Skip to main content
Versa Networks

Configure SSL VPN Profiles

Versa-logo-release-icon.pngFor supported software information, click here.

SSL VPN is an alternative to IPsec VPN for allowing remote users to connect to Versa gateways using the Versa SASE client. The Versa proprietary SSL VPN protocol is based on Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). SSL VPN generally uses port 443 to establish a secure connection with Versa gateways and ensures that you can deploy a Versa SASE client in any customer deployment.

You configure SSL VPN profiles to allow remote users to connect to an enterprise network on an SSL tunnel using a Versa SASE client. An SSL VPN profile defines the secure VPN tunnel that connects the remote user to the enterprise network.

The Versa SASE client supports IPsec VPNs and SSL VPNs to connect to a secure access gateway. For information about IPsec VPN profiles, see Configure IPsec VPN Profiles.

To configure an SSL VPN profile:

  1. In Director view:
    1. Select the Administration tab in the top menu bar.
    2. Select Appliances in the left menu bar.
    3. Select a device name in the main panel. The view changes to Appliance view.
  2. Select the Configuration tab in the top menu bar.
  3. Select Services > SSL > VPN Profiles in the left menu bar.

    ssl-vpn-profiles-menu-main.png
  4. Click the + Add icon. The Add SSL VPN Profile popup window displays. Select the General tab, and then enter information for the following fields.

    add-ssl-vpn-profiles-general-tab.png
     
    Field Description
    Name Enter a name for SSL VPN profile.
    Certificate (Group of Fields)  
    • Certificate Name
    Select the EE certificate to use for the SSL VPN profile. For more information, see Generate CA and EE Certificates Using OpenSSL.
    • CA Chain
    Select the certificate authority (CA) chain to use.
    Tunnel Routing Instance Select the tunnel routing instance to use to reach the staging server.
    RAS ID Enter the name identifier of the remote access server (RAS) to associate with the VPN profile. For more information, see Configure a Remote Access Server.
    LEF Profile Select a log export functionality (LEF) profile to use to record logs for the SSL VPN profile.
    LEF Profile Default Click to use the default LEF profile to record logs.
    Interface List Click to select one or more interfaces for the IPsec remote access server (RAS) profile, and then click the add-icon-blue.PNG Add icon to add the interface. IPsec uses the RAS ID to select a VPN configuration with the same RAS ID to continue IKE negotiation. For more information, see Configure a Remote Access Server.
  5. Select the Address Pool tab, and then enter information for the following field.

    add-ssl-vpn-profiles-address-pool-tab.png
     
    Field Description

    IPAM Address (Required)

    Select the IP address of an IP address management (IPAM) service to assign IP addresses for SASE clients.
  6. Click the + Add icon in the Accessible Subnets field to add an accessible subnet, or click theedit-icon.PNGEdit icon to modify an existing accessible subnet. The Add/Edit Accessible Subnets popup window displays.

    add-accessible-subnets.PNG
    1. In the Subnet field, enter the value of the subnet accessible by the SASE client. The subnet value must be in the format mask or mask/length format; for example, 192.168.2.0/24.
    2. Click OK.
    3. To delete an existing accessible subnet, select the subnet and then click the Delete icon.
  7. Select the Protocol tab, and then enter information for the following fields.

    add-ssl-vpn-profiles-protocol-tab.png
     
    Field Description
    TLS (Group of Fields)  
    • Minimum Version

    Select the minimum supported version of TLS:

    • TLS 1.2.
    • Maximum Version

    Select the maximum supported version of TLS:

    • TLS 1.2
    • Port
    Enter the port number on which the TLS server listens for incoming connections.
    DTLS (Group of Fields)  
    • Minimum Version

    Select the minimum supported version of DTLS:

    • DTLS 1.2
    • Maximum Version

    Select the maximum supported version of DTLS:

    • DTLS 1.2
    • Port
    Enter the port number on which the DTLS server listens for the incoming connections.
    Cipher Suites

    Select a cipher suite, and then click Add. You can select multiple cipher suites.

    • TLS-AES-128-GCM-SHA256
    • TLS-AES-256-GCM-SHA384
    • TLS-CHACHA20-POLY130S-SHA256
    • TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA
    • TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA
    • TLS-ECDHE-ECDSA-WITH-AES-128-CBC-SHA256
    • TLS-ECDHE-ECDSA-WITH-AES-256-CBC-SHA384
    • TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256
    • TLS-ECDHE -ECDSA-WITH-AES- 256-GCM-SHA384
    • TLS-ECDHE-RSA-WITH-AES-l28-CBC-SHA
    • TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA
    • TLS-ECDHE-RSA-WITH-AES-128-CBC-SHA256
    • TLS-ECDHE-RSA-WITH-AES-256-CBC-SHA384
    • TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256
    • TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
    • TLS-DHE-RSA-WITH-AES-128-CBC-SHA (Unsupported)
    • TLS-DHE-RSA-WITH-AES-256-CBC-SHA (Unsupported)
    • TLS-DHE-RSA-WITH-AES-128-CBC-SHA256 (Unsupported)
    • TLS-DHE-RSA-WITH-AES-256-CBC-SHA256 (Unsupported)
    • TLS-DHE-RSA-WITH-AES-256-GCM-SHA384 (Unsupported)
    • TLS-RSA-WITH-AES-128-CBC-SHA
    • TLS-RSA-WITH-AES-256-CBC-SHA
    • TLS-RSA-WITH-AES-128-CBC-SHA256
    • TLS-RSA-WITH-AES- 256-CBC-SHA256
    • TLS-RSA-WITH-AES-128-GCM-SHA256
    • TLS-RSA-WITH-AES-256-GCM-SHA384
    • TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA (Unsupported)
    • TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA (Unsupported)
    • TLS-ECDH-ECDSA-WITH-AES-128-CBC-SHA256 (Unsupported)
    • TLS-ECDH-ECDSA-WITH-AES-256-CBC-SHA384 (Unsupported)
    • TLS-ECDH-ECDSA-WITH-AES-128-GCM-SHA256 (Unsupported)
    • TLS-ECDH-ECDSA-WITH-AES-256-GCM-SHA384 (Unsupported)
    • TLS-ECDH-RSA-WITH-AES-128-CBC-SHA (Unsupported)
    • TLS-ECDH-RSA-WITH-AES-256-CBC-SHA (Unsupported)
    • TLS-ECDH-RSA-WITH-AES-128-CBC-SHA256 (Unsupported)
    • TLS-ECDH-RSA-WITH-AES-256-CBC-SHA384 (Unsupported)
    • TLS-ECDH-RSA-WITH-AES-l28-GCM-SHA256 (Unsupported)
    • TLS-ECDH-RSA-WITH-AES-256-GCM-SHA384 (Unsupported)
    • TLS-ECDHE-ECDSA-WITH-CHACHA20-POLY1305-SHA256
    • TLS-ECDHE-RSA-WITH-CHACHA20-POLY1305-SHA256
    • TLS-RSA-WITH-CAMELLIA-256-CBC-SHA
    • TLS-RSA-WITH-SEED-CBC-SHA
  1. Click OK.

Supported Software Information

Releases 22.1.4 and later support all content described in this article.

  • Was this article helpful?