Contents

Related Topics

Configure the Firebox for Mobile VPN with SSL

When you activate Mobile VPN with SSL, an SSLVPN-Users user group and a WatchGuard SSLVPN policy are automatically created to allow SSL VPN connections from the Internet to the Firebox. You can use the default group or you can create new groups that have the same names as the user group names on your authentication servers.

The WatchGuard SSLVPN policy is shared by Management Tunnel over SSL, BOVPN over TLS in Server mode, Mobile VPN with SSL, and the Access Portal. For more information about this policy, see SSL/TLS Settings Precedence and Inheritance.

Several Firebox features use SSL/TLS for secure communication and share the same OpenVPN server. The features that share the OpenVPN server, in order of precedence from highest to lowest, are:

  • Management Tunnel over SSL on hub devices
  • BOVPN over TLS in Server mode
  • Mobile VPN with SSL
  • Access Portal

Features with lower precedence inherit some SSL/TLS settings from enabled features with higher precedence. The shared settings are not configurable for the features with lower precedence.

Example — Management Tunnel and Mobile VPN with SSL enabled

When you enable a Management Tunnel over SSL on your WSM Management Server, some of the settings that are shared by the Mobile VPN with SSL tunnels become managed by your Management Server. You cannot change these settings in the Mobile VPN with SSL configuration. These settings include the Firebox IP addresses, networking method, virtual IP address pool, VPN resources, data channel, and configuration channel. You also cannot disable the Firebox-DB authentication server, which is required for Management Tunnel authentication. You must change these shared settings in the Device Properties on the Management Server.

Example — BOVPN over TLS Server and Mobile VPN with SSL enabled

When you enable your Firebox as a BOVPN over TLS server, some Mobile VPN with SSL settings are inherited from the BOVPN over TLS Server settings. You cannot change these settings in the Mobile VPN with SSL or VPN Portal configuration. These settings include the Firebox IP addresses, networking method, virtual IP address pool, VPN resources, data channel, authentication and encryption settings, and timeout settings. In the VPN Portal settings, you cannot change the VPN Portal port (the configuration channel for Mobile VPN with SSL). For more information about VPN Portal settings, see Configure the VPN Portal Settings.

Before You Begin

Before you configure Mobile VPN with SSL, decide how you want the Firebox to send traffic through the VPN tunnel. Based on the option you choose, you might have to make changes to your network configuration before you enable Mobile VPN with SSL.

You can configure Mobile VPN with SSL to use one of two methods to handle VPN traffic to your network: 

Routed VPN Traffic

This is the default selection. With this option, the Firebox sends traffic from the VPN tunnel to all local trusted, optional, and custom networks, or to the specific network resources you specify.

Bridge VPN Traffic

This option enables you to bridge SSL VPN traffic to a trusted, optional, or custom network. When you select this option, you cannot filter traffic between the SSL VPN users and the network that the SSL VPN traffic is bridged to. When you bridge VPN traffic to a network, the SSL VPN users are in the same security zone as other users on the network that you bridge to, and the traffic for those mobile users is managed by the same security policies as traffic for other users on the bridged network.

For example, if you bridge VPN traffic to a trusted interface, all policies that allow traffic for the Any-Trusted alias also allow traffic for the users who connect to the network with Mobile VPN with SSL. The Bridge VPN Traffic option does not bridge SSL VPN traffic to any secondary networks on the selected network bridge.

If you select Bridge VPN Traffic in the Mobile VPN with SSL configuration on a FireboxV or XTMv virtual machine, you must enable promiscuous mode on the attached virtual switch (vSwitch) in VMware.

The choice of interfaces you can bridge VPN traffic to depends on the version of Fireware installed on the device:

  • Fireware v11.8.x or lower — You can bridge VPN traffic to any interface that is not a LAN bridge.
  • Fireware v11.9 or higher — You can bridge VPN traffic only to a LAN bridge.

For information about how to configure a bridge interface, see Create a Network Bridge Configuration.

If you configure Mobile VPN with SSL from the Web UI, do not change the interface that you used to log in to the Web UI to a bridge interface. This causes you to immediately lose the management connection to the device. If this happens, you must use a different configured interface to reconnect to Fireware Web UI.

If you want to change the interface that you use to manage the device to a bridge interface, we recommend that you make this change from Policy Manager. You can complete all interface configuration changes before you save the updated configuration file to the device.

To change the trusted or optional interface you use for management to a bridge interface, from Fireware Web UI:

  1. Configure another trusted or optional interface to use as a temporary management interface.
  2. Connect the management computer to the new interface, and log in to the Web UI.
  3. Change the original management interface to a bridge interface, and configure a LAN bridge that includes this interface.
  4. Connect the management computer to the original management interface.
  5. Disable the temporary management interface.

For detailed instructions, see Create a Network Bridge Configuration.

Configure Connection Settings

Configure the Networking and IP Address Pool Settings

In the Networking and IP Address Pool section, configure the network resources that Mobile VPN with SSL clients can use.

By default, the BOVPN over TLS server assigns addresses in the 192.168.113.0/24 pool to BOVPN over TLS clients. Mobile VPN with SSL also uses the 192.168.113.0/24 pool by default. If BOVPN over TLS in Client mode and Mobile VPN with SSL are enabled on the same Firebox, you must specify a different address pool for one of these features. If both features use the same IP address pool, BOVPN over TLS traffic is not sent through the tunnel properly.

Configure Authentication Settings

Next, you must configure the authentication settings. You can select one or more configured authentication servers to use. The server at the top of the list is the default server. The default server is used for authentication if the user does not specify the authentication server or domain in the Mobile VPN with SSL client.

Make sure you create a group on the server that has the same name as the name you added in the wizard for the Mobile VPN group. If you use Active Directory as your authentication server, the users must belong to an Active Directory security group with the same name as the group name you configure for Mobile VPN with SSL. For more information, see Configure the External Authentication Server.

Select Authentication Servers

In Fireware v12.1 and higher, the authentication server settings appear in the VPN Portal settings.

Add Users and Groups

You can use the default SSLVPN-Users group for authentication, or you can add the names of users and groups that exist on your authentication server.

The group SSLVPN-Users is added by default. You can add the names of other groups and users that use Mobile VPN with SSL. For each group or user, you can select a specific authentication server where the group exists or select Any if that group exists on more than one authentication server. The group or user name you add must exist on the authentication server. The group and user names are case sensitive and must exactly match the name on your authentication server.

The Allow SSLVPN-Users Policy and Mobile VPN with SSL Groups and Users

When you save the Mobile VPN with SSL configuration, the Allow SSLVPN-Users policy is created or updated to apply to the groups and users you configured for authentication. The group and user names you added do not appear in the From list in the Allow SSLVPN-Users policy. Instead, the single group name SSLVPN-Users appears. The group and user names you added do not appear in the From list. However, this policy does apply to all users and groups you configured in the Mobile VPN with SSL authentication settings.

If you disable Mobile VPN with SSL, the Allow SSLVPN-Users policy and the SSLVPN-Users group are automatically removed.

Configure Advanced Settings for Mobile VPN with SSL

You can configure these settings on the Advanced page:

  • Authentication and encryption
  • Ports
  • Timers
  • DNS and WINS

The authentication and encryption settings changed to stronger defaults in Fireware v12.0. Settings for Blowfish, MD5, and DES were removed. For more information about these settings in Fireware v11.12.4 and lower, see the previous version of Fireware Help.

Configure Policies to Control Mobile VPN with SSL Client Access

When you enable Mobile VPN with SSL, policies to allow Mobile VPN with SSL client access are automatically created. You can change these policies to control Mobile VPN with SSL client access.

WatchGuard SSLVPN

This SSLVPN policy allows connections from a Mobile VPN with SSL client to the Firebox. This policy allows traffic from any host on the specified interfaces to any configured primary or secondary interface IP address of your Firebox on TCP port 443, the port and protocol the Firebox uses for Mobile VPN with SSL.

  • In Fireware v12.0.2 and lower, the WatchGuard SSLVPN policy includes the Any-External, Any-Optional, and Any-Trusted interfaces by default.
  • In Fireware v12.1 and higher, the WatchGuard SSLVPN policy includes the WG-VPN-Portal alias which specifies only the Any-External interface by default.
    For more information about how this policy changes when you upgrade to Fireware v12.1, see SSL/TLS Settings Precedence and Inheritance.

If you want this policy to allow TCP port 443 connections only to a specific interface IP address, edit the To section of the policy to remove the Firebox alias and add the external IP address that your Mobile VPN with SSL clients use to connect.

In Fireware v12.1 or higher, if you delete the WatchGuard SSLVPN policy and create a custom policy with a different name, Mobile VPN with SSL does not function if the Data Channel protocol is configured for TCP.

Allow SSLVPN-Users

This Any policy allows the groups and users you configure for SSL authentication to get access to resources on your network. This policy automatically includes all users and groups in your Mobile VPN with SSL configuration. It has no restrictions on the traffic that it allows from SSL clients to network resources protected by the Firebox.

To restrict VPN user traffic by port and protocol, you can disable or delete the Allow SSLVPN-Users policy. Then, add new policies to your configuration or add the group with Mobile VPN with SSL access to the From section of your existing policies.

All Mobile VPN with SSL traffic is untrusted by default. Even if you assign Mobile VPN with SSL users IP addresses on the same subnet as a trusted network, the traffic from the Mobile VPN with SSL user is not considered trusted. Regardless of assigned IP address, you must create policies to allow Mobile VPN with SSL users access to network resources.

WatchGuard Authentication

In Fireware v11.11.4 and lower, this WG-Auth policy allows users to authenticate with the Firebox on port 4100 to download the Mobile VPN with SSL client software. If the WatchGuard Authentication policy is not already included in your Firebox configuration, it is created automatically when you enable Mobile VPN with SSL. The WatchGuard Authentication policy must allow traffic from Any-External to the Firebox to enable users to connect to the Firebox from an external network.

For more information about this policy, see About the WatchGuard Authentication (WG-Auth) Policy.

In Fireware v11.12 and higher, this policy is not created automatically when you enable Mobile VPN with SSL. Users authenticate with the Firebox on port 443, or on a custom port that you specify, to download the Mobile VPN with SSL client software.

After you upgrade your Firebox to Fireware OS v11.12, if your configuration file includes a WatchGuard Authentication policy, the alias Any-External is automatically removed. If you upgrade with Policy Manager, to make sure the alias is not automatically added to the configuration again when you save the configuration to your Firebox, you must manually reload the configuration from the Firebox after the upgrade completes. The alias Any-External is automatically removed from the WatchGuard Authentication policy, whether you manually added the alias, or whether Mobile VPN with SSL is enabled.

Allow Mobile VPN with SSL Users to Access a Trusted Network

In this example, you add an Any policy that allows members in the SSLVPN-Users group to get full access to resources on all trusted networks.

For more information on policies, see Add Policies to Your Configuration.

Use Other Groups or Users in a Mobile VPN with SSL Policy

To make a Mobile VPN with SSL connection, users must be members of the SSLVPN-Users group or any group you added to the Mobile VPN with SSL configuration. You can use policies with other groups to restrict access to resources after the user connects. If you added groups from a third-party authentication server in your Mobile VPN with SSL configuration, and you want to use those group names in policies to restrict access, you must also add those groups to the Users and Groups list in the Firebox configuration.

See Also

Install and Connect the Mobile VPN with SSL Client

Uninstall the Mobile VPN with SSL Client

Video tutorial — Mobile VPN with SSL

Configure the VPN Portal Settings

SSL/TLS Settings Precedence and Inheritance

Give Us Feedback     Get Support     All Product Documentation     Technical Search