Skip to content

Settings

From the Settings screen, admin users can add site-to-site tunnels. Site-to-site tunnels provide secure communication between the virtual office network and other physical and virtual networks of the customer, such as branch level local networks.

To access Settings:

  1. Log into the Coro console and select Control Panel from the toolbar:

    Control panel

  2. Select Network:

    Network from Control panel

  3. Select the Settings tab:

    Settings tab

    The settings are displayed.

    Settings

In the Site-To-Site Tunnels section, admin users can add tunnels and manage existing tunnels.

To add a site-to-site tunnel:

  1. Select + ADD from the upper right of the site-to-site tunnel section:

    add tunnels button

  2. Enter the tunnel details, including:

    • Site name - create a name for the site-to-site tunnel. Example: Tunnel001
    • Site description - add a short description of the tunnel. Example: Tunnel between HQ and remote branch A
    • Remote gateway IP - the public IP address of the remote site’s VPN device. This is the IP address to which your devices connect. Example: 203.123.45.6
    • Remote network IP - the private IP address range used at the remote site. This defines the network at the other end of the tunnel. Example: 87.234.56.78
    • Preshared key - a shared password (secret) that both sites use to authenticate and secure the tunnel. The password must be at least 20 characters. Example: MySecurePresharedKey012
    • Lifetime key - the duration for which the tunnel remains active, in seconds. The maximum duration is 100,000 seconds. Example: 50,000

    tunnel details

  3. Select firewall settings from the dropdown menus, including:

    • Remote network mask - the subnet mask that defines the range of IP addresses included in the remote network
    • IKE (internet key exchange) version - the version of the IKE protocol to use for the VPN connection
    • Phase 1 encryption - the encryption algorithm used for the initial phase of negotiation
    • Phase 2 encryption - the encryption algorithm used for the subsequent phase of secure data transmission
    • Aggressive mode - a mode that simplifies the negotiation process, but may be less secure. Select whether to enable or disable this mode.

    Note

    Each option is designed to serve different IT admin needs based on their environment, such as differences in hardware or firewalls.

    firewall details

    Note

    In the add tunnel screen, the virtual office gateway IP address and subnet are shown. Enter these details into the remote or hardware firewall you’re connecting to the virtual office.

  4. Select SAVE. The screen reloads and the new site-to-site tunnel appears in the list of tunnels. You can test, edit, and delete existing tunnels.

  5. Select Test from the three-dot menu of the new tunnel to test the site-to-site tunnel.

  6. If the test fails, select Edit to check the tunnel configuration.