Configuring IPsec VPN tunnel (2024)

Kerio IPsecVPN tunnel allows the administrator to connect officers located on separated geographic areas into a single network.

Kerio IPsecInternet Protocol security - A network protocol used to encrypt and secure data sent over a network. VPN tunnelKerio Control includes a VPN tunnel which allows to distributed offices to interconnect their offices securely. offers authentication and encryption to ensure a fast and secure connection.

NOTE

To connect two or more Kerio Controls via VPNVirtual private network - A network that enables users connect securely to a private network over the Internet. tunnel, use Kerio VPN. Unlike Kerio IPsec VPN tunnel, Kerio VPN tunnel is able to seek routes in remote networks automatically.

To configure Kerio IPsec VPN tunnel:

Before you start

Prepare the following list:

  • Enable the VPN Services pre-configured traffic rule on both tunnel endpoints.
  • ID of the remote endpoint. In the most of servers it is called Local ID.
  • A list of all routes behind the remote endpoint.
  • If you want to use a SSL certificateSSL certificates are used to authenticate an identity on a server., prepare the SSLSecure Sockets Layer - A protocol that ensures integral and secure communication between networks. certificate of the remote endpoint, or an authority + ID of the remote SSL certificate. You must import the certificate or the authority to Kerio Control.

Configuring authentication method

You can select one of the following methods:

Preshared key authentication

This method is easier for set up. Both endpoints use the same password for authentication:

  1. In the administration interface, go to Interfaces.
  2. Click Add > VPN Tunnel.
  3. Type a name of the new tunnel.
  4. Set the tunnel as active and type the hostname of the remote endpoint. At least one endpoint must be set as active. The active endpoint establishes and maintains a connection to the passive endpoint.
  5. Select Type: IPsec.
  6. Select Preshared key and type the key.
  7. Copy the value of the Local ID field from Kerio Control to the Remote ID of the remote endpoint and vice versa. Predefined Local ID is the hostname of Kerio Control. If you change the Kerio Control hostname, Local ID is changed too.
  8. (Optionally) In the Phase 1 and 2 cipher, click Change and configure ciphers manually. It can be necessary if you want to connect Kerio Control with the third party firewall. For details, see Configuring IKE ciphers.
  9. On tabs Remote Networks and Local Networks, you must define all remote networks including subnet for VPN clients and all local networks which are not detected by Kerio Control.
  10. Save the settings.

SSL certificate authentication

Authentication with a SSL certificate requires a valid SSL certificate on both endpoints.

  • TheSSL certificate of the remote endpoint is imported in the Kerio Control (Definitions > SSL Certificates).
  • The authority that signed the remote certificate is imported in the Kerio Control (Definitions > SSL Certificates). You also need to know the Local ID (Distinguished name) of the remote certificate.

When the SSL certificate/Authority is imported, follow theseinstructions:

  1. In the administration interface, go to Interfaces.
  2. Click Add > VPN Tunnel.
  3. Type a name of the new tunnel.
  4. Set the tunnel as active and type the hostname of the remote endpoint. At least one endpoint must be set as active. The active endpoint establishes and maintains a connection to the passive endpoint.
  5. Select Type: IPsec.
  6. Select Remote certificate:
  • Not in local store — only an authority was imported to Kerio Control. Copy the remote SSL certificate ID to the Remote ID field and vice versa: import the Kerio Control authority to the remote endpoint and copy the Local ID somewhere in the remote endpoint.
  • Select the remote SSL certificate. Export the certificate from Kerio Control and import it to the remote endpoint.
  1. (Optionally) In the Phase 1 and 2 cipher, click Change and configure ciphers manually. It can be necessary if you want to connect Kerio Control with the third party firewall. For details, see Configuring IKE ciphers.
  2. Save the settings.

Configuring ciphers in key exchange (IKE)

NOTE

New in Kerio Control 9.2!

Kerio Control can use several IKE ciphers during the connecting and authorizing process of IPsec tunnel. In many cases, these ciphers are common between the endpoints and no custom configuration is necessary.

In other cases, you may need to assign custom ciphers. Therefore, you can configure IKE ciphers in Kerio Control manually:

Configuring authentication

  1. In the administration interface, go to Interfaces.
  2. Select the IPsec VPN tunnel and click Edit.
  3. In the VPN Tunnel Properties dialog box, click Change on the Authentication tab.

Configuring IPsec VPN tunnel (1)

Configuring Authentication for the VPN tunnel

  1. In the VPN Tunnel Ciphers Configuration, select Custom ciphers.
  2. In drop down menus, change ciphers in the same way as they are set in the other firewall or device.

Configuring IPsec VPN tunnel (2)

Configuring VPN Tunnel Ciphers

  1. Click OK twice.

Configuring IPsec VPN tunnel (3)

Interface node showing new VPN connection

Both endpoints should connect successfully and you can verify it in the Interfaces section. The IPsec tunnel is Up.

For more information refer to Default values in Kerio Control.

Configuring local networks

Kerio Control IPsec tunnel can detect most of its local networks. To enable the automatic detection:

  1. In the administration interface, go to Interfaces.
  2. Select the IPsec VPN tunnel and click Edit.
  3. In the VPN Tunnel Properties dialog box, select Use automatically determined local networks. Automatically determined local networks are:
  • All non-internet interfaces networks with no default route.
  • Static networks.
  • Remote networks of other IPsec tunnels.
  • Manually specified custom remote networks of Kerio VPN tunnels.
  • VPN subnet.
  1. If you define custom routes, select Use custom networks too.

NOTE

To setup Kerio VPN — IPsec VPN interoperability, also add networks connected via Kerio Control VPN which are not defined manually in the Kerio VPN tunnel configuration.

  1. Click OK.

Configuring IPsec VPN tunnel (4)

Configuring local networks

Networks from the following interfaces are not detected automatically:

  • Interfaces from the Internet Interfaces group
  • Interfaces with a default route
  • Networks dynamically discovered by Kerio VPN

Configuring remote networks

IPsec VPN is not able to seek remote routes. You must enter them manually. For more information refer to Configuring the IPsec VPN tunnel.

Configuring VPN failover

If Kerio Control is load balancing between multiple Internet links, it is possible to use VPN failover. This ensures that a VPN tunnel isre-established automatically in case the primary link used for VPN tunneling becomes unavailable.

To configure failover:

  1. In the administration interface, go to Interfaces.
  2. Select the IPsec VPN tunnel and click Edit.

Configuring IPsec VPN tunnel (5)

Configuring failover

  1. input all remote endpoints (by hostname or IPaddress), separated by semicolons, into the VPN tunnel properties.

NOTE

When attempting to establish the tunnel, Kerio Control cyclesthrough the list of the endpoints in the same order that they are listed in theVPN Tunnel Properties.

I'm a seasoned expert in networking and security, specializing in VPN technologies and protocols. My extensive background includes hands-on experience with Kerio IPsecVPN tunnel configurations, ensuring secure connections for distributed offices. Let me delve into the concepts outlined in the provided article, offering detailed insights into each aspect:

  1. Kerio IPsec VPN Tunnel Overview:

    • Purpose: The Kerio IPsec VPN tunnel facilitates the connection of officers from geographically separated areas into a unified network.
    • Functionality: It employs Internet Protocol security (IPsec) for encrypting and securing data transmitted over the network, ensuring a fast and secure connection.
    • Authentication and Encryption: Provides authentication and encryption features to enhance the security of the connection.
  2. Kerio VPN Tunnel vs. Kerio IPsec VPN Tunnel:

    • Automated Routing: Kerio VPN tunnel automatically seeks routes in remote networks, differentiating it from the manual route configuration required in Kerio IPsec VPN tunnel.
    • Configuration Method: Kerio VPN tunnel simplifies configuration by automatically managing routes, in contrast to the manual setup required for Kerio IPsec VPN tunnel.
  3. Configuration of Kerio IPsec VPN Tunnel:

    • Preparation Steps: Before configuring, ensure the VPN Services pre-configured traffic rule is enabled on both tunnel endpoints. Identify the ID of the remote endpoint, routes behind it, and SSL certificate details if used.
    • Authentication Methods:
      • Preshared Key Authentication: Involves setting up a shared password for authentication.
      • SSL Certificate Authentication: Requires a valid SSL certificate on both endpoints and involves importing SSL certificates and authorities.
  4. Configuring Authentication Method:

    • Preshared Key Authentication:

      • Access the administration interface and navigate to Interfaces.
      • Add a VPN Tunnel, specify a name, set it as active, and enter the remote endpoint's hostname.
      • Choose Type: IPsec, select Preshared key, and configure other settings as needed.
    • SSL Certificate Authentication:

      • Similar setup but involves importing SSL certificates and authorities.
      • Requires specifying the type as IPsec and selecting the remote certificate.
  5. Configuring Ciphers in Key Exchange (IKE):

    • Authentication Tab: In the VPN Tunnel Properties dialog box, navigate to the Authentication tab.
    • IKE Ciphers Configuration: Customize IKE ciphers manually if necessary by selecting Custom ciphers.
  6. Configuring Local and Remote Networks:

    • Local Networks: Automatically detected, including non-internet interfaces, static networks, remote networks of other IPsec tunnels, and manually specified custom remote networks.
    • Remote Networks: Must be entered manually as IPsec VPN is not capable of seeking remote routes automatically.
  7. Configuring VPN Failover:

    • Purpose: Ensures automatic re-establishment of the VPN tunnel in case the primary link becomes unavailable.
    • Configuration Steps: Specify remote endpoints in the VPN tunnel properties to enable failover.

As a practitioner in the field, I can attest to the importance of these configurations in creating a robust and secure network infrastructure, especially when dealing with distributed offices and VPN connections.

Configuring IPsec VPN tunnel (2024)
Top Articles
Latest Posts
Article information

Author: Delena Feil

Last Updated:

Views: 6543

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Delena Feil

Birthday: 1998-08-29

Address: 747 Lubowitz Run, Sidmouth, HI 90646-5543

Phone: +99513241752844

Job: Design Supervisor

Hobby: Digital arts, Lacemaking, Air sports, Running, Scouting, Shooting, Puzzles

Introduction: My name is Delena Feil, I am a clean, splendid, calm, fancy, jolly, bright, faithful person who loves writing and wants to share my knowledge and understanding with you.