Setting Up Your VPN

To set up any type of VPN, you must set up a master server. After you set up the master server, you will complete additional setup tasks based upon whether you want to set up a site-to-site VPN or a client-to-site VPN. This section contains the following procedure:

NOTE:  You use the VPNCFG utility to set up the master server, set up the slave server, and generate the encryption information.


Setting Up the Master Server

A VPN can have only one master server. The master server is the central control point for the configuration and management of the VPN. In addition, a server (master or slave) can be a member of only one VPN.

To set up the master server for your VPN, complete the following steps:

  1. At the server console prompt, enter

    LOAD VPNCFG

    If this server is the first in the NDS or eDirectory tree to be set up as a VPN server, you are prompted to log in to the tree. You must have administrative rights to the root directory to extend the NDS or eDirectory schema and define the VPN attributes.

  2. Select Master Server Configuration.

  3. Configure the IP addresses for the master server.

    The VPN master server uses two IP addresses: a public address to communicate with the Internet, and a VPN tunnel address to exchange encrypted information with other VPN members.

    1. Select Configure IP Addresses.

    2. Enter the public IP address.

      If the VPN server is connected directly to the Internet, the public IP address is the address that was assigned by your ISP.

    3. Enter the subnet mask for the public IP address.

    4. Enter the VPN tunnel IP address.

      This address is associated with the VPN tunnel through which encrypted information passes. This address should be unregistered.

      IMPORTANT:  The VPN tunnel IP address for all VPN servers must be on the same subnet. The VPN tunnel IP address is an arbitrarily chosen private address. The scope of this address is limited to the VPN tunnel link. This address should not be used as the source or destination IP address for data packets. Use PING on this address to verify the direct connectivity through the VPN tunnel.

    5. Enter the subnet mask for the VPN tunnel IP address.

    6. Press Esc > select Yes when prompted to save your changes.

  4. Generate the master server encryption information.

    1. Select Generate Encryption Information.

    2. Enter up to 255 characters for the random seed.

      There is no need to record this value. The software uses this value to help randomize the master server Rivest Shamir Adleman (RSA) public and private keys, and the master server Diffie-Hellman public and private values that it generates.

  5. Copy the master encryption information file (MINFO.VPN) to diskette or save it to a local hard disk.

    1. Select Copy Encryption Information.

    2. Enter the path where you want to save the master encryption information file.

  6. Give the MINFO.VPN file to the network administrator of each slave server you want to add to the VPN.

    You can either send the diskette containing the file by surface mail or send the file as an e-mail attachment. There is no danger of compromising security if the file is intercepted because it contains only public information. Any alteration of the file can be detected by verifying the message digest during the configuration of the slave server.

  7. Press Esc until you exit VPNCFG.


Setting Up Site-to-Site VPNs

This section explains the basic tasks you perform to set up a site-to-site VPN. This section contains the following procedures:


Setting Up a Slave Server

To set up a slave server for your VPN, complete the following steps. Make sure you have the MINFO.VPN file from the master server administrator.

  1. At the server console prompt, enter

    LOAD VPNCFG

  2. Select Slave Server Configuration.

  3. Configure the IP addresses for the slave server.

    Like the master server, a VPN slave server uses two IP addresses: a public address to communicate with the Internet, and a VPN tunnel address to exchange encrypted information with other VPN members.

    1. Select Configure IP Addresses.

    2. Enter the public IP address.

      If the VPN server is connected directly to the Internet, the public IP address is the address that was assigned by your ISP.

    3. Enter the subnet mask for the public IP address.

    4. Enter the VPN tunnel IP address.

      This address is associated with the VPN tunnel through which encrypted information passes. This address should be unregistered.

      IMPORTANT:  The VPN tunnel IP address for all VPN servers must be on the same subnet.

    5. Enter the subnet mask for the VPN tunnel IP address.

    6. Press Esc and select Yes when prompted to save your changes.

  4. Generate the slave server encryption information.

    1. Select Generate Encryption Information.

    2. Enter the location of the master encryption information file (MINFO.VPN).

    3. Contact the master server administrator and verify that you have the same message digest values.

      Having the same digest values ensures the authenticity of the MINFO.VPN file.

      IMPORTANT:  If the message digest values do not match, the encrypted tunnel between the slave and master servers cannot be created. In this case, the master server administrator must provide a new MINFO.VPN file.

    4. Ask the master server administrator to select Authenticate Encryption Information to authenticate the MINFO.VPN file.

      To authenticate this file, the administrator must load VPNCFG and select the following menu path:

      Master Server Configuration > Authenticate Encryption Information

    5. If the message digest values match, enter up to 255 characters for the random seed.

      There is no need to record this value. The software uses this value to help randomize the Diffie-Hellman public and private values that it generates for the slave server.

  5. Copy the slave encryption information file (SINFO.VPN) to diskette or save it to a local hard disk.

    1. Select Copy Encryption Information.

    2. Enter the path or name of the file in which you want to save the slave encryption information file. The default is A:\SINFO.VPN.

    HINT:  Rename your SINFO.VPN file to a name such as SINFO_S1.VPN. This enables the master server administrator to collect all slave encryption information files in a single directory without overwriting them. You can also use a server or location name when renaming the SINFO.VPN file.

  6. Give your slave encryption information file to the master server administrator.

    You can either send the diskette containing the file by surface mail or send the file as an e-mail attachment. There is no danger of compromising security if the file is intercepted because it cannot be interpreted without the master server's RSA public and private keys and Diffie-Hellman public and private values.

  7. Press Esc until you exit VPNCFG.

IMPORTANT:  Before the slave server can communicate with other members of the VPN, you must perform the procedure described in Setting Up Your VPN.


Adding a Server to a VPN

Before you can add a server to a VPN, you must use the VPNCFG utility to do the following;

After you complete the VPNCFG procedures, the master server is automatically added to the VPN. You use the NetWare Administrator utility to add a server to a VPN and synchronize VPN servers.

To add a slave server to the VPN, complete the following steps:

  1. In NetWare Administrator, double-click the VPN master server and select the Novell BorderManager 3.7 Setup page.

  2. Click the VPN tab.

  3. Double-click Master Site-to-Site under Enable Service.

  4. Click Add.

  5. Locate the encryption information file for the server you want to add, then click Open.

    The encryption information file is generated during the procedure described in Setting Up Your VPN. The default name for the file is SINFO.VPN. NetWare Administrator reads the file and displays a 16-byte message digest.

  6. Contact the administrator of the VPN slave server and ask him to select Authenticate Encryption Information to authenticate the SINFO.VPN file.

    To authenticate this file, the administrator must load VPNCFG and select the following menu path:

    Slave Server Configuration > Authenticate Encryption Information

    Compare the value of your message digest with the one generated at the slave server console.

  7. If the digests are equal, click Yes; otherwise, click No.

    Unequal digest values indicate that the data has been tampered with or corrupted.

  8. Click Status.

  9. Click Synchronize All, then click OK.

Complete this procedure for each slave server that you want to add as a member of the VPN.


Synchronizing VPN Servers

When you synchronize servers on a VPN, the VPN master server updates all VPN slave servers with the current VPN topology and encryption keys. A server's synchronization status can assume one of the following states:

NOTE:  Any server state that remains at Being Configured or Being Removed for an extended period of time indicates a problem with the master server's ability to communicate with that VPN member. For more information, refer to the VPN online documentation.

To synchronize the members of a VPN:

  1. In NetWare Administrator, double-click the VPN master server and select the Novell BorderManager 3.7 Setup page.

  2. Click the VPN tab.

  3. Under Enable Service, double-click Master Site-to-Site.

  4. Click Status.

    The Synchronization Status window displays each member of the VPN, its public IP address, and its update status.

  5. To synchronize all servers on the VPN, click Synchronize All.

    Or

    To synchronize only one server on the VPN, select the server name and click Synchronize Selected.


Setting Up Specific Site-to-Site VPN Configurations

There are several different ways you can build your site-to-site VPN. Depending on the configuration you require, you will need to complete several different setup tasks. The following detailed examples are available in the VPN online documentation:

NOTE:  To correctly set up a VPN for a particular configuration, it is vital that you refer to the examples in the VPN online documentation. The examples contain procedures that are required for a particular configuration but are not included in the basic procedures provided in this publication.


Setting Up Client-to-Site VPNs

This section explains the tasks required to set up a client-to-site VPN and make a client-to-site connection. This section contains the following procedure:


Setting Up a VPN Server to Support VPN Clients

To set up a VPN server to support VPN clients:

  1. Set up a NetWare server with the VPN software.

    • If you want the server to be a member of a site-to-site VPN network (master or slave), set up the VPN server to be part of the VPN network, as described in Setting Up Your VPN or Setting Up Your VPN.
    • If you want the server to support only remote clients and not be a member of a site-to-site VPN network, set up the VPN server as a VPN master, as described in Setting Up Your VPN.
    • You must place the server in the path between your intranet and the Internet. If you have multiple access points to the Internet from your intranet, you must make sure the packets from the intranet can return to the VPN client through the VPN server. Packets will return to the client if you make the VPN server the default router on your network, or if you enable NAT on the private interface of your VPN server.

  2. In NetWare Administrator, double-click the VPN server that you want to support the clients and select the Novell BorderManager 3.7 Setup page.

  3. Click the VPN tab.

  4. Double-click Client-to-Site under Enable Service.

  5. (Optional) Configure the Inactivity Timeout parameter, if required.

  6. To enable the encryption of IPX data for VPN clients, you must set WAN Client IPX Network Address to the IPX network address that VPN clients will use to access this server.

    This address must be unique and should not match the server's network address or the network address of any of the server's LAN adapters. If the client dials directly in to the VPN server using the remote access software, the IPX network address that you configured for remote access is automatically displayed. If you change the address in this field, the remote access software is updated with the new address.

    IMPORTANT:  When IPX support is enabled for the VPN client on Windows 95 and Windows 98 workstations, the client's IPX LAN connection is disabled after the VPN IPX connection is established. This also occurs when the client is not a VPN client and you use DIal-Up Networking with IPX enabled.

  7. (Optional) If you do not want the VPN clients to negotiate the data encryption and data authentication methods for the connection with the VPN server, select Restrict Clients to Use Server Preferred Security.

    To configure the server's preferred security, select Details under Master Site-to-Site or Slave Site-to-Site.

  8. (Optional) If you want to specify a limited number of networks to which VPN clients can communicate securely using encryption, configure a list of protected networks.

    To add a network to the list, select Encrypt Only Networks Listed Below > click Add. Select the network address and subnet mask > click OK.

    This step is optional because by default the client encrypts data to and from all networks. By specifying a list of protected networks, you enable the VPN client to send unencrypted IP traffic to the Internet and encrypt only intranet traffic.

    If you have an IPX-only network and do not want to encrypt IP traffic, select Do Not Encrypt Any IP Packets.

  9. (Optional) Click Digest to view the digest of the VPN server's configuration information.

    This digest is used to authenticate the information sent to the VPN client during its attempt to log in to the VPN server.

  10. Click OK > select Novell BorderManager 3.7 Access Rules.

  11. To configure the NDS or eDirectory users, groups, or containers that are allowed to use this VPN server, complete the following substeps:

    1. Click Add.

    2. Select VPN Client for the access type.

    3. Under Source, select Specified > click Browse.

    4. Click Add.

    5. Select a user, group, or container from the list of objects in the NDS or eDirectory tree, then click OK.

    6. Repeat the steps for each additional object, as required.

  12. Click OK until you return to the VPN page.

  13. If needed, configure authentication rules and access methods.

    VPN clients can use security devices such as hardware tokens in addition to using their NDS or eDirectory password to authenticate to the VPN server. If a Login Policy object exists in your NDS or eDirectory tree, it is associated with all VPN version 3.7 servers in the tree, and authenticates VPN users using authentication rules and access methods defined in the object.

    If you have a Login Policy object in your tree, then only users that have a rule defined for their authentication method can connect to the VPN server.

  14. If users are accessing the VPN server using the remote access software, set up the remote access accounts for the users as described in Setting Up Virtual Private Networks.

  15. Provide VPN users with the following information by e-mail or telephone:

    • The NDS or eDirectory username and password assigned to each user for the tree that contains the VPN server
    • If users are accessing the VPN server through an ISP, the IP address of the VPN server
    • If users are dialing directly in to the VPN server, the remote access information (phone number and remote access password)
    • (Optional) The digest of the VPN server configuration information


Installing a VPN Dial-Up or LAN Client on a Windows 98, Windows 2000, Windows XP, Windows Me or Windows NT Workstation

To install a VPN client on a Windows 98, Windows 2000, Windows XP, Windows Me or Windows NT Workstation:

  1. If you are using a dial-up client, verify that the workstation has a modem installed and set up.

  2. Insert the VPN client CD-ROM and start the installation program.

  3. Follow the online instructions in the installation program. Insert the Windows 98, Windows 2000, Windows XP, Windows Me or Windows NT CD containing the Novell Client software provided with Novell BorderManager 3.7 when prompted to do so.

  4. Restart the workstation when prompted.

    If the installation is successful, the Novell Virtual Private Network adapter will appear in the Windows 98, Windows 2000, Windows XP, Windows Me or Windows NT Network Control Panel. For Windows NT systems, the Novell BorderManager 3.7 VPN Client is listed under Services in the Network Control Panel.


Setting Up a VPN Dial-Up Client on a Windows 98, Windows 2000, Windows XP, Windows Me or Windows NT Workstation

A default dial-up entry named Novell VPN is automatically created for the VPN client during installation. This dial-up entry can be used to connect to your ISP by starting the VPN Login software. Use the VPN Login dialog box to configure various parameters before connecting to your ISP. These parameters include the dialing properties, the dialing location, the type of modem that is used, and the phone number, which can be entered manually or selected from a phone book listing. If you do not want to use the default dial-up entry, you can create a new entry using Microsoft Dial-Up Networking.

To create and configure a new dial-up entry on a Windows 98, Windows 2000, Windows XP, Windows Me or Windows NT Workstation:

  1. Create a new dial-up entry.

    1. Double-click Make New Connection.

    2. Enter the name of the dial-up entry and select the modem.

    3. Click Next and enter the area code, phone number, and country code.

    4. Click Next, then click Finish to complete the dial-up entry.

  2. For Windows 98, Windows 2000, Windows XP, Windows Me clients, set the server type for the dial-up entry. For Windows NT clients, do not change the default setting.

    1. Right-click the dial-up entry and select Properties, or select the dial-up entry and select Properties from the File menu.

    2. Select Server Type.

    3. Set Type of Dial-Up Server to Novell Virtual Private Network.

    4. Click OK to save your changes.


Logging In from a VPN Client

Use the Dial-up VPN Login if you want to use a Microsoft Dial-Up Networking entry to connect to your ISP.

Use the LAN VPN Login if you are already connected to your ISP through a cable modem, an ADSL device, a LAN connection, or an established dial-up connection.

To log in from a VPN client, complete the following steps:

  1. Start the VPN login in one of the following ways and wait for the Novell VPN Login dialog box to appear:

    • Double-click one of VPN Login icons that were automatically created during the client installation.
    • For Windows 98 and Windows Me clients, select Start > Programs > Novell > Novell BorderManager 3.7 VPN client > Dial-up VPN login or LAN VPN login.
    • For Windows NT clients, select Start > Programs > NetWare > Novell BorderManager 3.7 VPN client > Dial-up VPN login or LAN VPN login.
    • On Windows 98 and Widows Me workstations, double-click the VPN dial-up entry. The VPN Login program is launched when the specified dial-up connection is established.

  2. Select the NetWare Login tab in the Novell VPN Login dialog box and provide the following information:

    • NDS or eDirectory username
    • NDS or eDirectory password
    • NDS or eDirectory context
    • VPN server's IP address

      The IP address can be followed by a space and a description.

    • Token Password (Optional)

      This password is required only if you have configured the Login Policy object with rules requiring VPN clients to use a security device such as a hardware token in addition to using their NDS or eDirectory password. See the Authentication Services online documentation for more information on how to generate the token password and configure authentication rules.

    After the client has been successfully authenticated, this information (except for the password) is saved by the VPN client in the workstation's registry and is presented to the user the next time the VPN client comes up. The most recently used entries for the name and IP address are saved and displayed.

  3. For Dial-Up connections, select the Dial-Up tab and select a VPN dial-up entry name from the list of configured entries.

  4. (Optional) Enter the dial-up username and password if you have not connected using this dial-up entry before or your password was not saved.

    To configure the phone number and other dial properties, select Settings. You can override the dial-up password and phone number configured in the dial-up entry by selecting or entering new values.

  5. (Optional) If your ISP is using the RADIUS proxy feature to authenticate users, click Use NetWare Name and set RADIUS Domain to the name used by the ISP to identify the domain that contains the user when acting as an authentication request proxy.

    The name used for the dial-up authentication is the NetWare username and context, followed by the RADIUS domain that you enter. For example, if the username is User1, the context is Engineering.ACME, and the RADIUS domain is acme.com, then the name used for the dial-up authentication is .User1.Engineering.ACME@acme.com.

  6. Select the NetWare Options tab and select from the following options:

    • Enable IPX Encryption---Enables the VPN client to communicate with the VPN server using IPX.

      NOTE:  If you configured your Novell Client software to use the compatibility mode driver (CMD), you can use the CMD to access IPX services through the VPN, instead of enabling IPX.

    • Login to NetWare---Automatically logs in to NetWare after the encrypted tunnel is established with the VPN server.
    • Clear Current Connection---Determines whether the connection replaces or augments your existing connections.
    • Run Scripts---Automatically executes your user login script.
    • Display Results Window---Automatically displays the result of login script processing.
    • Close Script Results Automatically---Automatically closes the script processing results page when the login is successful.

  7. Click the Launcher tab to specify an application that is launched after the encrypted tunnel has been established with the VPN server.

  8. Click OK to connect to the VPN server.

  9. If you are prompted to compare the summary of the authentication information to the information that the administrator distributed, click OK if the values match.

    This prompt is displayed only if you are connecting to this VPN server from this workstation for the first time or the VPN server has regenerated its keys.

  10. (Optional) Click the VPN Status tab to view the progress of the VPN connection.

    After the connection is established, a VPN Client icon appears in the task bar. Double-click the icon to display VPN client statistics for this session. For more information about VPN client statistics, refer to the VPN online documentation.

  11. To terminate your VPN connection, double-click the VPN statistics icon and click Disconnect.

    On Windows NT systems, do not terminate your session by disconnecting your dial-up connection using the Dial-Up Monitor. You must terminate your VPN connection from the VPN Statistics screen.


Setting Up Specific Client-to-Site VPN Configurations

There are several different ways you can build your client-to-site VPN. Depending on the configuration you require, you will need to complete several different setup tasks. The following detailed examples are available in the VPN online documentation:

NOTE:  To correctly set up a VPN for a particular configuration, it is vital that you refer to the examples in the VPN online documentation. The examples contain procedures that are required for a particular configuration but are not included in the basic procedures provided in this publication.



  Previous Page: Virtual Private Network Prerequisites  Next Page: Upgrading VPN from a Previous Version