SSLVPN

All mbox gateways (HSG/CMG/HSA) support SSLVPN. Our SSLVPN is based on OpenVPN technology, which utilizes Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL) cryptographic protocols. It uses X.509 certificates and hence asymmetric cryptography to authenticate the counterparty with whom they are communicating, and to exchange a symmetric session key. This session key is then used to encrypt data flowing between the parties. This allows for data/message confidentiality, and message authentication codes for message integrity and as a by-product, message authentication. 

mbox SSL VPN has following key characteristics:

A few things to NOTE:

SSLVPN Server configuration example

In this example, we have 

CONFIGURATION STEPS

1. Prepare and configure mbox as an SSLVPN Gateway

!firewall-input 10 permit all tcp dport 443 remark "permit SSLVPN access"!security sslvpn-server 1 server address sgvpn.ransnet.com server net 10.1.2.0 255.255.255.0 tunnel-pool 10.2.2.0 255.255.255.0 client testprofilenet 10.1.1.0 255.255.255.0 start!mbox# show running-config begin sslvpn-serversecurity sslvpn-server server address sgvpn.ransnet.com server net 10.1.2.0 255.255.255.0 tunnel-pool 10.2.2.0 255.255.255.0 client testprofile  net 1.1.1.0 255.255.255.0mbox#

2. Export client profile (to be imported to client mbox).

!show the list of created client profilesmbox# show security sslvpn-server client list testprofilembox# !show the selected profile, copy out to a textpad to import into client machine!Copy below output to a text file and past to client config (next section).Make sure you copy the output start from ######BEGIN PROFILE###### to ######END PROFILE######mbox# show security sslvpn-server client testprofile######BEGIN PROFILE######setenv FORWARD_COMPATIBLE 1client......######END PROFILE######

SSLVPN Client configuration example

Prepare vpn client profile information (from step #2 in earlier section) and continue below steps on remote client.

(mbox)# configure(config)# security sslvpn-client 1(config-sslvpn)# vpnclient profile  ← this imports client vpn profile(config-sslvpn)# start(config-sslvpn)# exit(config)# exit

Troubleshooting techniques

Verify on the HQ/SSLVPN server mbox

mbox# show security sslvpn-server status SSLVPN server is running... mbox# 

A new tunnel interface should be created on server

mbox# show ip interface brief Interface   IP_Address       NetMask          Broadcast        MAC_Address     --------------------------------------------------------------------------------eth0        10.65.19.14      255.255.255.0    10.65.19.255     00:0C:29:7B:6D:66lo          127.0.0.1        255.0.0.0        0.0.0.0          00:00:00:00:00:00tun0        10.2.2.1         255.255.255.255  0.0.0.0          00:00:00:00:00:00   <---server tunnel interface.!check connected clientssgvpn.ransnet.com# show security sslvpn-server connectedName            RealAdd                 VPNAddress      Route           RX(B)   TX(B)   ConnectedSince----------------------------------------------------------------------------------------------------------------------ydev            10.65.19.8:32591        10.2.2.14       10.1.3.0/24;    566864  595209  Sat Aug  1 13:12:41 2015testprofile     210.193.28.179:63895    10.2.2.10       10.1.1.0/24;    573685  603755  Sat Aug  1 12:43:54 2015

check server routing table. All remote client networks should appear in server route

mbox# show ip route Codes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF, I - IS-IS, B - BGP, A - Babel, > - selected route, * - FIB route S>* 0.0.0.0/0 [1/0] via 10.65.19.78, eth0 K * 10.1.1.0/24 via 10.2.2.10, tun0 <---client network appears in server routing table. K * 10.2.2.0/24 via 10.2.2.10, tun0 C>* 10.2.2.2/32 is directly connected, tun0 C>* 10.65.19.0/24 is directly connected, eth0 C>* 127.0.0.0/8 is directly connected, lo

Verify on the remote/SSLVPN client mbox

mbox# show ip interface brief                                                                                                                                              Interface   IP_Address       NetMask          Broadcast        MAC_Address                                                            --------------------------------------------------------------------------                                                               eth0        NON-IP           NON-IP           NON-IP           00:E0:6F:12:80:FE                                                                eth1        210.193.28.179   255.255.255.240  210.193.28.191   00:E0:6F:12:80:FF                                                                 lo          127.0.0.1        255.0.0.0        0.0.0.0          00:00:00:00:00:00                                                                 tun0        10.2.2.10        255.255.255.255  0.0.0.0          00:00:00:00:00:00     <---client tunnel interface.
# show ip routeCodes: K - kernel route, C - connected, S - static, R - RIP, O - OSPF,      I - ISIS, B - BGP, > - selected route, * - FIB route......S>* 0.0.0.0/0 [1/0] via 210.193.28.177, eth1 C>* 10.1.1.0/24 is directly connected, vlan10 K>* 10.1.2.0/24 via 10.2.2.9, tun0   <---server network appears in client routing table.K>* 10.2.2.1/32 via 10.2.2.9, tun0 C>* 10.2.2.10/32 is directly connected, tun0 C>* 127.0.0.0/8 is directly connected, lo C>* 210.193.28.176/28 is directly connected, eth1