Create a New Remote Access VPN Policy
The Remote Access VPN Policy Wizard guides you to quickly and easily set up remote access VPNs with basic capabilities. You can further enhance the policy configuration by specifying additional attributes as you want and deploy it to your Secure Firewall Threat Defense secure gateway devices.
Before you begin
-
Ensure that you complete all the prerequisites listed in Prerequisites for Configuring Remote Access VPN.
Procedure
Step 1 | Choose . | ||
Step 2 | Click Add to create a new remote access VPN policy with basic policy configuration, using the Remote Access VPN Policy wizard. You must proceed through the entire wizard to create a new policy; the policy is not saved if you cancel before you complete the wizard. | ||
Step 3 | Select the target devices and protocols. The threat defense devices that you select here functions as your remote access VPN gateways for the VPN client users. You can select threat defense devices when you create a remote access VPN policy or change them later. See Set Target Devices for a Remote Access VPN Policy. You can select SSL or IPSec-IKEv2, or both the VPN protocols. Threat Defense supports both the protocols to establish secure connections over a public network through VPN tunnels.
For SSL settings, see SSL. | ||
Step 4 | Click Next. | ||
Step 5 | Configure the Connection Profile and Group Policy settings. A connection profile specifies a set of parameters that define how the remote users connect to the VPN device. The parameters include settings and attributes for authentication, address assignments to VPN clients, and group policies. Threat Defense device provides a default connection profile named DefaultWEBVPNGroup when you configure a remote access VPN policy. For more information, see Configure Connection Profile Settings. | ||
Step 6 | Configure the Authentication, Authorization & Accounting settings. For information about configuring,
| ||
Step 7 | Configure the Client Address Assignment settings. Client IP address can be assigned from AAA server, DHCP server and IP address pools. When multiple options are selected, IP address assignment is done in the order of AAA server, DHCP server, and IP address pool. Assignment of client IP addresses from the AAA server is supported only for realm and RADIUS authorization. Ensure that realm or RADIUS server is configured to provide client IP address. | ||
Step 8 | Configure the Group Policy settings. A group policy is a set of attribute and value pairs, stored in a group policy object, that define the remote access VPN experience for VPN users. You configure attributes such as user authorization profile, IP addresses, Secure Client settings, VLAN mapping, and user session settings and so on using the group policy. The RADIUS authorization server assigns the group policy, or it is obtained from the current connection profile. For more information, see Configuring Group Policies. | ||
Step 9 | Click Next. | ||
Step 10 | Select the Secure Client Image that the VPN users will use to connect to the remote access VPN. The Secure Client provides secure SSL or IPSec (IKEv2) connections to the Secure Firewall Threat Defense device for remote users with full VPN profiling to corporate resources. After the remote access VPN policy is deployed on the threat defense device, VPN users can enter the IP address of the configured device interface in their browser to download and install the Secure Client. For information about configuring the client profile and client modules, see Group Policy Secure Client Options. | ||
Step 11 | Click Next. | ||
Step 12 | Configure Network Interface for Incoming VPN Access. Interface objects segment your network to help you manage and classify traffic flow. A security zone object simply groups interfaces. These groups may span multiple devices; you can also configure multiple zones interface objects on a single device. There are two types of interface objects:
(Optional) Check the Enable DTLS on member interfaces check box, if required. DTLS is applicable only for SSL protocol. | ||
Step 13 | Configure Device Certificates. Device certificate (also called Identity certificate) identifies the VPN gateway to the remote access clients. Select a certificate which is used to authenticate the VPN gateway. From the Certificate Enrollment drop-down list, choose a certificate or click + to add a certificate. | ||
Step 14 | Configure Access Control for VPN Traffic . By default, all decrypted traffic in the VPN tunnel is subjected to the Access Control Policy. Check the Bypass Access Control policy for decrypted traffic (sysopt permit-vpn) check box to bypass decrypted traffic from the Access Control Policy. This option bypasses the Access Control Policy inspection, but VPN filter ACL and authorization ACL downloaded from AAA server are still applied to VPN traffic.
| ||
Step 15 | Click Next. | ||
Step 16 | View the Summary of the remote access VPN policy configuration. The Summary page displays all the remote access VPN settings you have configured so far and provides links to the additional configurations that need to be performed before deploying the remote access VPN policy on the selected devices. Click Back to make changes to the configuration, if required. | ||
Step 17 | Click Finish to complete the basic configuration for the remote access VPN policy. When you complete the Remote Access VPN Policy Wizard, the policy listing page appears. Later, set up DNS configuration, configure access control for VPN users, and enable NAT exemption (if necessary) to complete a basic remote access VPN Policy configuration. |
What to do next
Use the Remote Access VPN dashboard (Overview > Dashboards > Remote Access VPN) to monitor real-time data from active remote access VPN sessions on the devices. You can quickly determine problems related to user sessions and mitigate the problems for your network and users.