Network Security 2. Module 6 Configure Remote Access VPN



Similar documents
Module 6 Configure Remote Access VPN

Lab a Configure Remote Access Using Cisco Easy VPN

Lab Configure Remote Access Using Cisco Easy VPN

External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy

Configuring Remote Access IPSec VPNs

LAN-Cell to Cisco Tunneling

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

Configuring Internet Key Exchange Security Protocol

Scenario: IPsec Remote-Access VPN Configuration

Expert Reference Series of White Papers. Integrating Active Directory Users with Remote VPN Clients on a Cisco ASA

Scenario: Remote-Access VPN Configuration

Triple DES Encryption for IPSec

Understanding the Cisco VPN Client

TABLE OF CONTENTS NETWORK SECURITY 2...1

Virtual Private Network (VPN)

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

REMOTE ACCESS VPN NETWORK DIAGRAM

Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI

Encrypted Preshared Key

Industrial Classed H685 H820 Cellular Router User Manual for VPN setting

Using PIX Firewall in SOHO Networks

IPSec Network Security Commands

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Encrypted Preshared Key

Monitoring Remote Access VPN Services

VPN Configuration Guide. Cisco ASA 5500 Series

Cisco Easy VPN on Cisco IOS Software-Based Routers

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Cisco EXAM Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product.

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Lab Configure a PIX Firewall VPN

Most Common L2L and Remote Access IPSec VPN Troubleshooting Solutions

Remote Access VPN Business Scenarios

IPSec. User Guide Rev 2.2

Case Study for Layer 3 Authentication and Encryption

Objectives. Background. Required Resources. CCNA Security

DHCP Server Port-Based Address Allocation

Chapter 5 Virtual Private Networking Using IPsec

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Configure ISDN Backup and VPN Connection

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520

How to configure VPN function on TP-LINK Routers

Vodafone MachineLink 3G. IPSec VPN Configuration Guide

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Configuring DHCP. DHCP Server Overview

BUY ONLINE AT:

Packet Tracer Configuring VPNs (Optional)

How to configure VPN function on TP-LINK Routers

Point-to-Point GRE over IPsec Design and Implementation

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Configuring Easy VPN Services on the ASA 5505

How To Industrial Networking

SSL VPN Configuration Guide for Cisco Cloud Services Router 1000V Series, Cisco IOS XE Release 3S

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

If you have questions or find errors in the guide, please, contact us under the following address:

Securing Networks with PIX and ASA

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

Dial-Up VPN auf eine Juniper

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic

VPN Wizard Default Settings and General Information

Table of Contents. Cisco Cisco VPN Client FAQ

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

AnyConnect VPN Client FAQ

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

FortiOS Handbook - IPsec VPN VERSION 5.2.2

Configuring the Juniper SSG as an IPSec VPN Head-end to Support the Avaya VPNremote Phone and Avaya Phone Manager Pro with Avaya IP Office Issue 1.

Configuring the Cisco Secure PIX Firewall with a Single Intern

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

- The PIX OS Command-Line Interface -

VPN. VPN For BIPAC 741/743GE

Most Common L2L and Remote Access IPsec VPN Troubleshooting Solutions

Configuring the Content Routing Software

Troubleshooting Cisco IOS and PIX Firewall-Based IPSec Implementations

CCNA Security 1.1 Instructional Resource

Cisco PIX 515E Security Appliance Getting Started Guide

SSL SSL VPN

Astaro User Portal: Getting Software and Certificates Astaro IPsec Client: Configuring the Client...14

Application Notes SL1000/SL500 VPN with Cisco PIX 501

How To Configure SSL VPN in Cyberoam

Configuring IPSec Tunnel between Avaya 96xx Series IP Phone with VPN and Cisco 2811 ISR Router Issue 0.4

IPsec Direct Encapsulation VPN Design Guide

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1

Application Note 45. Main Mode IPSec VPN from Digi WR44 to a Cisco Using GRE over IPSec with the Cisco configured for VTI. UK Support June 2011

FortiOS Handbook - IPsec VPN VERSION 5.2.4

Configure IPSec VPN Tunnels With the Wizard

VPN SECURITY POLICIES

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

Latest IT Exam Questions & Answers

Connecting Remote Offices by Setting Up VPN Tunnels

SingTel VPN as a Service. Quick Start Guide

Transcription:

1 1

Network Security 2 Module 6 Configure Remote Access VPN 2

Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x 6.4 Configure Cisco Easy VPN Remote for Access Routers 6.5 Configure the PIX Security Appliance as an Easy VPN Server 6.6 Configure a PIX 501 or 506E as an Easy VPN Client 6.7 Configure the Adaptive Security Appliance to Support WebVPN 3

Module 6 Configure Remote Access VPN 6.1 Introduction to Cisco EasyVPN 4

Cisco Easy VPN Components The Cisco Easy VPN is made up of two components Easy VPN Server Enables Cisco IOS routers, Cisco PIX Security Appliances, and Cisco VPN 3000 Series Concentrators to act as VPN head-end devices in site-tosite or remote-access VPNs, where the remote office devices are using the Cisco Easy VPN Remote feature Easy VPN Remote Enables Cisco IOS routers, Cisco PIX Security Appliances, and Cisco VPN 3000 Hardware Clients or Software Clients to act as remote VPN Clients 5

Remote Access Using Cisco Easy VPN PC with Easy Remote VPN Client 4.x Cisco 800 Router Cisco 900 Router Cisco 1700 Router Cisco IOS router 12.3(11)T (or later) Easy VPN Server Cisco PIX Security Appliance 501 Cisco VPN 3002 Hardware Client 6

Easy VPN Remote Connection Process Step 1 The VPN Client initiates the IKE Phase 1 process. Step 2 The VPN Client establishes an ISAKMP SA. Step 3 The Easy VPN Server accepts the SA proposal. Step 4 The Easy VPN Server initiates a username/ password challenge. Step 5 The mode configuration process is initiated. Step 6 The RRI process is initiated. Step 7 IPSec quick mode completes the connection. 7

Step 1 The VPN Client Initiates the IKE Phase 1 Process Remote PC with Easy Remote VPN Client 4.x Cisco IOS router 12.3(11)T Easy VPN Server Using pre-shared keys? Initiate aggressive mode (AM). Using digital certificates? Initiate main mode (MM). 8

Step 2 The VPN Client Establishes an ISAKMP SA Remote PC with Easy Remote VPN Client 4.x Proposal 1, proposal 2, proposal 3 Cisco IOS router 12.3(11)T Easy VPN Server The VPN Client attempts to establish an SA between peer IP addresses by sending multiple ISAKMP proposals to the Easy VPN Server. To reduce manual configuration on the VPN Client, these ISAKMP proposals include several combinations of the following Encryption and hash algorithms Authentication methods Diffie-Hellman group sizes 9

Step 3 The Easy VPN Server Accepts the SA Proposal Remote PC with Easy Remote VPN Client 4.x The Easy VPN Server searches for a match The first proposal to match the server s list is accepted (highest-priority match). The most secure proposals are always listed at the top of the Easy VPN Server s proposal list (highest priority). ISAKMP SA is successfully established. Proposal 1 Cisco IOS router 12.3(11)T Easy VPN Server Device authentication ends and user authentication begins. Proposal checking finds proposal 1 match 10

Step 4 Username/Password Challenge Remote PC with Easy Remote VPN Client 4.x Username/password challenge Username/password Cisco IOS router 12.3(11)T Easy VPN Server AAA checking If the Easy VPN Server is configured for XAUTH, the VPN Client waits for a username/password challenge The user enters a username/password combination. The username/password information is checked against authentication entities using AAA. All Easy VPN Servers should be configured to enforce user authentication. 11

Step 5 The Mode Configuration Process Is Initiated Remote PC with Easy Remote VPN Client 4.x Client Requests Parameters Cisco IOS router 12.3(11)T Easy VPN Server If the Easy VPN Server indicates successful authentication, the VPN Client requests the remaining configuration parameters from the Easy VPN Server Mode configuration starts. System Parameters via Mode Config The remaining system parameters, such as IP address, DNS, split tunneling information, are downloaded to the VPN Client. Remember that the IP address is the only required parameter in a group profile. All other parameters are optional. 12

Step 6 The RRI Process Is Initiated Remote PC with Easy Remote VPN Client 4.x VPN Tunnel Cisco IOS router 12.3(11)T Easy VPN Server RRI static route creation After the Easy VPN Server knows the VPN Client s assigned IP address, it must determine how to route packets through the appropriate VPN tunnel RRI creates a static route on the Easy VPN Server for each VPN Client s internal IP address. RRI must be enabled on the crypto maps supporting VPN Clients. RRI need not be enabled on a crypto map applied to a GRE tunnel that is already being used to distribute routing information. 13

Step 7 IPSec Quick Mode Completes the Connection Remote PC with Easy Remote VPN Client 4.x Quick mode IPSec SA establishment VPN tunnel Cisco IOS router 12.3(11)T Easy VPN Server After the configuration parameters have been successfully received by the VPN Client, ISAKMP quick mode is initiated to negotiate IPSec SA establishment. After IPSec SA establishment, the VPN connection is complete. 14

Module 6 Configure Remote Access VPN 6.2 Configure the EasyVPN Server 15

Easy VPN Server General Configuration Tasks The following general tasks are used to configure Easy VPN Server on a Cisco router Task 1 Create IP address pool. Task 2 Configure group policy lookup. Task 3 Create ISAKMP policy for remote VPN Client access. Task 4 Define group policy for mode configuration push. Task 5 Create a transform set. Task 6 Create a dynamic crypto map with RRI. Task 7 Apply mode configuration to the dynamic crypto map. Task 8 Apply the crypto map to the router interface. Task 9 Enable IKE DPD. Task 10 Configure XAUTH. Task 11 (Optional) Enable XAUTH save password feature. 16

Task 1 Create IP Address Pool Remote client vpngate1 Pool REMOTE-POOL 10.0.1.100 to 10.0.1.150 router(config)# ip local pool {default pool-name low-ip-address [high-ip-address]} vpngate1(config)# ip local pool REMOTE-POOL 10.0.1.100 10.0.1.150 Creating a local address pool is optional if an external DHCP server is in use on the network. 17

Task 2 Configure Group Policy Lookup Remote client Group VPN-REMOTE-ACCESS vpngate1 router(config)# aaa new-model router(config)# aaa authorization network list-name local [method1 [method2 ]] vpngate1(config)# aaa new-model vpngate1(config)# aaa authorization network VPN-REMOTE-ACCESS local Creates a user group for local AAA policy lookup 18

Task 3 Create ISAKMP Policy for Remote VPN Client Access Remote client vpngate1 Policy 1 Authen Preshared keys Encryption 3-DES Diffie-Hellman Group 2 Other settings Default vpngate1(config)# crypto isakmp enable vpngate1(config)# crypto isakmp policy 1 vpngate1(config-isakmp)# authen pre-share vpngate1(config-isakmp)# encryption 3des vpngate1(config-isakmp)# group 2 vpngate1(config-isakmp)# exit Use standard ISAKMP configuration commands. 19

Task 4 Define Group Policy for Mode Configuration Push Task 4 contains the following steps Step 1 Add the group profile to be defined. Step 2 Configure the ISAKMP pre-shared key. Step 3 Specify the DNS servers. Step 4 Specify the WINS servers. Step 5 Specify the DNS domain. Step 6 Specify the local IP address pool. 20

Task 4-Step 1 Add the Group Profile to Be Defined Remote client Group VPN-REMOTE-ACCESS Key MYVPNKEY DNS DNS1 & DNS2 vpngate1 WINS WINS1 & WINS2 Domain cisco.com Pool name REMOTE-POOL router(config)# Pool 10.0.1.100 to 10.0.1.150 crypto isakmp client configuration group {group-name default} vpngate1(config)# crypto isakmp client configuration group VPN-REMOTE-ACCESS vpngate1(config-isakmp-group)# 21

Task 4-Step 2 Configure the IKE Pre-Shared Key Group VPN-REMOTE-ACCESS Key MYVPNKEY Remote client vpngate1 DNS DNS1 & DNS2 WINS WINS1 & WINS2 Domain cisco.com Pool name REMOTE-POOL Pool 10.0.1.100 to 10.0.1.150 router(config-isakmp-group)# key name vpngate1(config-isakmp-group)# key MYVPNKEY 22

Task 4-Step 3 Specify the DNS Servers Remote client router(config-isakmp-group)# vpngate1 dns primary-server secondary-server Group VPN-REMOTE-ACCESS Key MYVPNKEY DNS DNS1 & DNS2 WINS WINS1 & WINS2 Domain cisco.com Pool name REMOTE-POOL Pool 10.0.1.100 to 10.0.1.150 vpngate1(config-isakmp-group)# dns DNS1 DNS2 vpngate1(config-isakmp-group)# dns 172.26.26.120 172.26.26.130 23

Task 4-Step 4 Specify the WINS Servers Remote client router(config-isakmp-group)# vpngate1 Group VPN-REMOTE-ACCESS Key MYVPNKEY DNS DNS1 & DNS2 WINS WINS1 & WINS2 Domain cisco.com wins primary-server secondary-server Pool name REMOTE-POOL Pool 10.0.1.100 to 10.0.1.150 vpngate1(config-isakmp-group)# wins WINS1 WINS2 vpngate1(config-isakmp-group)# wins 172.26.26.160 172.26.26.170 24

Task 4-Step 5 Specify the DNS Domain Group VPN-REMOTE-ACCESS Key MYVPNKEY Remote client DNS DNS1 & DNS2 WINS WINS1 & WINS2 Domain cisco.com vpngate1 Pool name REMOTE-POOL Pool 10.0.1.100 to 10.0.1.150 router(config-isakmp-group)# domain name vpngate1(config-isakmp-group)# domain cisco.com 25

Task 4-Step 6 Specify the Local IP Address Pool Group VPN-REMOTE-ACCESS Key MYVPNKEY Remote client vpngate1 DNS DNS1 & DNS2 WINS WINS1 & WINS2 Domain cisco.com Pool name REMOTE-POOL Pool 10.0.1.100 to 10.0.1.150 router(config-isakmp-group)# pool name vpngate1(config-isakmp-group)# pool REMOTE-POOL 26

Task 5 Create Transform Set Remote client Transform set name VPNTRANSFORM vpngate1 router(config)# crypto ipsec transform-set transform-set-name transform1 [transform2 [transform3]] vpngate1(config)# crypto ipsec transform-set VPNTRANSFORM esp-3des esp-sha-hmac vpngate1(cfg-crypto-trans)# exit 27

Task 6 Create a Dynamic Crypto Map with RRI Task 6 contains the following steps Step 1 Create a dynamic crypto map. Step 2 Assign a transform set. Step 3 Enable RRI. 28

Task 6-Step 1 Create a Dynamic Crypto Map Dynamic Crypto map name/sequence # Remote client DYNMAP 1 vpngate1 router(config)# crypto dynamic-map dynamic-map-name dynamic-seq-num vpngate1(config)# crypto dynamic-map DYNMAP 1 vpngate1(config-crypto-map)# 29

Task 6-Step 2 Assign Transform Set to Dynamic Crypto Map Transform set name Remote client VPNTRANSFORM vpngate1 router(config-crypto-map)# set transform-set transform-set-name [transform-set-name2 transform-set-name6] vpngate1(config-crypto-map)# set transform-set VPNTRANSFORM 30

Task 6-Step 3 Enable RRI RRI routing announcement to inside network Remote client 10.0.1.100 File server Tunnel vpngate1 router(config-crypto-map)# reverse-route vpngate1(config-crypto-map)# reverse-route vpngate1(config-crypto-map)# exit 31

Task 7 Apply Mode Configuration to Crypto Map Task 7 contains the following steps Step 1 Configure the router to respond to mode configuration requests. Step 2 Enable IKE querying for a group policy. Step 3 Apply the dynamic crypto map to the crypto map. 32

Task 7-Step 1 Configure Router to Respond to Mode Configuration Requests Remote client vpngate1 router(config)# crypto map map-name client configuration address {initiate respond} vpngate1(config)# crypto map CLIENTMAP client configuration address respond 33

Task 7-Step 2 Enable ISAKMP Querying for Group Policy Group Remote client VPN-REMOTE-ACCESS vpngate1 router(config)# crypto map map-name isakmp authorization list list-name vpngate1(config)# crypto map CLIENTMAP isakmp authorization list VPN-REMOTE-ACCESS 34

Task 7-Step 3 Apply Dynamic Crypto Map to the Crypto Map Crypto map name/sequence # Remote client CLIENTMAP 65535 vpngate1 router(config)# crypto map map-name seq-num ipsec-isakmp dynamic dynamic-map-name vpngate1(config)# crypto map CLIENTMAP 65535 ipsec-isakmp dynamic DYNMAP 35

Task 8 Apply the Crypto Map to Router Outside Interface Crypto map name Remote client CLIENTMAP e0/1 vpngate1 vpngate1(config)# interface ethernet0/1 vpngate1(config-if)# crypto map CLIENTMAP vpngate1(config-if)# exit 36

Task 9 Enable ISAKMP DPD Remote client 1) DPD send Are you there? 2) 2) DPD Reply reply Yes, I I am here. vpngate1 router(config)# crypto isakmp keepalive secs retries vpngate1(config)# crypto isakmp keepalive 20 10 37

Task 10 Configure XAUTH Task 10 contains the following steps Step 1 Enable AAA login authentication. Step 2 Set the XAUTH timeout value. Step 3 Enable ISAKMP XAUTH for the dynamic crypto map. 38

Task 10, Step 1 Enable AAA Login Authentication Remote client VPN user group VPNUSERS vpngate1 router(config)# aaa authentication login list-name method1 [method2 ] vpngate1(config)# aaa authentication login VPNUSERS local 39

Task 10, Step 2 Set XAUTH Timeout Value Remote client 20 seconds vpngate1 VPN user group VPNUSERS router(config)# crypto isakmp xauth timeout seconds vpngate1(config)# crypto isakmp xauth timeout 20 40

Task 10, Step 3 Enable ISAKMP XAUTH for Crypto Map Crypto map name CLIENTMAP VPN user group Remote client VPNUSERS vpngate1 router(config)# crypto map map-name client authentication list list-name vpngate1(config)# crypto map CLIENTMAP client authentication list VPNUSERS 41

Task 11 (Optional) Enable XAUTH Save Password Remote client Group VPN-REMOTE-ACCESS vpngate1 router(config-isakmp-group)# save-password vpngate1(config)# crypto isakmp client configuration group VPN-REMOTE-ACCESS vpngate1(config-isakmp-group)# save-password This step could have been completed in Step 1 of Task 4 following the crypto isakmp client configuration group command. 42

Easy VPN Server Configuration Example version 12.3 hostname Router1! aaa new-model aaa authentication login VPNAUTHEN local aaa authorization network VPNAUTHOR local ip domain-name cisco.com ip dhcp excluded-address 10.0.1.1 10.0.1.12! ip dhcp pool POD1_INSIDE network 10.0.1.0 255.255.255.0 default-router 10.0.1.2! crypto isakmp policy 3 hash md5 authentication pre-share group 2! ip local pool IPPOOL 11.0.1.20 11.0.1.30 crypto isakmp xauth timeout 20 43

Easy VPN Server Configuration Example crypto isakmp client configuration group SALES key cisco123 domain cisco.com pool IPPOOL save-password! crypto ipsec transform-set MYSET esp-aes 256 esp-sha-hmac! crypto dynamic-map DYNMAP 10 set transform-set MYSET reverse-route! crypto map CLIENTMAP client authentication list VPNAUTHEN crypto map CLIENTMAP isakmp authorization list VPNAUTHOR crypto map CLIENTMAP client configuration address respond crypto map CLIENTMAP 10 ipsec-isakmp dynamic DYNMAP! interface FastEthernet 0/1 ip address 172.30.1.2 255.255.255.0 crypto map CLIENTMAP crypto isakmp keepalive 20 10 44

Task 12 Verify router# show crypto map [interface interface tag mapname] Router# show crypto map interface ethernet 0 Displays crypto map configuration. router# show run Router# show run Displays running configuration. 45

Module 6 Configure Remote Access VPN 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x 46

Configuring Easy VPN Remote for the Cisco VPN Client 4.x General Tasks Task 1 Install Cisco VPN Client 4.x. Task 2 Create a new client connection entry. Task 3 Choose an authentication method. Task 4 Configure transparent tunneling. Task 5 Enable and add backup servers. Task 6 Configure connection to the Internet through dial-up networking. 47

Task 1 Install Cisco VPN Client 4.x Installation file on IP-disks 48

Error Message 49

Task 2 Create a New Client Connection Entry 50

Task 3 Configure Client Authentication Properties 51

Task 4 Configure Transparent Tunneling 52

Task 5 Enable and Add Backup Servers 53

Task 6 Configure Connection to the Internet through Dial-up Networking 54

Module 6 Configure Remote Access VPN 6.4 Configure Cisco Easy VPN Remote for Access Routers 55

Easy VPN Remote Client Mode 192.168.100.X 10.0.0.3 10.0.0.2 VPN tunnel 10.0.0.4 Cisco 831 router Cisco router (Easy VPN Server) 12.3(11)T 56

Easy VPN Remote Network Extension Mode 172.16.10.5 172.16.10.6.4 Cisco 831(Easy VPN Remote) VPN tunnel Cisco router (Easy VPN Server) 12.3(11)T 172.16.X.X 57

Easy VPN Remote Configuration General Tasks for Access Routers Task 1 (Optional) Configure the DHCP server pool. Task 2 Configure and assign the Cisco Easy VPN client profile. Task 3 (Optional) Configure XAUTH password save. Task 4 Initiate the VPN tunnel. Task 5 Verify the Cisco Easy VPN configuration. 58

Task 1 Configure the DHCP Server Pool router(config)# ip dhcp pool pool-name router(dhcp-config)# network ip-address [ mask /prefix-length] default-router address [address2... addressn] import all lease {days [ hours][ minutes] infinite} exit router(config)# ip dhcp excluded-address lan-ip-address 59

Task 1 Example DHCP Server Pool 10.10.10.0.1.1 20.20.20.0.2 30.30.30.0 VPNREMOTE1 VPNGATE1 vpnremote1(config)# ip dhcp pool CLIENT vpnremote1(dhcp-config)# network 10.10.10.0 255.255.255.0 vpnremote1(dhcp-config)# default-router 10.10.10.1 vpnremote1(dhcp-config)# import all vpnremote1(dhcp-config)# lease 3 vpnremote1(dhcp-config)# exit vpnremote1(config)# ip dhcp excluded-address 10.10.10.1 60

Task 2 Configure the Cisco Easy VPN Client Profile router(config)# crypto ipsec client ezvpn name router(config-crypto-ezvpn)# group group-name key group-key peer [ ip-address hostname] mode {client network-extension network-plus} exit 61

Task 2 Example Configure the Cisco Easy VPN Client Profile VPNGATE1 10.10.10.0 20.20.20.0 30.30.30.0 Group: VPN-REMOTE-ACCESS Peer: 20.20.20.2 Key: MYVPNKEY Mode: Client.1.1 VPNREMOTE1.2 VPNGATE1 vpnremote1(config)# crypto ipsec client ezvpn VPNGATE1 vpnremote1(config-crypto-ezvpn)# group VPNREMOTE1 key MYVPNKEY vpnremote1(config-crypto-ezvpn)# peer 20.20.20.2 vpnremote1(config-crypto-ezvpn)# mode client vpnremote1(config-crypto-ezvpn)# exit vpnremote1(config)# 62

Task 2 Example Assign Easy VPN Remote to the Interface VPNGate1 10.10.10.0 20.20.20.0 30.30.30.0.1.1.2 VPNREMOTE1 VPNGATE1 router(config-if)# crypto ipsec client ezvpn name [inside outside] vpnremote1(config)# interface ethernet1 vpnremote1(config-if)# crypto ipsec client ezvpn VPNGATE1 vpnremote1(config-if)# exit 63

Task 3 (Optional) Configure XAUTH Save Password Feature router(config)# crypto ipsec client ezvpn name router(config-crypto-ezvpn)# username aaa-username password aaa-password vpnremote1(config)# crypto ipsec client ezvpn VPNGATE1 vpnremote1(config-crypto-ezvpn)# username VPNUSER password VPNPASS vpnremote1(config-crypto-ezvpn)# exit 64

Task 4 (Optional) Initiate the VPN Tunnel (XAUTH) 01:34:42: EZVPN: Pending XAuth Request, Please enter the following command: 01:34:42: EZVPN: crypto ipsec client ezvpn xauth router# Cisco IOS message: Waiting for valid XAUTH username and password. crypto ipsec client ezvpn xauth vpnremote1# crypto ipsec client ezvpn xauth Enter Username and Password: vpnusers Password: ******** With XAUTH: When SA expires, username and password must be manually entered. With XAUTH Password Save enabled: When SA expires, the last valid username and password will be reused automatically. 65

Task 5 Verify the Cisco Easy VPN Configuration vpnremote1# show crypto ipsec client ezvpn Easy VPN Remote Phase: 2 Tunnel name : VPNGATE1 Inside interface list: Ethernet0, Outside interface: Ethernet1 Current State: IPSEC_ACTIVE Last Event: SOCKET_UP Address: 30.30.30.24 Mask: 255.255.255.255 DNS Primary: 30.30.30.10 DNS Secondary: 30.30.30.11 NBMS/WINS Primary: 30.30.30.12 NBMS/WINS Secondary: 30.30.30.13 Default Domain: cisco.com 66

Easy VPN Remote Configuration Example version 12.2 hostname VPNREMOTE1! username admin privilege 15 password 7 070E25414707485744 ip subnet-zero ip domain-name cisco.com ip dhcp excluded-address 10.10.10.1! ip dhcp pool CLIENT import all network 10.10.10.0 255.255.255.0 default-router 10.10.10.1 lease 3! crypto ipsec client ezvpn VPNGATE1 connect auto group VPNREMOTE1 key 0 MYVPNKEY mode client peer 20.20.20.2 username VPNUSER password 0 VPNPASS 67

Easy VPN Remote Configuration Example (Cont.) interface Ethernet0 ip address 10.10.10.1 255.255.255.0 crypto ipsec client ezvpn VPNGATE1 inside! interface Ethernet1 ip address 20.20.20.1 255.255.255.0 crypto ipsec client ezvpn VPNGATE1! ip classless ip route 0.0.0.0 0.0.0.0 Ethernet1 ip route 30.30.30.0 255.255.255.0 Ethernet1 ip http server no ip http secure-server! line con 0 no modem enable stopbits 1 line aux 0 line vty 0 4! end 68

Module 6 Configure Remote Access VPN 6.5 Configure the PIX Security Appliance as an Easy VPN Server 69

EasyVPN Server General Configuration Tasks Task 1 Create an ISAKMP policy for remote Cisco VPN Client access. Task 2 Create an IP address pool. Task 3 Define a group policy for a mode configuration push. Task 4 Create a transform set. Task 5 Create a dynamic crypto map. Task 6 Assign a dynamic crypto map to a static crypto map. Task 7 Apply a dynamic crypto map to the PIX Security Appliance interface. Task 8 Configure XAUTH. Task 9 Configure NAT and NAT 0. Task 10 Enable IKE dead peer detection (DPD). 70

Create ISAKMP Policy 71

Create IP Address Pool 72

Define Group Policy for Mode Configuration Push Step 1 Set the Tunnel Group Type Step 2 Configure the IKE Pre-shared Key Step 3 Specify the Local IP Address Pool Step 4 Configure the Group Policy Type Step 5 Enter the Group Policy Attributes Submode Step 6 Specify the DNS Servers Step 7 Specify the WINS Servers Step 8 Specify the DNS Domain Step 9 Specify the Idle Timeout 73

Set Tunnel Group Type 74

Configure IKE Pre-Shared Key 75

Specify Local IP Address Pool 76

Configure the Group Policy Type 77

Enter the Group Policy Attributes Submode 78

Specify DNS Servers 79

Specify WINS Servers 80

Specify DNS Domain 81

Specify Idle Time 82

Create Transform Set 83

Create Dynamic Crypto Map 84

Assign Dynamic Crypto Map to Static Crypto Map 85

Apply Dynamic Crypto Map 86

Configure XAUTH Step 1 Enable AAA login authentication. Step 2 Define AAA server IP address and encryption key. Step 3 Enable IKE XAUTH for the crypto map. 87

Configure NAT and NAT 0 88

Enable IKE DPD 89

Module 6 Configure Remote Access VPN 6.6 Configure a PIX 501 or 506E as an Easy VPN Client 90

PIX Easy VPN Remote 91

Easy VPN Remote Client Configuration 92

Easy VPN Client Device Mode 93

Module 6 Configure Remote Access VPN 6.7 Configure the Adaptive Security Appliance to Support WebVPN 94

Home Page 95

Website Access 96

Port Forwarding 97

Enabling WebVPN 98

Home Page Look and Feel Configuration 99

Enabling WebVPN 100

Servers and URL Configuration Example 101

Enable Port Forwarding 102

Port Forwarding Configuration Example 103

Enable Email Proxy 104

Email Proxy Configuration Example 105

HTML Content Filtering 106

HTML Content Filtering 107

WebVPN ACLs 108