WatchGuard officially has clients only for Windows and Mac. But I see that it uses openvpn internally. I couldn't connect to WG from Linux.
Is there someone who actually get this working? How?
WatchGuard officially has clients only for Windows and Mac. But I see that it uses openvpn internally. I couldn't connect to WG from Linux.
Is there someone who actually get this working? How?
Here is what I did to get WatchGuard/Firebox SSL VPN working on Ubuntu 11.10:
You will need the following files:
You will need access to a window computer that you can install their client on.
C:\Documents and Settings\{Username}\Application Data\WatchGuard\Mobile VPN\
C:\Users\{Username}\AppData\Roaming\WatchGuard\Mobile VPN\
This is from the Watchguard site. I haven't tried these instructions directly but they look reasonable.
http://customers.watchguard.com/articles/Article/2870?retURL=/apex/knowledgeHome&popup=false
From their document:
You will need to install a number of packages to connect from Ubuntu (this assumes the desktop version, things are likely different for the server version).
sudo apt-get install openvpn
sudo apt-get install network-manager-openvpn
sudo apt-get install network-manager-openvpn-gnome
You can test if the connection is working from the command line. You don't have to do this but it may make things easier.
From the directory you copied the config/crt files:
sudo openvpn --config client.ovpn
The network manager is the icon in the panel bar at the top (currently the up/down arrows). You will need a number of lines out of the client.ovpn
file so open it in an editor for reference.
This is an example client.ovpn
:
dev tun
client
proto tcp-client
ca ca.crt
cert client.crt
key client.pem
tls-remote "/O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server"
remote-cert-eku "TLS Web Server Authentication"
remote 1.2.3.4 1000
persist-key
persist-tun
verb 3
mute 20
keepalive 10 60
cipher AES-256-CBC
auth SHA1
float 1
reneg-sec 3660
nobind
mute-replay-warnings
auth-user-pass
cert
line)ca
line)key
line)Password with Certificates (TLS)
(from the auth-user-pass
line).Gateway
comes from the remote
line. You need to copy the server name or IP address. In this example "1.2.3.4"The rest of the settings are in the Advanced area (the advanced button at the bottom). In the General tab:
Use custom gateway port
uses the last number from the remote
line. In this example "1000"Use TCP connection
come from the proto
line. In this case tcp-client.Under the Security tab:
Cipher
comes from the cipher
line. (In this example AES-256-CBC)auth
line. (In this example SHA1)Under the TLS Authentication tab:
Subject Match
comes from the `tls-remote' line. (In this example /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server)I also needed to check "use this connection only for resource on its network" under the IPv4 Settings tab under the "Routes..." button.
There maybe more needed to setup things depending on how the Firebox SSL is setup but hopefully this will help as a starting point. Also you may want to watch the sys log if you have problems (tail -fn0 /var/log/syslog)
sudo apt-get install network-manager-openvpn-gnome
or for the minimalist:
sudo apt-get install openvpn
For Watchguard XTM devices running 11.8+
It appears that the https://yourrouter.tld/sslvpn.html page that is used to pickup the windows client now also includes a generic ovpn configuration download saving the steps in the workaround. Simply login and go to that directory to get your configuration file. Congratulations on being equal with your windows and mac buddies.
Skip down to the "Create New VPN Connection" step.
For Watchguard XTM devices running 11.7 or less
These can be retrieved directly from the firewall (replace server with your own):
https://watchguard_server and authenticate to the firewall
.https://watchguard_server:4100/?action=sslvpn_download&filename=client.wgssl
Alternately (I believe this is less secure because the password is sent in the request)(replace server, user and pass with your own):
https://watchguard_server:4100/?action=sslvpn_download&filename=client.wgssl&username=youruser&password=yourpass
Move client.wgssl to where you want to store the config and certs, perhaps /etc/openvpn. This will tar bomb you, so you'll want to create the folder for it to extract into.
Run tar zxvf client.wgssl
Open Network Connections and Add new. For type, under VPN, select "Import a saved VPN configuration..." Browse for the client.ovpn file in the folder you extracted client.wgssl.
Edit the newly created connection to include your username and password, or set password to "Always Ask".
Warning: The password is saved in an encryption that can be reversed.
If you don't want the VPN to take over all your traffic, just the traffic going to the remote location go to IPv4 Settings tab -> Routes and check "Use this connection only for resources on its network"
Follow these instructions - http://customers.watchguard.com/articles/Article/2870?retURL=/apex/knowledgeHome&popup=false Tested in Ubuntu 11 and Fedora 15 with XTM 11.x
Thank you guys, I just tried a procedure described on Watchguard site (http://customers.watchguard.com/articles/Article/2870?retURL=/apex/knowledgeHome&popup=false)
I wrote a script to launch the connection and it works just fine.