Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

Configuring Aggressive Mode Site to Site VPN when a Site has Dynamic WAN Public IP address

10/28/2021 2,299 People found this article helpful 132,700 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    Image

    Configuring a Site to Site VPN on the central location (Static WAN IP address)

    • Central location network configuration
    1. LAN Subnet: 192.168.168.0
    2. Subnet Mask: 255.255.255.0
    3. WAN IP: 66.249.72.115
    4. Local IKE ID SonicWall Identifier: Chicago (This could be any string except it has to match the remote location VPN's Peer IKE ID SonicWall Identifier)


    CAUTION: The IP Address can be dynamic but it should always be Public.
    Private IP Addresses on WAN cause a Double NAT Effect that is unpredictable due to the uncertainty of the ISP Setup of the NAT Layers - this is why in certain scenarios VPNs may not work correctly when a private IP is specified.

    Resolution

    Resolution for SonicOS 7.X

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.



    This solution explains the configuration of a Site to Site VPN on SonicWall appliances when a site has a dynamic WAN IP address.

    The VPN policy is setup using Aggressive Mode.

    Configuring a Site to Site VPN on the Central location

    Creating Address Object for remote Site

    • Login to the Central location SonicWall appliance.
    • Navigate to Objects | Match Objects | Addresses, Click on Add button, enter the following settings.

      • Name – Remote Vpn,
      • Zone – VPN,
      • Type – Network,
      • Network – 192.168.168.0
      • Netmask – 255.255.255.0
      • Click Save.
        Image

    Configuring a VPN Policy 

    • Navigate to Network|IPSec VPN|Rules and Settings
    • Click the Add button under the VPN Policies section. The VPN Policy window pops up.

    General Tab 

    •   Select the Authentication method as  IKE Using Preshared Secret.
    • Name Remote-Site VPN.
    •  IPSec Primary Gateway Name or Address: 0.0.0.0.
       NOTE: Since the WAN IP address changes frequently, it is recommended to use the 0.0.0.0 IP address as the Primary Gateway.
    • IPSec Secondary Gateway Name or Address: 0.0.0.0.
    • Shared Secret: SonicWall (The Shared Secret would be the same at both SonicWall’s. You can choose any Secret Key, but it should be entered the same on both sites).
    • Local IKE ID: SonicWall Identifier -Central_Site(This could be any string except it has to match the remote location VPN's Peer IKE ID SonicWall Identifier)..
    • Peer IKE ID: SonicWall Identifier - Remote_Site(This could be any string except it has to match the remote location VPN's Local IKE ID SonicWall Identifier).

      Image

     Network Tab 

    • Select Choose local network from list, and select the Address Object – X0 Subnet (LAN subnet).
    • Select Choose destination network the list, and select the Address Object – Remote Vpn.
      Image

    Proposals Tab

    • IKE (Phase 1) Proposal.
    • Exchange:  Aggressive Mode.
    • DH Group:  Group 2.
    • Encryption: AES-128.
    • Authentication: SHA1.
    • Life Time (seconds): 28800.
    • IPSec (Phase 2) Proposal.
    • Protocol:  ESP
    • Encryption: AES-128.
    • Authentication: SHA1.
    • Enable Perfect Forward Secrecy(not checked).
    • Life Time (seconds): 28800. 

      Image

    Advanced tab

    • Ensure that the VPN Policy bound to: Zone WAN.
    • Click Save.

      NOTE: KeepAlive option will be disabled when Vpn policy configured with Primary Gateway Name or Address as 0.0.0.0.
      Image

    Configuring a Site to Site VPN on the remote location (Dynamic WAN IP address)

    Network Configuration 

    •  LAN Subnet: 192.168.168.0
    • Subnet Mask: 255.255.255.0.
    • WAN IP: DHCP (As this is a Dynamic IP Address).
    • Local IKE ID SonicWall Identifier:Remote_Site(This has to match the central location VPN's Peer IKE ID SonicWall Identifier).

    Creating Address Object for remote site

    • Login to the Remote location SonicWall appliance.
    • Navigate to Objects | Match Objects | Addresses, Click on Add button, enter the following settings.

      • Name – Central Vpn,
      • Zone – VPN,
      • Type – Network,
      • Network – 192.168.0.0
      • Netmask – 255.255.255.0
      • Click Save.
        Image

    Configuration VPN Policy

    • Navigate to Network|IPSec VPN|Rules and Settings
    • Click the Add button under the VPN Policies section. The VPN Policy window pops up.

    General Tab 

    •   Select the Authentication method as  IKE Using Preshared Secret.
    • Name Central-Site VPN.
    •  IPSec Primary Gateway Name or Address: 66.249.72.115 (Gateway of the main site, which is static IP)
    • IPSec Secondary Gateway Name or Address: 0.0.0.0.
    • Shared Secret: SonicWall (The Shared Secret would be the same at both SonicWall’s. You can choose any Secret Key, but it should be entered the same on both sites).
    • Local IKE ID: SonicWall Identifier -Remote_Site(This could be any string except it has to match the remote location VPN's Peer IKE ID SonicWall Identifier)
    • Peer IKE ID: SonicWall Identifier - Central_Site(This could be any string except it has to match the remote location VPN's Local IKE ID SonicWall Identifier) 
      Image

     Network Tab 

    • Select Choose local network from list, and select the Address Object – X0 Subnet .
    • Select Choose destination network from list, and select the Address Object – Central Vpn.
      Image

    Proposals Tab

    • IKE (Phase 1) Proposal.
    • Exchange:  Aggressive Mode.
    • DH Group:  Group 2.
    • Encryption: AES-128 .
    • Authentication: SHA1.
    • Life Time (seconds): 28800  .
    • IPSec (Phase 2) Proposal.
    • Protocol:  ESP.
    • Encryption: AES-128.
    • Authentication: SHA1.
    • Enable Perfect Forward Secrecy (not checked) .
    • DH Group:  Group 2.
    • Life Time (seconds): 28800.
      Image


     Advanced Tab

    • Enable Keep Alive box should be checked.
    • VPN Policy bound to: Zone WAN.
    • Click Save.
      Image


    How to Test

    • From the remote location try to ping an IP address on the central location.

      NOTE: Before receiving successful replies, you might see couple of “Request Timed Out“ messages while the VPN tunnel is still establishing.





    Resolution for SonicOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.



    This solution explains the configuration of a Site to Site VPN on SonicWall appliances when a site has dynamic WAN IP address.

    The VPN policy is setup using Aggressive Mode.

    Configuring a Site to Site VPN on the Central location

    • Creating Address Object for remote Site
    1. Login to the central location SonicWall appliance.
    2. Navigate to Manage | Policies | Objects | AddressObjects  page.
    3. Click Add button, enter the following settings.

      • Name – newyork vpn,
      • Zone – VPN,
      • Type – Network,
      • Network – 10.10.10.0,
      • Netmask – 255.255.255.0

    4. Click OK.

      Image



    • Configuring a VPN Policy 
    1. Navigate to Manage | Connectivity | VPN | Base Settings.
    2. Check the box “Enable VPN” under Global VPN Settings.
    3. Click Add button under VPN Policies section. The VPN Policy window pops up.


    General Tab 

    •   Select the Authentication method as  IKE Using Preshared Secret.
    • Name: New York Aggressive Mode VPN.
    •  IPSec Primary Gateway Name or Address: 0.0.0.0.


      NOTE: Since the WAN IP address changes frequently, it is recommended to use the 0.0.0.0 IP address as the Primary Gateway.

    • IPSec Secondary Gateway Name or Address: 0.0.0.0.
    • Shared Secret: SonicWall (The Shared Secret would be the same at both SonicWall’s. You can choose any Secret Key, but it should be entered sam on both sites).
    • Local IKE ID: SonicWall Identifier - Chicago (This could be any string except it has to match the remote location VPN's Peer IKE ID SonicWall Identifier)..
    • Peer IKE ID: SonicWall Identifier - newyork (This could be any string except it has to match the remote location VPN's Local IKE ID SonicWall Identifier).

      Image

      

     
    Network Tab
     

    • Select Choose local network from list, and select the Address Object – X0 Subnet (LAN subnet).
    • Select Choose destination network from list, and select the Address Object – newyork vpn.

      Image

     


    Proposals
     Tab


    • IKE (Phase 1) Proposal.
    • Exchange:  Aggressive Mode.
    • DH Group:  Group 2.
    • Encryption: 3DES.
    • Authentication: SHA1.
    • Life Time (seconds): 28800 .
    • IPSec (Phase 2) Proposal.
    • Protocol:  ESP.
    • Encryption: 3DES.
    • Authentication: SHA1.
    • Enable Perfect Forward Secrecy(not checked).
    • Life Time (seconds): 28800. 

      Image



    Advanced
    tab


    • Ensure that the VPN Policy bound to: Zone WAN.
    • Click OK 

      Image



    Configuring a Site to Site VPN on the remote location (Dynamic WAN IP address)

    NOTE: The Dynamic WAN IP Address must be Public.


    Network Configuration 

    1.  LAN Subnet: 10.10.10.0.
    2. Subnet Mask: 255.255.255.0.
    3.  WAN IP: DHCP (As this is a Dynamic IP Address).
    4. Local IKE ID SonicWall Identifier: newyork (This has to match the central location VPN's Peer IKE ID SonicWall Identifier).


    • Creating Address Object for remote site
    1. Login to the Remote location SonicWall appliance.
    2. Navigate to Manage | Policies | Objects | AddressObjects page.
    3. Click Add button, enter the following settings.

      • Name – Chicago vpn.
      • Zone – VPN.
      • Type – Network.
      • Network – 192.168.168.0.
      • Netmask – 255.255.255.0.
    4. Click OK .
      Image



    • Configuration VPN Policy


    1. Navigate to Manage | Connectivity | VPN | Base Settings.
    2. Check the box  Enable VPN under Global VPN Settings.
    3.  Click  Add button under the VPN Policies section. The VPN Policy window pops up.


    General Tab

    •  Select the Authentication method as IKE Using Preshared Secret.
    •   Name: Chicago Aggressive Mode VPN.
    •  IPSec Primary Gateway Name or Address: 66.249.72.115 ( Gateway of the main site, which is static IP).
    • IPSec Secondary Gateway Name or Address: 0.0.0.0.
    • Shared Secret: SonicWall.
    •  Local IKE ID: SonicWall Identifier - newyork (This has to match the central location VPN's Peer IKE ID SonicWall Identifier).
    • Peer IKE ID: SonicWall Identifier – Chicago (This has to match the central location VPN's Local IKE ID SonicWall Identifier).
      Image

     

     Network Tab 

    • Select Choose local network from list, and select the Address Object – LAN Primary Subnet .
    • Select Choose destination network from list, and select the Address Object – Chicago vpn.
      Image



    Proposals
     Tab


    • IKE (Phase 1) Proposal.
    • Exchange:  Aggressive Mode.
    • DH Group:  Group 2.
    • Encryption: 3DES .
    • Authentication: SHA1.
    • Life Time (seconds): 28800  .
    • IPSec (Phase 2) Proposal.
    • Protocol:  ESP.
    • Encryption: 3DES .
    • Authentication: SHA1.
    • Enable Perfect Forward Secrecy (not checked) .
    • DH Group:  Group 2.
    • Life Time (seconds): 28800.
      Image


     Advanced Tab


    • Enable Keep Alive box should be checked.
    • VPN Policy bound to: Zone WAN.
    • Click OK .
      Image



    How to Test

    • From the remote location try to ping an IP address on the central location.

      NOTE:Before receiving successful replies, you might see couple of “Request Timed Out“ messages while the VPN tunnel is still establishing.

    Related Articles

    • ‘Error sending one-time password’ encountered when connecting to NetExtender
    • Supported SonicWall and 3rd party SFP and SFP+ modules that can be used with SonicWall NSsp series
    • Supported SonicWall and 3rd party SFP and SFP+ modules that can be used with SonicWall NSA series

    Categories

    • Firewalls > NSa Series > VPN
    • Firewalls > NSv Series > VPN
    • Firewalls > TZ Series > VPN

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2022 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
      Scroll to top
      Trace:bc25ceab620983726ed9b9f9e3bc8474-80