14.4. Sonicwall

Contributed by Dino Bijedic < dino.bijedic (at) eracom-tech (dot) com>

The following describes how to configure a site to site IPSec VPN tunnel between a Sonicwall (PRO 300) and m0n0wall.

Editor's note: I would suggest using Main mode rather than Aggressive.

Figure 14.1. Network diagram

Network diagram

14.4.1. Sonicwall Configuration

Log in to Sonicwall

Click VPN -> Configure

Add/Modify IPSec Security Association

In Configure, select Security Association -> Add New SA
Name: Name of connection  (Monowall test)
IPSec Gateway Name or Address: Type IP address of your m0n0wall (203.49.X.117)

Security Policy

Exchange: Aggressive Mode
Phase 1 DH Group: Group2
SA Life time (secs): 28800
Phase 1 Encryption/Authentication: 3DES & MD5
Phase 2 Encryption/Authentication: Strong Encryption and Authentication (ESP 3DES HMAC MD5)
Share Secret: type your share secret (novitest)

Destination Networks

Select "Specify destination network below".

The following screenshot shows what this screen will look like.

Click Add New Network

You will get: Edit VPN Destination Network (Note: This is Popup window – enable Popup in your browser)

    Network: type your destination network (192.168.200.0)
    Subnet mask: Type destination subnet mask (255.255.255.0)    

Click Update

Figure 14.2. Example of Sonicwall configuration

Example of Sonicwall configuration

14.4.2. m0n0wall Configuration

Configure m0n0wall IPsec Edit Tunnel screen as follows.

Interface: WAN
Local subnet: LAN subnet
Remote subnet: 192.168.2.0/24
Remote gateway: 61.95.x.99
Description: Sonicwall
Negotiation mode: Aggressive
My identifier: My IP address
Encryption algorithm: 3DES
Hash algorithm: MD5
DH key group: 2
Lifetime: 28800
Pre-shared key: novitest
Protocol: ESP
Encryption algorithms: 3DES
Hash algorithms: MD5
PFS key group: off
Lifetime: 28800

Click Save at the bottom of the page to complete the VPN configuration.