Settings
From the Settings screen, admin users can add site-to-site tunnels. Site-to-site tunnels provide secure communication between the virtual office network and other physical and virtual networks of the customer, such as branch level local networks.
note
Site-to-site tunnels are available on MacOS and Windows.
To access Settings:
-
Sign into the Coro console
and select
Control Panel
from the toolbar:
-
Select
Network
:
-
Select the
Settings
tab:
The settings are displayed.
In the Site-To-Site Tunnels section, admin users can add tunnels and manage existing tunnels.
Adding a site-to-site tunnel
To add a new site-to-site tunnel:
-
Select
+ ADD
from the upper right of the site-to-site tunnel section:
-
Enter the tunnel details, including:
- Site name - create a name for the site-to-site tunnel. Example: Tunnel001
- Site description - add a short description of the tunnel. Example: Tunnel between HQ and remote branch A
- Remote gateway public IP - the public IP address of the remote site’s VPN device. This is the IP address to which your devices connect. Example: 203.123.45.6
- Preshared key - a shared password (secret) that both sites use to authenticate and secure the tunnel. The password must be at least 20 characters. Example: MySecurePresharedKey012. You can select GENERATE KEY to generate a strong pre-shared key.
- Lifetime key - the duration for which the tunnel remains active, in seconds. The maximum duration is 100,000 seconds. Example: 50,000
- Enter one or more remote internal subnet networks. These are the private IP address ranges used at the remote site. This defines the network at the other end of the tunnel. Example: 87.234.56.78.
-
In the
Firewall settings
section, use the dropdown menus to set your firewall parameters:
- IKE (internet key exchange) version - the version of the IKE protocol to use for the VPN connection
- Phase 1 encryption - the encryption algorithm used for the initial phase of negotiation
- Phase 2 encryption - the encryption algorithm used for the subsequent phase of secure data transmission
- Aggressive mode - a mode that simplifies the negotiation process, but may be less secure. Select whether to enable or disable this mode.
note
Coro provides selectable firewall parameters to ensure organizations can best match the requirements of differing hardware needs.
note
Coro displays the virtual office gateway IP address in the add tunnel dialog. Enter these details into the remote or hardware firewall you’re connecting to the virtual office.
-
Select
SAVE
.
The settings page reloads and the new site-to-site tunnel appears in the list of tunnels.
-
Select
Test
from the three-dot menu of the new tunnel to test the site-to-site tunnel.
- If the test fails, select Edit to check the tunnel configuration.
Managing site-to-site tunnels
From the three-dot menu of a tunnel, you can:
- Test tunnels to make sure they work correctly
- Edit tunnel configurations
- Disable tunnels without losing the configuration data
- Delete tunnels
- Download logs with information to debug problems with tunnels