11OpenVPN Client menu

 

 

inset_32.jpg 

This menu is not available on the FL MGUARD BLADE controller.

11.1OpenVPN Client >> Connections

With OpenVPN, an encrypted VPN connection can be established between the mGuard as the OpenVPN client and a peer (OpenVPN server). The OpenSSL library is used for encryp­tion and authentication. Data is transported using the TCP or UDP protocols.

Requirements for a VPN connection

A general requirement for a VPN connection is that the IP addresses of the VPN peers are known and can be accessed.

mGuard devices provided in stealth network mode are preset to the “multiple clients” stealth configuration. In this mode, you need to configure a management IP address and default gateway if you want to use VPN connections (see “Default gateway” on page 150). Alternatively, you can select a different stealth configuration than the “mul­tiple clients” configuration or use another network mode.

In order to successfully establish an OpenVPN connection, the VPN peer must support the OpenVPN protocol as the OpenVPN server.

11.1.1Connections

OpenVPN-Client_Verbindungen_Verbindungen_01.png

Lists all the VPN connections that have been defined.

Each connection name listed here can refer to an individual VPN connection. You also have the option of defining new VPN connections, activating and deactivating VPN connections, changing (editing) the VPN connection properties, and deleting connections.

 

OpenVPN Client >> Connections

License Status

VPN license counter

Number of peers that currently have a VPN connection estab­lished using the IPsec protocol.

 

OpenVPN license counter

Number of peers to which a VPN connection is currently es­tablished using the OpenVPN protocol.

OpenVPN Client >> Connections

Connections

Initial mode

Disabled / Stopped / Started

The “Disabled” setting deactivates the VPN connection per­manently; it cannot be started or stopped.

The “Started” and “Stopped” settings determine the status of the VPN connection after restarting/booting the mGuard (e.g., after an interruption in the power supply).

VPN connections that are not disabled can be started or stopped via icons on the web interface, via text message, a switch or a pushbutton.

 

State

Indicates the current activation state of the OpenVPN connec­tion.

 

VPN state

Indicates whether or not the corresponding OpenVPN con­nection has been established.

 

Client IP

IP address of the OpenVPN interface.

 

Name

Name of the VPN connection

Connections

Defining a new VPN connection

In the connection table, click on the ic_add_circle_outline_black_48dp_2x.png Insert Row icon to add a new table row.

Click on the ic_mode_edit_black_48dp_2x.png Edit Row icon.

Editing a VPN connection

Click on the ic_mode_edit_black_48dp_2x00565.png Edit Row icon in the relevant row.

11.1.2General

OpenVPN-Client_Verbindungen_Verbindungen_EDIT_Allgemein.png

.

OpenVPN Client >> Connections >> Edit >> General

Options

A descriptive name for the connection

The connection can be freely named/renamed.

 

Initial mode

Disabled / Stopped / Started

The “Disabled” setting deactivates the VPN connection per­manently; it cannot be started or stopped.

The “Started” and “Stopped” settings determine the status of the VPN connection after restarting/booting the mGuard (e.g., after an interruption in the power supply).

VPN connections that are not disabled can be started or stopped via icons on the web interface, via text message, a switch or a pushbutton.

 

Controlling service input

(Only available with the TC MGUARD RS4000/RS2000 3G, TC MGUARD RS4000/RS2000 4G, FL MGUARD RS4000/RS2000, FL MGUARD RS4004/RS2005, FL MGUARD RS, FL MGUARD GT/GT.)

None / Service input CMD 1-3

The VPN connection can be switched via a connected push­button/switch.

The pushbutton/switch must be connected to one of the ser­vice contacts (CMD 1-3).

Section1100566.jpg

 

Use inverted control logic

Inverts the behavior of the connected switch.

If the switching service input is configured as an on/off switch, it can activate one VPN connection while simultaneously de­activating another which uses inverted logic, for example.

 

Deactivation timeout

Time, after which the VPN connection is stopped, if it has been started via a text message, switch, pushbutton or the web in­terface. The timeout starts on transition to the “Started” state.

After the timeout has elapsed, the connection remains in the “Stopped” state until it is restarted.

Time in hours, minutes and/or seconds (00:00:00 to 720:00:00, around 1 month). The entry can be in seconds [ss], minutes and seconds [mm:ss] or hours, minutes, and seconds [hh:mm:ss].

0 means the setting is disabled.

 

Token for text mes­sage trigger

(Only available with the TC MGUARD RS4000/RS2000 3G, TC MGUARD RS4000/RS2000 4G.)

Incoming text messages can be used to start or stop VPN con­nections. The text message must contain the “openvpn/start” or “openvpn/stop” command followed by the token.

Connection

Address of the remote site's VPN gateway

IP address or host name of the VPN gateway of the peer

 

Protocol

TCP / UDP

The network protocol used by the OpenVPN server must like­wise be selected here in the mGuard.

 

Local port

The port of the local OpenVPN client from which the connec­tion to an OpenVPN server is initiated.

Values: 1 - 65535; default: %any (selection left to the peer)

 

Remote port

Port on the remote OpenVPN server that should respond to re­quests from the OpenVPN client.

Values: 1 - 65535; default: 1194

11.1.3Tunnel Settings

OpenVPN-Client_Verbindungen_Verbindungen_EDIT_Tunneleinstellungen.png

OpenVPN Client >> Connections >> Edit >> Tunnel Settings

Remote Networks

Network

Addresses of networks that are located behind the OpenVPN server (VPN gateway of the peer) (CIDR format).

 

Comment

Optional comment text.

Tunnel Settings

Learn remote routes from server

When the function is activated (default), remote networks are automatically learned from the server if the server is con­figured accordingly.

Section1100568.jpg
Section1100570.jpg

When the function is deactivated, the statically entered routes will be used.

 

Dynamically learned remote networks

Dynamically learned remote networks are displayed.

 

Use compression

Yes / No / Adaptive / Disabled

You can select whether compression should always be ap­plied, should never be applied or should be applied adaptively (adapted according to the type of traffic).

The option Disabled disables compression completely by disabling the use of liblzo resp. comp-lzo.

Section1100572.jpg

Data Encryption

Encryption algorithm

Blowfish / AES-128 / AES-192 / AES-256 (default)

Decide on which encryption algorithm should be used with the administrator of the peer.

The Blowfish encryption algorithm is used by default as it is widely used with OpenVPN.

Section1100574.jpg
Section1100576.jpg

The following generally applies: the longer the key length (in bits) used by an encryption algorithm (specified by the ap­pended number), the more secure it is. The longer the key, the more time-consuming the encryption procedure.

 

Key renegotiation

When the function is activated (default), the mGuard will at­tempt to negotiate a new key when the old one expires.

 

Key renegotiation interval

Duration after which the validity of the current key expires and a new key is negotiated between the server and client.

Time in hh:mm:ss (default: 8 h)

Dead Peer Detection

If the peer supports Dead Peer Detection, the relevant partners can detect whether the OpenVPN connection is still active or whether it needs to be established again.

 

Delay between requests for a sign of life

Duration after which DPD Keep Alive requests should be transmitted. These requests test whether the peer is still avail­able.

Time in hh:mm:ss

Default: 00:00:00 (DPD is disabled)

 

Timeout for absent sign of life after which peer is assumed dead

Duration after which the connection to the peer should be de­clared dead if there has been no response to the Keep Alive requests.

Time in hh:mm:ss

Section1100578.jpg

Default: 00:00:00 (DPD is disabled)

11.1.4Authentication

OpenVPN_Authentifizierung.png

OpenVPN Client >> Connections >> Edit >> Authentication

Authentication

Authentication method

There are three ways in which the mGuard can authenticate it­self as an OpenVPN client to the OpenVPN server:

X.509 Certificate (default)

Login/password

X.509 Certificate + login/password

The page contains different setting options depending on the method chosen.

 

Login

Authentication method: Login/Password

User identifier (login) that the mGuard uses to authenticate it­self to the OpenVPN server.

 

Password

Agreed password that is used together with a user identifier (login) for authentication.

Section1100580.jpg

 

 

Authentication method: X.509 Certificate

Each VPN device has a secret private key and a public key in the form of an X.509 certificate, which contains further infor­mation about the certificate's owner and the certification au­thority (CA).

The following must be specified:

How the mGuard authenticates itself to the peer

How the mGuard authenticates the remote peer

 

Local X.509 certificate

Specifies which machine certificate the mGuard uses as au­thentication to the VPN peer.

Select one of the machine certificates from the selection list.

The selection list contains the machine certificates that have been loaded on the mGuard under the Authentication >> Cer­tificates menu item.

Section1100582.jpg

 

CA certificate (for veri­fication of server cer­tificate)

Only the CA certificate from the certification authority (CA) that signed the certificate shown by the VPN peer (OpenVPN server) should be referenced here (selection from list).

Section1100584.jpg

The additional CA certificates that form the chain to the root CA certificate together with the certificate shown by the peer must then be imported into the mGuard under the Authentica­tion >> Certificates menu item.

Section1100586.jpg

The selection list contains all CA certificates that have been imported into the mGuard under the Authentication >> Certifi­cates menu item.

With this setting, all VPN peers are accepted, providing they log in with a signed CA certificate issued by a recognized cer­tification authority (CA). The CA is recognized if the relevant CA certificate and all other CA certificates have been loaded on the mGuard. These then form the chain to the root certifi­cate together with the certificates shown.

 

Pre-shared key for TLS auth

To increase security (e.g., prevent DoS attacks), authentica­tion of the OpenVPN connection can also be protected via pre-shared keys (TLS-PSK).

To do so, first a static PSK file (e.g., ta.key) must be created and installed and activated on both OpenVPN peers (server and client).

The PSK file can:

be created by the OpenVPN server or

consist of any file (8 – 2048 bytes).

If the file is generated by the server, the key direction can also be selected (see below).

To activate TLS authentication, a PSK file must be selected using the ic_folder_open_black_48dp_2x.png icon and uploaded using the Upload button.

To deactivate TLS authentication, the file must be deleted using the Delete button. The Delete button is always visible, i.e., even if no PSK file has been uploaded or an uploaded PSK file has been deleted.

 

Key direction for TLS auth

None / 0 / 1

None

Must be selected if the PSK file was not generated by the OpenVPN server.

0 and 1

Can be selected if the PSK file was generated by the Open­VPN server.

The selection on the client and server side must be comple­mentary (0 <–>1 or 1 <–> 0) or identical (None <–> None).

If the settings are incorrect, the connection will not be estab­lished and a log entry will be generated.

 

11.1.5Firewall

OpenVPN-Client_Verbindungen_Verbindungen_EDIT_Firewall.png

Incoming/outgoing firewall

While the settings made under the Network Security menu item only relate to non-VPN con­nections (see above under “Network Security menu” on page 259), the settings here only relate to the VPN connection defined on these tabs.

If multiple VPN connections have been defined, you can restrict the outgoing or incoming access individually for each connection. Any attempts to bypass these restrictions can be logged.

 

 

inset_38.jpg 

By default, the VPN firewall is set to allow all connections for this VPN connection.

However, the extended firewall settings defined and explained above apply independent­ly for each individual VPN connection (see “Network Security menu” on page 259, “Net­work Security >> Packet Filter” on page 259, “Advanced” on page 278).

 

 

inset_39.jpg 

If multiple firewall rules are defined, these are queried starting from the top of the list of entries until an appropriate rule is found. This rule is then applied. If the list of rules con­tains further subsequent rules that could also apply, these rules are ignored.

 

 

inset_40.jpg 

In Single Stealth mode, the actual IP address used by the client should be used in the fire­wall rules, or it should be left at 0.0.0.0/0, as only one client can be addressed through the tunnel.

 

 

inset_41.jpg 

If the Allow packet forwarding between VPN connections function is activated on the Options tab under the IPsec VPN >> Global menu item, the rules under Incoming are used for the incoming data packets to the mGuard, and the rules under Outgoing are ap­plied to the outgoing data packets. This applies for OpenVPN connections as well as for IPsec connections.

If the outgoing data packets are included in the same connection definition, then the fire­wall rules for Incoming and Outgoing for the same connection definition are used.

If a different VPN connection definition applies to the outgoing data packets, the firewall rules for Outgoing for this other connection definition are used.

 

 

inset_42.jpg 

If the mGuard has been configured to forward SSH connection packets (e.g., by permit­ting a SEC-Stick hub & spoke connection), existing VPN firewall rules are not applied. This means, for example, that packets of an SSH connection are sent through a VPN tun­nel despite the fact that this is prohibited by its firewall rules.

 

OpenVPN Client >> Connections >> Edit >> Firewall

Incoming

General firewall set­ting

Accept all incoming connections: the data packets of all in­coming connections are allowed.

Drop all incoming connections: the data packets of all in­coming connections are discarded.

Accept Ping only: the data packets of all incoming connec­tions are discarded, except for ping packets (ICMP).

Use the firewall ruleset below: displays further setting op­tions.

 

The following settings are only visible if “Use the firewall ruleset below” is set.

 

Protocol

All means TCP, UDP, ICMP, GRE, and other IP protocols.

 

From IP/To IP

0.0.0.0/0 means all IP addresses. To specify an address area, use CIDR format (see “CIDR (Classless Inter-Domain Rout­ing)” on page 29).

Name of IP groups, if defined. When a name is specified for an IP group, the host names, IP addresses, IP areas or net­works saved under this name are taken into consideration (see “IP/Port Groups” on page 276).

Section1100588.jpg
Section1100590.jpg

Incoming:

From IP:   IP address in the VPN tunnel

To IP:   1:1 NAT address or the actual address

Outgoing:

From IP:   1:1 NAT address or the actual address

To IP:   IP address in the VPN tunnel

 

From port / To port

(Only for TCP and UDP proto­cols)

any refers to any port.

startport:endport (e.g., 110:120) refers to a port range.

Individual ports can be specified using the port number or the corresponding service name (e.g., 110 for pop3 or pop3 for 110).

Name of port groups, if defined. When a name is specified for a port group, the ports or port ranges saved under this name are taken into consideration (see “IP/Port Groups” on page 276).

 

Action

Accept means that the data packets may pass through.

Reject means that the data packets are sent back and the sender is informed of their rejection. (In Stealth mode, Reject has the same effect as Drop.)

Drop means that the data packets are not permitted to pass through. They are discarded, which means that the sender is not informed of their whereabouts.

Name of rule sets, if defined. When a name is specified for rule sets, the firewall rules configured under this name take ef­fect (see Rule Records tab).

Section1100592.jpg
Section1100594.jpg

Name of Modbus TCP rule sets, if defined. When a Modbus TCP rule set is selected, the firewall rules configured under this rule set take effect (see “Modbus TCP” on page 283).

 

Comment

Freely selectable comment for this rule.

 

Log

For each individual firewall rule, you can specify whether the use of the rule:

Should be logged – activate Log function

Should not be logged – deactivate Log function (default)

 

Log entries for unknown connection attempts

When the function is activated, all connection attempts that are not covered by the rules defined above are logged.

Outgoing

The explanation provided under “Incoming” also applies to “Outgoing”.

 

11.1.6NAT

OpenVPN_NAT__1zu1.png

The IP address (OpenVPN client IP address) that the mGuard uses as the OpenVPN client is assigned to it by the OpenVPN server of the peer.

If NAT is not used, the local networks of the mGuard, from which the OpenVPN connection should be used, must be statically configured in the OpenVPN server. It is therefore recom­mended that you use NAT, i.e., that local routes (local IP addresses within the private ad­dress area) are rewritten to the OpenVPN client IP address so that devices in the local net­work can use the OpenVPN connection.

OpenVPN Client >> Connections >> Edit >> NAT

Local NAT

For outgoing data packets, the device can rewrite the specified sender IP addresses from its internal network to its OpenVPN client IP address, a technique referred to as NAT (Net­work Address Translation).

This method is used if the internal addresses cannot or should not be routed externally, e.g., because a private address area such as 192.168.x.x or the internal network struc­ture should be hidden.

Section1100596.jpg

 

Local NAT for Open­VPN connections

No NAT / 1:1 NAT / Masquerade

It is possible to translate the IP addresses of devices located at the local end of the OpenVPN tunnel, (e.g., behind the mGuard).

No NAT: NAT is not performed.

With 1:1 NAT, the IP addresses of devices at the local end of the tunnel are exchanged so that each individual address is translated into another specific address.

With Masquerade, the IP addresses of devices at the local end of the tunnel are exchanged with an IP address that is identical for all devices.

 

Virtual local network for 1:1 NAT

(When “1:1 NAT” was selected)

Configures the virtual IP address area to which the actual local IP addresses are translated when 1:1 NAT is used.

The netmask specified in CIDR format also applies to the Local address for 1:1-NAT (see below).

Section1100598.jpg

 

Local address for 1:1-NAT

(When “1:1 NAT” was selected)

Configures the local IP address area from which IP addresses are translated into the virtual IP addresses through the use of 1:1-NAT in the Virtual local network for 1:1-NAT defined above (see above).

The netmask specified for the Virtual local network for 1:1-NAT applies (see above). 

 

Network

(When “Masquerading” was se­lected)

Internal networks whose device IP addresses are translated into the OpenVPN client IP address.

0.0.0.0/0 means that all internal IP addresses are subject to the NAT procedure. To specify an address area, use CIDR for­mat (see “CIDR (Classless Inter-Domain Routing)” on page 29).

Section1100600.jpg
Section1100602.jpg

 

Comment

Freely selectable comment for this rule.

IP and Port Forwarding

Lists the rules defined for IP and port forwarding (DNAT = Destination NAT).

IP and port forwarding (DNAT) performs the following: the headers of incoming data pack­ets from the OpenVPN tunnel, which are addressed to the OpenVPN client IP address of the mGuard and to a specific port of the mGuard, are rewritten in order to forward them to a specific computer in the internal network and to a specific port on this computer. In other words, the IP address and port number in the header of incoming data packets are changed.

Section1100604.jpg

 

Protocol: TCP / UDP / GRE

Specify the protocol to which the rule should apply (TCP / UDP / GRE).

GRE protocol IP packets can be forwarded. However, only one GRE connection is supported at any given time. If more than one device sends GRE packets to the same external IP address, the mGuard may not be able to feed back reply pack­ets correctly.

Section1100606.jpg

 

From IP

The sender address for forwarding.

0.0.0.0/0 means all addresses. To specify an address area, use CIDR format (see “CIDR (Classless Inter-Domain Rout­ing)” on page 29).

Name of IP groups, if defined. When a name is specified for an IP group, the host names, IP addresses, IP areas or net­works saved under this name are taken into consideration (see “IP/Port Groups” on page 276).

Section1100608.jpg

 

From port

The sender port for forwarding.

any refers to any port.

Either the port number or the corresponding service name can be specified here, e.g., pop3 for port 110 or http for port 80.

Name of port groups, if defined. When a name is specified for a port group, the ports or port ranges saved under this name are taken into consideration (see “IP/Port Groups” on page 276).

 

Incoming on port

The original destination port specified in the incoming data packets.

Either the port number or the corresponding service name can be specified here, e.g., pop3 for port 110 or http for port 80.

This information is not relevant for the “GRE” protocol. It is ig­nored by the mGuard.

 

Redirect to IP

The internal IP address to which the data packets should be forwarded and into which the original destination addresses are translated.

 

Redirect to port

Internal port to which the data packets should be forwarded and into which the original port is translated.

 

Comment

Freely selectable comment for this rule.

 

Log

For each individual port forwarding rule, you can specify whether the use of the rule:

Should be logged – activate Log function

Should not be logged – deactivate Log function (default)