- Kerio WinRoute Firewall Administrator's Guide

21.3 Interconnection of two private networks via the Internet (VPN tunnel)
307
the tunnel).
Passive this end of the tunnel will only listen for an incoming connection from
the remote (active) side.
The passive mode is only useful when the local end of the tunnel has a fixed IP
address and when it is allowed to accept incoming connections.
At least one end of each VPN tunnel must be switched to the active mode (passive
servers cannot initialize connection).
Configuration of a remote end of the tunnel
When a VPN tunnel is being created, identity of the remote endpoint is authenti-
cated through the fingerprint of its SSL certificate. If the fingerprint does not match
with the fingerprint specified in the configuration of the tunnel, the connection will
be rejected.
The fingerprint of the local certificate and the entry for specification of the remote
fingerprint are provided in the Settings for remote endpoint section. Specify the
fingerprint for the remote VPN server certificate and vice versa specify the fin-
gerprint of the local server in the configuration at the remote server.
Figure 21.8 VPN tunnel certificate fingerprints
If the local endpoint is set to the active mode, the certificate of the remote endpoint
and its fingerprint can be downloaded by clicking Detect remote certificate. Passive
endpoint cannot detect remote certificate.
However, this method of fingerprint setting is quite insecure —a counterfeit certifi-
cate might be used. If a fingerprint of a false certificate is used for the configuration
of the VPN tunnel, it is possible to create a tunnel for the false endpoint (for the
attacker). Moreover, a valid certificate would not be accepted from the other side.
Therefore, for security reasons, it is recommended to set fingerprints manually.