SMC certificate expiration on July 04, 2022, update your SMC !
Update is not possible? See the SMC not functionnal after the 4th of July 2022 article on the KB (authentication required).
Configuring a route-based mesh topology
Depending on which authentication type you choose to secure your topology, there may be operations you must perform before creating the topology.
- For further information on X509 certificate authentication, refer to the section Configuring a policy-based mesh topology.
- For further information on pre-shared key authentication, refer to the section Configuring a policy-based star topology.
Follow the steps below to create a route-based VPN topology:
- In Configuration > Topologies, click on Add a VPN topology at the top of the screen and select Mesh.
- In the window that opens, select Route-based VPN and click on Create the topology.
- Enter a name. A description is optional.
- Choose the authentication type in the next step.
- Select the encryption profile. The SMC server offers pre-configured profiles. Create your customized profiles in Configuration > Encryption profiles. Refer to the Stormshield Network User Configuration Manual for more information on encryption profile options.
- If you need to edit the default network pool for IPsec VTIs, expand the Advanced properties section. For more information on the VTI network pool field, refer to the section Editing the VTI network pool.
- Select your topology peers in the next step. You can only select connected or offline firewalls. To ensure optimal performance, you can select up to 50 peers by default. The environment variable FWADMIN_VPN_MESH_ROUTE_BASED_MAX_PEERS makes it possible to configure this limit. This limitation is valid only for mesh VPN topologies.
- In the next step, double-click on the line of a firewall to open the Peers and VTI window:
- For further information on the Contact address and Output interface parameters, refer to the sections Defining the contact IP address of firewalls for VPN topologies and Selecting the output interface of firewalls for VPN topologies.
- IPsec VTIs will automatically be generated after the topology is created. Host VTI objects that represent remote peers will also be automatically generated. They can be used in filter rules to set up routing. You will see them in your object database as "VTI_on_FW1_with_FW2_in_topologyname". These objects are automatically deployed on firewalls. For further information, refer to the section Defining the traffic routing policy.
- Click on Apply to close the window.
- Click on Apply again at the end of step 4/4 to generate the topology.
- SMC then suggests that you download the .csv file to configure IPsec interfaces. This file contains the information you need to create interfaces on every firewall in the topology. Refer to the section Defining IPsec VTIs on SNS firewalls for further information.
- Deploy the configuration on the firewalls in the topology. The VPN configuration belongs to the firewall's global policy.
Your topology is still not operational at this stage. Follow the instructions in Defining IPsec VTIs on SNS firewalls and Defining the traffic routing policy to complete the process of setting up a route-based VPN topology.