{"id":211,"date":"2011-11-22T23:43:15","date_gmt":"2011-11-22T23:43:15","guid":{"rendered":"http:\/\/microsoftgeek.com\/?p=211"},"modified":"2018-09-06T22:59:03","modified_gmt":"2018-09-06T22:59:03","slug":"how-to-getting-vpn-to-work-through-nat-firewalls","status":"publish","type":"post","link":"https:\/\/microsoftgeek.com\/?p=211","title":{"rendered":"How To: Getting VPN to work through NAT firewalls"},"content":{"rendered":"<p>With the rising popularity of telecommuting and the increasing need to protect their electronic assets,  companies large and small have been turning to Virtual Private  Networking (VPN). The good news is that many savvy IT departments  realize that many of their telecommuting employees share their broadband  connections with consumer-grade routers. Those folks have made their  lives easier by using &#8220;NAT friendly&#8221; VPN gateways and VPN clients that  don&#8217;t require any changes to home users&#8217; router settings in order to  successfully set up a VPN tunnel.<\/p>\n<h3>Just Passing Through<\/h3>\n<p>If you&#8217;re not so lucky, however, you still may be able to get the job  done. First thing to check is whether your router has any settings for <strong>PPTP or IPsec &#8220;pass through&#8221;<\/strong>. These are commonly found in <strong>Linksys<\/strong> routers but you may have to hunt around for them. <strong>Figure 1<\/strong> shows a shot of the bottom of Linksys&#8217; BEFSR41 <strong>Filters<\/strong> screen, which contains separate enables for PPTP and IPsec pass through.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.smallnetbuilder.com\/images_old\/myimages\/howto\/linksys_passthough.jpg\" border=\"0\" alt=\"Linksys BEFSR41 VPN Pass through enables\" width=\"450\" height=\"401\" \/><\/p>\n<h6><strong>Figure 1: Linksys BEFSR41 VPN Pass through enables<\/strong><\/h6>\n<p>All you need to do is enable the setting for the VPN protocol that  you&#8217;re using, reboot your router and, if you&#8217;re lucky, the VPN  connection will come right up.<\/p>\n<blockquote><p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.smallnetbuilder.com\/images_old\/myimages\/attentionsml.gif\" border=\"0\" alt=\"NOTE\" width=\"30\" height=\"30\" \/><strong>Note:<\/strong> Not all routers have these enables and the lack of them doesn&#8217;t necessarily mean that you can&#8217;t get VPN working.<\/p><\/blockquote>\n<h3>Open up that Firewall<\/h3>\n<div><ins><ins id=\"aswift_0_anchor\"><\/ins><\/ins><\/div>\n<p>Still  no connection? The next step is to try opening some ports in your  router&#8217;s firewall to get your VPN connection made. In each case, you&#8217;ll  need to open the specific ports (and protocol) to the IP address of the computer that you&#8217;re running the VPN client on. <strong>NOTE that port mappings work with only one computer at a time<\/strong>.  If you have multiple VPN clients that you need to connect, your router  will have to support the VPN protocol that you&#8217;re using without  requiring ports opened.<\/p>\n<p>If you&#8217;re using Microsoft&#8217;s <strong>PPTP<\/strong> protocol, <strong>TCP port 1723<\/strong> is the port you&#8217;ll need to forward to allow PPTP control traffic to pass. <strong>Figure 2<\/strong> shows the <strong>Forwarding<\/strong> screen on a Linksys BEFSR41 set to forward this port to a client with IP address <strong>192.168.5.100<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.smallnetbuilder.com\/images_old\/myimages\/howto\/linksys_vpnports.jpg\" border=\"0\" alt=\"Linksys BEFSR41 VPN Port forwarding\" width=\"450\" height=\"401\" \/><\/p>\n<h6><strong>Figure 2: Linksys BEFSR41 VPN Port forwarding<\/strong><\/h6>\n<p>PPTP also needs <strong>IP protocol 47<\/strong> (Generic Routing Encapsulation) for the VPN data traffic itself, but note that this is a required <strong>protocol<\/strong>,  not a port. The ability to handle this protocol must be built into the  router&#8217;s NAT &#8220;engine&#8221; &#8211; which is true of most present-generation  routers.<\/p>\n<p><strong>IPsec<\/strong>-based VPN&#8217;s need <strong>UDP port 500<\/strong> opened for <strong>ISAKMP<\/strong> key negotiations, <strong>IP protocol 51<\/strong> for <strong>Authentication Header<\/strong> traffic (not always used), and <strong>IP protocol 50<\/strong> for the &#8220;encapsulated data itself. Again, the only &#8220;forwardable&#8221; item here is UDP port 500, which is also shown programmed in <strong>Figure 2<\/strong> to the same LAN client machine &#8211; protocols 50 and 51 must be built into your router.<\/p>\n<blockquote><p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.smallnetbuilder.com\/images_old\/myimages\/tip_hp.gif\" border=\"0\" alt=\"Tip!\" width=\"16\" height=\"16\" \/> <strong>Tip:<\/strong> Not all routers are created equal! Some allow only one VPN tunnel to be  opened and used by a single client. Others support multiple tunnels,  but with one client per tunnel. Unfortunately, most vendors don&#8217;t make  the VPN pass through capabilities of their products clear in their  documentation, nor do they have support staff properly trained to  provide this information either. In most cases, your only option is to  try a router in your specific application, and make sure you can return  it and get your money back if you can&#8217;t get it working.<\/p><\/blockquote>\n<h3>Still not Working?<\/h3>\n<p>Getting many IPsec-based VPN setups working can be a black art due to  the wide variation in techniques used by various vendors. Although  IPsec products have become more uniform as the <a id=\"itxthook3\" rel=\"nofollow\" href=\"http:\/\/www.smallnetbuilder.com\/security\/security-howto\/24433-howtovpnfirewall#\">technology<\/a> matures, your company may use older, more proprietary products that may  not be configured with NAT in mind, or require additional ports to be  opened in your firewall.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the rising popularity of telecommuting and the increasing need to protect their electronic assets, companies large and small have been turning to Virtual Private Networking (VPN). The good news is that many savvy IT departments realize that many of their telecommuting employees share their broadband connections with consumer-grade routers. Those folks have made their [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,16],"tags":[],"class_list":["post-211","post","type-post","status-publish","format-standard","hentry","category-networking-stuff","category-vpn"],"_links":{"self":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=211"}],"version-history":[{"count":6,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/211\/revisions"}],"predecessor-version":[{"id":2624,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/211\/revisions\/2624"}],"wp:attachment":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}