IMPORTANT
SNS 3.x versions have reached End of Maintenance since July 1st, 2024.
We recommend that you update your SNS firewalls to a version with maintenance to guarantee the protection of your infrastructure.
Site to site (Gateway-Gateway)
This tab will allow a VPN tunnel to be created between two network devices that support IPsec. This procedure is also called: Gateway to Gateway VPN tunnel.
Several tutorials show you step by step how to configure a secure connection between your sites. Click on one of the links to access a tutorial:
- IPsec VPN: Authentication by pre-shared key,
- IPsec VPN: Authentication by certificate,
- IPsec VPN: Hub and spoke configuration.
The Add button will be covered in the following section.
Search | Searches will be performed on the name of the object and its various properties, unless you have specified in the preferences of the application that you would like to restrict this search to object names only. |
Delete | Select the IPsec VPN tunnel to be removed from the table and click on this button. |
Move up | Places the selected line before the line just above it. |
Move down | Places the selected line after the line just below it. |
Cut | Cuts the selected line to paste it. |
Copy | Copies the selected line to duplicate it. |
Paste | Duplicates the selected line after it is copied. |
Add
In order to configure the tunnel, select the VPN policy in which you wish to set it up. The IPsec VPN policy wizard will guide you through the configuration.
Site-to-site tunnel
Here, you will define each of the endpoints for your tunnel as well as for your peer.
Peer selection | This is the object that corresponds to the public IP address of the tunnel endpoint, or of the remote VPN peer. By default the drop-down list shows “None”. You can create peers in the following option or select an existing peer from the list. |
Create an IKEv1 peer | Define the parameters for your peer. Several steps are necessary:![]() Remote gateway: select the object corresponding to the IP address of the tunnel endpoint from the drop-down list. You can also add gateways using the button ![]() Name: you can specify a name for your gateway or keep the peer’s original name, which will be prefixed with “Site_” (“Site_<name of object>“). Selecting None as a peer allows generating policies without encryption. The aim is to create an exception to the following rules of the encryption policy. Traffic matching this rule will be managed by the routing policy. Click on Next. ![]() 2 choices are possible, identification via Certificate or by Pre-shared key (PSK). Select the desired option.
You can Enter the key in ASCII characters (every character in ASCII text is stored in a byte whose 8th is 0) by selecting the relevant option. Unselect the option to view the key in hexadecimal characters (which is based on 16 digits: the letters A to F and numbers 0 to 9). NOTE Click on Next. ![]() The screen will show you a window summarizing the configuration that was made, the Parameters of the remote site and the Pre-shared key. You can also add a backup peer by clicking on the link provided. You will need to define a remote gateway.
Click on Finish. |
Create an IKEv2 peer | The steps are the same as the ones in creating an IKEv1 peer. |
Local network | Host, host group, network or network group that will be accessible via the IPsec VPN tunnel. |
Remote network | Host, host group, network or network group accessible through the IPsec tunnel with the peer. |
Star configuration
This procedure consists of directing several VPN tunnels to a single point. It allows, for example, linking agencies to a central site.
Local network | Select the host, host group, network or network group that will be accessible via the IPsec VPN tunnel, from the drop-down list of objects. |
Remote sites | Define the parameters for your remote sites: select your peer from the list of those already created or click on the icon![]() You can Add or Delete peers by clicking on the relevant buttons. |
Treat IPsec interfaces as internal interfaces (applies to all tunnels) | If this option is selected, IPsec interfaces will become internal - and therefore protected - interfaces. All networks that are able to go through IPsec tunnels must therefore be legitimized and static routes allowing them to be contacted must be specified. Otherwise, the firewall will reject the IPsec traffic. IMPORTANT |
Create policies without encryption (none) for internal networks | This option allows automatically generating policies without encryption (none) dedicated to internal networks (Network_internals to Network_internals). If the policy already exists, a warning message will appear indicating that these policies have already been created. |
Click on Finish.
Separator – rule grouping
This option allows inserting a separator above the selected line. This allows the administrator to create a hierarchy for his tunnels according to his needs.
The table
Line | This column indicates the number of the line processed in order of appearance on the screen. |
Status | This column shows the status ![]() ![]() |
![]() |
To ease the configuration of the tunnel with a remote device (gateway or mobile client), click on this icon to view information on the IPsec policy:
This information can be selected, and can therefore be copied. |
Local network | Select the host, host group, network or network group that will be accessible via the IPsec VPN tunnel, from the drop-down list of objects. |
Peer | Configuration of the peer, which can be viewed in the tab of the same name in the IPsec VPN module. |
Remote network | Select from the drop-down list of objects, the host, host group, network or network group accessible through the IPsec tunnel with the peer. |
Encryption profile | This option allows selecting the protection model associated with your VPN policy, from 3 preconfigured profiles: StrongEncryption, GoodEncryption and Mobile. Other profiles can be created or modified in the tab Encryption profiles. |
Comments | Description given of the VPN policy. |
The additional Keepalive option makes it possible to artificially maintain mounted tunnels. This mechanism sends packets that initialize the tunnel and force it to be maintained. This option is disabled by default to avoid wasting resources, especially in the case of a configuration containing many tunnels set up at the same time without any real need for them.
This option is only valid for site-to-site tunnels. It can be enabled by selecting the value Keepalive in the Columns menu, which appears when you move the mouse over the header of the columns in the table.
Keep alive | To enable this option, assign a value other than 0, corresponding to the interval in seconds, between each UDP packet sent. |
Checking the policy in real time
The window for editing IPsec policy rules has a “Check policy” field (located below the table), which warns the administrator whenever there are inconsistencies or errors in the rules created.