- 12 Dec 2024
- 3 読む分
- 印刷する
- PDF
Veltar VPN Configuration
- 更新日 12 Dec 2024
- 3 読む分
- 印刷する
- PDF
Once you have completed the setup of Veltar VPN server as described here, you can now proceed to create the VPN configuration on Scalefusion Dashboard and push it to the devices by performing the following steps,
Create a VPN Tunnel using the VPN server IP and Secret key
Configure the IP Range that needs to be allocated to managed devices
Configure the list of IPs that a user has access to when connected to this VPN Tunnel and optimally configure a DNS server
VPN Tunnel Configuration
When setting up VPN tunnels through the Scalefusion Dashboard, consider the following:
Listen Port for VPN Tunnels
Port Selection:
Specify a Listen Port when creating a new VPN tunnel via the Scalefusion Dashboard.
This is separate from the HTTP/HTTPS port used for the Veltar VPN API’s.
UDP Protocol:
The Listen Port for VPN tunnels uses the UDP protocol, not TCP.
Firewall Configuration:
Ensure the chosen Listen Port is open in your firewall for incoming UDP traffic.
Configure port forwarding for this UDP port if behind a NAT.
Port Range Consideration:
Consider opening a range of UDP ports (e.g., 51820-51830) for multiple VPN tunnels.
Configuring VPN on Scalefusion Dashboard
Pre-Requisites
Enrollment mode on Android: BYOD, Shared Company Owned, COPE
Enrollment mode on iOS : BYOD, AUE, User Authenticated & DEP/ADE
Scalefusion Android Agent v17.0.1 or above and iOS Agent v4.1.1 should be installed on device.
The device must be added to the User group (as the configuration can be published only to user Group).
Device Profile(s) should be created on Scalefusion Dashboard
Step 1: Create VPN Config
On Scalefusion Dashboard, navigate to Veltar > VPN Tunnel and click on Create VPN Config.
This will open the VPN config dialog/wizard.
Provide the required details under following tabs:
VPN Server Details: Under this, IT Admins need to enter the basic VPN details,
VPN Host address: IP address or domain name of the VPN server that clients connect to in order to establish a secure VPN connection
API Access token: A unique identifier used to authenticate a user or application when making API calls.
API Port: The specific network port on the server that is used to handle API requests.
Click Next
Tunnel Details
Tunnel Name: Enter a name for the tunnel
IP Address: Base IP Address for the Tunnel. It is the virtual IP address assigned to the device within the VPN tunnel. For each device it is auto generated with the help of base IP address.
Listen Port: Port on a server that accepts incoming connections
Click Next
Peer Details
Allowed IPs: The IPs that we want to pass through VPN tunnel. Here, Range is not supported
DNS Servers: In this phase we are not supporting it
Persistent Keep Alive Time (in seconds): The idle time the connection will remain, if not actively being used. By default it is set to 60 seconds.
After entering all details, click on Save
The VPN Configuration will get created and displayed on the main VPN Tunnel page with other related details. The details will be as under:
Tunnel Name
IP:Port - The IP and Port for the Tunnel
Total Peers: Number of devices on which the VPN config is published
Sent/Received (MB) : The total data (in MB) sent / received on the tunnel for all the devices.
Actions: Click on the three dots for the list of actions you can perform on VPN
Step 2: Publish VPN configuration
To apply VPN config you have created, the next step is to Publish it.
Click on publish by clicking on three dots under Actions
In the new window, select the User Group(s) on which you want to publish the configuration.
Click Publish
Additional Actions
You can perform following additional actions on a VPN Configuration (access from Actions):
Edit: Only peer details can be edited
Delete: Deleting a tunnel will unpublish/remove the VPN from the device.
User Experience on Device
iOS
On publishing the VPN config,
A new section for Veltar will be created inside Scalefusion Agent. Here, toggle on Secure VPN.
Android
On publishing the VPN config,
Veltar will be available on the managed device. When you click on it, a key icon will be visible on the top notification bar and Secure VPN shows as Enabled.
Known Behaviors
Android
On BYOD and Company Owned Personally enabled (COPE) Devices, you can enable or disable VPN manually but not on Shared Company Owned Devices.
VPN and Secure Web Gateway cannot be used simultaneously. If both VPN and Secure Web Gateway are configured, the VPN will take precedence, and Secure Web Gateway functionality will be temporarily disabled.
On certain devices, the VPN connection may be automatically disconnected due to device-specific compatibility issues. Users might encounter difficulties reconnecting to the VPN using Scalefusion in these cases.