Settings

From the Settings screen, admin users can add site-to-site tunnels. Site-to-site tunnels provide secure communication between the virtual office network and other physical and virtual networks of the customer, such as branch level local networks.

note

Site-to-site tunnels are available on MacOS and Windows.

To access Settings:

  1. Sign into the Coro console and select Control Panel from the toolbar:

    Control panel

  2. Select Network :

    Network from Control panel

  3. Select the Settings tab:

    Settings tab

    The settings are displayed.

    Settings

In the Site-To-Site Tunnels section, admin users can add tunnels and manage existing tunnels.

Adding a site-to-site tunnel

To add a new site-to-site tunnel:

  1. Select + ADD from the upper right of the site-to-site tunnel section:

    add tunnels button

  2. Enter the tunnel details, including:
    • Site name - create a name for the site-to-site tunnel. Example: Tunnel001
    • Site description - add a short description of the tunnel. Example: Tunnel between HQ and remote branch A
    • Remote gateway public IP - the public IP address of the remote site’s VPN device. This is the IP address to which your devices connect. Example: 203.123.45.6
    • Preshared key - a shared password (secret) that both sites use to authenticate and secure the tunnel. The password must be at least 20 characters. Example: MySecurePresharedKey012. You can select GENERATE KEY to generate a strong pre-shared key.
    • Lifetime key - the duration for which the tunnel remains active, in seconds. The maximum duration is 100,000 seconds. Example: 50,000

    tunnel details

  3. Enter one or more remote internal subnet networks. These are the private IP address ranges used at the remote site. This defines the network at the other end of the tunnel. Example: 87.234.56.78.
  4. In the Firewall settings section, use the dropdown menus to set your firewall parameters:
    • IKE (internet key exchange) version - the version of the IKE protocol to use for the VPN connection
    • Phase 1 encryption - the encryption algorithm used for the initial phase of negotiation
    • Phase 2 encryption - the encryption algorithm used for the subsequent phase of secure data transmission
    • Aggressive mode - a mode that simplifies the negotiation process, but may be less secure. Select whether to enable or disable this mode.
    note

    Coro provides selectable firewall parameters to ensure organizations can best match the requirements of differing hardware needs.

    firewall details

    note

    Coro displays the virtual office gateway IP address in the add tunnel dialog. Enter these details into the remote or hardware firewall you’re connecting to the virtual office.

  5. Select SAVE .

    The settings page reloads and the new site-to-site tunnel appears in the list of tunnels.

  6. Select Test from the three-dot menu of the new tunnel to test the site-to-site tunnel.

    tunnel test

  7. If the test fails, select Edit to check the tunnel configuration.

Managing site-to-site tunnels

From the three-dot menu of a tunnel, you can:

  • Test tunnels to make sure they work correctly
  • Edit tunnel configurations
  • Disable tunnels without losing the configuration data
  • Delete tunnels
  • Download logs with information to debug problems with tunnels

tunnel actions