Allow Mobile VPN with SSL Users to use Resources Through a BOVPN Tunnel
Before your Mobile VPN with SSL users can use resources through a BOVPN tunnel, you must add the appropriate tunnel routes and resources to your BOVPN configuration.
In this example, a BOVPN tunnel is already configured between the Site A Firebox and the Site B Firebox.
Site A Firebox configuration
External interface IP address — 203.0.113.2
Trusted network IP address — 10.0.1.0/24
Mobile VPN with SSL IP address pool — 192.168.113.0/24
Site B Firebox configuration
External interface IP address — 198.51.100.2
Trusted network IP address — 10.50.1.0/24
To allow the Mobile VPN with SSL users who connect to the Firebox at Site A to use resources on the trusted network of the Firebox at Site B, follow the procedures in the next sections.
Configure the Firebox at Site A
First, you must configure the Firebox at Site A to allow SSL VPN traffic to the Firebox at Site B.
- Connect to Fireware Web UI for the Firebox at Site A.
This is the Firebox that the SSL VPN users connect to. - Select VPN > Mobile VPN with SSL.
The Mobile VPN with SSL page appears.
- Select the Activate Mobile VPN with SSL check box.
- In the Allowed Resources section, select Specify allowed resources.
- Add the IP addresses of the trusted networks on both the local and remote Firebox.
For this example, for the IP address of the trusted network at Site A, add 10.0.1.0/24.
For the IP address of the trusted network at Site B, add 10.50.1.0/24. - Add the network addresses for any other networks you want to make available to your SSL VPN users.
For example, you could add the optional networks on the local and remote Firebox. - Make a note of the address specified in the Virtual P Address Pool text box. You use this address when you set up tunnel routes to the resources. Click Save.
- Select VPN > Branch Office VPN.
The Branch Office VPN page appears. - In the Tunnels list, select a tunnel and click Edit.
The Edit Tunnel dialog box appears. The existing tunnel route between the devices at Site A and Site B appears in the Addresses list.
- On the Addresses tab, click Add.
The Tunnel Route Settings dialog box appears.
- In the Local IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type 192.168.113.0/24.
This is the network IP address assigned to your SSLVPN users for this example. You can find this IP address in the Mobile VPN with SSL Configuration dialog box, in the IP Address Pool text box. - In the Remote IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type 10.50.1.0/24.
This is the trusted network IP address of the remote Firebox for this example. - Click OK.
The new tunnel route is added to the Addresses list.
- Click Save.
The Firebox at Site A now allows traffic from Mobile VPN for SSL users through the BOVPN tunnel to the remote network at Site B.
- Open Policy Manager with the configuration file for the Firebox at Site A.
This is the Firebox that the SSL VPN users connect to.
Policy Manager appears with the selected configuration file. - Select VPN > Mobile VPN > SSL.
The Mobile VPN with SSL Configuration dialog box appears.
If you select the Force all client traffic through tunnel check box, the Firebox allows access to all resources, and you can skip steps 3, 4, and 5.
- In the Allowed Resources section, select Specify allowed resources.
- Add the IP addresses of the trusted networks on both the local and remote Firebox.
For this example, for the IP address of the trusted network at Site A, add 10.0.1.0/24.
For the IP address of the trusted network at Site B, add 10.50.1.0/24. - Add the network addresses for any other networks you want to make available to your SSL VPN users.
For example, you could add the optional networks on the local and remote Firebox. - Make a note of the address specified in the Virtual IP Address Pool text box. You use this address when you set up tunnel routes to the resources. Click OK.
Policy Manager appears. - Select VPN > Branch Office Tunnels.
The Branch Office IPSec Tunnels dialog box appears. - Select a tunnel and click Edit.
The Edit Tunnel dialog box appears. The existing tunnel route between the devices at Site A and Site B appears in the Addresses list.
- On the Addresses tab, click Add.
The Tunnel Route Settings dialog box appears.
- In the Local text box, type 192.168.113.0/24.
This is the network IP address assigned to your SSLVPN users for this example. You can find this IP address in the Mobile VPN with SSL Configuration dialog box, in the IP Address Pool text box. - In the Remote text box, type 10.50.1.0/24.
This is the trusted network IP address of the remote Firebox for this example. - Click OK.
The new tunnel route is added to the Addresses tab.
- Click OK. Save the configuration to the Firebox.
The Firebox at Site A now allows traffic from Mobile VPN for SSL users through the BOVPN tunnel to the remote network at Site B.
Configure the Firebox at Site B
Next, you must configure the Firebox at Site B to accept traffic from Mobile VPN for SSL users through the BOVPN tunnel to its local network.
- Select VPN > Branch Office Tunnels.
The Branch Office IPSec Tunnels dialog box appears. - Select a tunnel and click Edit.
The Edit Tunnel dialog box appears. The existing tunnel route between the devices at Site A and Site B appears in the Addresses list.
- On the Addresses tab, click Add.
The Tunnel Route Settings dialog box appears.
- In the Local IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IPtext box, type 10.50.1.0/24.
This is the IP address of the local network of the Firebox at Site B for this example. - In the Remote IP section, from the Choose Type drop-down list, select Network IPv4.
- In the Network IP text box, type 192.168.113.0/24.
This the network IP address assigned to your SSLVPN users at Site A for this example. You can find this IP address in the Mobile VPN with SSL Configuration dialog box, in the IP Address Pool text box. - Click OK.
The new tunnel route is added to the Addresses list.
- Click Save.
The Firebox at Site B is now configured to accept traffic from Mobile VPN for SSL users through the BOVPN tunnel.
- Open Policy Manager with the configuration file for the Firebox at Site B.
Policy Manager appears with the selected configuration file. - Select VPN > Branch Office Tunnels.
The Branch Office IPSec Tunnels dialog box appears. - Select a tunnel and click Edit.
The Edit Tunnel dialog box appears.The existing tunnel route between the devices at Site A and Site B appears in the Addresses list.
- On the Addresses tab, click Add.
The Tunnel Route Settings dialog box appears. - In the Local text box, type 10.50.1.0/24.
This is the IP address of the local network of the Firebox at Site B for this example. - In the Remote text box, type 192.168.113.0/24.
This the network IP address assigned to your SSLVPN users at Site A for this example. You can find this IP address in the Mobile VPN with SSL Configuration dialog box, in the IP Address Pool text box. - Click OK.
The tunnel route is added to the Addresses tab.
- Click OK. Save the configuration to the Firebox.
The Firebox at Site B is now configured to accept traffic from Mobile VPN for SSL users through the BOVPN tunnel.