VPN
VPN
VPN
VIRTUAL PRIVATE
NETWORKING
18.07.2000
Software Reference
Software Reference
Table of Contents
Table of Contents
REFERENCE
Technology Overview
1.1
Introduction
1.2
1.3
11
1.3.1
12
1.3.2
14
1.4
17
1.4.1
Authentication
17
1.4.2
Data Encryption
17
1.4.3
Compression
18
1.5
18
1.6
19
1.6.1
19
1.6.2
20
1.6.3
21
Configuration Overview
23
2.1
23
2.1.1
24
2.1.2
PPP Settings
25
Software Reference
Table of Contents
2.1.3
Advanced Settings
27
2.1.4
IP Settings
28
2.1.5
29
2.1.6
IPX Settings
32
WORKSHOP
35
36
1.1
Introduction
36
1.2
Prerequisites
37
1.3
Instructions
37
1.3.1
37
1.3.2
40
1.4
44
1.4.1
44
1.4.2
44
45
2.1
Introduction
45
2.2
Prerequisites
46
2.3
Instructions
47
2.3.1
47
3.1
Introduction
51
3.2
Prerequisites
52
3.3
Instructions
54
3.3.1
Step 1: This is how to configure a PPP link from a Windows NT host to an ISP 54
Software Reference
Table of Contents
3.3.2
Step 2: This is how to configure the PPTP link from the Client to the
BinTec router
56
3.3.3
58
3.3.4
Step 4: This is how to configure the VPN interface on your BinTec router
60
3.4
64
3.4.1
64
3.4.2
Tracing errors
66
Software Reference
Table of Contents
Software Reference
REFERENCE
Software Reference
Technology Overview
Technology Overview
1.1
Introduction
In Internet VPNs, companies set up connections to their Internet Service Providers (ISP) and let the ISP transmit the data to the desired destination across
the Internet. Virtual also implies that the networks are dynamic. Connections
are established on demand and torn down when they are no longer needed, reducing bandwidth utilization and consequently costs, especially for dial-in clients. LAN-to-LAN VPN connections (typically with a leased line connection to
the ISP on one side, a dial-up line on the other) also offer significant cost savings in comparison with long-distance dedicated lines.
Security
As the Internet is a public network with the security risks associated with the
open transmission of data, companies that rely on Internet VPNs depend on the
encryption of their data to prevent the threat of security violations, such as
spoofing, sniffing or man-in-the-middle attacks. A VPN is thus considered a Virtual "Private" Network since user data transmitted over the link is typically encrypted. Windows 95/98/NT/2000 based networks achieve this security via
Microsofts own Point-to-Point Encryption protocol, or MPPE. This encryption
method was developed especially for use with the protocol PPTP, a major tunneling protocol.
Tunneling protocols
There are three major tunneling protocols: IPSec, L2TP and PPTP.
IPSec is an advanced security package that addresses issues such as authentication, key management, data privacy and integrity, as well as supporting VPN tunneling. Due to the inclusion of such security measures in its
standards set, it provides an excellent security solution for pure IP environments. IPSec operates at layer three and can thus only transmit IP packets
over its tunnels.
Software Reference
The Layer 2 Tunneling Protocol (L2TP) is a hybrid Layer two tunneling protocol that combines elements from PPTP and L2F (a proprietary product
from an American manufacturer). Like PPTP, L2TP leans heavily on PPP;
the ability to use IPSec increases the security of data transmission.
The Point-to-Point Tunneling Protocol or PPTP is an IETF standard described in RFC 1171. PPTP works at layer two, the Link layer enabling
PPTP to work in multiprotocol environments such as IPX and NetBEUI as
well as IP. PPTP is especially popular in Client-LAN VPNs as the protocol
is supported by Windows operating systems.
The VPN solution that is described in this document and that can be acquired
as an extended feature from BinTec Communications AG is the PPTP VPN.
1.2
The process of building a VPN tunnel between a PPTP client and a VPN partner
can be outlined as follows.
How a tunnel is built
Software Reference
Technology Overview
lish a tunnel over the infrastructure of the Internet to its VPN partner and to exchange user data packets with this other tunnel endpoint.
PPTP Client
(agent mole)
ISP
ISP
10.5.5.11
VPN Partner
(headquarters)
Internet
Dynamic
IP add.
198.16.13.1
10.5.5.0
10.5.5.1
10.5.5.2
10.5.5.3
PPP
PPP
PPTP
10.5.5.8
VPN Tunnel
Figure 1-A-1: Typical VPN scenario
Control connection
In order to do this, PPTP creates a control connection that contains control packets and that runs over TCP. The control packets forward messages that establish, maintain and end the connection between the two PPTP tunnel endpoints.
PPP Header
IP Header
TCP Header
PPTP Control Message
Tunnel
endpoint
Figure 1-A-2: Tunnel establishment phase
Data stream
10
After the control connection is made, the PPTP protocol creates a data stream
that contains data packets that run in IP envelopes, using GRE (GRE refers to
the Generic Routing Encapsulation protocol). After the PPTP tunnel is estab-
Software Reference
lished, the actual user data transmission can commence over this data stream,
see figure 1-A-7, page 15.
PPP Header
IP Header
GRE Header
PPP Header
IP/IPX/NetBEUI
User Data
Tunnel
endpoint
Figure 1-A-3: Data transport phase
When sending data, PPP packets are encapsualted in the user-data field of the
IP packet which is later unpacked by the opposite site.
1.3
For both basic Internet access as well as for the construction of a VPN over the
Internet, the use of Network Address Translation (NAT) offers significant advantages.
A limited number of official IP addresses is required for the entire LAN. This
saves costs for the organization and conserves the number of world-wide
exclusive IP addresses.
Security is increased by hiding internal IP addresses from external networks, while at the same time enabling all workstations to access the Internet and participate in VPN tunnels.
Software Reference
11
Technology Overview
1.3.1
Address translation
without VPN
The Network Address Translation feature on the BinTec router converts internal
IP addresses in IP packets destined for the public Internet, substituting a globally unique address for the private address within the packet. The globally
unique address, automatically converted in the ipNatTable, becomes the
source address of the IP packet. When the globally unique address returns to
the BinTec router, it is reconverted to the originating LAN IP address by means
of the port number accompanying the packet.
off. IP address
Address translation
with VPN
12
Network Address Translation occurs a little differently when the BinTec router
is functioning as a VPN tunnel endpoint. In this case, the LAN IP address is not
converted to a globally unique IP address as outlined above. What happens is
this: the packet the VPN router receives from the LAN, including the LAN IP address is packed within the IP packet of the VPN tunnel endpoint. The LAN IP
address is thus "absorbed" within another IP packet. This absorbing IP packet,
the IP packeting of the VPN tunnel endpoint, uses its own source address in the
IP header, i.e the source address of the router. This source address may be the
Unique Source Address, the LAN IP address of the router or the official IP ad-
Software Reference
dress. The source address, whatever it may be, is then translated through NAT
into a globally unique IP address.
Network Address Translation
PPP Header
IP Header (source add)
GRE Header
PPP Header
IP/IPX/NetBEUI
(LAN address)
User Data
Tunnel
endpoint
It could well be the case that the source address of the IP router is the same as
the globally unique address and thus a translation of the former to the latter will
not produce any visible difference. Nevertheless, strictly speaking a conversion
from the routers source address to the official IP address has taken place. The
two addresses may differ, however, if the source address of the router is a
Unique Source Address or the LAN IP address.
In non-VPN address translation, the source address of an outgoing session
and the destination address of an incoming session are both the same for the
same machine: the internal LAN IP address.
In VPN address translation, the source and destination addresses are different
as the router itself is the source and destination and usually has different
addresses for each. The routers source address could be the official IP
address, a unique source address or a LAN IP address, while the routers destination address is invariably the loopback address (127.0.0.1) which is basically a signal to unpack the tunneling headers and to send the remains back
inside the LAN.
If NAT does not seem apparent when the routers source address is the same
as the globally unique address, i.e. the actual address does not change, the
conversion of addresses is clearly perceptible when packets return to the VPN
Software Reference
13
Technology Overview
tunnel endpoint. In this case, the official IP address is translated into the destination address (usually the loopback address). The tunnel packeting is then
stripped away, leaving the user data and LAN IP address which is routed back
into the LAN to the host requiring the data.
Network Address Translation
PPP Header
IP Header (destination,
loopback add. 127.0.0.1)
GRE Header
PPP Header
IP/IPX/NetBEUI
(LAN address)
User Data
Tunnel
endpoint
1.3.2
With NAT activated on the ISP interface, the successful construction and operation of a VPN tunnel would ordinarily be prevented. GRE packets initiated by
the VPN partner would not be switched through the NAT barrier. In order to ensure that packets can return to the LAN client that establishes the VPN connection and that lies concealed behind the BinTec router because of NAT, explicit
permission for special session profiles must be given.
BinTecs NAT implementation supports connections with the protocols ICMP,
TCP, UDP and GRE (Generic Routing Encapsulation).
The administrator can specify these session profiles by means of the following
parameters:
The type of service used; or a combination of the port number used (e.g.
1723) and the protocol used (e.g. TCP).
14
Software Reference
The particular IP address that may be allowed through the NAT barrier.
The loopback address, 127.0.0.1, should be used as the destination address.
Assigned to the BinTec router itself, this address is the recommended destination as the BinTec router is an endpoint of the VPN tunnel
To allow FTP sessions, for example, the tcp protocol and port 21 would have to
be configured (IP NAT Config ADD).
For the specific purpose of establishing a VPN connection with PPTP over NAT,
the protocols TCP and GRE must be allowed through the NAT barrier.
NAT
Protocol TCP
Port 1723
NAT
Internet
BI
AN
CA
/B
RI
CK
-X
M
127.0.0.1
2. Transport of data:
Protocol GRE
Internet
NAT
NAT
BI
AN
CA
/B
RI
CK
-X
M
127.0.0.1
LAN 1
(branch office)
LAN 2
(headquarters)
In the example above, NAT is activated on the ISP interface of branch office.
The VPN connection can only be realized by headquarters if both the TCP and
GRE packets from headquarters can be switched through the NAT firewall of
branch office. The reverse is also the case in the example. TCP and GRE packets must be allowed through the NAT firewall of headquarters so that branch
office can establish and transmit data to headquarters. As explained above,
once both protocols, TCP and GRE, have been given explicit permission to
pass through the NAT firewall, the PPTP VPN tunnel can successfully exchange data over a NAT interface.
Software Reference
15
Technology Overview
PPP Header
IP Header (off. IP Add.)
TCP Header
PPTP Control Message
Tunnel
endpoint
Figure 1-A-8: Tunnel establishment phase
And then GRE is switched through to allow the data channel to be opened.
PPP Header
IP Header (off. IP add)
GRE Header
PPP Header
IP/IPX/NetBEUI
(LAN address)
User Data
Tunnel
endpoint
Figure 1-A-9: Data transport phase
16
Software Reference
1.4
In the scenarios below (see section A, chapter 1.6, page 19), a second PPTP
connection is established over an existing link. This second connection has its
own PPP parameters (unique from those of the underlying ISP link) with respect
to user authentication, encryption, and compression.
1.4.1
Authentication
Both the ISP and the VPN Server will typically want to verify the initiating partner
during connection establishment. Authentication is performed inband using
PAP, CHAP, or MS-CHAP. The authentication parameters for both the ISP and
the VPN server connections are completely independent of each other.
1.4.2
Data Encryption
Data encryption allows you to be sure that all user data transmitted over public
data networks via a VPN is secure. The BinTec router supports Microsofts
Point-to-Point Encryption protocol, or MPPE. Data encryption/decryption is performed at each end of the tunnel.
In addition, BinTec routers support the encryption protocols DES, Blowfish and
Triple Blowfish. These protocols can thus be used in a LAN-LAN VPN.
Each host separately generates a session-key (40, 56 or 128-bit key) using the
respective partners PPP password which is known to each host. The passwords must be exchanged between partners and configured before an attempt
to establish a VPN link can be made.
Software Reference
17
Technology Overview
The Windows PPTP configuration dialog includes an option for password encryption. This option applies to transmittal of the PPP password and does not
apply to data encryption.
1.4.3
Compression
Depending on the data and the compression algorithm used, data compression
can increase performance over dial-up links as much as 30 fold (best case scenario using Stacker LZS). In both scenarios shown below, compression can be
enabled for the initial PPP connection. Compression can also be enabled for
PPTP links between BinTec routers (see section A, chapter 1.6.1, page 19).
The following limitation currently exists when combining compression and encryption for a PPTP link with Windows 95 based hosts.
When the Enable software compression option is enabled in the Server Types tab, Windows 95 PPTP Clients offer either MPPC Compression or MPPE
Encryption when tunnel parameters are negotiated. Currently, compression is
only possible for the PPTP link if encryption is set to none for the VPN partner
interface on the BinTec router.
1.5
There are two different scenarios in which the manner of IP addressing on either side of the WAN affects which side can establish or partake in a VPN tunnel:
One side has a statically configured IP address, the other does not.
If the client gets its IP address dynamically assigned by its ISP, the VPN
connection can only be established by that client, not by the central site.
18
Software Reference
The central site has to have a statically configured IP address to enable the
client to establish a VPN connection to the central site.
1.6
Here we will look at some of the most commonly used scenarios for establishing
VPN connections.
The first is where two LANs, both equipped with BinTec routers, build a
VPN tunnel between their LANs.
The second is where a LAN-LAN VPN tunnel is established after one side
triggers the other side to call back.
The third is where a roaming client (Win NT, for example) dials in to an ISP
and establishes a VPN connection with his headquarters over the Internet.
1.6.1
In this scenario, a Virtual Private Network that connects two enterprise LANs via
the Internet is established via two VPN servers. Both sides have BinTec routers
Software Reference
19
Technology Overview
and both sides have statically configured official IP addresses. Either side may
therefore initiate the VPN connection.
VPN Tunnel
LAN 1
(branch office)
14.7.7.1
14.7.7.2
14.7.7.3
ISP
ISP
LAN 2
(headquarters)
10.5.5.0
Internet
195.185.6.217
198.16.13.1
14.7.7.9
10.5.5.1
10.5.5.2
10.5.5.3
10.5.5.8
Firstly, a standard PPP link is made to a local ISP. Once the link is established,
the same server, branch office, establishes a PPTP connection to the remote
VPN server headquarters. Again, the ISP is unaware of its participation in the
VPN.
All traffic routed via the ISP and destined for the remote LAN is encapsulated/
unpacked by the respective VPN servers.
For the configuration of such a scenario, see section B, chapter 1, page 36.
1.6.2
Why Callback?
20
Callback is not only useful to allow the side that cannot establish a VPN link (i.e.
the side whose partner has no fixed IP address) to tell the side that can establish a VPN link to do so. In a scenario in which both sides are capable of estab-
Software Reference
lishing the VPN link (both sides have statically configured official IP addresses),
Callback is very often required to simplify and regulate accounting systems.
VPN Tunnel
LAN 1
(sales office)
11.7.7.0
ISP
ISP
LAN 2
(headquarters)
10.5.5.0
Internet
198.16.13.1
11.7.7.1
11.7.7.2
11.7.7.9
10.5.5.1
10.5.5.2
10.5.5.3
10.5.5.8
Triggering Callback
In this scenario, a Virtual Private Network that connects two enterprise LANs via
the Internet is established via two VPN servers. Both sides have BinTec routers,
but only headquarters has a statically configured official IP address. Sales
office receives its IP address dynamically from its ISP. Therefore, only sales
office can initiate the VPN connection. If, however, headquarters needs a VPN
connection to be initiated (perhaps to transmit mails from the central server to
the sales office), it can trigger the process with Callback.
For the configuration of such a scenario, see section B, chapter 2, page 45.
1.6.3
This is one of two of the most common scenarios for PPTP. The remote client
(agent mole in the graphic below) first establishes a standard PPP connection
to a local ISP. The same client then initiates a second logical connection to the
VPN partner, headquarters. The ISP (and all intermediate Internet routers),
Software Reference
21
Technology Overview
10.5.5.11
Dynamic
IP add.
ISP
ISP
VPN Partner
(headquarters)
Internet
198.16.13.1
10.5.5.0 10.5.5.1
10.5.5.2
10.5.5.3
10.5.5.8
VPN Tunnel
Figure 1-A-12: Scenario 1: PPTP Client (teleworker) to VPN Server (LAN side)
To hosts on the Private Enterprise LAN, agent mole appears as if it were directly connected to headquarters. The reverse also appears to be the case.
For the configuration of such a scenario, see section B, chapter 3, page 51.
22
Software Reference
Configuration Overview
2.1
After entering setup from the SNMP-shell prompt, Setup Tools Main Menu is
displayed as below. Depending on your hardware setup, software configuration
and license agreements, your routers menu may differ slightly. The Setup Tool
menu pages illustrated in this document are based on system software 5.2.1.
BinTec Setup Tool
BinTec Communications AG
MyRouter
Licences
System
Slot1:
Slot2:
CM-BNC/TP, Ethernet
CM-2XBRI, ISDN S0, Unit 0
CM-2XBRI, ISDN S0, Unit 1
Slot3:
CM-1BRI, ISDN S0
WAN Partner
IP
IPX
X.25
VPN
Configuration Management
Monitoring and Debugging
Exit
This overview will just take a look at the menu pages specific to VPN, the WAN
partner entries necessary to configure a PPP link to an ISP can be found in a
copy of the Users Guide.
Software Reference
23
Configuration Overview
If you go to VPN, you will find a list of the current Virtual Private Networking partner interfaces configured on the router.
BinTec Setup Tool
[VPN]: Configure VPN Interfaces
BinTec Communications AG
MyRouter
Protocol
ADD
2.1.1
State
DELETE
EXIT
By pressing ADD, you will arrive at a menu where it is possible to create Virtual
Private Networking interfaces:
BinTec Setup Tool
[VPN][ADD]: Configure VPN Interfaces
BinTec Communications AG
MyRouter
Partner Name
H.Q.
Encapsulation
Compression
Encryption
PPP
none
MPPE 128
PPP>
Advanced Settings>
IP >
IPX >
SAVE
Enter string, max length = 25 chars
24
Software Reference
CANCEL
The following is a list of fields and their meanings that need to be configured.
Field
Meaning
Partner Name
Encapsulation
Encryption
2.1.2
PPP Settings
In the PPP submenu, PPP settings for the VPN partner interface can be defined.
BinTec Setup Tool
[VPN][ADD][PPP]: PPP Settings (H.Q.)
BinTec Communications AG
MyRouter
Authentication
Partner PPP ID
Local PPP ID
PPP Password
MS-CHAP
HQ-ppp-id
mybrick
*******
Keepalives
Link Quality Monitoring
off
off
OK
CANCEL
Software Reference
25
Configuration Overview
Field
Meaning
Authentication
Partner PPP ID
Local PPP ID
The BinTec routers PPP ID which is used during PPP negotiation with this VPN partner.
PPP Password
Keepalives
This option is relevant for leased line connections and VPN connections. Keepalive packets
are sent at regular intervals to test the status of
the partner.
It is advisable to set this feature to on.
26
Software Reference
2.1.3
Advanced Settings
In this menu, if using short hold, you should be careful to set the short hold for
the VPN interface to a value shorter than the short hold value set for the interface to the ISP.
.
30
OK
CANCEL
Field
Meaning
Extended Interface
Settings (optional)
Software Reference
27
Configuration Overview
2.1.4
IP Settings
The next Setup Tool menu we want to look at is the IP submenu. This is where
IP addresses (official and/or unofficial) can be entered.
BinTec Setup Tool
[VPN][ADD][IP]: IP Configuration (H.Q.)
BinTec Communications AG
MyRouter
198.16.13.1
ISP
yes
local IP Address
Partners LAN IP Address
Partners LAN Netmask
10.5.5.0
255.255.255.0
Advanced Settings>
SAVE
Enter string, max length = 25 chars
28
Software Reference
CANCEL
Field
Meaning
VPN Partners IP
Address
via IP Interface
Identification by IP
Address
When set to yes, the VPN partner can be identified by his IP address (static).
local IP Address
Partners LAN IP
Address
2.1.5
Software Reference
29
Configuration Overview
none
none
no
IP Accounting
Back Route Verify
Route Announce
Proxy Arp
off
off
up or dormant
off
OK
30
Software Reference
CANCEL
Field
Meaning
RIP Send/Receive
IP Accounting
Route Announce
always: Routes are propagated always, regardless of the current links operational
status.
Software Reference
31
Configuration Overview
Field
Meaning
Proxy Arp
ADVANCED SETTINGS
The settings defined here are similar to the WAN PARTNERS ADVANCED
SETTINGS menu but apply specifically to a VPN partner interface.
2.1.6
IPX Settings
Finally, the VPN IPX submenu defines IPX-relevant settings for VPN partner interfaces that support IPX.
BinTec Setup Tool
[VPN][ADD][IPX]: IPX Configuration (H.Q.)
Enable IPX
IPX NetNumber
yes
0
Update Time
60
OK
Enter hex number range 0..fffffffe
32
BinTec Communications AG
MyRouter
Software Reference
CANCEL
Field
Meaning
IPX NetNumber
Update Time
Software Reference
33
34
Configuration Overview
Software Reference
WORKSHOP
Software Reference
35
1.1
Introduction
Two distant networks, a corporate central site LAN headquarters and a partners network sales office can be connected over the Internet via a Virtual Private Network using two BinTec routers as follows.
VPN Tunnel
LAN 1
(sales office)
11.7.7.0
ISP
ISP
LAN 2
(headquarters)
10.5.5.0
Internet
198.16.13.1
11.7.7.1
11.7.7.2
11.7.7.9
10.5.5.1
10.5.5.2
10.5.5.3
10.5.5.8
Once both BinTec routers are configured for Virtual Private Networking, hosts
on either LAN can connect to hosts on the remote LAN. All traffic that is routed
between the two networks is encrypted (user-data encryption).
The configuration
Firstly, the configuration of the connection to the ISP over the PPP protocol.
This is a perfectly conventional PPP connection and can be used for normal
Internet access, fully independently of the VPN connection.
36
Software Reference
Prerequisites
1.2
Where to start
Prerequisites
If you are already using your BinTec router to connect to the Internet, but
have not yet configured your WAN partner, check the entries for your ISP
and proceed with section B, chapter 1.3.2, page 40.
VPN license
A separate VPN license must be installed before the BinTec router will support
VPN connections. If you are not sure you have one, verify the license is installed
in Setup Tools LICENSES menu.
If you do not have the VPN license yet, one can be purchased from BinTec
Communications AG directly or from your local distributor.
A LAN-LAN VPN tunnel using BinTecs VPN solution can only be established
between two BinTec routers. It is not possible to establish a VPN connection between a BinTec router and a router from another manufacturer.
At least one VPN partner must have a statically configured, official IP address.
1.3
Instructions
1.3.1
The link to the ISP can be setup as a standard dial-up or as a leased-line PPP
interface in the WAN PARTNERS menu.
Software Reference
37
When configuring a VPN connection over a dialup connection, it is recommended to set Short Hold for the VPN connection with a shorter time interval
than the Short Hold for the underlying dial-up connection. Otherwise, unnecessary connections could be established because of termination of the VPN connection.
Adding a WAN partner
Dynamic or static IP
address
Now there are two possibilities for the next setting: either your BinTec router is
dynamically assigned an IP address or the IP address is statically configured.
1.
38
Software Reference
Instructions
An important characteristic of the configuration concerns the following configuration points, Local ISDN IP address and Partner ISDN IP address. As you
probably will not know the IP address of your ISP, only enter the official IP
address of the local BinTec router in both cases.
Under Local ISDN IP address, enter your own official IP address: e.g.
198.16.13.1.
Under Partners ISDN IP address, also enter your own official IP address:
e.g. 198.16.13.1.
Network Address
Translation
Press ADD.
Under Protocol select: e.g. TCP.
Under Destination, you have to specify the router as tunnel endpoint.
Software Reference
39
Repeat for the protocol GRE and for any other protocols needed.
Go to IP ROUTING ADD.
Add the default route
1.3.2
The VPN Partner interface for your BinTec router could be configured as follows:
40
Software Reference
Instructions
BinTec Communications AG
MyBinGO!
Authentication
Partner PPP ID
Local PPP ID
PPP Password
MS-CHAP
HQ-ppp-id
mybrick
*******
Keepalives
Link Quality Monitoring
on
off
SAVE
CANCEL
Software Reference
41
BinTec Communications AG
MyBinGO!
198.16.13.1
ISP
yes
local IP Address
Partners LAN IP Address
Partners LAN Netmask
10.5.5.0
255.255.255.0
Advanced Settings>
SAVE
CANCEL
Under via IP Interface select the PPP interface for the local ISP. VPN connections from this side may only be established over this interface.
Even if you do not know the VPN Partners IP Address above, enable
(yes) the Identification by IP Address option. If you have entered VPN
Partners IP Address, the VPN partner will be identified by the IP address
it uses when establishing the PPP link.
42
Software Reference
Instructions
Press ADD.
Under Protocol select: tcp.
Under Destination, you have to specify the router as tunnel endpoint.
.
Press ADD.
Under Protocol select: gre.
Under Destination, you have to specify the router as tunnel endpoint.
The loopback address, 127.0.0.1, should be used as the destination address.
Assigned to the BinTec router itself, this address is the recommended destination as the BinTec router is an endpoint of the VPN tunnel
Software Reference
43
1.4
1.4.1
1.4.2
If you are still having problems establishing a VPN tunnel, you can follow a step
by step configuration which will lead you to a BinTec test access site. This can
be found in the form of an FAQ on the support pages of www.bintec.de. Once
you have achieved this test access, compare and exchange the values you
need for your own VPN tunnel.
44
Software Reference
Introduction
2.1
Introduction
Lets assume in this example that only headquarters has a statically configured official IP address. Sales office receives its IP address dynamically from
its ISP. Therefore, only sales office can initiate the VPN connection.
Headquarters, however, needs VPN connections to be periodically established
in order to transmit mails from a central mail server to the sales office. Without
actively establishing the tunnel, it can trigger the process with the Callback function.
VPN Tunnel
LAN 1
(sales office)
11.7.7.0
ISP
ISP
LAN 2
(headquarters)
10.5.5.0
Internet
198.16.13.1
11.7.7.1
11.7.7.2
11.7.7.9
10.5.5.1
10.5.5.2
10.5.5.3
10.5.5.8
The Configuration
Software Reference
45
over which Callback will take place. A second interface with the same IP
route destination is thus created.
The existing VPN interface entry is then configured with a higher metric so
that all connections made from this side (headquarters) are made over this
newly configured dialup interface.
Thirdly, the receiving end (sales office) must be configured to identify the
call intended to trigger Callback.
Lastly, Callback must be activated on the VPN interface of the side that
should actively establish the VPN connection (sales office).
2.2
Prerequisites
Setup Tool will always cover the most essential parts of a configuration. There
are, however, some few areas of a total configuration where subtle solutions to
more complex, network-management issues can only be managed over MIB tables. The MIB tables allow the user to fine-tune a configuration. Changes to MIB
variables should only be made by experienced professionals who understand
the implications of each setting. The Callback feature can only be configured by
means of the MIB tables.
Existing tunnel
46
Software Reference
Instructions
Configuration on
headquarters
Adding a WAN partner
over Setup Tool
2.3
Instructions
2.3.1
Under Partners LAN Netmask, enter the LAN IP address of your VPN
partner, in the example: 255.255.255.0.
2 Routes, 1 Destination
Now there are two entries in the ipRouteTable routed to the same destination:
the initial virtual interface route and a route to the same destination over which
Callback will be triggered. In order to ensure the "trigger route" will be used
Software Reference
47
when contacting the partner, it is necessary to increase the metric of the virtual
interface by a value of 1.
bintec:ipRouteTable>Metric1:02=2
02: ipRouteTable1.0.0.0.0.2(rw):2
bintec:ipRouteTable>
inxDest(*rw)
Metric3
Proto(ro)
IfIndex(rw
Metric4(rw)
Age(rw)
Metric1(rw)
NextHop(rw)
Mask(rw)
Metric2(rw)
Type(-rw)
Metric5(rw)
VPN interface
02 11.7.7.0
-1
local
10001
2
257610
2
0.0.0.0
255.255.255.0
-1
indirect
536870912
Dialup interface
04 11.7.7.0
-1
local
.0.0
10002
2
257612
1
0.0.0.0
255.255.255.0
-1
indirect
536870912
bintec:ipRouteTable>
Table 1-B-1: ipRouteTable
Configuration on sales
office
Identifying the dialup
connection
Now it is necessary to tell sales office about the dialup interface being used to
initiate Callback. Using the VPN interface index, an entry must be made in the
biboDialTable of sales office in which biboDialDirection is set to incoming
and biboDialNumber is set with the Calling Partys Number, i.e. the ISDN
phone number of headquarters.
bintec:biboDialTable>Direction:01=incoming Number:01=983641
01:
biboDialDirection.10002.9(rw):both
01:
biboDialNumber.10002.9(rw):
"983641"
bintec:biboDialTable>
48
inxIfIndex(ro)
Number(rw)
StkMask(rw)
Type(*rw)
Subaddress(rw)
Screening(rw)
Direction(rw)
ClosedUserGroup(rw)
00 10001
"432958"
0xffffffff
isdn
outgoing
0
Software Reference
dont_care
Instructions
01 10002
198.16.13.1
0xffffffff
isdn
02 10002
"983641"
0xffffffff
isdn
both
0
dont_care
incoming
0
dont_care
bintec:biboDialTable>
Table 1-B-2: biboDialTable
Configuring Callback
Type(*rw)
Timeout(rw)
AuthIdent(rw)
RetryTime(rw)
ShortHold(rw)
MinConn(rw)
LoginString(rw)
DynShortHold(rw)
Encryption(rw)
Encapsulation(-rw)
Compression(rw)
AuthSecret(rw)
BlockTime(rw)
InitConn(rw)
Callback(rw)
VJHeaderComp(rw)
LocalIdent(rw)
LQMonitoring(rw)
Software Reference
49
ISP interface
VPN interface
00 10001
off
both
static
5
1
data_64k
auto
enabled
0
isdn_dialup
3000
ppp
none
4
60
1
300
1
disabled
disabled
0
none
off
01 10002
off
both
static
5
1
pptp_pns
auto
enabled
0
isdn_dialup
3000
ppp
none
4
30
1
300
1
delayed
disabled
bintec:biboPPPTable>
Table 1-B-3: biboPPPTable
50
Software Reference
0
none
off
Introduction
3.1
Introduction
PPTP Client
(agent mole)
10.5.5.11
Dynamic
IP add.
ISP
ISP
VPN Partner
(headquarters)
Internet
198.16.13.1
10.5.5.0 10.5.5.1
10.5.5.2
10.5.5.3
10.5.5.8
VPN Tunnel
Figure 1-B-3: A typical client-to-LAN scenario.
Once that is done, the next step will be to configure a PPTP link from the
client to a BinTec VPN server.
LAN-side
The third stage involves a basic configuration of your BinTec router to connect to its ISP.
The final stage entails configuring the VPN interface on your BinTec router.
Software Reference
51
3.2
Client-side: TCP/IP &
PPTP protocol
Prerequisites
For the type of tunneling described in this chapter, two network protocols must
be installed: TCP/IP and PPTP. TCP/IP is supported on all Windows operating
systems since Windows 95. Under Windows 95, however, a software update for
the PPTP protocol is required.
This upgrade under the title "Dial-Up Networking 1.2 Upgrade", as well as additional configuration information can be retrieved from Microsofts web site at:
http://www.microsoft.com
This description is based on Windows NT, no update for the PPTP protocol is
required. The Point-to-Point Tunneling Protocol (PPTP), however, must be installed and RAS devices configured. The following is a brief explanation of how
to install the PPTP protocol and how to configure the RAS devices.
Installing the PPTP
protocol
Select the Number of Virtual Private Networks the client will support.
One is usually enough.
The number of VPNs selected here will be offered as RAS Capable Devices
when configuring Remote Access Service devices in the next step.
Now that PPTP is installed, it is necessary to add a VPN device (VPN1 RASPPTPM) or devices to the Remote Access Service (RAS).
Software Reference
Prerequisites
If you dont arrive at Add RAS Device directly after installing PPTP,
Click OK.
In Remote Access Setup, select a VPN port and click Configure.
Assuming this client receives its IP address dynamically, ensure that the
Dial out only option in the Port Usage dialog box is selected.
Click OK.
You have returned to the Remote Access Setup page.
Click Network and ensure that TCP/IP is selected as the Dial out Protocol
in the Network Configuration dialog box.
Click OK.
You have returned to the Remote Access Setup page.
Click Continue.
On the Network page, click Close.
Restart your computer.
Two dial-up
networking entries
When PPTP is installed and configured as a RAS device on the Windows client,
two Dial-Up Networking entries are required on that client: one for the ISP and
one for the VPN partner network. These configuration steps are described in the
instructions in section B, chapter 3.3, page 54.
Software Reference
53
A separate VPN license must be installed before the BinTec router will support
VPN connections. A VPN license can be purchased from your local distributor.
As the client will probably receive its IP address dynamically from the ISP, the
LAN partner participating in the VPN must have a statically configured, official
IP address.
3.3
Instructions
3.3.1
Under Entry Name in the resulting dialog box, specify a name for the ISP
this host will be using.
Under Phone number, you will need to enter the ISPs telephone number.
Under Dial using, select from the drop-down list a modem device you will
be using to connect with your Internet Service Provider.
54
Software Reference
Instructions
In the Dial-up server type field, select: PPP: Windows NT, Windows
95 Plus, Internet.
In the Network protocols box: verify TCP/IP is enabled, NetBEUI is disabled and IPX is disabled.
Click the TCP/IP Settings... button. Verify the IP address, name service,
and compression settings are consistent with those required by the ISP and
click OK.
In most cases, the default settings in the Script and the X25 tabs can be left
untouched.
Software Reference
55
Click OK again. The initial PPP link to the Internet Service Provider is now
configured.
Proceed to the next section to configure another dial-up networking entry,
this time a virtual interface to your VPN partner using PPTP.
3.3.2
Under Entry Name, specify a name for the VPN partner this host will be using.
Under Phone number, you will need to enter the official IP address of the
VPN server on the other side.
56
Software Reference
Instructions
In the Network protocols box: verify TCP/IP is enabled, NetBEUI is disabled and IPX is disabled.
Click the TCP/IP Settings... button. Verify the IP address, name service,
and compression settings are consistent with those required by your VPN
partner and click OK.
Software Reference
57
3.3.3
Now to the other side of the VPN link and to Setup Tool on the BinTec router.
The link to the ISP can be set up as a standard dial-up or as a leased-line PPP
interface in the WAN PARTNERS menu.
58
Software Reference
Instructions
Assuming the client receives its IP address dynamically, the BinTec router must
have a statically configured, official IP address. Therefore, proceed as follows:
Under Local ISDN IP address, enter your own official IP address: e.g.
198.16.13.1.
Under Partner ISDN IP address, also enter your own official IP address:
e.g. 198.16.13.1.
Network Address
Translation
Press ADD.
Under Protocol, select TCP.
Under Destination, you have to specify the router as tunnel endpoint.
Software Reference
59
Repeat for the protocol GRE and for any other protocols needed.
Go to IP ROUTING ADD.
Add the default route
3.3.4
Step 4: This is how to configure the VPN interface on your BinTec router
The VPN Partner interface for your BinTec router could be configured as follows:
60
Software Reference
Instructions
BinTec Communications AG
MyBinGO!
Partner Name
H.Q.
Encapsulation
Compression
Encryption
PPP
none
MPPE 128
PPP>
Advanced Settings>
IP >
IPX >
SAVE
CANCEL
Authentication
Partner PPP ID
Local PPP ID
PPP Password
MS-CHAP
mole-ppp-id
myrouter
*******
Keepalives
Link Quality Monitoring
off
off
OK
BinTec Communications AG
MyBinGO!
CANCEL
Software Reference
61
The Authentication entry here must match the entry for the AuthProtocol variable in the biboPPPProfileTable.
If MPPE 128 was the encryption protocol selected, the MS-CHAP protocol is
required here.
no
local IP Address
Partners LAN IP Address
Partners LAN Netmask
Advanced Settings>
SAVE
10.10.5.11
255.255.255.255
CANCEL
As your VPN partner is probably a dial-in client and is assigned its IP address dynamically, you will not know the VPN Partners IP Address.
Disable (no) the Identification by IP Address option. The VPN partner will
not be identified by the IP address it uses when establishing the PPP link.
It cannot be if it is a dynamic client.
62
Software Reference
Instructions
none
none
no
IP Accounting
Back Route Verify
Route Announce
Proxy Arp
off
off
up or dormant
off
OK
CANCEL
If the partner is using a LAN address from the network of the headquarters,
configure Proxy Arp to on (up only).
If you did not already do so in the previous step (section B, chapter 3.3.3,
page 58), it is now imperative for the success of your VPN tunnel that you
define two session profiles that may be permitted through the NAT barrier. This
means that sessions initiated by the other side of the VPN can pass the NAT
firewall and access your LAN.
The session profiles should be set on the ISP interface, not the VPN interface.
Network Address
Translation
Press ADD.
Under Protocol, select tcp.
Under Destination, you have to specify the router as tunnel endpoint.
Software Reference
63
Press ADD.
Under Protocol select: gre.
Under Destination, you have to specify the router as tunnel endpoint.
.
3.4
3.4.1
From the perspective of the client, this is how to test the connection to the
BinTec router and the success of your VPN tunnel.
Establishing a PPP link
to the ISP
64
Software Reference
Click Dial.
In the Connect to MyISP dialog box, enter the User name and Password
assigned by the ISP.
Establishing a PPTP
link to the
BinTec router
After connecting to the ISP, select the BinTec VPN server Phonebook
entry to dial in the Dial-up Networking dialog box and click Dial.
Software Reference
65
In the Connect To My BinTec VPN server window shown below, enter the
PPP ID and PPP Password settings configured on the BinTec router in the
User name and Password fields and press OK.
3.4.2
Tracing errors
If the VPN tunnel could not be established and a data exchange was not possible, narrow down the possible areas of misconfiguration.
66
Software Reference
To test the ISP connection from a workstation behind your BinTec router,
simply ping the IP address of an Internet site such as 195.185.6.70 (BinTecs web server).
To test the ISP connection from your client PC, ping the IP address of an
Internet site such as 195.185.6.70 (BinTecs web server).
To ensure that essential parameters are consistent between both sides, try
to establish a normal PPP connection to your WAN partner.
If the destination host proves unreachable in any of these stages, review the
settings made for that part of the configuration.
Software Reference
67
68
Software Reference