Cisco Virtual Office: Converged Virtual Private Network
|
|
|
- Noah Poole
- 9 years ago
- Views:
Transcription
1 Cisco Virtual Office: Converged Virtual Private Network Deployment Guide 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 2
2 Introduction This white paper provides detailed design and implementation information relating to the deployment of Converged VPN with the Cisco Virtual Office. Please refer to the Cisco Virtual Office overview ( for more information about the solution, its architecture, and all of its components. This document shows how to configure the Cisco Virtual Office VPN headend routers. Three types of VPN technologies are configured in the same headend to handle multiple methods of connecting to the corporate network: Dynamic Multipoint VPN (DMVPN) for teleworkers and smalloffice sites, Easy VPN for mobile VPN client users, and Secure Sockets Layer (SSL) VPN for SSLbased mobile users. With the Cisco Converged VPN solution, you can consolidate all possible VPN deployment types in one headend design. This consolidation can lower your total cost of ownership (TCO) because it helps advance standardization of network infrastructure for achieving efficient networks. The document provides three configuration samples for the most common VPN headend scenarios: Single hub: Cisco 3800 Integrated Services Routers or Cisco 7200 Series Routers High-concentration hub with integrated encryption plus a server farm: Cisco Catalyst 6500 Series Switches with high-performance encryption cards plus a server farm consisting of Cisco 7200 Series Routers High-concentration hub with distributed encryption plus a server farm: Cisco Catalyst 6500 Series Switches plus a server farm consisting of Cisco 7200 Series Routers Platforms and Images Images based on Cisco IOS Software Release 12.4(15)T are recommended for headend routers. The VPN headend router can be one of the following: Cisco 3800 Integrated Services Router with a VPN encryption card (AIM-VPN/SSL-3) Cisco 7206VXR Router with a Cisco VPN Services Adapter (VSA) encryption card and Cisco 7200 Series NPE-G2 Network Processing Engine Cisco Catalyst 6500 with a server-load-balancing (SLB) design and a server farm consisting of Cisco 7206 Routers: The Cisco Catalyst 6500 uses the Cisco Catalyst 6500 Series Supervisor Engine 720 and the Cisco IP Security (IPsec) VPN Shared Port Adapter (SPA) (in the scenario with integrated encryption) and runs Cisco IOS Software Release 12.2(18)SXH2 or later For SSL VPN full-tunnel mode, you need to install a client package on the hub. AnyConnect Version or later is recommended. Please refer to the SSL VPN guide available at for more information about where to get the extra SSL files and how to install them Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 38
3 Converged VPN Solution This section shows how to deploy the three main VPN solutions in one hub. Following is a summary of each of the technologies: Dynamic Multipoint VPN: DMVPN provides a full end-to-end VPN solution that allows for dynamic direct, secure connections between remote sites (that is, dynamic spoke-to-spoke tunnel) and full access to corporate services, including multicast forwarding support. For this technology, a Cisco IOS Software router is required at the remote site. Enhanced Easy VPN: Enhanced Easy VPN provides a point-to-point secure connection between a remote device and a corporate headend. This technology simplifies the configuration for hardware-based clients, and supports software version clients. For this technology, the remote site can have either a Cisco IOS Software router or a PC running Windows, Mac OS, or Linux. SSL VPN: SSLVPN provides secure access to corporate servers from any PC, even if it is connecting from a public location. This technology uses an SSL-enabled web browser to establish an SSL tunnel back to the corporate securely. For this technology, the remote site can be any mobile devices that have Cisco AnyConnect clients available. In addition to the VPN configuration, you need to provision other services before you can use the VPN: Public key infrastructure (PKI) using Cisco IOS Certificate Server or other Certificate Authority Authentication, authorization and accounting (AAA) using Cisco Secure Access Control Server (ACS) or other AAA servers Please refer to the respective guides at for more information. This document then shows the full configuration that you can use to combine DMVPN with Enhanced Easy VPN and SSL VPN, all in the same hub. For Enhanced Easy VPN, two profiles are configured: one for PKI and one for preshared keys. Each VPN configuration is shown with different formatting. The rest of the configuration is shared by all. Following are some notes about the configuration: DMVPN and Enhanced Easy VPN can use the same PKI certificate server, or they can each use a different one. For Enhanced Easy VPN, the spokes need to have the subject name OU field set to match the Easy VPN group name. When the same WAN-facing interface is shared by Enhanced Easy VPN and DMVPN, you must use the same cryptography profile for protecting both VPNs. The shared keyword is used to achieve this objective under the tunnel command. For example: tunnel protection ipsec profile my-profile shared 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 38
4 The following Converged VPN headend configuration sample is valid for a Cisco 3845 Integrated Services Router and a Cisco 7206 Router. Only interface names are different from one platform to the other. Converged VPN Configuration for Cisco 3800 and Cisco 7206 DMVPN ENHANCED EASY VPN SSL VPN service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone service password-encryption hostname converged-vpn-hub boot-start-marker boot-end-marker enable secret <removed> aaa new-model aaa group server radius EzVPN-Users server-private auth-port 1812 acct-port 1813 key <removed> ip radius source-interface Loopback0 This AAA group is used to authenticate device s PKI certificates against their respective AAA profile aaa group server radius pki-aaa-server server-private auth-port 1812 acct-port 1813 key <removed> aaa group server radius SSLVPN-Users server-private auth-port 1812 acct-port 1813 key <removed> ip radius source-interface Loopback1 aaa authentication login default local group SSLVPN-Users aaa authentication login admin group tacacs+ enable aaa authentication login easyvpn local group EzVPN-Users aaa authorization exec default none aaa authorization network easyvpn local group EzVPN-Users aaa authorization network pkiaaa group pki-aaa-server aaa session-id common clock timezone pst Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 38
5 clock summer-time pdt recurring no ip source-route ip cef ip domain name cisco.com ip name-server ip multicast-routing crypto pki trustpoint verisign enrollment terminal fqdn none subject-name cn=web-vpn-server.cisco.com,o=cisco Systems,c=US,st=California revocation-check crl rsakeypair web-vpn-server.cisco.com crypto pki trustpoint dmvpn-pki-server enrollment url serial-number ip-address none revocation-check crl auto-enroll 75 authorization list pkiaaa crypto pki trustpoint easyvpn-pki-server enrollment url serial-number ip-address none revocation-check crl auto-enroll 75 authorization list pkiaaa crypto pki certificate map 1 10 subject-name co easyvpn-pki-group crypto pki certificate chain verisign certificate <removed> certificate ca <removed> crypto pki certificate chain dmvpn-pki-server certificate ca <removed> certificate <removed> crypto pki certificate chain easyvpn-pki-server certificate <removed> certificate ca <removed> 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 38
6 crypto isakmp policy 10 encr 3des group 2 crypto isakmp policy 20 encr 3des authentication pre-share group 2 crypto isakmp keepalive 30 5 crypto isakmp nat keepalive 30 crypto isakmp xauth timeout 10 crypto isakmp client configuration group pki-group dns wins domain cisco.com pool easyvpn-pool acl ezvpn-split-tunnel save-password backup-gateway banner ^C You are connecting to a Converged VPN server using PKI ^C crypto isakmp client configuration group pre-shared-group key EasyVPN-Secret-KEY dns wins domain cisco.com pool easyvpn-pool acl ezvpn-split-tunnel save-password firewall are-u-there backup-gateway banner ^C You are connecting to a Converged VPN server using Pre-shared ^C crypto isakmp profile pre-shared-group description PSK group match identity group pre-shared-group client authentication list easyvpn isakmp authorization list easyvpn client configuration address respond virtual-template 3 crypto isakmp profile pki-group description PKI group ca trust-point dmvpn-pki-server 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 6 of 38
7 match identity group pki-group match certificate 1 client authentication list easyvpn isakmp authorization list easyvpn client configuration address respond virtual-template 2 crypto ipsec transform-set t1 esp-3des esp-sha-hmac mode transport require crypto ipsec profile my-profile set transform-set t1 interface Tunnel1 bandwidth 2000 ip address no ip redirects ip mtu 1400 ip pim nbma-mode ip pim sparse-dense-mode ip multicast rate-limit out 768 ip nhrp map multicast dynamic ip nhrp redirect ip tcp adjust-mss 1360 no ip split-horizon eigrp 7 ip summary-address eigrp ip summary-address eigrp delay 2000 qos pre-classify tunnel source GigabitEthernet0/0 tunnel mode gre multipoint tunnel key tunnel protection ipsec profile my-profile shared interface Loopback0 ip address ip ospf network point-to-point interface Loopback1 ip address ip ospf network point-to-point interface GigabitEthernet0/0 ip address ip pim sparse-dense-mode duplex full speed Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 7 of 38
8 media-type sfp interface GigabitEthernet0/1 shutdown interface Virtual-Template2 type tunnel ip unnumbered GigabitEthernet0/0 ip pim dr-priority 10 ip pim sparse-mode ip multicast rate-limit out 768 tunnel mode ipsec ipv4 tunnel protection ipsec profile my-profile shared interface Virtual-Template3 type tunnel ip unnumbered GigabitEthernet0/0 ip pim dr-priority 10 ip pim sparse-mode ip multicast rate-limit out 768 tunnel mode ipsec ipv4 tunnel protection ipsec profile my-profile shared router eigrp 7 description DMVPN internal routing redistribute ospf 5 route-map split_in network default-metric distribute-list split_out in Tunnel1 no auto-summary no eigrp log-neighbor-changes router ospf 5 descrition Corporate internal routing log-adjacency-changes area 24 nssa redistribute static subnets route-map RRI-spokes redistribute eigrp 7 metric 40 subnets route-map split_out network area 24 network area 24 network area 24 ip local pool webvpn-pool ip local pool easyvpn-pool ip route Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 8 of 38
9 no ip http server ip http authentication aaa ip http secure-server ip http secure-trustpoint verisign ip pim bidir-enable ip pim ssm range multicast_ssm_range ip access-list extended ezvpn-split-tunnel These are internal corporate subnets, which are allowed to be advertised to EzVPN spokes. In other words, the networks that are part of the split tunnel permit ip any permit ip any permit ip any ip access-list extended RRI-spokes These are Enhanced Easy VPN spokes, which use network-extension to connect permit ip any permit ip any permit ip any permit ip any permit ip any permit ip any permit ip any permit ip any ip access-list standard no_split_in This list, if used, allows all internal corporate subnets to be advertised to DMVPN spokes. permit ip access-list standard split_in These are internal corporate subnets, which are allowed to be advertised to DMVPN spokes. In other words, the networks that are part of the split tunnel permit permit permit permit ip access-list standard split_out Remark: These are DMVPN spokes subnets permit permit permit permit permit permit permit permit permit Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 9 of 38
10 permit permit permit permit permit permit permit route-map split_in permit 10 match ip address split_in route-map split_out permit 10 match ip address split_out route-map no_split_in permit 10 match ip address no_split_in route-map RRI-spokes permit 10 Redistribute remote EzVPN-Users spokes subnets from RRI match ip address RRI-spokes tacacs-server host tacacs-server timeout 3 tacacs-server directed-request line con 0 exec-timeout 60 0 authorization exec tacacs+ login authentication admin transport output ssh stopbits 1 line aux 0 transport output ssh stopbits 1 line vty 0 4 exec-timeout 60 0 login authentication admin transport input ssh transport output ssh ntp server ntp server webvpn gateway sslvpn-gw ip address port 443 ssl trustpoint verisign 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 10 of 38
11 inservice webvpn install svc flash:/webvpn/svc.pkg webvpn install csd flash:/webvpn/sdesktop.pkg webvpn context csd title "Welcome to the pki-group CVO SSLVPN - CSD" title-color pink ssl authenticate verify all policy group csdpolicy functions svc-enabled svc address-pool "webvpn-pool" svc keep-client-installed svc split include svc split include svc split include svc dns-server primary policy group tunnelpolicy default-group-policy csdpolicy gateway sslvpn-gw domain csd csd enable inservice webvpn context tunnel title "Welcome to the pki-group CVO SSLVPN - tunnel mode" title-color lightgreen ssl authenticate verify all policy group tunnelpolicy functions svc-required svc address-pool "webvpn-pool" svc keep-client-installed svc split include svc split include svc split include svc dns-server primary svc wins-server primary svc wins-server secondary default-group-policy tunnelpolicy gateway sslvpn-gw domain tunnel inservice 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 11 of 38
12 webvpn context voice title "Welcome to the CVO SSLVPN - tunnel mode - voice only" title-color lightblue ssl authenticate verify all policy group voicepolicy functions svc-enabled svc address-pool "webvpn-pool" svc keep-client-installed svc split include svc split include svc split include svc split include svc split include default-group-policy voicepolicy gateway sslvpn-gw domain voice inservice end Cisco Catalyst 6500 with Server Farm Converged VPN Configuration Following is a sample configuration for a Converged VPN server based on a Cisco Catalyst 6500 that has a VPN SPA for encryption and a Supervisor Engine 720 as the supervisor engine, and uses a server farm of Cisco 7206 Routers for the DMVPN routing protocol, Next Hop Resolution Protocol (NHRP), and multicast work (Figure 1). The Cisco Catalyst 6500 uses the Cisco IOS SLB feature to perform load balancing between the real Cisco 7206 servers Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 12 of 38
13 Figure 1. Overview of the High-Concentration Hub with Integrated Encryption for Converged DMVPN and Enhanced Easy VPN Note: In this example a VPN SPA is used for encrypting both DMVPN and Enhanced Easy VPN traffic. SSL VPN, however, is not supported on the Cisco Catalyst For the DMVPN routing, Enhanced IGRP (EIGRP) is used. Configuration of one of the Cisco 7206 server farms is also shown after the Cisco Catalyst 6500 configuration. In this example EIGRP7 is used internally for DMVPN, and the corporate traffic runs on Open Shortest Path First OSPF5 Cisco Catalyst 6500 Configuration DMVPN ENHANCED EASY VPN upgrade fpd auto upgrade fpd path disk1: version 12.2 service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone service password-encryption service counters max age 10 hostname 6500-converged-vpn-headend enable secret <removed> aaa new-model aaa group server radius pki-aaa-server server-private <removed> auth-port 1812 acct-port 1813 key <removed> ip radius source-interface Loopback0 aaa group server radius EzVPN-Users server-private <removed> auth-port 1812 acct-port 1813 key <removed> ip radius source-interface Vlan Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 13 of 38
14 aaa authentication login easyvpn local group EzVPN-Users aaa authorization network pkiaaa group pki-aaa-server aaa authorization network easyvpn local group EzVPN-Users aaa session-id common clock timezone pst -8 clock summer-time pdt recurring ip subnet-zero no ip source-route ip flow-cache timeout active 1 ip multicast-routing ip sap cache-timeout 30 ip domain-name cisco.com ip name-server ip slb probe PING-PROBE ping faildetect 3 ip slb serverfarm FARM predictor leastconns failaction purge probe PING-PROBE real maxconns 500 inservice real maxconns 500 inservice ip slb vserver GRE virtual gre serverfarm FARM no advertise idle 30 inservice kerberos local-realm Realm mls ip multicast flow-stat-timer 9 no mls flow ip no mls flow ipv6 no mls acl tcam share-global mls cef error action freeze password encryption aes 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 14 of 38
15 no scripting tcl init no scripting tcl encdir crypto pki trustpoint pki-cert-server enrollment url serial-number revocation-check crl auto-enroll 75 authorization list pkiaaa crypto pki certificate chain pki-cert-server certificate <removed> certificate ca <removed> crypto isakmp policy 1 encr 3des authentication pre-share group 2 crypto isakmp policy 2 encr 3des group 2 crypto isakmp keepalive 30 5 crypto isakmp nat keepalive 30 crypto isakmp xauth timeout 10 crypto isakmp client configuration group pre-shared-group key <removed> dns wins domain cisco.com pool easyvpn-pool acl ezvpn-split-tunnel save-password firewall are-u-there backup-gateway banner ^C You are connecting to a Converged VPN server using Pre-shared ^C crypto isakmp client configuration group pki-group dns wins domain cisco.com pool easyvpn-pool acl ezvpn-split-tunnel save-password 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 15 of 38
16 backup-gateway banner ^C You are connecting to a Converged VPN server using PKI ^C crypto isakmp profile pre-shared-group description PSK group match identity group pre-shared-group client authentication list easyvpn isakmp authorization list easyvpn client configuration address respond crypto isakmp profile pki-group description PKI group match identity group pki-group client authentication list easyvpn isakmp authorization list easyvpn client configuration address respond crypto ipsec transform-set t1 esp-3des esp-sha-hmac crypto ipsec transform-set t1 esp-3des esp-sha-hmac mode transport crypto dynamic-map dmap 1 set transform-set t2 set isakmp-profile pre-shared-group reverse-route crypto dynamic-map dmap 2 set transform-set t2 set isakmp-profile pki-group reverse-route crypto dynamic-map dmap 10 set transform-set t1 match address VPNaccept crypto map dmvpn_easyvpn local-address Vlan10 crypto map dmvpn_easyvpn 1 ipsec-isakmp dynamic dmap redundancy mode sso main-cpu auto-sync running-config auto-sync standard spanning-tree mode pvst no spanning-tree optimize bpdu transmission spanning-tree extend system-id 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 16 of 38
17 no spanning-tree vlan 10 vlan internal allocation policy ascending vlan access-log ratelimit 2000 interface Loopback0 ip address ip ospf network point-to-point interface FastEthernet3/1 switchport switchport access vlan 55 switchport mode access speed 100 duplex full interface FastEthernet3/2 switchport switchport access vlan 55 switchport mode access speed 100 duplex full <cut> <cut> <cut> interface GigabitEthernet4/1/1 switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1,10, switchport mode trunk mtu 9216 flowcontrol receive on flowcontrol send off spanning-tree portfast trunk interface GigabitEthernet4/1/2 switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1,11, switchport mode trunk mtu Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 17 of 38
18 flowcontrol receive on flowcontrol send off spanning-tree portfast trunk interface GigabitEthernet5/1 shutdown interface GigabitEthernet5/2 switchport switchport access vlan 11 switchport mode access media-type rj45 interface Vlan1 interface Vlan10 ip address ip flow ingress ip pim sparse-dense-mode ip route-cache flow no mop enabled crypto map dmvpn_easyvpn crypto engine subslot 4/1 hold-queue 1000 in hold-queue 1000 out interface Vlan11 crypto connect vlan 10 hold-queue 1000 in hold-queue 1000 out interface Vlan55 Description Server FARM ip address ip pim sparse-dense-mode router eigrp 7 Description DMVPN internal routing redistribute ospf 5 route-map split_in network default-metric no auto-summary no eigrp log-neighbor-changes router ospf Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 18 of 38
19 log-adjacency-changes area 24 nssa redistribute static subnets route-map RRI-spokes redistribute eigrp 7 metric 38 subnets route-map split_out network area 24 network area 24 ip local pool easyvpn-pool ip classless ip route no ip http server ip access-list extended ezvpn-split-tunnel These are internal corporate subnets, which are allowed to be advertised to DMVPN spokes. In other words, the networks that are part of the split tunnel permit ip any permit ip any permit ip any ip access-list extended RRI-spokes These are Enhanced Easy VPN spokes, which use network-extension to connect permit ip any permit ip any permit ip any permit ip any permit ip any permit ip any permit ip any permit ip any ip access-list standard no_split_in This list, if used, allows all internal corporate subnets to be advertised to DMVPN spokes. permit ip access-list standard split_in These are internal corporate subnets, which are allowed to be advertised to DMVPN spokes. In other words, the networks that are part of the split tunnel permit permit permit permit ip access-list standard split_out Remark: These are DMVPN spokes subnets permit permit Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 19 of 38
20 permit permit permit permit permit permit permit permit permit permit permit permit permit permit ip access-list extended VPNaccept permit gre host any route-map no_split_out permit 10 match ip address no_split_out route-map split_in permit 10 match ip address split_in route-map split_out permit 10 match ip address split_out route-map no_split_in permit 10 match ip address no_split_in route-map RRI-spokes permit 10 Redistribute remote EzVPN-Users spokes subnets from RRI match ip address RRI-spokes control-plane dial-peer cor custom line con 0 exec-timeout line vty 0 4 exec-timeout login authentication admin transport input ssh transport output ssh monitor event-trace timestamps ntp clock-period ntp server Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 20 of 38
21 ntp server end One Cisco 7206 Real Server Example Note: This router is used only for DMVPN. version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname Hub boot-start-marker boot-end-marker enable secret <removed> no aaa new-model resource policy clock timezone PST -8 clock summer-time PDT recurring ip cef no ip domain lookup ip multicast-routing interface Tunnel0 bandwidth 2000 ip address secondary ip address no ip redirects ip mtu 1400 ip pim nbma-mode ip pim sparse-dense-mode ip multicast rate-limit out 768 ip nhrp map multicast dynamic ip nhrp redirect ip tcp adjust-mss 1360 no ip split-horizon eigrp 7 ip summary-address eigrp ip summary-address eigrp delay 2000 qos pre-classify tunnel source Loopback Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 21 of 38
22 tunnel mode gre multipoint hold-queue 1000 in hold-queue 1000 out interface Loopback0 ip address interface GigabitEthernet0/0 ip address ip pim sparse-dense-mode duplex full speed 100 media-type rj45 no negotiation auto interface GigabitEthernet0/1 duplex auto speed auto media-type rj45 no negotiation auto interface GigabitEthernet0/2 duplex auto speed auto media-type rj45 no negotiation auto router eigrp 7 network network default-metric distribute-list block_internal_acl out Tunnel0 no auto-summary eigrp router-id no eigrp log-neighbor-changes ip route no ip http server no ip http secure-server ip pim ssm range multicast_ssm_range ip access-list standard block_internal_acl deny permit any control-plane 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 22 of 38
23 gatekeeper shutdown line con 0 exec-timeout 0 0 stopbits 1 line aux 0 stopbits 1 line vty 0 4 login ntp clock-period ntp server end Another Cisco Catalyst 6500 with Server Farm Converged VPN Configuration Alternatively, encryption, multipoint generic routing encapsulation (mgre), and routing can be terminated at the server farm. In this case, the Cisco Catalyst 6500 uses a Supervisor Engine 720 as the supervisor engine and a server farm of Cisco 7206 Routers for Internet Key Exchange (IKE), IPsec, DMVPN, NHRP, and multicast work (Figure 2). For SSL VPN, sessions can also be terminated in the server farm. Figure 2. Overview of the High-Concentration Hub with Distributed Encryption for Converged DMVPN and Enhanced Easy VPN Cisco Catalyst 6500 Configuration upgrade fpd auto upgrade fpd path disk1: version 12.2 service timestamps debug datetime msec localtime show-timezone service timestamps log datetime msec localtime show-timezone service password-encryption service counters max age Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 23 of 38
24 hostname 6500-converged-vpn-headend enable secret <removed> aaa new-model aaa session-id common clock timezone pst -8 clock summer-time pdt recurring ip subnet-zero no ip source-route ip flow-cache timeout active 1 ip multicast-routing ip sap cache-timeout 30 ip domain-name cisco.com ip name-server ip slb probe PING-PROBE ping faildetect 3 ip slb serverfarm FARM predictor leastconns failaction purge probe PING-PROBE real maxconns 500 inservice real maxconns 500 inservice ip slb vserver ESP virtual esp serverfarm FARM no advertise idle 30 inservice ip slb vserver ISAKMP virtual udp isakmp serverfarm FARM no advertise idle 30 inservice 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 24 of 38
25 ip slb vserver ISAKMP-4500 virtual udp 4500 serverfarm FARM no advertise idle 30 inservice ip slb vserver SSLVPN virtual tcp https serverfarm FARM no advertise idle 30 inservice kerberos local-realm Realm mls ip multicast flow-stat-timer 9 no mls flow ip no mls flow ipv6 no mls acl tcam share-global mls cef error action freeze password encryption aes no scripting tcl init no scripting tcl encdir crypto pki trustpoint pki-cert-server enrollment url serial-number revocation-check crl auto-enroll 75 authorization list pkiaaa crypto pki certificate chain pki-cert-server certificate <removed> certificate ca <removed> redundancy mode sso main-cpu auto-sync running-config auto-sync standard spanning-tree mode pvst no spanning-tree optimize bpdu transmission spanning-tree extend system-id no spanning-tree vlan Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 25 of 38
26 vlan internal allocation policy ascending vlan access-log ratelimit 2000 interface FastEthernet3/1 switchport switchport access vlan 55 switchport mode access speed 100 duplex full interface FastEthernet3/2 switchport switchport access vlan 55 switchport mode access speed 100 duplex full <cut> <cut> <cut> interface GigabitEthernet4/1/1 switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1,10, switchport mode trunk mtu 9216 flowcontrol receive on flowcontrol send off spanning-tree portfast trunk interface GigabitEthernet4/1/2 switchport switchport trunk encapsulation dot1q switchport trunk allowed vlan 1,11, switchport mode trunk mtu 9216 flowcontrol receive on flowcontrol send off spanning-tree portfast trunk interface GigabitEthernet5/ Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 26 of 38
27 shutdown interface GigabitEthernet5/2 switchport switchport access vlan 11 switchport mode access media-type rj45 interface Vlan1 interface Vlan10 ip address ip flow ingress ip pim sparse-dense-mode ip route-cache flow no mop enabled crypto map dmvpn_easyvpn crypto engine subslot 4/1 hold-queue 1000 in hold-queue 1000 out interface Vlan11 crypto connect vlan 10 hold-queue 1000 in hold-queue 1000 out interface Vlan55 Description Server FARM ip address ip pim sparse-dense-mode router eigrp 7 Description DMVPN internal routing redistribute ospf 5 route-map split_in network default-metric no auto-summary no eigrp log-neighbor-changes router ospf 5 log-adjacency-changes area 24 nssa redistribute static subnets route-map RRI-spokes redistribute eigrp 7 metric 38 subnets route-map split_out network area 24 network area Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 27 of 38
28 ip classless ip route no ip http server control-plane dial-peer cor custom line con 0 exec-timeout line vty 0 4 exec-timeout login authentication admin transport input ssh transport output ssh monitor event-trace timestamps ntp clock-period ntp server ntp server end One Cisco 7206 Real Server Example Note: This router is used for DMVPN, Enhanced Easy VPN, and SSL VPN. DMVPN ENHANCED EASY VPN SSLVPN version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname Hub boot-start-marker boot-end-marker enable secret <removed> aaa new-model aaa group server radius EzVPN-Users 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 28 of 38
29 server-private auth-port 1812 acct-port 1813 key <removed> ip radius source-interface Loopback0 This AAA group is used to authenticate device s PKI certificates against their respective AAA profile aaa group server radius pki-aaa-server server-private auth-port 1812 acct-port 1813 key <removed> aaa group server radius SSLVPN-Users server-private auth-port 1812 acct-port 1813 key <removed> ip radius source-interface Loopback1 aaa authentication login default local group SSLVPN-Users aaa authentication login admin group tacacs+ enable aaa authentication login easyvpn local group EzVPN-Users aaa authorization exec default none aaa authorization network easyvpn local group EzVPN-Users aaa authorization network pkiaaa group pki-aaa-server aaa session-id common resource policy clock timezone PST -8 clock summer-time PDT recurring ip cef no ip domain lookup ip multicast-routing crypto pki trustpoint verisign enrollment terminal fqdn none subject-name cn=web-vpn-server.cisco.com,o=cisco Systems,c=US,st=California revocation-check crl rsakeypair web-vpn-server.cisco.com crypto pki trustpoint dmvpn-pki-server enrollment url serial-number ip-address none revocation-check crl auto-enroll 75 authorization list pkiaaa crypto pki trustpoint easyvpn-pki-server enrollment url Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 29 of 38
30 serial-number ip-address none revocation-check crl auto-enroll 75 authorization list pkiaaa crypto pki certificate map 1 10 subject-name co easyvpn-pki-group crypto pki certificate chain verisign certificate <removed> certificate ca <removed> crypto pki certificate chain dmvpn-pki-server certificate ca <removed> certificate <removed> crypto pki certificate chain easyvpn-pki-server certificate <removed> certificate ca <removed> crypto isakmp policy 10 encr 3des group 2 crypto isakmp policy 20 encr 3des authentication pre-share group 2 crypto isakmp keepalive 30 5 crypto isakmp nat keepalive 30 crypto isakmp xauth timeout 10 crypto isakmp client configuration group pki-group dns wins domain cisco.com pool easyvpn-pool acl ezvpn-split-tunnel save-password backup-gateway banner ^C You are connecting to a Converged VPN server using PKI ^C crypto isakmp client configuration group pre-shared-group 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 30 of 38
31 key EasyVPN-Secret-KEY dns wins domain cisco.com pool easyvpn-pool acl ezvpn-split-tunnel save-password firewall are-u-there backup-gateway banner ^C You are connecting to a Converged VPN server using Pre-shared ^C crypto isakmp profile pre-shared-group description PSK group match identity group pre-shared-group client authentication list easyvpn isakmp authorization list easyvpn client configuration address respond virtual-template 3 crypto isakmp profile pki-group description PKI group ca trust-point dmvpn-pki-server match identity group pki-group match certificate 1 client authentication list easyvpn isakmp authorization list easyvpn client configuration address respond virtual-template 2 crypto ipsec transform-set t1 esp-3des esp-sha-hmac mode transport require crypto ipsec profile my-profile set transform-set t1 interface Tunnel0 bandwidth 2000 ip address secondary ip address no ip redirects ip mtu 1400 ip pim nbma-mode ip pim sparse-dense-mode ip multicast rate-limit out 768 ip nhrp map multicast dynamic ip nhrp redirect ip tcp adjust-mss Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 31 of 38
32 no ip split-horizon eigrp 7 ip summary-address eigrp ip summary-address eigrp delay 2000 qos pre-classify tunnel source Loopback2 tunnel mode gre multipoint tunnel key tunnel protection ipsec profile my-profile shared interface Loopback0 ip address interface Loopback1 ip address interface Loopback2 ip address interface GigabitEthernet0/0 ip address ip pim sparse-dense-mode duplex full speed 100 media-type rj45 no negotiation auto interface GigabitEthernet0/1 duplex auto speed auto media-type rj45 no negotiation auto interface GigabitEthernet0/2 duplex auto speed auto media-type rj45 no negotiation auto interface Virtual-Template2 type tunnel ip unnumbered Loopback2 ip pim dr-priority 10 ip pim sparse-mode ip multicast rate-limit out 768 tunnel mode ipsec ipv4 tunnel protection ipsec profile my-profile shared 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 32 of 38
33 interface Virtual-Template3 type tunnel ip unnumbered Loopback2 ip pim dr-priority 10 ip pim sparse-mode ip multicast rate-limit out 768 tunnel mode ipsec ipv4 tunnel protection ipsec profile my-profile shared router eigrp 7 network network default-metric distribute-list block_internal_acl out Tunnel0 no auto-summary eigrp router-id no eigrp log-neighbor-changes ip local pool webvpn-pool ip local pool easyvpn-pool ip route no ip http server no ip http secure-server ip http authentication aaa ip http secure-server ip http secure-trustpoint verisign ip pim ssm range multicast_ssm_range ip access-list extended ezvpn-split-tunnel These are internal corporate subnets, which are allowed to be advertised to EzVPN spokes. In other words, the networks that are part of the split tunnel permit ip any permit ip any permit ip any ip access-list extended RRI-spokes These are Enhanced Easy VPN spokes, which use network-extension to connect permit ip any permit ip any permit ip any permit ip any permit ip any permit ip any permit ip any permit ip any 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 33 of 38
34 ip access-list standard no_split_in This list, if used, allows all internal corporate subnets to be advertised to DMVPN spokes. permit ip access-list standard split_in These are internal corporate subnets, which are allowed to be advertised to DMVPN spokes. In other words, the networks that are part of the split tunnel permit permit permit permit ip access-list standard split_out Remark: These are DMVPN spokes subnets permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit permit route-map split_in permit 10 match ip address split_in route-map split_out permit 10 match ip address split_out route-map no_split_in permit 10 match ip address no_split_in route-map RRI-spokes permit 10 Redistribute remote EzVPN-Users spokes subnets from RRI match ip address RRI-spokes ip access-list standard block_internal_acl deny permit any 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 34 of 38
35 control-plane gatekeeper shutdown line con 0 exec-timeout 0 0 stopbits 1 line aux 0 stopbits 1 line vty 0 4 login ntp clock-period ntp server webvpn gateway sslvpn-gw ip address port 443 ssl trustpoint verisign inservice webvpn install svc flash:/webvpn/svc.pkg webvpn install csd flash:/webvpn/sdesktop.pkg webvpn context csd title "Welcome to the pki-group CVO SSLVPN - CSD" title-color pink ssl authenticate verify all policy group csdpolicy functions svc-enabled svc address-pool "webvpn-pool" svc keep-client-installed svc split include svc split include svc split include svc dns-server primary policy group tunnelpolicy default-group-policy csdpolicy gateway sslvpn-gw domain csd csd enable inservice webvpn context tunnel 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 35 of 38
36 title "Welcome to the pki-group CVO SSLVPN - tunnel mode" title-color lightgreen ssl authenticate verify all policy group tunnelpolicy functions svc-required svc address-pool "webvpn-pool" svc keep-client-installed svc split include svc split include svc split include svc dns-server primary svc wins-server primary svc wins-server secondary default-group-policy tunnelpolicy gateway sslvpn-gw domain tunnel inservice webvpn context voice title "Welcome to the CVO SSLVPN - tunnel mode - voice only" title-color lightblue ssl authenticate verify all policy group voicepolicy functions svc-enabled svc address-pool "webvpn-pool" svc keep-client-installed svc split include svc split include svc split include svc split include svc split include default-group-policy voicepolicy gateway sslvpn-gw domain voice inservice end References Cisco Virtual Office Easy VPN guide: ment_guide_c07_458259_ns855_networking_solutions_white_paper.html 2008 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 36 of 38
37 Cisco Virtual Office SSL VPN guide: html DMVPN: Easy VPN: SSL VPN: Printed in USA C / Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 37 of 38
Network Security 2. Module 6 Configure Remote Access VPN
1 1 Network Security 2 Module 6 Configure Remote Access VPN 2 Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client
Module 6 Configure Remote Access VPN
Network Security 2 Module 6 Configure Remote Access VPN Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x
Network Diagram Scalability Testbed and Configuration Files
APPENDIX A Network Diagram Scalability Testbed and Configuration Files This appendix contains configurations that were used during a V 3 PN performance and scalability evaluation based on the network illustrated
Cisco Virtual Office Deployment Guide
Cisco Virtual Office Deployment Guide Scope of Document This deployment guide provides detailed information on configuring the Cisco Virtual Office headend devices and ManageExpress Virtual Office. It
Ejemplo de configuración de punta a punta SBC en un Cisco 7600 Series Router
Ejemplo de configuración de punta a punta SBC en un Cisco 7600 Series Router Descargue este capítulo Ejemplo de configuración de punta a punta SBC en un Cisco 7600 Series Router Descargue el libro completo
Juniper Networks WX Series Large. Integration on Cisco
APPLICATION NOTE Juniper Networks WX Series Large Deployment with WCCP Off-Path Integration on Cisco Integrating Multiple Juniper Networks WX Series Application Acceleration Platforms into a Cisco Infrastructure
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
How To Configure A Cisco Router With A Cio Router
CHAPTER 1 This chapter provides procedures for configuring the basic parameters of your Cisco router, including global parameter settings, routing protocols, interfaces, and command-line access. It also
Brest. Backup : copy flash:ppe_brest1 running-config
Brest Backup : copy flash:ppe_brest1 running-config Cisco SF300-08 Mise en place des services : - Serveurs : 10.3.50.0/24 VLAN 2 (port 1) - DSI : 10.3.51.0/24 VLAN 3 (port 2) - Direction : 10.3.52.0/24
Remote Access VPN Business Scenarios
CHAPTER 4 This chapter explains the basic tasks for configuring an IP-based, remote access Virtual Private Network (VPN) on a Cisco 7200 series router. In the remote access VPN business scenario, a remote
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
Point-to-Point GRE over IPsec Design and Implementation
CHAPTER 2 Point-to-Point GRE over IPsec Design and Implementation In designing a VPN deployment for a customer, it is essential to integrate broader design considerations such as high availability, resiliency,
Network Diagram and Configuration Files
CHAPTER 7 This chapter contains a topology diagram and the associated router, firewall, and switch configuration files for the devices in this sample implementation. See Figure 1. Figure 1 Network Diagram
Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic
Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic Introduction This document discusses Cisco tunnel default gateway implementations that are available as part
Schools Configuration Files Guide
This document, contains the network diagram, and a list of all the platforms and software releases which were validated for the Schools Service Ready Architecture (SRA). The last section includes the configurations
Configuring IPsec VPN Fragmentation and MTU
CHAPTER 5 This chapter provides information about configuring IPsec VPN fragmentation and the maximum transmission unit (MTU). It includes the following sections: Understanding IPsec VPN Fragmentation
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN Objective Scenario Topology In this lab, the students will complete the following tasks: Enable policy lookup via authentication, authorization,
Cisco EXAM - 300-209. Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product. http://www.examskey.com/300-209.html
Cisco EXAM - 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product http://www.examskey.com/300-209.html Examskey Cisco 300-209 exam demo product is here for you to test the quality
Simple MPLS network topology for Dynamips/Olive
Simple MPLS network topology for Dynamips/Olive R1 version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname R1 boot-start-marker
ICND1-100-101 IOS CLI Study Guide (CCENT)
ICND1-100-101 IOS CLI Study Guide (CCENT) Hostname: 2. hostname SW1 SWITCH CONFIGURATION Mgmt IP: 2. interface vlan 1 3. ip address 10.0.0.2 4. no shut Gateway: 2. ip default-gateway 10.0.0.1 Local User/Pwd:
How To Configure A Cisco Vpn On A Cell Phone With A Pkv On A Safd On A Pv On An Asda On A Network With A Network On A Pc Or Ipv On The Ipv (Svv
CHAPTER 17 The Cisco VPN Client for Cisco Unified IP Phones adds another option for customers attempting to solve the remote telecommuter problem by complementing other Cisco remote telecommuting offerings.
Virtual Private Network Setup
This chapter provides information about virtual private network setup. Virtual Private Network, page 1 Devices Supporting VPN, page 2 Set Up VPN Feature, page 2 Complete Cisco IOS Prerequisites, page 3
Case Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER
CHAPTER 5 The following two case studies are provided as reference material for implementing p2p GRE over IPsec designs. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study This
Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access
Table of Contents Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...1 Conventions...1 Configure...2
Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN
Lab 7.3.6 Configure Remote Access Using Cisco Easy VPN Objective Scenario Estimated Time: 20 minutes Number of Team Members: Two teams with four students per team In this lab, the student will learn the
CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA. Switch S1 S1#sh ru Building configuration...
CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA Switch S1 S1#sh ru Building configuration... Current configuration : 1639 bytes version 12.2 no service timestamps log datetime
Multicast over IPsec VPN Design Guide
Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 ALL DESIGNS, SPECIFICATIONS, STATEMENTS,
Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham
Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham In part two of NetCertLabs Cisco CCNA Security VPN lab series, we explored setting up a site-to-site VPN connection where one side
IPsec Direct Encapsulation VPN Design Guide
This design guide provides guidelines and best practices for customer deployments of IP Security (IPsec) direct encapsulation VPNs. It is assumed that the reader has a basic understanding of IPsec. Contents
Firewall Load Balancing
CHAPTER 6 This chapter describes the (FWLB) feature. It includes the following sections: FWLB Overview, page 6-1 FWLB Features, page 6-2 FWLB Configuration Tasks, page 6-3 Monitoring and Maintaining FWLB,
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
Document ID: 45741. Introduction
Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4
Securing Networks with Cisco Routers and Switches (642-637)
Securing Networks with Cisco Routers and Switches (642-637) Exam Description: The 642-637 Securing Networks with Cisco Routers and Switches exam is the exam associated with the CCSP, CCNP Security, and
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
IPSec. User Guide. 2120028 Rev 2.2
IPSec User Guide 2120028 Rev 2.2 Important Notice Safety and Hazards Due to the nature of wireless communications, transmission and reception of data can never be guaranteed. Data may be delayed, corrupted
Skills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
Skills Assessment Student Training (Answer Key)
CCNA: Connecting Networks Skills Assessment Student Training (Answer Key) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Assessment
Configuring Easy VPN Services on the ASA 5505
CHAPTER 34 Configuring Easy VPN Services on the ASA 5505 This chapter describes how to configure the ASA 5505 as an Easy VPN hardware client. This chapter assumes you have configured the switch ports and
Configuring the MNLB Forwarding Agent
CHAPTER 3 Configuring the MNLB Forwarding Agent This chapter describes how to configure a Cisco router as an MNLB Forwarding Agent to operate in conjunction with a Cisco LocalDirector serving as Services
Virtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
How To Design An Ipsec Vpn Network Connection
Solutions Guide Deploying IPsec Virtual Private Networks Introduction Corporate networks connected to the Internet can enable flexible and secure VPN access with IPsec. Connecting remote sites over the
Lab 6.1.3 Configure Local AAA on Cisco Router
Lab 6.1.3 Configure Local AAA on Cisco Router Objective Scenario Topology In this lab, the students will complete the following tasks: Securing and testing access to the privileged EXEC, VTY, and console
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Objectives. Background. Required Resources. CCNA Security
Chapter 8 Lab B, Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A
C H A P T E R Management Cisco SAFE Reference Guide OL-19523-01 9-1
CHAPTER 9 The primary goal of the management module is to facilitate the secure management of all devices and hosts within the enterprise network architecture. The management module is key for any network
Felix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram
Felix Rohrer PT Activity 7.5.3: Troubleshooting Wireless WRT300N Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Switch Configuration Required to Support Cisco ISE Functions
APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,
Configuring a Leased Line
CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
EIGRP Routing Protocol & Configuration
EIGRP Routing Protocol & Configuration ~ GNU Public License ~ ma2d http: // www.oscentre.co.nr A) EIGRP Definition There is several terms on routing protocol, as we know RIP, IGRP/EIGRP, OSPF, BGP is major
Expert Reference Series of White Papers. Integrating Active Directory Users with Remote VPN Clients on a Cisco ASA
Expert Reference Series of White Papers Integrating Active Directory Users with Remote VPN Clients on a Cisco ASA 1-800-COURSES www.globalknowledge.com Integrating Active Directory Users with Remote VPN
Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI
Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure and Verify
BUY ONLINE AT: http://www.itgovernance.co.uk/products/730
IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology
DYNAMIC MULTIPOINT VPN HUB AND SPOKE INTRODUCTION
DYNAMIC MULTIPOINT VPN HUB AND SPOKE INTRODUCTION NOVEMBER 2004 1 INTRODUCTION Spoke, Presentation_ID 11/04 2004, Cisco Systems, Inc. All rights reserved. 2 What is Dynamic Multipoint VPN? Dynamic Multipoint
Configuring Fax Pass-Through
Configuring Fax Pass-Through This chapter describes the configuration of fax pass-through. With fax pass-through, modulated fax information from the PSTN is passed in-band over a voice speech path in an
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Configuring L2TP over IPsec
CHAPTER 65 This chapter describes how to configure L2TP over IPsec/IKEv1 on the ASA. This chapter includes the following topics: Information About L2TP over IPsec/IKEv1, page 65-1 Licensing Requirements
Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others
Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java
Cisco Virtual Office: High Availability Design Guide
Design Guide Cisco Virtual Office: High Availability Design Guide May, 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 8 Contents DMVPN Redundancy...
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab
Length 5 days Format Lecture/lab Version 3.0 SNRS Course Description SNRS 1.0 is a 5-day, lab-intensive course that provides the knowledge and skills needed to secure Cisco IOS router and switch networks.
Configuring Secure Socket Layer HTTP
Finding Feature Information, page 1 Prerequisites for Configuring the Switch for Secure Sockets Layer HTTP, page 1 Restrictions for Configuring the Switch for Secure Sockets Layer HTTP, page 2 Information
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
BRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
Supporting Document LNS Configuration
Supporting Document LNS Configuration Swisscom (Schweiz) AG Version 1-0 15.112010 Inhalt 1 General... 3 1.1 Appendix A: Load Balancing between POPs... 3 1.2 Appendix B: Examples of LNS and BGP Configurations...
Implementing Core Cisco ASA Security (SASAC)
1800 ULEARN (853 276) www.ddls.com.au Implementing Core Cisco ASA Security (SASAC) Length 5 days Price $6215.00 (inc GST) Overview Cisco ASA Core covers the Cisco ASA 9.0 / 9.1 core firewall and VPN features.
Configuring Dial Backup and Remote Management
13 CHAPTER Configuring Dial Backup and Remote Management The Cisco 800 series access routers support dial-in (for remote management) and dial-out (for dial backup) capabilities. By allowing you to configure
CS3695/M6-109 Lab 8-NPS02 VOIP Sniffing Ver. 8 Rev. 0
Background For this lab, we will be analyzing some Wireshark capture files that were captured using the ARP Poisoning technique on Cisco VIOP (Voice Over IP) phones As this lab took special equipment (i.e.
Cisco Easy VPN on Cisco IOS Software-Based Routers
Cisco Easy VPN on Cisco IOS Software-Based Routers Cisco Easy VPN Solution Overview The Cisco Easy VPN solution (Figure 1) offers flexibility, scalability, and ease of use for site-to-site and remoteaccess
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
IOS Server Load Balancing
IOS Server Load Balancing This feature module describes the Cisco IOS Server Load Balancing (SLB) feature. It includes the following sections: Feature Overview, page 1 Supported Platforms, page 5 Supported
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering
Lab 7: Firewalls Stateful Firewalls and Edge Router Filtering 7.1 Details Aim: Rich Macfarlane The aim of this lab is to introduce the concepts of stateful firewalls, using Cisco Contextbased Access Control
CCNP v2 Eğitimi İçeriği
Öngereksinimler: CCNA http://www.cliguru.com/ccna Kurs Tanımı: CCNP v2 Eğitimi İçeriği Giriş seviyesi network bilgilerine sahip katılımcıları network'ün temeli olan Routing Switching alanında orta üst
Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]
Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
Motorola TEAM WSM - Cisco Unified Communications Manager Express (CME) Integration
Motorola TEAM WSM - Cisco Unified Communications Manager Express (CME) Integration Summary This setup covers the of the TEAM VoWLAN solution with a Cisco Communications Manager Express 4.1 +. This integration
Configuring Modem Transport Support for VoIP
Configuring Modem Transport Support for VoIP This chapter explains how to configure modem transport support for Voice over IP (VoIP) and contains the following sections: Modem Transport Support Overview,
Most Common DMVPN Troubleshooting Solutions
Most Common DMVPN Troubleshooting s Document ID: 111976 Contents Introduction Prerequisites Requirements Components Used Conventions DMVPN Configuration does not work s Common Issues Verify if ISAKMP packets
Testing Juniper Networks M40 Router MPLS Interoperability with Cisco Systems 7513 and 12008 Routers
Interoperability Test Paper Testing Juniper Networks M40 Router MPLS Interoperability with Cisco Systems 7513 and 12008 Routers Mark Anderson, Systems Engineer Annette Kay Donnell, Marketing Engineer Juniper
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support Topology Objectives Background Configure auto QoS to support IP phones. Configure CoS override for data frames. Configure the distribution
TotalCloud Phone System
TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power
Cisco 2621 Gateway-PBX Interoperability: Lucent/Avaya Definity G3si V7 PBX with Cisco CallManager Using T1 PRI NI-2 for an H.
Application Note Cisco 2621 Gateway-PBX Interoperability: Lucent/Avaya Definity G3si V7 PBX with Cisco CallManager Using T1 PRI NI-2 for an H.323 Gateway Introduction This document describes the interoperability
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
APNIC Members Training Course Security workshop. 2-4 July, 2008. Port Vila Vanuatu. In conjunction with PACNOG 4
APNIC Members Training Course Security workshop 2-4 July, 2008 Port Vila Vanuatu In conjunction with PACNOG 4 Router device security lab 1. APNIC s remote lab In these exercises you will be remotely accessing
Cisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
Configuring Remote Access IPSec VPNs
CHAPTER 34 Remote access VPNs let single users connect to a central site through a secure connection over a TCP/IP network such as the Internet. This chapter describes how to build a remote access VPN
(d-5273) CCIE Security v3.0 Written Exam Topics
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
Cisco Certified Network Expert (CCNE)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Expert (CCNE) Program Summary This instructor- led program with a combination
COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30
logging enable logging console 4 logging timestamp logging trap 5 logging buffered 4 logging device id hostname logging host 10.0.128.240 udp/514 format emblem logging host 10.0.143.24 udp/514 login timeout
