Browsec is VPN extension similar to ZenMate
CheckPoint:
Cisco ASA:
Cyberoam:
Fortigate:
Mikrotik:
add action=drop chain=forward layer7-protocol=browsec src-address-list=LAN
PaloAlto:
SonicWall:
Browsec is VPN extension similar to ZenMate
CheckPoint:
Cisco ASA:
Cyberoam:
Fortigate:
Mikrotik:
add action=drop chain=forward layer7-protocol=browsec src-address-list=LAN
PaloAlto:
SonicWall:
Cisco ASA:
end
Juniper:
PaloAlto:
SonicWall:
Cisco ASA:
(config)# access-list acl-inside extended deny ip any object-group zenmate
Cyberoam:
FortiGate:
Juniper:
add action=drop chain=forward disabled=yes layer7-protocol=zenmate src-address-list=LAN
PaloAlto:
SonicWall:
CheckPoint:
Cisco:
FortiGate:
Juniper:
Mikrotik:
/ip firewall layer7-protocol
add name=youtube regexp=”^.+(c.youtube.com|googlevideo.com).*\$”
/ip firewall address-list
add address=12.12.12.0/24 list=LAN
/ip firewall filter
add action=drop chain=forward layer7-protocol=youtube src-address-list=LAN
PaloAlto:
SonicWall:
NOTE: This for evaluation purposes only and can use VMware Workstation 11 or ESXi 5 above
Download flex_ISE_1.x.x.rar from Internet
extract and copy flex content into FAT32 pen drive
insert pen drive into your pc
-download Cisco ISE and Centos LiveCD
-install Cisco ISE
-set vm boot options to 7000
-add CD/DVD drive and USB Controller into ISE vm
-power on ISE vm
-configure ISE
-reboot
-connect pen drive to ISE vm
-connect to Centos LiveCD
-press Esc within 7s or Ctrl-All-Insert to reboot and try press Esc again
-click Troubleshooting
-click Rescue a CentOS system
click Continue to begin Installation
click OK 2x
# cd /mnt/sysimage
# mkdir usb
# mount /dev/sdb1 usb
# cp usb/flexlm-10.9.jar ./opt/CSCOcpm/upgrade/javalib/flexlm-10.9.jar
# cp usb/flexlm-10.9.jar ./opt/CSCOcpm/appsrv/apache-tomcat-ca-7.0.42/webapps/caservice-webapp/WEB-INF/lib/flexlm-10.9.jar
# cp usb/flexlm-10.9.jar ./opt/CSCOcpm/appsrv/apache-tomcat-ca-7.0.42/webapps/ocsp-responder-webapp/WEB-INF/lib/flexlm-10.9.jar
# cp usb/flexlm-10.9.jar ./opt/CSCOcpm/appsrv/apache-tomcat-7.0.42/lib/flexlm-10.9.jar
# reboot
disconnect Centos LiveCD and pen drive
login: setup
Enter hostname[]: ise
Enter IP address[]: 10.0.20.79
Enter IP netmask[]: 255.255.255.0
Enter IP default gateway[]: 10.0.20.1
Enter default DNS domain[]: poc.com
Enter primary nameserver[]: 10.0.20.2
Add secondary nameserver? Y/N [N}:
Enter NTP server[time.nist.gov]:10.0.20.2
Add another NTP server? Y/N [N}:
Enter system timezone[UTC]: Jakarta
Enable SSH service? Y/N [N]: y
Enter username[admin]:
Enter password:
Enter password again:
Here will take about 15min to get https active
open FireFox and go to https://10.0.20.79
click Administration/Licensing
scroll to the bottom and copy Serial Number (SN)
open Basic and Advance license file in your pen drive with NotePad++
replace all 4L4CAAMFHJ6 with your Serial Number above and save
back to Administration/Licensing, click Import License and import both Basic and Advance license
delete existing Evaluation license
1. Create 2 users, User1 and User2
go to User & Device/User/User Definition
2. Create 1 group named vpn and add User1 and User2 into vpn group
go to User & Device/User/User Groups
3. Create a Policy to allow LAN address to WAN1 address
go to Policy & Objects/Policy/IPv4
4. Create VPN Wizard for Windows, Mac or Android
go to VPN/IPSec/Wizard
9. IOS Native Client Setup
-open Settings/VPN/
click Add VPN Configuration
click IPSec
Server: 10.0.10.54
Account: user1
Password: password
Secret: password
SOURCE: http://blog.webernetz.net/2015/02/02/ipsec-site-to-site-vpn-fortigate-cisco-router/
ROUTER1
# sh run
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname RTR2811a
boot-start-marker
boot system flash:c2800nm-adventerprisek9-mz.151-4.M10.bin
warm-reboot count 10 uptime 7
boot-end-marker
aaa new-model
aaa session-id common
dot11 syslog
ip source-route
ip cef
ip dhcp excluded-address 10.0.31.201 10.0.31.254
ip dhcp excluded-address 10.0.31.1 10.0.31.100
ip dhcp pool pool10.0.31.0
network 10.0.31.0 255.255.255.0
default-router 10.0.31.1
dns-server 8.8.8.8 8.8.4.4
no ip domain lookup
ip domain name nbctcp.com
ip name-server 8.8.8.8
ip name-server 8.8.4.4
no ipv6 cef
multilink bundle-name authenticated
redundancy
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 28800
crypto isakmp key P@ssw0rd address 0.0.0.0 0.0.0.0
crypto ipsec transform-set TS esp-3des esp-md5-hmac
crypto ipsec profile 3DESMD5
set transform-set TS
set pfs group2
!
interface Tunnel1
ip unnumbered FastEthernet0/0.206
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.207
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel2
ip unnumbered FastEthernet0/0.221
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.221
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel3
ip unnumbered FastEthernet0/0.224
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.224
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel4
ip unnumbered FastEthernet0/0.226
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.226
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel5
ip unnumbered FastEthernet0/0.228
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.228
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel6
ip unnumbered FastEthernet0/0.230
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.230
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel7
ip unnumbered FastEthernet0/0.232
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.232
tunnel protection ipsec profile 3DESMD5
!
interface FastEthernet0/0
ip address 10.0.10.206 255.255.255.0
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 10.0.31.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip nat inside source list 101 interface FastEthernet0/0 overload
ip route 0.0.0.0 0.0.0.0 10.0.10.1
ip route 10.0.41.0 255.255.255.0 Tunnel1
ip route 10.0.42.0 255.255.255.0 Tunnel2
ip route 10.0.43.0 255.255.255.0 Tunnel3
ip route 10.0.44.0 255.255.255.0 Tunnel4
ip route 10.0.45.0 255.255.255.0 Tunnel5
ip route 10.0.46.0 255.255.255.0 Tunnel6
ip route 10.0.47.0 255.255.255.0 Tunnel7
access-list 101 permit ip 10.0.31.0 0.0.0.255 any
!
control-plane
mgcp fax t38 ecm
mgcp profile default
line con 0
line aux 0
line vty 0 4
transport input all
line vty 5 15
transport input ssh
scheduler allocate 20000 1000
end
– refresh routing table if needed
# clear ip route *
You can try ping from PC1 to PC2 now
SONICWALL2
-create address objects
SOURCE: http://blog.webernetz.net/2015/02/02/ipsec-site-to-site-vpn-fortigate-cisco-router/
ROUTER1
# sh run
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
hostname RTR2811a
boot-start-marker
boot system flash:c2800nm-adventerprisek9-mz.151-4.M10.bin
warm-reboot count 10 uptime 7
boot-end-marker
aaa new-model
aaa session-id common
dot11 syslog
ip source-route
ip cef
ip dhcp excluded-address 10.0.31.201 10.0.31.254
ip dhcp excluded-address 10.0.31.1 10.0.31.100
ip dhcp pool pool10.0.31.0
network 10.0.31.0 255.255.255.0
default-router 10.0.31.1
dns-server 8.8.8.8 8.8.4.4
no ip domain lookup
ip domain name nbctcp.com
ip name-server 8.8.8.8
ip name-server 8.8.4.4
no ipv6 cef
multilink bundle-name authenticated
redundancy
!
crypto isakmp policy 1
encr 3des
hash md5
authentication pre-share
group 2
lifetime 28800
crypto isakmp key P@ssw0rd address 0.0.0.0 0.0.0.0
crypto ipsec transform-set TS esp-3des esp-md5-hmac
crypto ipsec profile 3DESMD5
set transform-set TS
set pfs group2
!
interface Tunnel1
ip unnumbered FastEthernet0/0.206
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.207
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel2
ip unnumbered FastEthernet0/0.221
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.221
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel3
ip unnumbered FastEthernet0/0.224
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.224
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel4
ip unnumbered FastEthernet0/0.226
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.226
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel5
ip unnumbered FastEthernet0/0.228
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.228
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel6
ip unnumbered FastEthernet0/0.230
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.230
tunnel protection ipsec profile 3DESMD5
!
interface Tunnel7
ip unnumbered FastEthernet0/0.232
tunnel source 10.0.10.206
tunnel mode ipsec ipv4
tunnel destination 10.0.10.232
tunnel protection ipsec profile 3DESMD5
!
interface FastEthernet0/0
ip address 10.0.10.206 255.255.255.0
ip nat outside
ip virtual-reassembly in
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 10.0.31.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
duplex auto
speed auto
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip nat inside source list 101 interface FastEthernet0/0 overload
ip route 0.0.0.0 0.0.0.0 10.0.10.1
ip route 10.0.41.0 255.255.255.0 Tunnel1
ip route 10.0.42.0 255.255.255.0 Tunnel2
ip route 10.0.43.0 255.255.255.0 Tunnel3
ip route 10.0.44.0 255.255.255.0 Tunnel4
ip route 10.0.45.0 255.255.255.0 Tunnel5
ip route 10.0.46.0 255.255.255.0 Tunnel6
ip route 10.0.47.0 255.255.255.0 Tunnel7
access-list 101 permit ip 10.0.31.0 0.0.0.255 any
!
control-plane
mgcp fax t38 ecm
mgcp profile default
line con 0
line aux 0
line vty 0 4
transport input all
line vty 5 15
transport input ssh
scheduler allocate 20000 1000
end
CYBEROAM2:
-create necessary objects
Troubleshoot
Cisco:
# sh crypto isakmp sa
# sh crypto ipsec sa
# debug crypto isakmp
# debug crypto ipsec
Cyberoam:
console> tcpdump ‘host 10.0.31.101 and host 10.0.43.101
You can try ping from PC1 to PC2 now
SOURCE: http://blog.webernetz.net/2015/02/02/ipsec-site-to-site-vpn-fortigate-cisco-router/
You can try ping from PC1 to PC2 now