Sie sind auf Seite 1von 132

Module 6: Configure Remote

Access VPN

PDF created with pdfFactory trial version www.pdffactory.com


Overview

• Introduction to Cisco Easy VPN


• Configure the Easy VPN Server
• Configure Easy VPN Remote for the Cisco VPN Client 4.x
• Configure Cisco Easy VPN Remote for Access Routers
• Configure the PIX Security Appliance as an Easy VPN
Server
• Configure a PIX 501 or 506E as an Easy VPN Client
• Configure the Adaptive Security Appliance to Support
WebVPN

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Introduction to Cisco Easy VPN

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Introduction to Cisco Easy VPN

• Cable modems, DSL routers, and other forms of broadband access provide
high-performance connections to the Internet, but many applications also
require the security of VPN connections that perform a high level of
authentication and that encrypt the data between two particular endpoints.
• However, establishing a VPN connection between two routers can be
complicated and typically requires tedious coordination between network
administrators to configure the VPN parameters of the two routers.
• The Cisco Easy VPN Remote feature eliminates much of this tedious work by
implementing Cisco Unity Client Protocol, which allows most VPN parameters
to be defined at a Cisco Easy VPN server. This server can be a dedicated VPN
device, such as a Cisco VPN 3000 concentrator a PIX Security Appliance, or
an IOS router that supports the Cisco Unity Client Protocol.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Overview of the Easy VPN Server

• The Easy VPN Server enables Cisco IOS routers, PIX Security
Appliances, and Cisco VPN 3000 Series Concentrators to act as VPN
headend devices in site-to-site or remote-access VPNs, where the
remote office devices are using the Easy VPN Remote feature.
• Using this feature, security policies defined at the headend are pushed
to the remote VPN device, ensuring that those connections have up-to-
date policies in place before the connection is established.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Overview of the Cisco Easy VPN Remote

• The Easy VPN Remote feature enables Cisco IOS routers, PIX Security Appliances, and
Cisco VPN 3002 Hardware Clients or Software Clients to act as remote VPN Clients.
These devices can receive security policies from an Easy VPN Server, minimizing VPN
configuration requirements at the remote location.
• In the example in Figure , the VPN gateway is a Cisco IOS router running the Easy VPN
Server feature. Remote Cisco IOS routers and VPN Software Clients connect to the
Cisco IOS router Easy VPN Server for access to the corporate intranet.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Overview of the Cisco Easy VPN Remote

• Restrictions for VPN Remote


The Cisco Easy VPN Remote feature requires that the destination peer
be a Cisco IOS Easy VPN server or VPN concentrator that supports
the Cisco Easy VPN Server feature. At the time of publication, this
includes the platforms when running the indicated software releases
that are shown in Figure
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Overview of the Cisco Easy VPN Remote

• Only ISAKMP Policy Group 2 Supported on Easy VPN Servers


The Unity Protocol supports only Internet Security Association Key
Management Protocol (ISAKMP) policies that use group 2 (1024-bit
Diffie-Hellman) Internet Key Exchange (IKE) negotiation, so the Easy
VPN server being used with the Cisco Easy VPN Remote feature must
be configured for a group 2 ISAKMP policy. The Easy VPN server
cannot be configured for ISAKMP group 1 or group 5 when being used
with a Cisco Easy VPN client.
• Transform Sets Supported
To ensure a secure tunnel connection, the Cisco Easy VPN Remote
feature does not support transform sets that provide encryption without
authentication, such as ESP-DES and ESP-3DES. Transform sets that
provide authentication without encryption, such as ESP-NULL ESP-
SHA-HMAC and ESP-NULL ESP-MD5-HMAC, are also not supported.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


How Cisco Easy VPN works

• When an Easy VPN Remote client initiates a connection with an Easy


VPN Server gateway, the conversation that occurs between the peers
generally consists of the following major steps:
– Device authentication via ISAKMP
– User authentication using IKE Extended Authentication (XAUTH)
– VPN policy push, when using mode configuration
– IPSec Security Association (SA) creation

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Remote client connection in detail

• Step 1 The VPN Client Initiates the IKE Phase 1 Process.


Because there are two ways to perform authentication, the VPN Client must consider the
following when initiating this phase.
– If a pre-shared key is to be used for authentication, the VPN Client initiates
aggressive mode (AM). When pre-shared keys are used, the accompanying group
name entered in the configuration GUI, ID_KEY_ID, is used to identify the group
profile associated with this VPN Client.
– If digital certificates are to be used for authentication, the VPN Client initiates main
mode (MM). When digital certificates are used, the organizational unit (OU) field of a
distinguished name (DN) is used to identify the group profile.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Remote client connection in detail

• Step 2 The VPN Client Establishes an ISAKMP SA.


To reduce the amount of manual configuration on the VPN Client,
every combination of encryption and hash algorithms, in addition to
authentication methods and Diffie-Hellman (DH) group sizes, is
proposed
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Remote client connection in detail

• Step 3 The Easy VPN Server Accepts the SA Proposal.


ISAKMP policy is global for the Easy VPN Server and can consist of several
proposals . In the case of multiple proposals, the Easy VPN Server will use the
first match. The most secure policies should always be listed first.
• Device authentication ends and user authentication begins at this point.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Remote client connection in detail

• Step 4 The Easy VPN Server Initiates a Username/password Challenge.


The information that is entered is checked against authentication entities using
AAA protocols such as RADIUS and TACACS+ . Token cards may also be
used via AAA proxy.
• VPN devices that are configured to handle remote VPN Clients should always
be configured to enforce user authentication.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Remote client connection in detail

• Step 5 The Mode Configuration Process is Initiated.


The remaining system parameters, such as IP address, DNS, split
tunnel attributes, are pushed to the VPN Client at this time using mode
configuration . The IP address is the only required parameter in a
group profile. All other parameters are optional.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Remote client connection in detail

• Step 6 The Reverse Route Injection (RRI) Process is Initiated.


Reverse Route Injection (RRI) ensures that a static route is created on the Easy VPN
Server for the internal IP address of each VPN Client .
• It is recommended that RRI is enabled on the crypto map, either static or dynamic, for
the support of VPN Clients, unless the crypto map is being applied to a Generic Routing
Encapsulation (GRE) tunnel that is already being used to distribute routing information.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Remote client connection in detail

• Step 7 IPSec Quick Mode Completes the Connection.


After IPSec SAs have been created, the connection is complete.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 1 – create an IP address pool


• If a local IP address pool is to be used, that pool must first be
configured using the ip local pool command. The syntax for this
command is as follows:
ip local pool {default | pool-name low-ip-address [high-ip-address]}

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 2 – configure group policy lookup


• Configuring group policy lookup is completed in two steps, as shown in Figure :
– Step 1 The first step when preparing the Easy VPN Server router for remote access
is to establish a AAA section in the configuration file using the aaa new-model
command in global configuration mode.
– Step 2 Enable group policy lookup using the aaa authorization network command.
A RADIUS server and the router local database may be used together and will be
tried in the order listed.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 3 – create ISAKMP policy for remote VPN access


• Complete this task to configure the ISAKMP policy for all Easy VPN
Remote clients attaching to this router. Use the standard ISAKMP
configuration commands to accomplish this task. A general example of
how to configure the ISAKMP policy starting in global configuration
mode is shown in Figure.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 4 – define a group policy for a mode configuration push


• This task creates a transform set for the Easy VPN Remote clients to
use when they attempt to build an IPSec tunnel to the router. Use the
standard method for creating a transform set, as shown in Figure .
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 4 (continue)– define a group policy for a mode configuration push


– Step 1 Add the Group Profile to be Defined
The crypto isakmp client configuration group command specifies the
policy profile of the group that will be defined and enters ISAKMP group
configuration mode.
– Use the crypto isakmp client configuration group command to specify
group policy information that needs to be defined or changed .
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 4 (continue)– define a group policy for a mode configuration push


– Step 2 Configure the ISAKMP Pre-shared Key
Use the key command in ISAKMP group configuration mode to specify the
ISAKMP pre-shared key when defining group policy information for the
mode configuration push . This command must be used if the VPN Client
identifies itself to the router with a pre-shared key.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 4 (continue)– define a group policy for a mode configuration


push
– Step 3 (Optional) Specify the DNS servers
Specify the primary and secondary DNS servers using the dns
command in ISAKMP group configuration mode .
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 4 (continue)– define a group policy for a mode configuration


push
– Step 4 (Optional) Specify the Windows Internet Name Service
(WINS) servers
Specify the primary and secondary WINS servers using the wins
command in ISAKMP group configuration mode.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 4 (continue)– define a group policy for a mode configuration


push
– Step 5 (Optional) Specify the DNS Domain
Specify the DNS domain to which a group belongs by using the
domain command in ISAKMP group configuration mode .
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 4 (continue)– define a group policy for a mode configuration push


– Step 6 Specify the Local IP Address Pool
Use the pool command to refer to an IP local address pool, which defines
a range of addresses that will be used to allocate an internal IP address to
a VPN Client.
– Use the pool command in the ISAKMP group configuration mode to define
a local pool address .
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 5 – create a transform set


• This task creates a transform set for the Easy VPN Remote clients to
use when they attempt to build an IPSec tunnel to this router. Use the
standard method for creating a transform set, as shown in Figure .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 6 – create a dynamic crypto map with RRI


• This task creates a dynamic crypto map to be used when building IPSec
tunnels to Easy VPN Remote clients. In this example, RRI is used to ensure
that returning data destined for a particular IPSec tunnel can find that tunnel.
RRI ensures that a static route is created on the Easy VPN Server for each
client internal IP address.
• Complete the following steps to create the dynamic crypto map with RRI :
– Step 1 Create a dynamic crypto map.
– Step 2 Assign a transform set to the crypto map.
– Step 3 Enable RRI.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 6 (continue) – create a dynamic crypto map with RRI


– Step 1 Create a Dynamic Crypto Map
Create a dynamic crypto map entry and enter the crypto map configuration
mode using the crypto dynamic-map command .
– A dynamic crypto map entry is essentially a crypto map entry without all of
the parameters configured. It acts as a policy template where the missing
parameters are later dynamically configured, as the result of an IPSec
negotiation, to match the requirements of as remote peer. This practice
allows remote peers to exchange IPSec traffic with the router even if the
router does not have a crypto map entry specifically configured to meet all
of the requirements of the remote peer.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 6 (continue) – create a dynamic crypto map with RRI


– Step 2 Assign a Transform Set to the Crypto Map
Specify which transform sets are allowed for the crypto map entry
using the set transform-set command . When using this
command, be sure to list multiple transform sets in order of priority,
with the highest priority listed first. Note that this is the only
configuration statement required in dynamic crypto map entries.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 6 (continue) – create a dynamic crypto map with RRI


– Step 3 Enable RRI
Enable RRI using the reverse-route command . This command
has no arguments or keywords.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 7 – apply mode configuration to the dynamic crypto map


• Apply mode configuration to a dynamic crypto map using the following steps in
global configuration mode :
– Step 1 Configure the router to respond to mode configuration requests.
– Step 2 Enable IKE queries for group policy lookup.
– Step 3 Apply the dynamic crypto map to the crypto map.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 7 (continue)– apply mode configuration to the dynamic crypto map


– Step 1 Configure the Router to Respond to Mode Configuration
Requests
Configure the router to initiate or reply to mode configuration requests with
the crypto map map-name client configuration command . Note that
VPN Clients require the respond keyword to be used. The initiate
keyword was used with older VPN Clients and is no longer used with the
3.x or higher version Cisco VPN Clients.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 7 (continue)– apply mode configuration to the dynamic crypto map


– Step 2 Enable IKE Queries for Group Policy Lookup
Enable ISAKMP querying for group policy when requested by the VPN
Client with the crypto map isakmp authorization list command . AAA uses
the list-name argument to determine which method list is used to find the
policy, either local or RADIUS, as defined in the aaa authorization network
command.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 7 (continue)– apply mode configuration to the dynamic


crypto map
– Step 3 Apply the Dynamic Crypto Map to the Crypto Map
Apply the dynamic crypto map to the crypto map using the crypto
map command in global configuration mode.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 8 – apply a dynamic crypto map to the router interface


• The crypto map map-name command is used to apply the crypto map
to the outside interface of the Easy VPN Server router.
• An example of how to apply the crypto map to the outside interface
beginning in global configuration mode is shown in Figure .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 9 – enable IKE dead peer detection


• Dead peer detection (DPD) is a keepalives scheme that allows the router to query the liveliness of its
IKE peer. There are two options for DPD. These options are periodic and on-demand.
– Periodic DPD
Periodic DPD functions on the basis of the timer. If the timer is set for 10 seconds, the router will
send a hello message every 10 seconds, unless, the router receives a hello message from the
peer.
– On-demand DPD
DPD also has an on-demand approach. The on-demand approach is the default. With on-
demand DPD, messages are sent on the basis of traffic patterns .
• Enable DPD
Use the crypto isakmp keepalive command in global configuration mode to enable a Cisco IOS VPN
gateway, instead of the VPN Client, to send DPD messages .
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 10 – (optional) Configure XAUTH


• Complete the following steps to configure XAUTH on the Easy VPN Server
router :
– Step 1 Enable AAA login authentication.
– Step 2 Set XAUTH timeout value.
– Step 3 Enable ISAKMP XAUTH for the dynamic crypto map.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 10 (continue)– (optional) Configure XAUTH


– Step 1 Enable AAA Login Authentication
Enable AAA login authentication using the aaa authentication login
command in global configuration mode .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 10 (continue)– (optional) Configure XAUTH


– Step 3 Enable ISAKMP XAUTH for the Dynamic Crypto Map
Enable IKE XAUTH for the dynamic crypto map using the crypto map
command with the authentication list option .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Easy VPN Server

• Task 11 – (optional) Enable XAUTH save password feature


• Cisco Easy VPN Remote uses one of three available authentication methods:
– No XAUTH – When no XAUTH is used, there is no authentication for the user when
establishing the VPN tunnels.
– XAUTH with no password save feature – This is better than no XAUTH, but it
requires that users re-enter the password each time they need to establish the VPN
tunnel.
– XAUTH with password save feature – Using the password save function, users need
only enter their password once when establishing the VPN tunnel.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco
VPN Client 4.x

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• The Cisco VPN Client for Windows, referred to in this lesson as VPN
Client, is software that runs on a Microsoft Windows-based PC.
• The VPN Client on a remote PC, communicating with a Cisco Easy
VPN server on an enterprise network or with a service provider,
creates a secure connection over the Internet.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 1 – install the Cisco VPN Client 4.x on the remote PC


• The VPN Client can be installed on a system through either InstallShield or the
Microsoft Windows Installer (MSI) . Both applications use installation wizards
to walk the user through the installation.
• Installing the VPN Client through InstallShield includes an Uninstall icon in the
program group. MSI installation does not include this icon. In the latter case, to
manually remove VPN Client applications, the Microsoft Add/Remove
Programs utility can be used.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 1 (continue) – install the Cisco VPN Client 4.x on the remote PC
• If a VPN Client has been previously installed, when the vpnclient_en.exe
command or vpnclien_en.msi is executed, an error message displays . The
previously installed VPN Client must be uninstalled before proceeding with the
new installation.
• To remove a VPN Client installed with the MSI installer, use the Windows
Add/Remove Programs control panel. To remove a VPN Client installed with
InstallShield, select Start > Programs > Cisco Systems VPN Client >
Uninstall Client.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 2 – create a new client connection entry


• To use the VPN Client, at least one connection entry must be created, which identifies
the following information:
– The VPN device, also known as the remote server, to access
– Preshared keys – The IPSec group to which the user is assigned to. The group
determines how the user can access and use the remote network. For example, the
group specifies access hours, number of simultaneous logins, user authentication
method, and the IPSec algorithms that the VPN Client uses.
– Certificates – The name of the certificate that will be used for authentication
– Optional parameters that govern VPN Client operation and connection to the remote
network
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 2 (continue)– create a new client connection entry


• Creating a New Connection Entry
Use the following procedure to create a new connection entry.
– Step 1 Start the VPN Client by choosing Start > Programs > Cisco Systems VPN Client > VPN
Client.
– Step 2 The VPN Client application starts and displays the advanced mode main window. If
necessary, open the Options menu in simple mode and choose AdvancedMode or press Ctrl-M.
– Step 3 Select New from the toolbar or the Connection Entries menu. The VPN Client displays a
form.
– Step 4 Enter a unique name for this new connection. Any name can be used to identify this
connection. This name can contain spaces, and it is not case-sensitive.
– Step 5 Enter a description of this connection. This field is optional, but it helps to further identify
this connection.
– Step 6 Enter the hostname or IP address of the remote VPN device that the client will connect
to.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 3 – choose an authentication method


• Under the Authentication tab, enter the information for the
authentication method that will be used. The VPN Client can connect
as part of a group that is configured on the remote VPN device, or by
supplying an identity digital certificate.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 3 (continue)– choose an authentication method


• Group Authentication
The network administrator usually configures group authentication for the
remote user. If this is not the case, use the following procedure:
– Step 1 Click the Group Authentication radio button.
– Step 2 In the Name field, enter the name of the IPSec group to which the
remote user belongs. This entry is case-sensitive.
– Step 3 In the Password field, enter the password, which is also case-
sensitive, for the IPSec group to which the remote user belongs. The field
displays only asterisks.
– Step 4 Verify the password by entering it again in the Confirm Password
field. Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 3 (continue)– choose an authentication method


• Mutual Group Authentication
To use mutual group authentication, a root certificate that is compatible
with the central-site VPN installed on the system is needed. The
network administrator can load a root certificate on the remote user’s
system during installation of the VPN Client software. When mutual
group authentication is used, the VPN Client software verifies whether
the remote user has a root certificate installed. If not, it prompts the
remote user to install one. Before the user can continue, a root
certificate must be imported. When the root certificate has been
installed, follow the steps for Group Authentication.
• Certificate Authentication
For certificate authentication, perform the following procedure, which
varies according the type of certificate that is being used:
– Step 1 Click the Certificate Authentication radio button.
– Step 2 Choose the name of the certificate that is being used from
the menu.
• If the field says No Certificates Installed and is shaded, then the VPN
Client must enroll for a certificate before this feature can be used.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 4 – configure transparent tunneling


• Transparent tunneling allows secure transmission between the VPN Client and a secure
gateway through a router serving as a firewall, which may also be performing NAT or
PAT.
• Transparent tunneling encapsulates ESP traffic within UDP packets and can allow for
both ISAKMP ISAKMP and ESP to be encapsulated in TCP packets before they are sent
through the NAT or PAT devices and/or firewalls.
• The most common application for transparent tunneling is behind a home router
performing PAT.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 4 (continue)– configure transparent tunneling


• Using IPSec over UDP (NAT/PAT)
To enable IPSec over UDP (NAT/PAT), click the radio button. With UDP, the
port number is negotiated. UDP is the default mode.
• Using IPSec over TCP (NAT/PAT/Firewall)
To enable IPSec over TCP, click the radio button. When using TCP, the port
number for TCP must also be enteredin the TCP port field. This port number
must match the port number configured on the secure gateway. The default
port number is 10000.
• Allowing Local LAN Access
In a multiple-NIC configuration, Local LAN access pertains only to network
traffic on the interface on which the tunnel was established. The Allow Local
LAN Access parameter gives the remote user access to the resources on their
local LAN when they are connected through a secure gateway to a central-site
VPN device The resources could include printers, fax machines, shared files,
or other systems, When this parameter is enabled and the central site is
configured to permit it, remote users can access local resources while
connected. When this parameter is disabled, all traffic from the Client system
goes through the IPSec connection to the secure gateway.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 5 – enable and add backup servers


• The private network may include one or
more backup VPN servers to use if the
primary server is not available. The system
administrator should tell the remote user
whether to enable backup servers.
Information on backup servers can
download automatically from the VPN
Concentrator, or this information can be
entered manually.
• To enable backup servers from the VPN
Client, use the following procedure:
– Step 1 Open the Backup Servers tab.
– Step 2 Check Enable Backup
Server(s). This is not checked by
default.
– Step 3 Click Add to enter the address
of a backup server.
– Step 4 Enter the hostname or IP
address of the backup server. Use a
maximum of 255 characters.
– Step 5 To add more backup devices,
repeat Steps 2, 3, and 4.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Easy VPN Remote for the Cisco VPN Client 4.x

• Task 6 – configure connection to


the Internet through dial-up
networking
• To connect to a private network using
a dial-up connection, perform the
following steps:
– Step 1 Use a dial-up connection to
an Internet service provider (ISP)
to connect to the Internet.
– Step 2 Use the VPN Client to
connect to the private network
through the Internet.
• To enable and configure this feature,
check the Connect to the Internet via
dial-up check box. This feature is not
checked by default.
• Remote users can connect to the
Internet using the VPN Client
application in either of the following
ways:
– Microsoft Dial-up Networking
(DUN)
– Third party dial-up program
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for
Access Routers

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Easy VPN Remote modes of operation


– The Cisco Easy VPN Remote feature supports the following three modes
of operation:
• Client mode
• Network extension mode
• Network extension plus mode
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Easy VPN Remote modes of operation (continue)


– Client Mode Example
The diagram in Figure illustrates the client mode of operation. In this
example, the Cisco 831 router provides access to two PCs, which have IP
addresses in the 10.0.0.0 private network space. These PCs connect to the
Ethernet interface on the Cisco 831 router, which also has an IP address in
the 10.0.0.0 private network space. The Cisco 831 router performs NAT or
PAT translation over the VPN tunnel so that the PCs can access the
destination network.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Easy VPN Remote modes of operation (continue)


– Network Extension Mode Example
The diagram in Figure illustrates the network extension mode of operation. In this
example, the Cisco 831 router acts as Cisco Easy VPN remote devices, connecting
to a router used as a Cisco Easy VPN server.
The client hosts are given IP addresses that are fully routable by the destination
network over the tunnel. These IP addresses could be either in the same subnet
space as the destination network, or in separate subnets, assuming that the
destination routers are configured to properly route those IP addresses over the
tunnel.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Configuration tasks for Cisco Easy VPN Remote for access


routers
• Configuring Cisco access routers to act as Easy VPN Remote clients
consists of the following tasks :
– Task 1 – (Optional) Configure the DHCP server pool.
– Task 2 – Configure and assign the Cisco Easy VPN client profile.
– Task 3 – (Optional) Configure XAUTH password save.
– Task 4 – Initiate the VPN tunnel.
– Task 5 – Verify the Cisco Easy VPN configuration.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 1 – configure the DHCP server pool


• To use the DHCP server of the local router to assign IP addresses to the hosts that are
connected to the LAN interface of the router, a pool of IP addresses must be created for
the internal DHCP server .
• In a typical VPN connection, the hosts connected to the LAN interface of the router are
assigned an IP address in a private address space. The router then uses NAT/PAT to
translate those IP addresses into a single IP address that is transmitted across the VPN
tunnel connection.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 1 (continue)– configure the DHCP server pool


• The following steps are used to create the DHCP server pool:
– Step 1
Create a DHCP server address pool using the ip dhcp pool pool-name command.
This places the administrator in DHCP pool configuration mode.
– Step 2
Use the network command to specify the IP network and subnet mask of the
address pool that will be used by the hosts connected to the local Ethernet interface
of the router.
– Step 3
Use the default-router command to specify the IP address of the default router for a
DHCP client. At least one address must be specified. Up to eight addresses can be
specified per command.
– Step 4
Use the import all command to ensure that the router is configured with the proper
DHCP parameters from the central DHCP server. This option requires a central
DHCP server be configured to provide the DHCP options. This server can be on a
different subnet or network.
– Step 5
The lease command is optional. Use this command to specify the duration of the
DHCP lease. Use the exit command to leave the DHCP pool configuration mode.
– Step 6
Use the ip dhcp excluded-address command to exclude the specified address
from the DHCP server pool. The lan-ip-address should be the IP address assigned
to the LAN interface of the router.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 1 (continue)– configure the DHCP server pool


• One example of a DHCP server pool configuration is shown in Figure.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 2 – configure and assign the Cisco Easy VPN


Client profile

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 2 (continue)– configure and assign the Cisco Easy VPN Client
profile
– Step 1
Use the crypto ipsec client ezvpn name command to create a profile.
This places the administrator in Cisco Easy VPN Remote configuration
mode.
– Step 2
Use the group group-name key group-key command to specify the IPSec
group and IPSec key values to be associated with this profile. The values
of group-name and group-key must match the values assigned in the Easy
VPN Server.
– Step 3
Use the peer command to specify the IP address or hostname for the
destination peer. This is typically the IP address of the outside interface of
the Easy VPN Server. If a hostname is used, a DNS server must be
configured and available in order for this to work.
– Step 4
Use the mode command to specify the type of VPN connection that should
be made. The options are client mode or network extension mode.
– Step 5
Enter the exit command to leave Easy VPN Remote configuration mode.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 2 (continue)– configure and assign the Cisco Easy VPN Client
profile
– An example of an Easy VPN Client profile configuration is shown in Figure.
– Use the crypto ipsec client ezvpn name command in interface
configuration mode to assign the Easy VPN client profile to a router
interface.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 2 (continue)– configure and assign the Cisco Easy VPN


Client profile
– An example of how to assign the Easy VPN Client profile to a router
interface is shown in Figure.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 3 – (optional) configure XAUTH save password feature


• Task 3 is an optional task. If XAUTH is not used, then skip this task.
• If the save password feature is enabled on the Cisco Easy VPN Server, it must
be enabled on the client as well. If both ends of the tunnel do not match, the
VPN tunnel will not be established.
• This task could be also be done as part of Task 2 – Configure the Cisco Easy
VPN Client Profile.
• Enter the username command in ezvpn crypto configuration mode for the
specific client profile as shown in Figure . This is the AAA username and
password used to automatically re-authenticate the user with the XAUTH
password save feature enabled in the Cisco Easy VPN Server.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 4 – (optional) initiate the VPN tunnel (XAUTH)


• Task 4 is also optional. If XAUTH is not being used, then skip this task.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 4 (continue)– (optional) initiate the VPN tunnel (XAUTH)


• With XAUTH configured, the VPN tunnel must be initiated manually, for
at least the first time. The Cisco IOS software message shown in
Figure (slide 122) is displayed because the software is waiting for a
valid XAUTH username and password. This message will be displayed
whenever an administrator logs in to the remote router console port.
– Step 1 Enter the crypto ipsec client ezvpn xauth command.
– Step 2 Enter the username and password as prompted.
• Which of two options happens next is determined by the XAUTH
configuration:
– With just the XAUTH feature enabled, when the SA expires, the
username and password must be re-entered manually. This
process is ongoing. The same Cisco IOS message will be
displayed and the user will have to repeat this manual process to
re-authenticate each time.
– With the XAUTH password save enabled, when the SA expires, the
last valid username and password will be reused automatically.
This option is the more popular of the two.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure Cisco Easy VPN Remote for Access Routers

• Task 5 – verify the Cisco Easy VPN configuration


• Task 5 consists of reviewing the Easy VPN configuration using the
show crypto ipsec client ezvpn command . Figure details an
example of Easy VPN Remote access router configuration.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the PIX Security Appliance as an
Easy VPN Server

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Server general configuration tasks

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 1 – create ISAKMP policy for remote VPN Client
access

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 2 – create an IP address pool

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Complete this task to define a group policy to be pushed


during mode configuration. Although users can belong to
only one group per connection, they may belong to specific
groups with different policy requirements.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Step 1 Set the Tunnel Group Type


To enable remote access the tunnel group type must be
named and set to remote access using the tunnel-group
name type IPsec_RA command

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Step 2 Configure the IKE Pre-shared Key


Use the pre-shared-key command to specify the IKE pre-shared key when
defining group policy information for the mode configuration push . This
command must be used if the Cisco VPN Client identifies itself to the router
with a pre-shared key.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Step 3 Specify the Local IP Address Pool


Use the address-pool command to refer to an IP local pool address,
which defines a range of addresses that will be used to allocate an
internal IP address to a VPN client .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Step 4 Configure the Group Policy Type


Use the group-policy command to create and specify the type of
group to be created .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Step 5 Enter the Group Policy Attributes Submode


Enter the group policy attribute sub-command mode to configure
parameters specific to the group created .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Step 6 Specify the DNS Servers


Specify the primary and secondary DNS servers using the dns-server command in
group-policy configuration mode . This step is optional.
• Every time that the dns-server command is issued, the existing setting are overwritten.
To add a DNS server rather than overwrite previously configured servers, include the IP
addresses of all DNS servers when this command is entered.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Step 7 Specify the WINS Servers


Specify the primary and secondary WINS servers using the wins-server
command in group-policy configuration mode . This step is optional.
• As with DNS servers, every time that the wins-server command is issued, the
existing settings are overwritten.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Step 8 Specify the DNS Domain


Specify the DNS domain to which a group belongs by using the default-domain
command in group-policy configuration mode . This step is optional.
• The PIX Security Appliance passes the default domain name to the IPSec client to
append to DNS queries that omit the domain field. This domain name applies only to
tunneled packets. When there are no default domain names, users inherit the default
domain name in the default group policy.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 3 – define a group policy for mode configuration
push

• Step 9 Specify the Idle Timeout


Use the vpn-idle-timeout command to set the inactivity timeout for a
Cisco VPN Client . When the inactivity timeout for a given VPN client
or Easy VPN Remote device expires, the tunnel is terminated. The
default inactivity timeout is 30 minutes.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 4 – create a transform set

• Specify which transform sets are allowed for the crypto map entry using the
crypto ipsec transform-set command . When using this command, be sure
to list multiple transform sets in order of priority, with the highest priority first.
Note that this is the only configuration statement required in dynamic crypto
map entries.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Tasks 5 through 7 – dynamic crypto map

• Task 5– Create Dynamic Crypto Map


Create a dynamic crypto map entry and enter the crypto map
configuration mode using the crypto dynamic-map command .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Tasks 5 through 7 – dynamic crypto map

• Task 6 – Assign the Dynamic Crypto Map to a Static Crypto Map


Add the dynamic crypto map to a static crypto map .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Tasks 5 through 7 – dynamic crypto map

• Task 7 – Apply the Crypto Map to an Interface


Apply the crypto map to the outside interface of the PIX Security
Appliance

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 8 – configure XAUTH

• Complete the following steps to configure XAUTH on the Easy VPN


Server PIX Security Appliance :
– Step 1 Enable AAA login authentication.
– Step 2 Define AAA server IP address and encryption key.
– Step 3 Enable IKE XAUTH for the crypto map.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 8 – configure XAUTH

• Step 1 Enable AAA Login Authentication


Enable AAA login authentication using the aaa-server
command .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 8 – configure XAUTH

• Step 2 Define AAA Server IP Address and Encryption


Key
Set the IP address of the AAA server and the encryption
key using the aaa-server command .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 8 – configure XAUTH

• Step 3 Enable IKE XAUTH for the Crypto Map


Enable IKE XAUTH for the tunnel using the
authentication-server-group command in tunnel-group
general-attributes configuration mode .
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 9 – configure NAT and NAT 0

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Task 10 – enable IKE dead peer detection

• Dead peer detection (DPD) allows two IPSec peers to determine if the other is
still alive during the lifetime of a VPN connection. DPD is useful because a host
may reboot or the dialup link of a remote user may disconnect without notifying
the peer that the VPN connection is gone away. When the IPSec host
determines that a VPN connection no longer exists, it can notify the user,
attempt to switch to another IPSec host, or clean up valuable resources that
were allocated for the peer that no longer exists.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure a PIX 501 or 506E as an Easy
VPN Client

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


PIX Security Appliance Easy VPN Remote feature
overview

• When using PIX Security Appliance Software Version 6.2 and higher, a
PIX 501 or PIX 506/506E can be used as an Easy VPN Remote device
when connecting to an Easy VPN Server, such as a Cisco VPN 3000
Concentrator, Cisco IOS router, or another PIX . Easy VPN Remote
device functionality, sometimes called a hardware client, allows the PIX
to establish a VPN tunnel to the Easy VPN Server. Hosts running on
the LAN behind the PIX can connect through the Easy VPN Remote
without individually running any VPN client software.
• Each Easy VPN Remote device is assigned to a group. The
administrator use the vpngroup command to associate security policy
attributes with a VPN group name. As Easy VPN Remote devices
establish a VPN tunnel to the Easy VPN Server, the attributes
associated with their group are pushed to the Easy VPN Remote
device.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


PIX Security Appliance Easy VPN Remote feature
overview

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Remote configuration

• The Easy VPN Server controls the policy enforced on the PIX Security
Appliance Easy VPN Remote device. However, to establish the initial
connection to the Easy VPN Server, some configuration must be
completed locally. This configuration can be done by using Cisco PIX
Device Manager (PDM) or by using the command line interface as
described in the following points .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Client device mode and enabling Easy VPN
Remote clients

• Set the Easy VPN Remote device to one of two modes, client mode or
network extension mode. In client mode, the remote PIX Security
Appliance applies PAT to all client IP addresses connected to the
inside interface. In the example in the figure, when PC 10.1.1.2
attempts connect to the server at the central site, the remote PIX
translates the original PC IP address and port number using the IP
address and a port number of the outside interface, port address
translation. Due to the translation, the IP address of PC1 is not visible
from the central site.
• The other option is network extension mode (NEM) . With NEM, the IP
address of the inside PCs are received without change at the central
site. In this instance, the IP address of the PC is visible from the central
site. In the example in the figure, the remote inside PC makes a
connection to a server on the central site. The original PC IP address,
10.1.1.2, is not translated by the remote PIX Security Appliance.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Client device mode and enabling Easy VPN
Remote clients

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Client device mode and enabling Easy VPN
Remote clients

• Set the Easy VPN Remote device mode by entering the following command :
vpnclient mode {client-mode | network-extension-mode}
• Client mode applies NAT to all IP addresses of clients connected to the inside (higher
security) interface of the PIX Security Appliance.
• Network extension mode – This option does not apply NAT to any IP addresses of clients
on the inside, higher security, interface of the PIX Security Appliance.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Client device mode and enabling Easy VPN
Remote clients

• Finally, to enable the Easy VPN Remote device by entering


the following command :
vpnclient enable

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Easy VPN Remote authentication

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure the Adaptive Security Appliance
to Support WebVPN

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


WebVPN end-user interface

• The following buttons are available:


– Help – The user can click this icon to access this help system.
– Show Toolbar – The user can click this icon to show the WebVPN Toolbar
– Home – The user can click this icon to return to the home page.
– Logout – The user can click this icon to end the remote access session.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


WebVPN end-user interface

• Website Access and Browsing Files


If the administrator sets up end user accounts to access particular
websites or file shares, one or more links appear under Websites on
the home page of the end user . To access the website or file share,
the end user simply clicks the link. If the site is protected, the end user
will have to enter a username and password.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


WebVPN end-user interface

• Port Forwarding
The administrator can configure certain client/server applications for
use by the end user. Starting Application Access, or Port Forwarding,
opens a secure connection between the end user computer and the
remote server. When the window is open or minimized, the connection
is active. If the end user quits the window, the connection closes.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN general parameters

• Enabling WebVPN and HTTP Server


WebVPN features must be enabled on an interface-specific basis. On any interface, these features
can be configured either singly or in combination. To use the following features on an interface, the
administrator must enable them on each individual interface :
– WebVPN (HTTPS) connections
– POP3S, IMAP4S, and SMTPS for e-mail proxy sessions
– HTTPS management sessions

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN general parameters

• To enable the Adaptive Security Appliance HTTP server,


use the http server enable command . To specify hosts
that can access the HTTP server internal to the ASA, use
the http command.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN general parameters

• WebVPN Command Sub Mode


These webvpn commands let the administrator configure AAA servers,
default group policies, default idle timeout, http and https proxies, and
NetBIOS Name Service (NBNS) servers for WebVPN, as well as the
appearance of WebVPN screens that end users see.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN general parameters

• NBNS Server Configuration


The nbns-server command adds a NBNS server for Common Internet File System
(CIFS) name resolution . Specifying the master option indicates that this is a master
browser, rather than just a WINS server. This command may be entered multiple times.
The no option will remove the matching entry from the configuration. The timeout value
is in seconds. The default timeout value is 2 seconds, and the range is 1 to 30. The
default number of retries is 2, and the range is 0 to 10.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN general parameters

• Authentication Server Configuration


The authentication-server-group command specifies the set of
authentication servers to use with WebVPN or one of the e-mail proxies . For
WebVPN, use this command in webvpn mode. For e-mail proxies, IMAP4S,
POP3S, or SMTPS, use this command in the applicable e-mail proxy mode.
The default is to not have any authentication servers configured.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN general parameters

• Home Page Look and Feel Configuration


Many of the commands in the webvpn subcommand mode control and
customize the look and feel of the home page of the end user .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN servers and URLs

• Enable WebVPN Protocol for Group Policy


Use the vpn-tunnel-protocol command in group-policy configuration mode or
username configuration mode to configure a VPN tunnel type for the user or
group .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN servers and URLs

• Enable URL Entry for WebVPN Users


Use the webvpn command in group-policy configuration mode or in username
configuration mode to enter the webvpn mode . These webvpn commands apply to the
username or group policy from which they are configured. webvpn commands for group
policies and usernames define access to files, MAPI proxy, URLs and TCP applications
over WebVPN. They also identify ACLs and types of traffic to filter.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN servers and URLs

• Use the functions command in webvpn mode to enable file access and file browsing,
MAPI Proxy, and URL entry over WebVPN for this user or group policy . To remove a
configured function, use the no form of this command. To remove all configured
functions, including a null value created by issuing the functions none command, use
the no form of this command without arguments. The no option allows inheritance of a
value from another group policy. To prevent inheriting function values, use the functions
none command. Functions are disabled by default.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN servers and URLs

• Defining URLs with the url-listCommand


Use the url-list command in global configuration mode to configure a set of URLs for
WebVPN users to access . To configure a list with multiple URLs, use this command
with the same listname multiple times, once for each URL. To remove an entire
configured list, use the no url-list listname command. To remove a configured URL, use
the no url-list listname url command. To configure multiple lists, use this command
multiple times, assigning a unique listname to each list. To allow access to the URLs in a
list for a specific group policy or user, use the listname created here with the url-list
command in webvpn mode.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN servers and URLs

• The example in Figure illustrates the various parameters which must


be configured on the Adaptive Security Appliance to enable WebVPN
access to the resources on the private network. Files access via CIFS
is configured in the same basic manner.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN port forwarding

• Use the port-forward command in webvpn mode to enable WebVPN


application access for this user or group policy . To remove the port forwarding
attribute from the configuration, including a null value created by issuing the
port-forward none command, use the no form of this command. The no
option allows inheritance of a list from another group policy. To prevent
inheriting a port forwarding list, use the port-forward none command.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN port forwarding

• Use the port-forward command in global configuration mode to configure the set of
applications that WebVPN users can access over forwarded TCP ports . To configure
access to multiple applications, use this command with the same listname multiple times,
once for each application. To remove an entire configured list, use the no port-forward
listname command. To remove a configured application, use the no port-forward
listname localport command. The remoteserver and remoteport parameters do not need
to be included in the command.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN port forwarding

• The example in Figure contrasts configuring port


forwarding using DNS names verses IP addresses.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN e-mail proxy

• The mapi parameter enables or disables Microsoft Outlook/Exchange


port forwarding at the group or user level and is only necessary if this
feature is to be used .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN e-mail proxy

• Proxy servers are defined by entering the appropriate subcommand


mode in global configuration mode . Proxy servers are available for
POP3S, SMTPS, and IMAP4S.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN e-mail proxy

• Use the server command in the applicable e-mail proxy mode to specify a
default e-mail proxy server . The Adaptive Security Appliance sends requests
to the default e-mail server when the user connects to the e-mail proxy without
specifying a server. If a default server is not configured, and a user does not
specify a server, the security appliance returns an error.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN e-mail proxy

• Use the authentication command to configure


authentication methods for the e-mail proxy . To restore
the default, aaa, use the no form of this command.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN e-mail proxy

• The example in Figure illustrates the various parameters


that must be configured on each device.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN content filters and ACLs

• WebVPN Content Filters and ACLs are configured in the


group-policy attributes in the webvpn subcommand mode .

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN content filters and ACLs

• WebVPN Content Filtering let the administrator block or remove the


parts of websites that use Java or Active X, scripts, display images,
and deliver cookies . By default, these parameters are disabled, which
means that no filtering occurs.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Configure WebVPN content filters and ACLs

• Use the filter command in webvpn mode to specify the name of the access list
to use for WebVPN connections for this group policy or username . To remove
the access list, including a null value created by issuing the filter none
command, use the no form of this command. The no option allows inheritance
of a value from another group policy. To prevent inheriting filter values, use the
filter value none command.
Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com


Summary

• This module primarily covered the configuration of Cisco


Easy VPN Server and Cisco Easy VPN Remote.
• Cisco Easy VPN Server configuration on routers and PIX
Security Appliances was discussed.
• Configuring Easy VPN Remote with the Cisco VPN Client,
Cisco routers, and the PIX 501 and 506/506E models was
also covered.
• This module also provided an explanation of how to
configure WebVPN on an Adaptive Security Appliance.

Học viện mạng Cisco Bách Khoa - Website: www.ciscobachkhoa.com

PDF created with pdfFactory trial version www.pdffactory.com

Das könnte Ihnen auch gefallen