SonicWALL Switch TZ170 User Manual

Hub and Spoke TZ170 VPNs with Checkpoint NG  
SonicOS  
Introduction  
This technote will detail all steps to get a Hub and Spoke setup between the SonicWALL SonicOS Enhanced and the  
Checkpoint NG. Within this setup the Checkpoint NG will be the HUB and 2 TZ170 units will be the Spokes.  
Versions Used  
ƒ SonicOS 2.5.0.2 Enhanced on both TZ170 units  
ƒ Checkpoint FW-1 NGAI  
Sample Diagram  
Tasklist  
On the SonicWALL units:  
ƒ Create new network objects and groups  
ƒ Create new VPN Policy for the Check Point FW-1 NG  
ƒ Specify Destination Network(s), IKE Phase 1 and Phase 2 properties  
On FireWall-1 NG:  
ƒ Create local(Check Point) LAN network objects and group  
ƒ Create remote(SonicWALL's) LAN network objects  
ƒ Create new Interoperable Device objects  
ƒ Edit the Check Point Gateway object  
ƒ Verify the Topology  
ƒ Manually define VPN Domain  
ƒ Create new VPN Star Community  
ƒ Edit VPN Star community properties  
ƒ Verify Security Rules  
ƒ Verify Address Translation Rules  
Testing  
ƒ Verify that traffic flows through the tunnel.  
ƒ Verify that applications function properly through the tunnel.  
ƒ Verify that the tunnel can reestablish if either side is disconnected.  
ƒ Verify that the network map and documentation match the running configuration.  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Next create an address object group for the two checkpoint address objects. On the ‘Network > Address Objects’ page in  
the ‘Address Groups’ section, click on ‘Add Group…’ to create the address group for the objects.  
Name: checkpoint_lan  
Zone Assignment: VPN  
Type: Network  
Name: Side_Bob_lan  
Zone Assignment: VPN  
Type: Network  
Network: 192.168.170.0  
Netmask: 255.255.255.0  
Click ‘OK’ to finish.  
Network: 10.234.234.0  
Netmask: 255.255.255.0  
Click ‘OK’ to finish.  
Next create an address object group for the two checkpoint address objects. On the ‘Network > Address Objects’ page in  
the ‘Address Groups’ section, click on ‘Add Group…’ to create the address group for the objects. The ‘Name;" is  
"checkpoint_group"  
Select the "checkpoint_lan" object and ‘Ctrl’ or ‘Shift’ click to select the "Side_Bob_lan" object. Click the right arrow button  
to add both objects to the group.  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
From the navigation bar on the left, click on ‘VPN’, this will bring up the ‘VPN > Settings’ page. In the ‘VPN Global  
Settings’ section, make sure the ‘Enable VPN’ radio button is selected. In the ‘VPN Policies’ section, click on ‘Add’ to  
create the new VPN policy for the Check Point FireWall-1.  
The ‘VPN Policy’ window will then appear. On the ‘General’ tab page, ‘Security Policy’ section, select “IKE using  
Preshared Secret” from the ‘IPSec Keying Mode:’ dropdown box.  
Name: "to_checkpoint"  
IPSec Primary Gateway Name or Address: 67.115.118.94  
Shared Secret: HaRd!_to_Gue55_Al1c3  
Local IKE ID: SNWL Identifier HUB-TEST (the SonicWALL Identifier needs to be identical as the VPN SA name on the  
CheckPoint NG)  
Peer IKE ID: IP Address 192.168.170.1  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Next select the ‘Network’ tab.  
In the ‘Local Networks’ section, select the radio button next to ‘Choose local network from list’ and select "LAN Primary  
Subnet" from the dropdown box.  
In the ‘Destination Networks’ section, select the radio button next to ‘Choose destination network from list’ and select  
"checkpoint_group" from the dropdown box.  
Next select the ‘Proposals’ tab. The default values should be correct, except the ‘Life Time’; normally "28800" should be  
lowered to "3600" in both Phase 1 and 2 proposals. Verify that all values are correct.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
IKE (Phase 1) Proposal  
Exchange: Aggressive Mode  
DH Group: Group 5  
Encryption: 3DES  
Authentication: SHA1  
Life Time (seconds): 3600  
Ipsec (Phase 2) Proposal  
Protocol: ESP  
Encryption: 3DES  
Authentication: SHA1  
DH Group Group 2  
Life Time (seconds): 3600  
Do not enable Perfect Forward Security.  
Next select the ‘Advanced’ tab.  
Make sure that the option Enable Keep Alive is checked. All other options can be left as they are. Click the OK button.  
This completes the settings on the SonicWALL TZ170 installed on Side Alice. Now, we will setup the Check  
Point unit we will setup the TZ170 unit at Side Bob.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
SonicWALL Setup Side Bob  
Log into the SonicWALL’s Management GUI using a current web browser.  
The address objects will be created first, and then a group will be created to contain the address objects. From the  
navigation bar on the left, click on ‘Network’ and then ‘Address Objects’, this will bring up the ‘Network > Address Objects’  
page. In the ‘Address Objects’ section, click on ‘Add’ to create the address objects for the networks connected to the  
Check Point FireWall-1 and SonicWALL. The first address object is for the LAN behind the Check Point FW-1.  
Next create an address object group for the two checkpoint address objects. On the ‘Network > Address Objects’ page in  
the ‘Address Groups’ section, click on ‘Add Group…’ to create the address group for the objects.  
7
Download from Www.Somanuals.com. All Manuals Search And Download.  
Name: checkpoint_lan  
Zone Assignment: VPN  
Type: Network  
Name: Side_Alice_lan  
Zone Assignment: VPN  
Type: Network  
Network: 192.168.170.0  
Netmask: 255.255.255.0  
Click ‘OK’ to finish.  
Network: 180.10.10.0  
Netmask: 255.255.255.0  
Click ‘OK’ to finish.  
Next create an address object group for the two checkpoint address objects. On the ‘Network > Address Objects’ page in  
the ‘Address Groups’ section, click on ‘Add Group…’ to create the address group for the objects. The ‘Name;" is  
"checkpoint_group"  
Select the "checkpoint_lan" object and ‘Ctrl’ or ‘Shift’ click to select the "Side_Alice_lan" object. Click the right arrow  
button to add both objects to the group.  
From the navigation bar on the left, click on ‘VPN’, this will bring up the ‘VPN > Settings’ page. In the ‘VPN Global  
Settings’ section, make sure the ‘Enable VPN’ radio button is selected. In the ‘VPN Policies’ section, click on ‘Add’ to  
create the new VPN policy for the Check Point FireWall-1.  
8
Download from Www.Somanuals.com. All Manuals Search And Download.  
The ‘VPN Policy’ window will then appear. On the ‘General’ tab page, ‘Security Policy’ section, select “IKE using  
Preshared Secret” from the ‘IPSec Keying Mode:’ dropdown box.  
Name: "to_checkpoint"  
IPSec Primary Gateway Name or Address: 67.115.118.94  
Shared Secret: HaRd!_to_Gue55_B0b  
Local IKE ID: SNWL Identifier HUB-TEST  
(the SonicWALL Identifier needs to be identical as the VPN SA name on the CheckPoint NG)  
Peer IKE ID: IP Address 192.168.170.1  
9
Download from Www.Somanuals.com. All Manuals Search And Download.  
Next select the ‘Network’ tab.  
In the ‘Local Networks’ section, select the radio button next to ‘Choose local network from list’ and select "LAN Primary  
Subnet" from the dropdown box.  
In the ‘Destination Networks’ section, select the radio button next to ‘Choose destination network from list’ and select  
"checkpoint_group" from the dropdown box.  
Next select the ‘Proposals’ tab. The default values should be correct, except the ‘Life Time’; normally "28800" should be  
lowered to "3600" in both Phase 1 and 2 proposals. Verify that all values are correct.  
IKE (Phase 1) Proposal  
Exchange: Aggressive Mode  
DH Group: Group 5  
Encryption: 3DES  
Authentication: SHA1  
Life Time (seconds): 3600  
10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Ipsec (Phase 2) Proposal  
Protocol: ESP  
Encryption: 3DES  
Authentication: SHA1  
DH Group Group 2  
Life Time (seconds): 3600  
Do not enable Perfect Forward Security.  
Next select the ‘Advanced’ tab.  
Make sure that the option Enable Keep Alive has been checked. All other options can be left as they are. Click the OK  
button.  
This completes the settings on the SonicWALL TZ170 installed on Side Bob.  
11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Check Point FireWall-1NG Setup  
Log into SmartDashboard.  
Before the VPN can be setup it is necessary to create Network Objects for all devices and networks.  
To create the network objects, first click on ‘Manage’ on the top of the SmartDashboard. Then  
click on ‘Network Objects…’ from the drop down box.  
The ‘Network Objects’ window will then appear. The first object to create is for the LAN subnet of the Checkpoint FW, it’s  
likely that these object already exist as they are used as the base for most rules. To create the LAN object, click the ‘New’  
button at the bottom of the ‘Network Objects’ window, then select ‘Network’ from the dropdown box.  
12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The ‘Network Properties’ window will then appear.  
In this window, enter the object:  
Name: CP_LAN  
Network Address: 192.168.170.0  
Net Mask: 255.255.255.0  
The next network objects to create are for the LAN of the SonicWALL appliance at Side Alice and for the LAN of the  
SonicWALL appliance at Side Bob.  
From the ‘Network Objects’ window, click the ‘New’ button at the bottom of the ‘Network Objects’ window, then select  
‘Network…’ from the dropdown box.  
Here we create the Network Object for the LAN of Side Alice. Make sure that the Object contains the correct LAN Network  
Address and Net Mask. Within our example we used:  
Name: Network_Alice  
Network Address: 180.10.10.0  
Net Mask: 255.255.255.0  
13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Here we create the Network Object for the LAN of Side Bob. Make sure that the Object contains the correct LAN Network  
Address and Net Mask. Within our example we used:  
Name: Network_Bob  
Network Address: 10.234.234.0  
Net Mask: 255.255.255  
Next, edit the ‘Check Points’ network object. It should be named the same as the machine name then press the edit  
button. If it does not exist, create it under ‘New’ > ‘Check Point’ > ‘Gateway…’ and proceed to the next step.  
14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
The ‘Check Point Gateway’ page will appear. On ‘General Properties’, verify the ‘IP Address’ and that both ‘FireWall-1’  
and ‘VPN-1 Pro’ are selected. In this example, the ‘IP Address’ is “192.168.170.1”. When finished, click ‘Topology’ on the  
left hand side.  
On ‘Topology’, verify the network addresses of the ‘internal’ and ‘external’ networks listed under the ‘Topology’ section. If  
nothing is populated in the topology fields, click ‘Get Topology…’  
In this example:  
External network: “67.115.118.94”  
Net mask : “255.255.255.255”  
Internal network: “192.168.170.1”  
Net mask: “255.255.255.0”  
(internal is also referred to as ‘This Network’).  
In the ‘VPN Domain’ section select ‘Manually defined’ and select the previously created “CP_LAN” Network Object with  
the dropdown menu. When this is done you can close this page by pressing the OK button.  
15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
It is needed to create also Interoperable Network objects for the both SonicWALL appliances. Go to ‘Manage’ > ‘Network  
Objects’ now the Network Objects window will then appear. To create the ‘Interoperable Device’ object, click the ‘New’  
button at the bottom of the ‘Network Objects’ window, then select ‘Interoperable Device’ …’ from the dropdown box. The  
‘Interoperable Device’ window will then appear.  
In this window, under ‘General Properties’ enter  
Name: SNWL_Alice  
IP Address: 207.88.91.77  
Next click ‘Topology’ on the left hand side.  
.
16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
On the ‘Topology’ page, under the ‘VPN Domain’ section, select ‘Manually defined’ and select the previously created  
“Network_Alice” Network Object with the dropdown menu. Click on ‘OK’ to finish.  
An Interoperable Device Object needs also to be created for Side Bob. Go to ‘Manage’ > ‘Network Objects’ now the  
Network Objects window will then appear. To create the ‘Interoperable Device’ object, click the ‘New’ button at the bottom  
of the ‘Network Objects’ window, then select ‘Interoperable Device’ …’ from the dropdown menu.  
The ‘Interoperable Device’ window will then appear.  
17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
In this window, under ‘General Properties’ enter:  
Name: SNWL_Bob  
IP Address: 80.62.91.20  
Next click ‘Topology’ on the left hand side.  
On the ‘Topology’ page, under the ‘VPN Domain’ section select ‘Manually defined’ and select the previously created  
“Network_Bob” Network Object with the dropdown menu. Click on ‘OK’ to finish.  
Now all the Network Addresses are created which will be needed to setup the VPN SA on the Checkpoint NGAI unit.  
Next, define the VPN. From the top menu, select ‘Manage’ and then ‘VPN Communities…’; the ‘VPN Communities’  
window will appear.  
18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
From the ‘VPN Communities’ window, select the ‘New’ button on the bottom. Then select ‘Site To Site’ and ‘Star…’ The  
‘Star Community Properties’ page will appear.  
On the ‘Star Community Properties’ page, enter the VPN name in the ‘Name:’ field. In this example, the ‘Name:’ is "HUB-  
TEST" which needs to be the same as the SNWL Identifier setup in the VPN SA on the Spokes.  
For the ‘Enable VPN routing for satellites’ you need to select the option ‘To center, or through the center to other  
satellites, to internet and other VPN targets. ’  
At the Community Traffic Security Policy it is necessary to have the checkbox ‘Accept all encrypted traffic’ ticked. Next,  
click on ‘Central Gateways’.  
On the Central Gateways, click on the ‘Add…’ button under the ‘Central Gateways:’ section. This will bring up the ‘Central  
Gateways’ window. Select here the address object ‘cpmodule’ and press OK.  
19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Next, click on ‘Satellite Gateways’. On the Satellite Gateways, click on the ‘Add…’ button under the ‘Satellite Gateways:’  
section. This will bring up the ‘Satellite Gateways’ window.  
Select here the address objects ‘SNWL_Alice’ and address object ‘SNWL_Bob’ after this is done press OK.  
20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Click on 'VPN Properties'.  
Enter the ‘IKE (Phase 1) Properties’ and the ‘IPsec (Phase 2) Properties’. In this example, the ‘IKE (Phase 1)’ section the  
settings are as follows:  
IKE (Phase 1) Properties  
Perform key exchange encryption with: 3DES  
Perform data integrity with: SHA1  
Ipsec (Phase 2) Properties  
Perform IPsec data encryption with: 3DES  
Perform data integrity with: SHA1  
Next, click on ‘Advanced Properties.’  
21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
In the ‘Advanced Properties’ section, under IKE (Phase 1), modify the ‘Renegotiate IKE security associations every’ field  
to "60" minutes and the ‘Use Diffie-Hellman group’ should be "Group 5 (1536 bit). Tick the option ‘Use aggressive mode’  
For the ‘Ipsec (Phase 2) Proposal’ section the settings are as follows: ‘Life Time (seconds)’ is "3600". Do not enable  
Perfect Forward Security. At the ‘NAT’ it is necessary to tick the option ‘Disable NAT inside the VPN community’  
Click ‘Shared Secret’.  
On the ‘Shared Secret’ section, tick the option ‘Use only Shared Secret for all External members’. Highlight "SNWL_Alice"  
in the ‘Peer Name’ table below. Click on the ‘Edit…" button to enter the secret. In this example, the shared secret is  
"HaRd!_to_Gue55_Al1c3" press the OK button. After this Highlight "SNWL_Bob" in the ‘Peer Name’ table below. Click on  
the ‘Edit…" button to enter the secret. In this example, the shared secret is "HaRd!_to_Gue55_B0b" and press the OK  
button.  
Click ‘OK’ to finish the VPN Interoperability Hub Spoke setup between the SonicOS 2.5 Enhanced and Checkpoint NG  
within the SmartDashboard. Make sure that the Policy has been installed onto the Checkpoint firewall to have it working.  
Document Created: 11/16/2004  
Last Updated: 06/19/2008  
Version 1.1  
22  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Sennheiser Microphone e903 User Manual
Sony Baby Gym A ATF 210 1 11 User Manual
Sony CRT Television KP 41S4G User Manual
Sony Ericsson Computer Drive MD300 User Manual
Sony Microphone FV 820 User Manual
Sony Stereo Receiver IFT R20 User Manual
Stinger Automobile Accessories SGN11 User Manual
Sunbeam Coffee Grinder EM0415 User Manual
Sylvania CD Player SRCD302 User Manual
Sylvania Telephone ST 884 User Manual