Computers & Internet Logo

Related Topics:

Anonymous Posted on Jul 01, 2017

Fire box VPN gateway issue

We have three  location  Miami.Nassau, Abaco,

we have a vpn setup between 3 points , we can talk on our voip system between miami and nasau fine but we have no voice path from abaco to miami and maimi to abaco, the system we are using is  nortel BCM,

which uses the following UDP ports , 28000-29000.7000, 5100.

 

we can be reached at 9547187890 

Andrew

4 Related Answers

Anonymous

  • 114 Answers
  • Posted on Sep 01, 2006

SOURCE: Setting up a VPN through watchguard

The key with any VPN solution is to make sure that the configurations on both ends match. I am not very familiar with this particular product, but it looks like you need to have the proper VPN licenses installed first. There are two types of VPN you can do. 1) Site to Site - This is where the are two static boxes that you want to create an encrypted tunnel between 2) Remote User access - This is where mobile users connect to a central site over an encrypted tunnel from their home or on the road. Next, take a looks at the User Guide PDF here: https://www.watchguard.com/help/documentation/soho6.asp Chapter 10 tells how to configure the VPN on the Firebox side. You would just duplicate your settings if your doing option #1. Chapter 11 tells how to configure the VPN on the client side. This section would tell you how to configure the client software for option #2. Hope this helps.

Ad
bob95008

Lindsey & Associates

  • 50 Answers
  • Posted on Jan 25, 2008

SOURCE: Watchguard site to remote offices

What have you done to date, what is the Config on both sides.
Let me know
Aloha
Bob

Anonymous

  • 42 Answers
  • Posted on May 09, 2008

SOURCE: Site to site VPN between Checkpoint UTM 1 R62 and Cisco pix /Netscreen

I couple of points:

PIX has a few dislikes...

1. Pix does not like class A address, make sure you are using B or C.
2. The VPN subnet always has to be differant to the LAN.
3. Has to have a working DNS server.
4. Add static route, and last resort to main ethernet port that has the DNS & R62. (or 2 if on differant sub)

Hope this helps.

Anonymous

  • 52 Answers
  • Posted on Nov 05, 2008

SOURCE: vpn client

You can download the MU VPN client at www.watchguard.com/support

For instructions on how to install and set it up, this document should be helpful http://www.watchguard.com/help/docs/v50SOHOMUVPNGuide.pdf

Goodluck!

Ad

Add Your Answer

×

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

0helpful
3answers

Having issues with logging into the cisco softphone from home via vpn

Make sure that the subnet for the call manager is available over your VPN if you have locked the tunnel down. Also make sure that the IPC is allowed to bind to the VPN virtual network card.

Hope that helped!
tip

How to setup VPN on a D-link Router.


Ok to Setup you VPN follow the instructions below. You can configure DI-804HV, DI-808HV, and DI-824VUP+ by web management interface. Type 192.168.0.1 (The LAN IP is 192.168.0.1 by default) in the browser, and then input user name: admin (there is no password by default) to pass authentication of web management interface. Then finish the configurations as showed below on Gateway A and Gateway B. Configurations of Gateway A 􀂾 Model: DI-804HV (DI-808HV, or DI-824VUP+) 􀂾 Firmware version: v1.40 (You can download the latest firmware on D-Link’s website.) 􀂾 WAN IP Address: 14.15.16.17 (Static IP) 􀂾 LAN IP Address: 10.5.6.1 (Subnet Mask: 255.255.255.0) 􀂾 VPN Configurations: 􀂄 Enable VPN function on Gateway A. 􀂄 Tunnel Name: toGatewayB 􀂄 VPN Method: IKE (Main mode) 􀂄 Local Subnet: 10.5.6.0 􀂄 Local Netmask: 255.255.255.0 􀂄 Remote Subnet: 172.23.9.0 􀂄 Remote Netmask: 255.255.255.0 􀂄 Remote Gateway: 22.23.24.25 􀂄 Pre-share Key: hr5xb8416aa9r6 􀂄 IKE Proposal (Please remember to add the correct proposal ID into the list of IKE Proposal Index when you finish inputting the following information.) 􀀹 Proposal Name: toGatewayB 􀀹 DH Group: Group 2 􀀹 Encryption Algorithm: 3DES 􀀹 Authentication Algorithm: SHA1 􀀹 Life Time: 28800 􀀹 Life Time Unit: Second 􀂄 IPSec Proposal (Please remember to add the correct proposal ID into the list of IKE Proposal Index when you finish inputting the following information.) 􀀹 Proposal Name: toGatewayB 􀀹 DH Group: Group 2 􀀹 Encapsulation Protocol: ESP 􀀹 Encryption Algorithm: 3DES 􀀹 Authentication Algorithm: SHA1 􀀹 Life Time: 3600 􀀹 Life Time Unit: Second 4. Verify the VPN connection Before you start to establish VPN connection between Gateway A and Gateway B, please make sure the Internet connection between Gateway A and Gateway B is workable. You can use “Ping Test” tool on Gateway A (or Gateway B), and input the IP address of Gateway B (or Gateway A) to see if there is any response from its peer device. Connect a PC (called PC_A) to the LAN port of Gateway A, and connect another PC (called PC_B) to the LAN port of Gateway B. Start to “Ping” PC_B on PC_A, then Gateway A will start to establish IPSec connection with Gateway B. If you can get “Ping” responses from PC_B on PC_A, then it means the tunnel has been established successfully. You can also check the “VPN Status” page with web management interface to verify the status of VPN connections. Figure 1: VPN status of Gateway A after IPSec connection has been established. Figure 2: VPN status of Gateway B after IPSec connection has been established.
Hope this helps
Here it is in PDF.http://www.vpnc.org/InteropProfiles/D-Link-DI.pdf






on Feb 11, 2010 • Computers & Internet
0helpful
3answers

Every time i go to oovoo it keep getting this error Error 101 (net::ERR_CONNECTION_RESET): Unknown error.

DON'T USE GOOGLE CHROME ITS FULL OF TROJANS!!! WINDOWS DEFENDER ON MY MACHINE DETECTED IT!!!! TRY FIREFOX!!!! HOPE HELPS :D
1helpful
1answer

I use sonic wall VPN to work form home. I use a lan BUT I also have a Belkin Wirelss N. When I plug into the wireless I cannot log into the VPN BUT everyone can use their laptops. Is there a way to work...

Is this Belkin Wireless N a Gateway / Router or is it a Wireless Access Point WAP¿ If it is a Gateway it is most likely not getting the inbound packets from the VPN since you are most likely using the same octets in the Sonic Wall VPN as well in the Gateway. I would recommend finding a WAP to link the wired world (the LAN and your VPN) and the wireless world everyone else you want to have access to your wireless signal. At this point I would recommend that you ensure your security is adequate since at this time the Wireless world has access to your VPN.
0helpful
1answer

Vpn site to site

you need to create an IPSec tunnel between the router and windows server 2003 (run secpol.msc). From the dlink router, you need to set the IP address of the VoIP gateway as part of the LAN that is included on the VPN tunnel. Since it is the server 2003 that has a static IP, you need to initiate the connection from the Dlink router.
0helpful
1answer

VPN tunnel between two DLINK VPN DIR-130

- Logon to the configuration page of your D-Link.
- Go to Advanced tab
- And Click on Firewall Settings on the left side
- Under that look for Application Gateway Level at the bottom and you must uncheck at the box on it and click on save settings at the top.

7helpful
4answers

I bought an unlocked G1, Im in the UAE, how can I set up my phone it is not connecting to the 3G network of etisalat

Here is how to set G1 3G and MMS for UAE Etisalat separately (u can enjoy mms or 3G alone by deactivating settings for either one). First you need to setup 1 access point for each service, sttings is as follows:
-----------------3G----------------
Name: Etisalat3G (could chos any name)
APN: Etisalat.ae
-
-
-
-
-
-
-
-
MCC: 424
MNC: 02
APN type: default
--------------------------MMS----------------------
Name: EtisalatMMS (chose any name)
APN: mms
Proxy: 010.012.000.030
Port: 8080
Username: mms
Password: mms
-
MMSC: http://mms/servlets/mms
MMS proxy: 010.012.000.030
MMS Port: 8080
MCC: 424
MNC: 02
APN type: mms

--------------------
Enjoy the ultimate G1 services!!!

0helpful
1answer

VPN

This example will demonstrate how to create a Virtual private Network (VPN) between two remote locations through the Internet. The VPN policy will use 3DES IPSec to securely send/receive encrypted data over the Internet. When the VPN tunnel is enabled, the two offices will virtually appear to be on the same local network. This example will consist of two DI-804V VPN Routers with a simple setup. The two remote offices in this example will be known as Office A and Office B. Both VPN Routers must already be set up and able to access each other. This is only an example, your setup will vary using the WAN IP address provided by your ISP. Please note the differences in the IP addresses for each office. We will begin by configuring the DI-804V at Office A. Start by going into VPN Settings under the Basic Setup menu. Step 1. In the Connection Name field, type in OfficeA. Click ADD. Step 2. A properties screen will appear for the new connection you have made. Fill in the appropriate information for Office A: Connection Name: OfficeA Local IPSEC Identifier: Local Remote IPSEC Identifier: Remote Remote IP Network: 192.168.1.0 Remote IP Netmask: 255.255.255.0 Remote Gateway IP: 192.170.0.2 Network Interface: WAN ETHERNET Secure Association: IKE Perfect Forward Secure: Enabled PreShared Key: 123456 Key Life: 28800 IKE Life Time: 3600 Step 3 Click SAVE. There should now be a VPN policy created for Office A. Now you will want to Save & Restart the DI-804V. Note: 123456 is an example of a preshared key, please fill in any secret preshared key you desire. Keep in mind that both sites require the same preshared key. Office A setup is now complete, we will now configure Office B with the other DI-804V, Follow the same steps previously with Ofice A to create a VPN policy. Step 1 Please change the appropriate information. Connection Name: OfficeB Local IPSEC Identifier: Local Remote IPSEC Identifier: Remote Remote IP Network: 192.168.0.0 Remote IP Netmask: 255.255.255.0 Remote Gateway IP: 192.170.0.1 Network Interface: WAN ETHERNET Secure Association: IKE Perfect Forward Secure: Enabled PreShared Key: 123456 Key Life: 28800 IKE Life Time: 3600 Step 2 Click SAVE. There should now be a VPN policy created for Office B. Now you will want to Save & Restart the DI-804V. After the VPN policies have been created for the two Offices, the two remote locations should authenticate and connect. To view the status of the VPN connection, go to the Device Status menu. On the bottom-left side of the menu, click on the VPN Status icon. A VPN Status pop-up screen will appear showing VPN connection status. If a VPN tunnel is active, the State should indicate Q-Estab. Go to a DOS prompt and ping the internal IP address of the remote network.
Not finding what you are looking for?

242 views

Ask a Question

Usually answered in minutes!

Top WatchGuard Technologies Computers & Internet Experts

Grand Canyon Tech
Grand Canyon Tech

Level 3 Expert

3867 Answers

Brad Brown

Level 3 Expert

19187 Answers

Cindy Wells

Level 3 Expert

6688 Answers

Are you a WatchGuard Technologies Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...