_en 1. 2 Nov. 2004 2. 50
4. 4. 1 Settings description
Name Label for Authentication phase used only the configuration user interface. This value is never used during IKE negotiation. It is possible to change this name at any time and read it in the tree control. IP address of the network interface of the computer, through which VPN connection is established. If the IP address may change (when it is received dynamically by an ISP), select "*". IP address or DNS address of the remote gateway (in our example: gateway. mydomain. com). Password or key shared with the remote gateway. X509 certificate used by the VPN client (see certificate configuration). Encryption algorithm used during Authentication phase (3DES, AES, . . . ). Authentication algorithm used during Authentication phase (MD5, SHA, . . . ). Diffie-Hellman key length.
Interface
Remote Gateway Pre-shared key Certificate IKE encryption IKE authentication IKE key group
Once the parameters are set, click on "Save & Apply" to save and to take into account the new configuration.
4. 4. 2 Advanced configuration ("Advanced" Button)
4. 4. 3 Settings description
Aggressive Mode Nat port Local ID If checked, the VPN client will used aggressive mode as negociation mode with the remote gateway Negociation port for IKE. Local ID is the identity the VPN client is sending during Phase 1 to VPN gateway. ?
IPSec VPN Client User Manual
an IP address (type = IP address), for example: 195. 100. 205. 101 an domaine name (type = DNS), e. g. mydomain. com an email address (type = Email), e. g. support@thegreenbow. com
Property of Sistech SA - © Sistech 2004 12/12
Doc. Ref Doc. version VPN version
TgbVpn25x_en 1. 2 Nov. 2004 2. 50
Remote ID
a string (type = KEY ID), e. g. 123456 a certificate issuer (type=DER ASN1 DN) (see Certificates configuration) If this identity is not set, VPN client's IP address is used. Remote ID is the identity the VPN client is expecting to receive during Phase 1 from the VPN gateway. [. . . ] User certificate is copied into directory " [install_path]\cert\". User certificate private key is copied to " [install_path]\private\local. key".
3. Open "Advanced button" and fill Local ID with: Type = "DER_ASN1_DN". Value = subject user certificate ("Subject:") content like "C=FR, ST=Paris, L=Paris, O=TheGreenBow, OU=Internal OpenSSL CA, CN=exemple/Email=support@thegreenbow. com".
IPSec VPN Client User Manual
Property of Sistech SA - © Sistech 2004
15/15
Doc. Ref Doc. version VPN version
TgbVpn25x_en 1. 2 Nov. 2004 2. 50
4. 7 Global Parameters
4. 7. 1 Settings description
IKE default lifetime IKE minimal lifetime IKE maximal lifetime IPSec minimal lifetime IPSec maximal lifetime IPSec minimal lifetime Retransmissions Delay between retries Block non-ciphered connection Default lifetime for IKE rekeying. [. . . ]
DISCLAIMER TO DOWNLOAD THE USER GUIDE ZYXEL THEGREENBOW VPN-CLIENT Lastmanuals offers a socially driven service of sharing, storing and searching manuals related to use of hardware and software : user guide, owner's manual, quick start guide, technical datasheets... In any way can't Lastmanuals be held responsible if the document you are looking for is not available, incomplete, in a different language than yours, or if the model or language do not match the description. Lastmanuals, for instance, does not offer a translation service. Click on "Download the user manual" at the end of this Contract if you accept its terms, the downloading of the manual ZYXEL THEGREENBOW VPN-CLIENT will begin.