Module 6

  • Uploaded by: Le Minh Ngoc
  • 0
  • 0
  • April 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Module 6 as PDF for free.

More details

  • Words: 10,980
  • Pages: 132
Module 6: Configure Remote Access VPN

PDF created with pdfFactory trial version www.pdffactory.com

Overview • • • • • • •

Introduction to Cisco Easy VPN Configure the Easy VPN Server Configure Easy VPN Remote for the Cisco VPN Client 4.x Configure Cisco Easy VPN Remote for Access Routers Configure the PIX Security Appliance as an Easy VPN Server Configure a PIX 501 or 506E as an Easy VPN Client Configure the Adaptive Security Appliance to Support WebVPN

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Introduction to Cisco Easy VPN

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Introduction to Cisco Easy VPN

• • •

Cable modems, DSL routers, and other forms of broadband access provide high-performance connections to the Internet, but many applications also require the security of VPN connections that perform a high level of authentication and that encrypt the data between two particular endpoints. However, establishing a VPN connection between two routers can be complicated and typically requires tedious coordination between network administrators to configure the VPN parameters of the two routers. The Cisco Easy VPN Remote feature eliminates much of this tedious work by implementing Cisco Unity Client Protocol, which allows most VPN parameters to be defined at a Cisco Easy VPN server. This server can be a dedicated VPN device, such as a Cisco VPN 3000 concentrator a PIX Security Appliance, or an IOS router that supports the Cisco Unity Client Protocol. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Overview of the Easy VPN Server





The Easy VPN Server enables Cisco IOS routers, PIX Security Appliances, and Cisco VPN 3000 Series Concentrators to act as VPN headend devices in site-to-site or remote-access VPNs, where the remote office devices are using the Easy VPN Remote feature. Using this feature, security policies defined at the headend are pushed to the remote VPN device, ensuring that those connections have up-todate policies in place before the connection is established. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Overview of the Cisco Easy VPN Remote

• •

The Easy VPN Remote feature enables Cisco IOS routers, PIX Security Appliances, and Cisco VPN 3002 Hardware Clients or Software Clients to act as remote VPN Clients. These devices can receive security policies from an Easy VPN Server, minimizing VPN configuration requirements at the remote location. In the example in Figure , the VPN gateway is a Cisco IOS router running the Easy VPN Server feature. Remote Cisco IOS routers and VPN Software Clients connect to the Cisco IOS router Easy VPN Server for access to the corporate intranet. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Overview of the Cisco Easy VPN Remote



Restrictions for VPN Remote The Cisco Easy VPN Remote feature requires that the destination peer be a Cisco IOS Easy VPN server or VPN concentrator that supports the Cisco Easy VPN Server feature. At the time of publication, this includes the platforms when running the indicated software releases that are shown in Figure Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Overview of the Cisco Easy VPN Remote •



Only ISAKMP Policy Group 2 Supported on Easy VPN Servers The Unity Protocol supports only Internet Security Association Key Management Protocol (ISAKMP) policies that use group 2 (1024-bit Diffie-Hellman) Internet Key Exchange (IKE) negotiation, so the Easy VPN server being used with the Cisco Easy VPN Remote feature must be configured for a group 2 ISAKMP policy. The Easy VPN server cannot be configured for ISAKMP group 1 or group 5 when being used with a Cisco Easy VPN client. Transform Sets Supported To ensure a secure tunnel connection, the Cisco Easy VPN Remote feature does not support transform sets that provide encryption without authentication, such as ESP-DES and ESP-3DES. Transform sets that provide authentication without encryption, such as ESP-NULL ESPSHA-HMAC and ESP-NULL ESP-MD5-HMAC, are also not supported.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

How Cisco Easy VPN works



When an Easy VPN Remote client initiates a connection with an Easy VPN Server gateway, the conversation that occurs between the peers generally consists of the following major steps: – Device authentication via ISAKMP – User authentication using IKE Extended Authentication (XAUTH) – VPN policy push, when using mode configuration – IPSec Security Association (SA) creation Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Remote client connection in detail



Step 1 The VPN Client Initiates the IKE Phase 1 Process. Because there are two ways to perform authentication, the VPN Client must consider the following when initiating this phase. – If a pre-shared key is to be used for authentication, the VPN Client initiates aggressive mode (AM). When pre-shared keys are used, the accompanying group name entered in the configuration GUI, ID_KEY_ID, is used to identify the group profile associated with this VPN Client. – If digital certificates are to be used for authentication, the VPN Client initiates main mode (MM). When digital certificates are used, the organizational unit (OU) field of a distinguished name (DN) is used to identify the group profile. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Remote client connection in detail



Step 2 The VPN Client Establishes an ISAKMP SA. To reduce the amount of manual configuration on the VPN Client, every combination of encryption and hash algorithms, in addition to authentication methods and Diffie-Hellman (DH) group sizes, is proposed Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Remote client connection in detail





Step 3 The Easy VPN Server Accepts the SA Proposal. ISAKMP policy is global for the Easy VPN Server and can consist of several proposals . In the case of multiple proposals, the Easy VPN Server will use the first match. The most secure policies should always be listed first. Device authentication ends and user authentication begins at this point. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Remote client connection in detail

• •

Step 4 The Easy VPN Server Initiates a Username/password Challenge. The information that is entered is checked against authentication entities using AAA protocols such as RADIUS and TACACS+ . Token cards may also be used via AAA proxy. VPN devices that are configured to handle remote VPN Clients should always be configured to enforce user authentication. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Remote client connection in detail



Step 5 The Mode Configuration Process is Initiated. The remaining system parameters, such as IP address, DNS, split tunnel attributes, are pushed to the VPN Client at this time using mode configuration . The IP address is the only required parameter in a group profile. All other parameters are optional. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Remote client connection in detail

• •

Step 6 The Reverse Route Injection (RRI) Process is Initiated. Reverse Route Injection (RRI) ensures that a static route is created on the Easy VPN Server for the internal IP address of each VPN Client . It is recommended that RRI is enabled on the crypto map, either static or dynamic, for the support of VPN Clients, unless the crypto map is being applied to a Generic Routing Encapsulation (GRE) tunnel that is already being used to distribute routing information. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Remote client connection in detail



Step 7 IPSec Quick Mode Completes the Connection. After IPSec SAs have been created, the connection is complete.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •

Task 1 – create an IP address pool If a local IP address pool is to be used, that pool must first be configured using the ip local pool command. The syntax for this command is as follows: ip local pool {default | pool-name low-ip-address [high-ip-address]} Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •

Task 2 – configure group policy lookup Configuring group policy lookup is completed in two steps, as shown in Figure : – Step 1 The first step when preparing the Easy VPN Server router for remote access is to establish a AAA section in the configuration file using the aaa new-model command in global configuration mode. – Step 2 Enable group policy lookup using the aaa authorization network command. A RADIUS server and the router local database may be used together and will be tried in the order listed. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •

Task 3 – create ISAKMP policy for remote VPN access Complete this task to configure the ISAKMP policy for all Easy VPN Remote clients attaching to this router. Use the standard ISAKMP configuration commands to accomplish this task. A general example of how to configure the ISAKMP policy starting in global configuration mode is shown in Figure. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •

Task 4 – define a group policy for a mode configuration push This task creates a transform set for the Easy VPN Remote clients to use when they attempt to build an IPSec tunnel to the router. Use the standard method for creating a transform set, as shown in Figure . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 4 (continue)– define a group policy for a mode configuration push – Step 1 Add the Group Profile to be Defined The crypto isakmp client configuration group command specifies the policy profile of the group that will be defined and enters ISAKMP group configuration mode. – Use the crypto isakmp client configuration group command to specify group policy information that needs to be defined or changed . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 4 (continue)– define a group policy for a mode configuration push – Step 2 Configure the ISAKMP Pre-shared Key Use the key command in ISAKMP group configuration mode to specify the ISAKMP pre-shared key when defining group policy information for the mode configuration push . This command must be used if the VPN Client identifies itself to the router with a pre-shared key. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 4 (continue)– define a group policy for a mode configuration push – Step 3 (Optional) Specify the DNS servers Specify the primary and secondary DNS servers using the dns command in ISAKMP group configuration mode . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 4 (continue)– define a group policy for a mode configuration push – Step 4 (Optional) Specify the Windows Internet Name Service (WINS) servers Specify the primary and secondary WINS servers using the wins command in ISAKMP group configuration mode. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 4 (continue)– define a group policy for a mode configuration push – Step 5 (Optional) Specify the DNS Domain Specify the DNS domain to which a group belongs by using the domain command in ISAKMP group configuration mode . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 4 (continue)– define a group policy for a mode configuration push – Step 6 Specify the Local IP Address Pool Use the pool command to refer to an IP local address pool, which defines a range of addresses that will be used to allocate an internal IP address to a VPN Client. – Use the pool command in the ISAKMP group configuration mode to define a local pool address . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •

Task 5 – create a transform set This task creates a transform set for the Easy VPN Remote clients to use when they attempt to build an IPSec tunnel to this router. Use the standard method for creating a transform set, as shown in Figure . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •



Task 6 – create a dynamic crypto map with RRI This task creates a dynamic crypto map to be used when building IPSec tunnels to Easy VPN Remote clients. In this example, RRI is used to ensure that returning data destined for a particular IPSec tunnel can find that tunnel. RRI ensures that a static route is created on the Easy VPN Server for each client internal IP address. Complete the following steps to create the dynamic crypto map with RRI : – Step 1 Create a dynamic crypto map. – Step 2 Assign a transform set to the crypto map. – Step 3 Enable RRI. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 6 (continue) – create a dynamic crypto map with RRI – Step 1 Create a Dynamic Crypto Map Create a dynamic crypto map entry and enter the crypto map configuration mode using the crypto dynamic-map command . – A dynamic crypto map entry is essentially a crypto map entry without all of the parameters configured. It acts as a policy template where the missing parameters are later dynamically configured, as the result of an IPSec negotiation, to match the requirements of as remote peer. This practice allows remote peers to exchange IPSec traffic with the router even if the router does not have a crypto map entry specifically configured to meet all of the requirements of the remote peer. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 6 (continue) – create a dynamic crypto map with RRI – Step 2 Assign a Transform Set to the Crypto Map Specify which transform sets are allowed for the crypto map entry using the set transform-set command . When using this command, be sure to list multiple transform sets in order of priority, with the highest priority listed first. Note that this is the only configuration statement required in dynamic crypto map entries. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 6 (continue) – create a dynamic crypto map with RRI – Step 3 Enable RRI Enable RRI using the reverse-route command . This command has no arguments or keywords. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •

Task 7 – apply mode configuration to the dynamic crypto map Apply mode configuration to a dynamic crypto map using the following steps in global configuration mode : – Step 1 Configure the router to respond to mode configuration requests. – Step 2 Enable IKE queries for group policy lookup. – Step 3 Apply the dynamic crypto map to the crypto map. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 7 (continue)– apply mode configuration to the dynamic crypto map – Step 1 Configure the Router to Respond to Mode Configuration Requests Configure the router to initiate or reply to mode configuration requests with the crypto map map-name client configuration command . Note that VPN Clients require the respond keyword to be used. The initiate keyword was used with older VPN Clients and is no longer used with the 3.x or higher version Cisco VPN Clients. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 7 (continue)– apply mode configuration to the dynamic crypto map – Step 2 Enable IKE Queries for Group Policy Lookup Enable ISAKMP querying for group policy when requested by the VPN Client with the crypto map isakmp authorization list command . AAA uses the list-name argument to determine which method list is used to find the policy, either local or RADIUS, as defined in the aaa authorization network command. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 7 (continue)– apply mode configuration to the dynamic crypto map – Step 3 Apply the Dynamic Crypto Map to the Crypto Map Apply the dynamic crypto map to the crypto map using the crypto map command in global configuration mode. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• • •

Task 8 – apply a dynamic crypto map to the router interface The crypto map map-name command is used to apply the crypto map to the outside interface of the Easy VPN Server router. An example of how to apply the crypto map to the outside interface beginning in global configuration mode is shown in Figure . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •



Task 9 – enable IKE dead peer detection Dead peer detection (DPD) is a keepalives scheme that allows the router to query the liveliness of its IKE peer. There are two options for DPD. These options are periodic and on-demand. – Periodic DPD Periodic DPD functions on the basis of the timer. If the timer is set for 10 seconds, the router will send a hello message every 10 seconds, unless, the router receives a hello message from the peer. – On-demand DPD DPD also has an on-demand approach. The on-demand approach is the default. With ondemand DPD, messages are sent on the basis of traffic patterns . Enable DPD Use the crypto isakmp keepalive command in global configuration mode to enable a Cisco IOS VPN gateway, instead of the VPN Client, to send DPD messages . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •

Task 10 – (optional) Configure XAUTH Complete the following steps to configure XAUTH on the Easy VPN Server router : – Step 1 Enable AAA login authentication. – Step 2 Set XAUTH timeout value. – Step 3 Enable ISAKMP XAUTH for the dynamic crypto map. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 10 (continue)– (optional) Configure XAUTH – Step 1 Enable AAA Login Authentication Enable AAA login authentication using the aaa authentication login command in global configuration mode . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server



Task 10 (continue)– (optional) Configure XAUTH – Step 3 Enable ISAKMP XAUTH for the Dynamic Crypto Map Enable IKE XAUTH for the dynamic crypto map using the crypto map command with the authentication list option . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Easy VPN Server

• •

Task 11 – (optional) Enable XAUTH save password feature Cisco Easy VPN Remote uses one of three available authentication methods: – No XAUTH – When no XAUTH is used, there is no authentication for the user when establishing the VPN tunnels. – XAUTH with no password save feature – This is better than no XAUTH, but it requires that users re-enter the password each time they need to establish the VPN tunnel. – XAUTH with password save feature – Using the password save function, users need only enter their password once when establishing the VPN tunnel. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

• •

The Cisco VPN Client for Windows, referred to in this lesson as VPN Client, is software that runs on a Microsoft Windows-based PC. The VPN Client on a remote PC, communicating with a Cisco Easy VPN server on an enterprise network or with a service provider, creates a secure connection over the Internet. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

• • •

Task 1 – install the Cisco VPN Client 4.x on the remote PC The VPN Client can be installed on a system through either InstallShield or the Microsoft Windows Installer (MSI) . Both applications use installation wizards to walk the user through the installation. Installing the VPN Client through InstallShield includes an Uninstall icon in the program group. MSI installation does not include this icon. In the latter case, to manually remove VPN Client applications, the Microsoft Add/Remove Programs utility can be used. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

• • •

Task 1 (continue) – install the Cisco VPN Client 4.x on the remote PC If a VPN Client has been previously installed, when the vpnclient_en.exe command or vpnclien_en.msi is executed, an error message displays . The previously installed VPN Client must be uninstalled before proceeding with the new installation. To remove a VPN Client installed with the MSI installer, use the Windows Add/Remove Programs control panel. To remove a VPN Client installed with InstallShield, select Start > Programs > Cisco Systems VPN Client > Uninstall Client. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

• •

Task 2 – create a new client connection entry To use the VPN Client, at least one connection entry must be created, which identifies the following information: – The VPN device, also known as the remote server, to access – Preshared keys – The IPSec group to which the user is assigned to. The group determines how the user can access and use the remote network. For example, the group specifies access hours, number of simultaneous logins, user authentication method, and the IPSec algorithms that the VPN Client uses. – Certificates – The name of the certificate that will be used for authentication – Optional parameters that govern VPN Client operation and connection to the remote network Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

• •

Task 2 (continue)– create a new client connection entry Creating a New Connection Entry Use the following procedure to create a new connection entry. – Step 1 Start the VPN Client by choosing Start > Programs > Cisco Systems VPN Client > VPN Client. – Step 2 The VPN Client application starts and displays the advanced mode main window. If necessary, open the Options menu in simple mode and choose AdvancedMode or press Ctrl-M. – Step 3 Select New from the toolbar or the Connection Entries menu. The VPN Client displays a form. – Step 4 Enter a unique name for this new connection. Any name can be used to identify this connection. This name can contain spaces, and it is not case-sensitive. – Step 5 Enter a description of this connection. This field is optional, but it helps to further identify this connection. – Step 6 Enter the hostname or IP address of the remote VPN device that the client will connect to. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

• •

Task 3 – choose an authentication method Under the Authentication tab, enter the information for the authentication method that will be used. The VPN Client can connect as part of a group that is configured on the remote VPN device, or by supplying an identity digital certificate. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

• •

Task 3 (continue)– choose an authentication method Group Authentication The network administrator usually configures group authentication for the remote user. If this is not the case, use the following procedure: – Step 1 Click the Group Authentication radio button. – Step 2 In the Name field, enter the name of the IPSec group to which the remote user belongs. This entry is case-sensitive. – Step 3 In the Password field, enter the password, which is also casesensitive, for the IPSec group to which the remote user belongs. The field displays only asterisks. – Step 4 Verify the password by entering it again in the Confirm Password field. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

• •





Task 3 (continue)– choose an authentication method Mutual Group Authentication To use mutual group authentication, a root certificate that is compatible with the central-site VPN installed on the system is needed. The network administrator can load a root certificate on the remote user’s system during installation of the VPN Client software. When mutual group authentication is used, the VPN Client software verifies whether the remote user has a root certificate installed. If not, it prompts the remote user to install one. Before the user can continue, a root certificate must be imported. When the root certificate has been installed, follow the steps for Group Authentication. Certificate Authentication For certificate authentication, perform the following procedure, which varies according the type of certificate that is being used: – Step 1 Click the Certificate Authentication radio button. – Step 2 Choose the name of the certificate that is being used from the menu. If the field says No Certificates Installed and is shaded, then the VPN Client must enroll for a certificate before this feature can be used. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x

• • • •

Task 4 – configure transparent tunneling Transparent tunneling allows secure transmission between the VPN Client and a secure gateway through a router serving as a firewall, which may also be performing NAT or PAT. Transparent tunneling encapsulates ESP traffic within UDP packets and can allow for both ISAKMP ISAKMP and ESP to be encapsulated in TCP packets before they are sent through the NAT or PAT devices and/or firewalls. The most common application for transparent tunneling is behind a home router performing PAT. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x • • •



Task 4 (continue)– configure transparent tunneling Using IPSec over UDP (NAT/PAT) To enable IPSec over UDP (NAT/PAT), click the radio button. With UDP, the port number is negotiated. UDP is the default mode. Using IPSec over TCP (NAT/PAT/Firewall) To enable IPSec over TCP, click the radio button. When using TCP, the port number for TCP must also be enteredin the TCP port field. This port number must match the port number configured on the secure gateway. The default port number is 10000. Allowing Local LAN Access In a multiple-NIC configuration, Local LAN access pertains only to network traffic on the interface on which the tunnel was established. The Allow Local LAN Access parameter gives the remote user access to the resources on their local LAN when they are connected through a secure gateway to a central-site VPN device The resources could include printers, fax machines, shared files, or other systems, When this parameter is enabled and the central site is configured to permit it, remote users can access local resources while connected. When this parameter is disabled, all traffic from the Client system goes through the IPSec connection to the secure gateway.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x • •



Task 5 – enable and add backup servers The private network may include one or more backup VPN servers to use if the primary server is not available. The system administrator should tell the remote user whether to enable backup servers. Information on backup servers can download automatically from the VPN Concentrator, or this information can be entered manually. To enable backup servers from the VPN Client, use the following procedure: – Step 1 Open the Backup Servers tab. – Step 2 Check Enable Backup Server(s). This is not checked by default. – Step 3 Click Add to enter the address of a backup server. – Step 4 Enter the hostname or IP address of the backup server. Use a maximum of 255 characters. – Step 5 To add more backup devices, repeat Steps 2, 3, and 4.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Easy VPN Remote for the Cisco VPN Client 4.x • •

• •

Task 6 – configure connection to the Internet through dial-up networking To connect to a private network using a dial-up connection, perform the following steps: – Step 1 Use a dial-up connection to an Internet service provider (ISP) to connect to the Internet. – Step 2 Use the VPN Client to connect to the private network through the Internet. To enable and configure this feature, check the Connect to the Internet via dial-up check box. This feature is not checked by default. Remote users can connect to the Internet using the VPN Client application in either of the following ways: – Microsoft Dial-up Networking (DUN) – Third party dial-up program

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers



Easy VPN Remote modes of operation – The Cisco Easy VPN Remote feature supports the following three modes of operation: • Client mode • Network extension mode • Network extension plus mode Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers



Easy VPN Remote modes of operation (continue) – Client Mode Example The diagram in Figure illustrates the client mode of operation. In this example, the Cisco 831 router provides access to two PCs, which have IP addresses in the 10.0.0.0 private network space. These PCs connect to the Ethernet interface on the Cisco 831 router, which also has an IP address in the 10.0.0.0 private network space. The Cisco 831 router performs NAT or PAT translation over the VPN tunnel so that the PCs can access the destination network. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers



Easy VPN Remote modes of operation (continue) – Network Extension Mode Example The diagram in Figure illustrates the network extension mode of operation. In this example, the Cisco 831 router acts as Cisco Easy VPN remote devices, connecting to a router used as a Cisco Easy VPN server. The client hosts are given IP addresses that are fully routable by the destination network over the tunnel. These IP addresses could be either in the same subnet space as the destination network, or in separate subnets, assuming that the destination routers are configured to properly route those IP addresses over the tunnel. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers

• •

Configuration tasks for Cisco Easy VPN Remote for access routers Configuring Cisco access routers to act as Easy VPN Remote clients consists of the following tasks : – Task 1 – (Optional) Configure the DHCP server pool. – Task 2 – Configure and assign the Cisco Easy VPN client profile. – Task 3 – (Optional) Configure XAUTH password save. – Task 4 – Initiate the VPN tunnel. – Task 5 – Verify the Cisco Easy VPN configuration. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers

• • •

Task 1 – configure the DHCP server pool To use the DHCP server of the local router to assign IP addresses to the hosts that are connected to the LAN interface of the router, a pool of IP addresses must be created for the internal DHCP server . In a typical VPN connection, the hosts connected to the LAN interface of the router are assigned an IP address in a private address space. The router then uses NAT/PAT to translate those IP addresses into a single IP address that is transmitted across the VPN tunnel connection. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers • •

Task 1 (continue)– configure the DHCP server pool The following steps are used to create the DHCP server pool: – Step 1 Create a DHCP server address pool using the ip dhcp pool pool-name command. This places the administrator in DHCP pool configuration mode. – Step 2 Use the network command to specify the IP network and subnet mask of the address pool that will be used by the hosts connected to the local Ethernet interface of the router. – Step 3 Use the default-router command to specify the IP address of the default router for a DHCP client. At least one address must be specified. Up to eight addresses can be specified per command. – Step 4 Use the import all command to ensure that the router is configured with the proper DHCP parameters from the central DHCP server. This option requires a central DHCP server be configured to provide the DHCP options. This server can be on a different subnet or network. – Step 5 The lease command is optional. Use this command to specify the duration of the DHCP lease. Use the exit command to leave the DHCP pool configuration mode. – Step 6 Use the ip dhcp excluded-address command to exclude the specified address from the DHCP server pool. The lan-ip-address should be the IP address assigned to the LAN interface of the router. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers

• •

Task 1 (continue)– configure the DHCP server pool One example of a DHCP server pool configuration is shown in Figure. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers



Task 2 – configure and assign the Cisco Easy VPN Client profile Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers •

Task 2 (continue)– configure and assign the Cisco Easy VPN Client profile – Step 1 Use the crypto ipsec client ezvpn name command to create a profile. This places the administrator in Cisco Easy VPN Remote configuration mode. – Step 2 Use the group group-name key group-key command to specify the IPSec group and IPSec key values to be associated with this profile. The values of group-name and group-key must match the values assigned in the Easy VPN Server. – Step 3 Use the peer command to specify the IP address or hostname for the destination peer. This is typically the IP address of the outside interface of the Easy VPN Server. If a hostname is used, a DNS server must be configured and available in order for this to work. – Step 4 Use the mode command to specify the type of VPN connection that should be made. The options are client mode or network extension mode. – Step 5 Enter the exit command to leave Easy VPN Remote configuration mode. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers



Task 2 (continue)– configure and assign the Cisco Easy VPN Client profile – An example of an Easy VPN Client profile configuration is shown in Figure. – Use the crypto ipsec client ezvpn name command in interface configuration mode to assign the Easy VPN client profile to a router interface. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers



Task 2 (continue)– configure and assign the Cisco Easy VPN Client profile – An example of how to assign the Easy VPN Client profile to a router interface is shown in Figure. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers

• • • • •

Task 3 – (optional) configure XAUTH save password feature Task 3 is an optional task. If XAUTH is not used, then skip this task. If the save password feature is enabled on the Cisco Easy VPN Server, it must be enabled on the client as well. If both ends of the tunnel do not match, the VPN tunnel will not be established. This task could be also be done as part of Task 2 – Configure the Cisco Easy VPN Client Profile. Enter the username command in ezvpn crypto configuration mode for the specific client profile as shown in Figure . This is the AAA username and password used to automatically re-authenticate the user with the XAUTH password save feature enabled in the Cisco Easy VPN Server. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers

• •

Task 4 – (optional) initiate the VPN tunnel (XAUTH) Task 4 is also optional. If XAUTH is not being used, then skip this task. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers

• •



Task 4 (continue)– (optional) initiate the VPN tunnel (XAUTH) With XAUTH configured, the VPN tunnel must be initiated manually, for at least the first time. The Cisco IOS software message shown in Figure (slide 122) is displayed because the software is waiting for a valid XAUTH username and password. This message will be displayed whenever an administrator logs in to the remote router console port. – Step 1 Enter the crypto ipsec client ezvpn xauth command. – Step 2 Enter the username and password as prompted. Which of two options happens next is determined by the XAUTH configuration: – With just the XAUTH feature enabled, when the SA expires, the username and password must be re-entered manually. This process is ongoing. The same Cisco IOS message will be displayed and the user will have to repeat this manual process to re-authenticate each time. – With the XAUTH password save enabled, when the SA expires, the last valid username and password will be reused automatically. This option is the more popular of the two. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure Cisco Easy VPN Remote for Access Routers

• •

Task 5 – verify the Cisco Easy VPN configuration Task 5 consists of reviewing the Easy VPN configuration using the show crypto ipsec client ezvpn command . Figure details an example of Easy VPN Remote access router configuration. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the PIX Security Appliance as an Easy VPN Server

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Server general configuration tasks

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 1 – create ISAKMP policy for remote VPN Client access

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 2 – create an IP address pool

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push



Complete this task to define a group policy to be pushed during mode configuration. Although users can belong to only one group per connection, they may belong to specific groups with different policy requirements. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push



Step 1 Set the Tunnel Group Type To enable remote access the tunnel group type must be named and set to remote access using the tunnel-group name type IPsec_RA command Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push



Step 2 Configure the IKE Pre-shared Key Use the pre-shared-key command to specify the IKE pre-shared key when defining group policy information for the mode configuration push . This command must be used if the Cisco VPN Client identifies itself to the router with a pre-shared key. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push



Step 3 Specify the Local IP Address Pool Use the address-pool command to refer to an IP local pool address, which defines a range of addresses that will be used to allocate an internal IP address to a VPN client . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push



Step 4 Configure the Group Policy Type Use the group-policy command to create and specify the type of group to be created .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push



Step 5 Enter the Group Policy Attributes Submode Enter the group policy attribute sub-command mode to configure parameters specific to the group created .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push

• •

Step 6 Specify the DNS Servers Specify the primary and secondary DNS servers using the dns-server command in group-policy configuration mode . This step is optional. Every time that the dns-server command is issued, the existing setting are overwritten. To add a DNS server rather than overwrite previously configured servers, include the IP addresses of all DNS servers when this command is entered. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push

• •

Step 7 Specify the WINS Servers Specify the primary and secondary WINS servers using the wins-server command in group-policy configuration mode . This step is optional. As with DNS servers, every time that the wins-server command is issued, the existing settings are overwritten. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push

• •

Step 8 Specify the DNS Domain Specify the DNS domain to which a group belongs by using the default-domain command in group-policy configuration mode . This step is optional. The PIX Security Appliance passes the default domain name to the IPSec client to append to DNS queries that omit the domain field. This domain name applies only to tunneled packets. When there are no default domain names, users inherit the default domain name in the default group policy. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 3 – define a group policy for mode configuration push



Step 9 Specify the Idle Timeout Use the vpn-idle-timeout command to set the inactivity timeout for a Cisco VPN Client . When the inactivity timeout for a given VPN client or Easy VPN Remote device expires, the tunnel is terminated. The default inactivity timeout is 30 minutes. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 4 – create a transform set



Specify which transform sets are allowed for the crypto map entry using the crypto ipsec transform-set command . When using this command, be sure to list multiple transform sets in order of priority, with the highest priority first. Note that this is the only configuration statement required in dynamic crypto map entries.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Tasks 5 through 7 – dynamic crypto map



Task 5– Create Dynamic Crypto Map Create a dynamic crypto map entry and enter the crypto map configuration mode using the crypto dynamic-map command . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Tasks 5 through 7 – dynamic crypto map



Task 6 – Assign the Dynamic Crypto Map to a Static Crypto Map Add the dynamic crypto map to a static crypto map .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Tasks 5 through 7 – dynamic crypto map



Task 7 – Apply the Crypto Map to an Interface Apply the crypto map to the outside interface of the PIX Security Appliance Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 8 – configure XAUTH



Complete the following steps to configure XAUTH on the Easy VPN Server PIX Security Appliance : – Step 1 Enable AAA login authentication. – Step 2 Define AAA server IP address and encryption key. – Step 3 Enable IKE XAUTH for the crypto map. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 8 – configure XAUTH



Step 1 Enable AAA Login Authentication Enable AAA login authentication using the aaa-server command .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 8 – configure XAUTH



Step 2 Define AAA Server IP Address and Encryption Key Set the IP address of the AAA server and the encryption key using the aaa-server command . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 8 – configure XAUTH



Step 3 Enable IKE XAUTH for the Crypto Map Enable IKE XAUTH for the tunnel using the authentication-server-group command in tunnel-group general-attributes configuration mode . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 9 – configure NAT and NAT 0

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Task 10 – enable IKE dead peer detection



Dead peer detection (DPD) allows two IPSec peers to determine if the other is still alive during the lifetime of a VPN connection. DPD is useful because a host may reboot or the dialup link of a remote user may disconnect without notifying the peer that the VPN connection is gone away. When the IPSec host determines that a VPN connection no longer exists, it can notify the user, attempt to switch to another IPSec host, or clean up valuable resources that were allocated for the peer that no longer exists. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure a PIX 501 or 506E as an Easy VPN Client

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

PIX Security Appliance Easy VPN Remote feature overview





When using PIX Security Appliance Software Version 6.2 and higher, a PIX 501 or PIX 506/506E can be used as an Easy VPN Remote device when connecting to an Easy VPN Server, such as a Cisco VPN 3000 Concentrator, Cisco IOS router, or another PIX . Easy VPN Remote device functionality, sometimes called a hardware client, allows the PIX to establish a VPN tunnel to the Easy VPN Server. Hosts running on the LAN behind the PIX can connect through the Easy VPN Remote without individually running any VPN client software. Each Easy VPN Remote device is assigned to a group. The administrator use the vpngroup command to associate security policy attributes with a VPN group name. As Easy VPN Remote devices establish a VPN tunnel to the Easy VPN Server, the attributes associated with their group are pushed to the Easy VPN Remote device.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

PIX Security Appliance Easy VPN Remote feature overview

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Remote configuration



The Easy VPN Server controls the policy enforced on the PIX Security Appliance Easy VPN Remote device. However, to establish the initial connection to the Easy VPN Server, some configuration must be completed locally. This configuration can be done by using Cisco PIX Device Manager (PDM) or by using the command line interface as described in the following points . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Client device mode and enabling Easy VPN Remote clients





Set the Easy VPN Remote device to one of two modes, client mode or network extension mode. In client mode, the remote PIX Security Appliance applies PAT to all client IP addresses connected to the inside interface. In the example in the figure, when PC 10.1.1.2 attempts connect to the server at the central site, the remote PIX translates the original PC IP address and port number using the IP address and a port number of the outside interface, port address translation. Due to the translation, the IP address of PC1 is not visible from the central site. The other option is network extension mode (NEM) . With NEM, the IP address of the inside PCs are received without change at the central site. In this instance, the IP address of the PC is visible from the central site. In the example in the figure, the remote inside PC makes a connection to a server on the central site. The original PC IP address, 10.1.1.2, is not translated by the remote PIX Security Appliance.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Client device mode and enabling Easy VPN Remote clients

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Client device mode and enabling Easy VPN Remote clients

• • •

Set the Easy VPN Remote device mode by entering the following command : vpnclient mode {client-mode | network-extension-mode} Client mode applies NAT to all IP addresses of clients connected to the inside (higher security) interface of the PIX Security Appliance. Network extension mode – This option does not apply NAT to any IP addresses of clients on the inside, higher security, interface of the PIX Security Appliance. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Client device mode and enabling Easy VPN Remote clients



Finally, to enable the Easy VPN Remote device by entering the following command : vpnclient enable Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Easy VPN Remote authentication

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure the Adaptive Security Appliance to Support WebVPN

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

WebVPN end-user interface



The following buttons are available: – Help – The user can click this icon to access this help system. – Show Toolbar – The user can click this icon to show the WebVPN Toolbar – Home – The user can click this icon to return to the home page. – Logout – The user can click this icon to end the remote access session. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

WebVPN end-user interface



Website Access and Browsing Files If the administrator sets up end user accounts to access particular websites or file shares, one or more links appear under Websites on the home page of the end user . To access the website or file share, the end user simply clicks the link. If the site is protected, the end user will have to enter a username and password. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

WebVPN end-user interface



Port Forwarding The administrator can configure certain client/server applications for use by the end user. Starting Application Access, or Port Forwarding, opens a secure connection between the end user computer and the remote server. When the window is open or minimized, the connection is active. If the end user quits the window, the connection closes. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN general parameters



Enabling WebVPN and HTTP Server WebVPN features must be enabled on an interface-specific basis. On any interface, these features can be configured either singly or in combination. To use the following features on an interface, the administrator must enable them on each individual interface : – WebVPN (HTTPS) connections – POP3S, IMAP4S, and SMTPS for e-mail proxy sessions – HTTPS management sessions Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN general parameters



To enable the Adaptive Security Appliance HTTP server, use the http server enable command . To specify hosts that can access the HTTP server internal to the ASA, use the http command. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN general parameters



WebVPN Command Sub Mode These webvpn commands let the administrator configure AAA servers, default group policies, default idle timeout, http and https proxies, and NetBIOS Name Service (NBNS) servers for WebVPN, as well as the appearance of WebVPN screens that end users see. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN general parameters



NBNS Server Configuration The nbns-server command adds a NBNS server for Common Internet File System (CIFS) name resolution . Specifying the master option indicates that this is a master browser, rather than just a WINS server. This command may be entered multiple times. The no option will remove the matching entry from the configuration. The timeout value is in seconds. The default timeout value is 2 seconds, and the range is 1 to 30. The default number of retries is 2, and the range is 0 to 10. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN general parameters



Authentication Server Configuration The authentication-server-group command specifies the set of authentication servers to use with WebVPN or one of the e-mail proxies . For WebVPN, use this command in webvpn mode. For e-mail proxies, IMAP4S, POP3S, or SMTPS, use this command in the applicable e-mail proxy mode. The default is to not have any authentication servers configured. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN general parameters



Home Page Look and Feel Configuration Many of the commands in the webvpn subcommand mode control and customize the look and feel of the home page of the end user . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN servers and URLs



Enable WebVPN Protocol for Group Policy Use the vpn-tunnel-protocol command in group-policy configuration mode or username configuration mode to configure a VPN tunnel type for the user or group .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN servers and URLs



Enable URL Entry for WebVPN Users Use the webvpn command in group-policy configuration mode or in username configuration mode to enter the webvpn mode . These webvpn commands apply to the username or group policy from which they are configured. webvpn commands for group policies and usernames define access to files, MAPI proxy, URLs and TCP applications over WebVPN. They also identify ACLs and types of traffic to filter. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN servers and URLs



Use the functions command in webvpn mode to enable file access and file browsing, MAPI Proxy, and URL entry over WebVPN for this user or group policy . To remove a configured function, use the no form of this command. To remove all configured functions, including a null value created by issuing the functions none command, use the no form of this command without arguments. The no option allows inheritance of a value from another group policy. To prevent inheriting function values, use the functions none command. Functions are disabled by default. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN servers and URLs



Defining URLs with the url-listCommand Use the url-list command in global configuration mode to configure a set of URLs for WebVPN users to access . To configure a list with multiple URLs, use this command with the same listname multiple times, once for each URL. To remove an entire configured list, use the no url-list listname command. To remove a configured URL, use the no url-list listname url command. To configure multiple lists, use this command multiple times, assigning a unique listname to each list. To allow access to the URLs in a list for a specific group policy or user, use the listname created here with the url-list command in webvpn mode. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN servers and URLs



The example in Figure illustrates the various parameters which must be configured on the Adaptive Security Appliance to enable WebVPN access to the resources on the private network. Files access via CIFS is configured in the same basic manner. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN port forwarding



Use the port-forward command in webvpn mode to enable WebVPN application access for this user or group policy . To remove the port forwarding attribute from the configuration, including a null value created by issuing the port-forward none command, use the no form of this command. The no option allows inheritance of a list from another group policy. To prevent inheriting a port forwarding list, use the port-forward none command. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN port forwarding



Use the port-forward command in global configuration mode to configure the set of applications that WebVPN users can access over forwarded TCP ports . To configure access to multiple applications, use this command with the same listname multiple times, once for each application. To remove an entire configured list, use the no port-forward listname command. To remove a configured application, use the no port-forward listname localport command. The remoteserver and remoteport parameters do not need to be included in the command. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN port forwarding



The example in Figure contrasts configuring port forwarding using DNS names verses IP addresses. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN e-mail proxy



The mapi parameter enables or disables Microsoft Outlook/Exchange port forwarding at the group or user level and is only necessary if this feature is to be used . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN e-mail proxy



Proxy servers are defined by entering the appropriate subcommand mode in global configuration mode . Proxy servers are available for POP3S, SMTPS, and IMAP4S. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN e-mail proxy



Use the server command in the applicable e-mail proxy mode to specify a default e-mail proxy server . The Adaptive Security Appliance sends requests to the default e-mail server when the user connects to the e-mail proxy without specifying a server. If a default server is not configured, and a user does not specify a server, the security appliance returns an error. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN e-mail proxy



Use the authentication command to configure authentication methods for the e-mail proxy . To restore the default, aaa, use the no form of this command. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN e-mail proxy



The example in Figure illustrates the various parameters that must be configured on each device. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN content filters and ACLs



WebVPN Content Filters and ACLs are configured in the group-policy attributes in the webvpn subcommand mode . Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN content filters and ACLs



WebVPN Content Filtering let the administrator block or remove the parts of websites that use Java or Active X, scripts, display images, and deliver cookies . By default, these parameters are disabled, which means that no filtering occurs. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Configure WebVPN content filters and ACLs



Use the filter command in webvpn mode to specify the name of the access list to use for WebVPN connections for this group policy or username . To remove the access list, including a null value created by issuing the filter none command, use the no form of this command. The no option allows inheritance of a value from another group policy. To prevent inheriting filter values, use the filter value none command. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Summary • • • •

This module primarily covered the configuration of Cisco Easy VPN Server and Cisco Easy VPN Remote. Cisco Easy VPN Server configuration on routers and PIX Security Appliances was discussed. Configuring Easy VPN Remote with the Cisco VPN Client, Cisco routers, and the PIX 501 and 506/506E models was also covered. This module also provided an explanation of how to configure WebVPN on an Adaptive Security Appliance.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Related Documents

Module 6
November 2019 26
Module 6
October 2019 29
Module 6
December 2019 15
Module 6
June 2020 11
Module 6
December 2019 28
Module 6
November 2019 31

More Documents from "jeffrey flores"

Module 7
April 2020 30
Module 8
April 2020 33
Module 4
April 2020 25
Module 6
April 2020 27
Module 1
April 2020 26
Module 5
April 2020 17