Module 6 Configure Remote Access VPN



Similar documents
Network Security 2. Module 6 Configure Remote Access VPN

Lab Configure Remote Access Using Cisco Easy VPN

Lab a Configure Remote Access Using Cisco Easy VPN

External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy

Configuring Remote Access IPSec VPNs

Scenario: IPsec Remote-Access VPN Configuration

Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI

LAN-Cell to Cisco Tunneling

Configuring Internet Key Exchange Security Protocol

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

Scenario: Remote-Access VPN Configuration

Expert Reference Series of White Papers. Integrating Active Directory Users with Remote VPN Clients on a Cisco ASA

Triple DES Encryption for IPSec

Understanding the Cisco VPN Client

Industrial Classed H685 H820 Cellular Router User Manual for VPN setting

IPSec Network Security Commands

Virtual Private Network (VPN)

Encrypted Preshared Key

Configuring DHCP. DHCP Server Overview

Using PIX Firewall in SOHO Networks

REMOTE ACCESS VPN NETWORK DIAGRAM

Table of Contents. Cisco Configuring IPSec Cisco Secure VPN Client to Central Router Controlling Access

Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall

Encrypted Preshared Key

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Packet Tracer Configuring VPNs (Optional)

Configuring Easy VPN Services on the ASA 5505

Lab Configure a PIX Firewall VPN

Monitoring Remote Access VPN Services

DHCP Server Port-Based Address Allocation

Case Study for Layer 3 Authentication and Encryption

TABLE OF CONTENTS NETWORK SECURITY 2...1

Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1

VPN Configuration Guide. Cisco ASA 5500 Series

Astaro User Portal: Getting Software and Certificates Astaro IPsec Client: Configuring the Client...14

Cisco EXAM Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product.

Application Notes SL1000/SL500 VPN with Cisco PIX 501

Configure ISDN Backup and VPN Connection

Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic

Vodafone MachineLink 3G. IPSec VPN Configuration Guide

Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Configuring L2TP over IPsec

Application Notes. How to Configure UTM with Apple OSX and ios Devices for IPsec VPN

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

BRI to PRI Connection Using Data Over Voice

Cisco Easy VPN on Cisco IOS Software-Based Routers

Chapter 8 Lab A: Configuring a Site-to-Site VPN Using Cisco IOS and SDM

IPSec. User Guide Rev 2.2

Remote Access VPN Business Scenarios

Configuring the PIX Firewall with PDM

Case Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER

Configuring the Cisco Secure PIX Firewall with a Single Intern

Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access

Configuring the Content Routing Software

Configuring a Leased Line

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Most Common L2L and Remote Access IPSec VPN Troubleshooting Solutions

Configuration Guide. How to establish IPsec VPN Tunnel between D-Link DSR Router and iphone ios. Overview

Chapter 5 Virtual Private Networking Using IPsec

Configuring IKEv2 Load Balancer

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Cisco 1841 MyDigitalShield BYOG Integration Guide

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

SSL VPN Configuration Guide for Cisco Cloud Services Router 1000V Series, Cisco IOS XE Release 3S

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Configuring IPsec VPN with a FortiGate and a Cisco ASA

How To Industrial Networking

Configuring a Check Point FireWall-1 to SOHO IPSec Tunnel

DHCP and DNS Services

7. Configuring IPSec VPNs

Objectives. Background. Required Resources. CCNA Security

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

Table of Contents. Cisco Cisco VPN Client FAQ

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Table of Contents. Cisco Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall

GregSowell.com. Mikrotik VPN

How to configure VPN function on TP-LINK Routers

Lab Configure Basic AP Security through IOS CLI

ICND IOS CLI Study Guide (CCENT)


Dial-Up VPN auf eine Juniper

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Fortinet Firewall. Overview

Lab Configuring DHCP with SDM and the Cisco IOS CLI

Deploying IPSec VPN in the Enterprise

- The PIX OS Command-Line Interface -

If you have questions or find errors in the guide, please, contact us under the following address:

Configuring L2TP over IPSec

Implementing Cisco IOS Network Security

How to configure VPN function on TP-LINK Routers

SMS PASSCODE CONFIGURATION FOR CISCO ASA / RADIUS AUTHENTICATION SMS PASSCODE 2011

VPN. VPN For BIPAC 741/743GE

Cisco PIX 515E Security Appliance Getting Started Guide

Transcription:

Network Security 2 Module 6 Configure Remote Access VPN

Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x 6.4 Configure Cisco Easy VPN Remote for Access Routers

Module 6 Configure Remote Access VPN 6.1 Introduction to Cisco EasyVPN

Cisco Easy VPN Components The Cisco Easy VPN is made up of two components Easy VPN Server Enables Cisco IOS routers, Cisco PIX Security Appliances, and Cisco VPN 3000 Series Concentrators to act as VPN head-end devices in site-to-site or remote-access VPNs, where the remote office devices are using the Cisco Easy VPN Remote feature Easy VPN Remote Enables Cisco IOS routers, Cisco PIX Security Appliances, and Cisco VPN 3000 Hardware Clients or Software Clients to act as remote VPN Clients

Remote Access Using Cisco Easy VPN PC with Easy Remote VPN Client 4.x Cisco 800 Router Cisco 900 Router Cisco 1700 Router Cisco IOS router 12.3(11)T (or later) Easy VPN Server Cisco PIX Security Appliance 501 Cisco VPN 3002 Hardware Client

Easy VPN Remote Connection Process Step 1 The VPN Client initiates the IKE Phase 1 process. Step 2 The VPN Client establishes an ISAKMP SA. Step 3 The Easy VPN Server accepts the SA proposal. Step 4 The Easy VPN Server initiates a username/ password challenge. Step 5 The mode configuration process is initiated. Step 6 The RRI process is initiated. Step 7 IPSec quick mode completes the connection.

Step 1 The VPN Client Initiates the IKE Phase 1 Process Remote PC with Easy Remote VPN Client 4.x Cisco IOS router 12.3(11)T Easy VPN Server Using pre-shared keys? Initiate aggressive mode (AM). Using digital certificates? Initiate main mode (MM).

Step 2 The VPN Client Establishes an ISAKMP SA Remote PC with Easy Remote VPN Client 4.x Proposal 1, proposal 2, proposal 3 Cisco IOS router 12.3(11)T Easy VPN Server The VPN Client attempts to establish an SA between peer IP addresses by sending multiple ISAKMP proposals to the Easy VPN Server. To reduce manual configuration on the VPN Client, these ISAKMP proposals include several combinations of the following Encryption and hash algorithms Authentication methods Diffie-Hellman group sizes

Step 3 The Easy VPN Server Accepts the SA Proposal Remote PC with Easy Remote VPN Client 4.x Proposal 1 The Easy VPN Server searches for a match The first proposal to match the server s list is accepted (highestpriority match). The most secure proposals are always listed at the top of the Easy VPN Server s proposal list (highest priority). ISAKMP SA is successfully established. Cisco IOS router 12.3(11)T Easy VPN Server Proposal checking finds proposal 1 match Device authentication ends and user authentication begins.

Step 4 Username/Password Challenge Remote PC with Easy Remote VPN Client 4.x Username/password challenge Username/password Cisco IOS router 12.3(11)T Easy VPN Server AAA checking If the Easy VPN Server is configured for XAUTH, the VPN Client waits for a username/password challenge The user enters a username/password combination. The username/password information is checked against authentication entities using AAA. All Easy VPN Servers should be configured to enforce user authentication.

Step 5 The Mode Configuration Process Is Initiated Remote PC with Easy Remote VPN Client 4.x Client Requests Parameters Cisco IOS router 12.3(11)T Easy VPN Server System Parameters via Mode Config If the Easy VPN Server indicates successful authentication, the VPN Client requests the remaining configuration parameters from the Easy VPN Server Mode configuration starts. The remaining system parameters, such as IP address, DNS, split tunneling information, are downloaded to the VPN Client. Remember that the IP address is the only required parameter in a group profile. All other parameters are optional.

Step 6 The RRI Process Is Initiated Remote PC with Easy Remote VPN Client 4.x VPN Tunnel Cisco IOS router 12.3(11)T Easy VPN Server RRI static route creation After the Easy VPN Server knows the VPN Client s assigned IP address, it must determine how to route packets through the appropriate VPN tunnel RRI creates a static route on the Easy VPN Server for each VPN Client s internal IP address. RRI must be enabled on the crypto maps supporting VPN Clients.

Step 7 IPSec Quick Mode Completes the Connection Remote PC with Easy Remote VPN Client 4.x Quick mode IPSec SA establishment Cisco IOS router 12.3(11)T Easy VPN Server VPN tunnel After the configuration parameters have been successfully received by the VPN Client, ISAKMP quick mode is initiated to negotiate IPSec SA establishment. After IPSec SA establishment, the VPN connection is complete.

Module 6 Configure Remote Access VPN 6.2 Configure the EasyVPN Server

Easy VPN Server General Configuration Tasks The following general tasks are used to configure Easy VPN Server on a Cisco router Task 1 Create IP address pool. Task 2 Configure group policy lookup. Task 3 Create ISAKMP policy for remote VPN Client access. Task 4 Define group policy for mode configuration push. Task 5 Create a transform set. Task 6 Create a dynamic crypto map with RRI. Task 7 Apply mode configuration to the dynamic crypto map. Task 8 Apply the crypto map to the router interface. Task 9 Enable IKE DPD. Task 10 Configure XAUTH. Task 11 (Optional) Enable XAUTH save password feature.

Task 1 Create IP Address Pool Remote client vpngate1 Pool REMOTE-POOL 10.0.1.100 to 10.0.1.150 router(config)# ip local pool {default pool-name low-ip-address [high-ip-address]} vpngate1(config)# ip local pool REMOTE-POOL 10.0.1.100 10.0.1.150 Creating a local address pool is optional if an external DHCP server is in use on the network.

Task 2 Configure Group Policy Lookup Remote client Group vpngate1 VPN-REMOTE-ACCESS router(config)# aaa new-model router(config)# aaa authorization network list-name local [method1 [method2 ]] vpngate1(config)# aaa new-model vpngate1(config)# aaa authorization network VPN-REMOTE-ACCESS local Creates a user group for local AAA policy lookup

Task 3 Create ISAKMP Policy for Remote VPN Client Access Remote client vpngate1 Policy 1 Authen Preshared keys Encryption 3-DES Diffie-Hellman Group 2 Other settings Default vpngate1(config)# crypto isakmp enable vpngate1(config)# crypto isakmp policy 1 vpngate1(config-isakmp)# authen pre-share vpngate1(config-isakmp)# encryption 3des vpngate1(config-isakmp)# group 2 vpngate1(config-isakmp)# exit Use standard ISAKMP configuration commands.

Task 4 Define Group Policy for Mode Configuration Push Task 4 contains the following steps Step 1 Add the group profile to be defined. Step 2 Configure the ISAKMP pre-shared key. Step 3 Specify the DNS servers. Step 4 Specify the WINS servers. Step 5 Specify the DNS domain. Step 6 Specify the local IP address pool.

Task 4-Step 1 Add the Group Profile to Be Defined Remote client Group VPN-REMOTE-ACCESS Key MYVPNKEY DNS DNS1 & DNS2 vpngate1 WINS WINS1 & WINS2 Domain cisco.com router(config)# Pool name REMOTE-POOL Pool 10.0.1.100 to 10.0.1.150 crypto isakmp client configuration group {group-name default} vpngate1(config)# crypto isakmp client configuration group VPN-REMOTE-ACCESS vpngate1(config-isakmp-group)#

Task 4-Step 2 Configure the IKE Pre-Shared Key Remote client Group VPN-REMOTE-ACCESS router(config-isakmp-group)# key name vpngate1 Key MYVPNKEY DNS DNS1 & DNS2 WINS WINS1 & WINS2 Domain cisco.com Pool name REMOTE-POOL Pool 10.0.1.100 to 10.0.1.150 vpngate1(config-isakmp-group)# key MYVPNKEY

Task 4-Step 3 Specify the DNS Servers Group VPN-REMOTE-ACCESS Remote client Key MYVPNKEY DNS DNS1 & DNS2 WINS WINS1 & WINS2 vpngate1 Domain cisco.com Pool name REMOTE-POOL router(config-isakmp-group)# dns primary-server secondary-server vpngate1(config-isakmp-group)# dns DNS1 DNS2 vpngate1(config-isakmp-group)# dns 172.26.26.120 172.26.26.130 Pool 10.0.1.100 to 10.0.1.150

Task 4-Step 4 Specify the WINS Servers Group VPN-REMOTE-ACCESS Remote client Key MYVPNKEY DNS DNS1 & DNS2 WINS WINS1 & WINS2 vpngate1 Domain cisco.com Pool name REMOTE-POOL router(config-isakmp-group)# wins primary-server secondary-server vpngate1(config-isakmp-group)# wins WINS1 WINS2 vpngate1(config-isakmp-group)# wins 172.26.26.160 172.26.26.170 Pool 10.0.1.100 to 10.0.1.150

Task 4-Step 5 Specify the DNS Domain Group VPN-REMOTE-ACCESS Key MYVPNKEY Remote client DNS DNS1 & DNS2 WINS WINS1 & WINS2 Domain cisco.com vpngate1 Pool name REMOTE-POOL Pool 10.0.1.100 to 10.0.1.150 router(config-isakmp-group)# domain name vpngate1(config-isakmp-group)# domain cisco.com

Task 4-Step 6 Specify the Local IP Address Pool Group VPN-REMOTE-ACCESS Key MYVPNKEY Remote client DNS DNS1 & DNS2 WINS WINS1 & WINS2 vpngate1 Domain cisco.com Pool name REMOTE-POOL Pool 10.0.1.100 to 10.0.1.150 router(config-isakmp-group)# pool name vpngate1(config-isakmp-group)# pool REMOTE-POOL

Task 5 Create Transform Set Remote client Transform set name VPNTRANSFORM vpngate1 router(config)# crypto ipsec transform-set transform-set-name transform1 [transform2 [transform3]] vpngate1(config)# crypto ipsec transform-set VPNTRANSFORM esp-3des esp-sha-hmac vpngate1(cfg-crypto-trans)# exit

Task 6 Create a Dynamic Crypto Map with RRI Task 6 contains the following steps Step 1 Create a dynamic crypto map. Step 2 Assign a transform set. Step 3 Enable RRI.

Task 6-Step 1 Create a Dynamic Crypto Map Remote client Dynamic Crypto map name/sequence # vpngate1 DYNMAP 1 router(config)# crypto dynamic-map dynamic-map-name dynamic-seq-num vpngate1(config)# crypto dynamic-map DYNMAP 1 vpngate1(config-crypto-map)#

Task 6-Step 2 Assign Transform Set to Dynamic Crypto Map Remote client Transform set name VPNTRANSFORM vpngate1 router(config-crypto-map)# set transform-set transform-set-name [transform-set-name2 transform-set-name6] vpngate1(config-crypto-map)# set transform-set VPNTRANSFORM

Task 6-Step 3 Enable RRI RRI routing announcement to inside network Remote client 10.0.1.100 File server Tunnel vpngate1 router(config-crypto-map)# reverse-route vpngate1(config-crypto-map)# reverse-route vpngate1(config-crypto-map)# exit

Task 7 Apply Mode Configuration to Crypto Map Task 7 contains the following steps Step 1 Configure the router to respond to mode configuration requests. Step 2 Enable IKE querying for a group policy. Step 3 Apply the dynamic crypto map to the crypto map.

Task 7-Step 1 Configure Router to Respond to Mode Configuration Requests Remote client vpngate1 router(config)# crypto map map-name client configuration address {initiate respond} vpngate1(config)# crypto map CLIENTMAP client configuration address respond

Task 7-Step 2 Enable ISAKMP Querying for Group Policy Remote client Group vpngate1 VPN-REMOTE-ACCESS router(config)# crypto map map-name isakmp authorization list list-name vpngate1(config)# crypto map CLIENTMAP isakmp authorization list VPN-REMOTE-ACCESS

Task 7-Step 3 Apply Dynamic Crypto Map to the Crypto Map Remote client Crypto map name/sequence # CLIENTMAP 65535 vpngate1 router(config)# crypto map map-name seq-num ipsec-isakmp dynamic dynamic-map-name vpngate1(config)# crypto map CLIENTMAP 65535 ipsec-isakmp dynamic DYNMAP

Task 8 Apply the Crypto Map to Router Outside Interface Crypto map name Remote client CLIENTMAP e0/1 vpngate1 vpngate1(config)# interface ethernet0/1 vpngate1(config-if)# crypto map CLIENTMAP vpngate1(config-if)# exit

Task 9 Enable ISAKMP DPD Remote client 1) DPD send Are you there? 2) 2) DPD Reply reply Yes, I I am here. vpngate1 router(config)# crypto isakmp keepalive secs retries vpngate1(config)# crypto isakmp keepalive 20 10

Task 10 Configure XAUTH Task 10 contains the following steps Step 1 Enable AAA login authentication. Step 2 Set the XAUTH timeout value. Step 3 Enable ISAKMP XAUTH for the dynamic crypto map.

Task 10, Step 1 Enable AAA Login Authentication Remote client vpngate1 VPN user group VPNUSERS router(config)# aaa authentication login list-name method1 [method2 ] vpngate1(config)# aaa authentication login VPNUSERS local

Task 10, Step 2 Set XAUTH Timeout Value Remote client 20 seconds vpngate1 VPN user group VPNUSERS router(config)# crypto isakmp xauth timeout seconds vpngate1(config)# crypto isakmp xauth timeout 20

Task 10, Step 3 Enable ISAKMP XAUTH for Crypto Map Remote client Crypto map name CLIENTMAP vpngate1 VPN user group VPNUSERS router(config)# crypto map map-name client authentication list list-name vpngate1(config)# crypto map CLIENTMAP client authentication list VPNUSERS

Task 11 (Optional) Enable XAUTH Save Password Remote client Group VPN-REMOTE-ACCESS router(config-isakmp-group)# save-password vpngate1 vpngate1(config)# crypto isakmp client configuration group VPN-REMOTE-ACCESS vpngate1(config-isakmp-group)# save-password This step could have been completed in Step 1 of Task 4 following the crypto isakmp client configuration group command.

Task 12 Verify router# show crypto map [interface interface tag mapname] Router# show crypto map interface ethernet 0 Displays crypto map configuration. router# show run Router# show run Displays running configuration.

Module 6 Configure Remote Access VPN 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x

Configuring Easy VPN Remote for the Cisco VPN Client 4.x General Tasks Task 1 Install Cisco VPN Client 4.x. Task 2 Create a new client connection entry. Task 3 Choose an authentication method. Task 4 Configure transparent tunneling. Task 5 Enable and add backup servers. Task 6 Configure connection to the Internet through dial-up networking.

Task 1 Install Cisco VPN Client 4.x

Error Message

Task 2 Create a New Client Connection Entry

Task 3 Configure Client Authentication Properties

Task 4 Configure Transparent Tunneling

Task 5 Enable and Add Backup Servers

Task 6 Configure Connection to the Internet through Dial-up Networking

Module 6 Configure Remote Access VPN 6.4 Configure Cisco Easy VPN Remote for Access Routers

Easy VPN Remote Client Mode 192.168.100.X 10.0.0.3 10.0.0.2 VPN tunnel 10.0.0.4 Cisco 831 router Cisco router (Easy VPN Server) 12.3(11)T

Easy VPN Remote Network Extension Mode 172.16.X.X 172.16.10.5 172.16.10.6.4 Cisco 831(Easy VPN Remote) VPN tunnel Cisco router (Easy VPN Server) 12.3(11)T

Easy VPN Remote Configuration General Tasks for Access Routers Task 1 (Optional) Configure the DHCP server pool. Task 2 Configure and assign the Cisco Easy VPN client profile. Task 3 (Optional) Configure XAUTH password save. Task 4 Initiate the VPN tunnel. Task 5 Verify the Cisco Easy VPN configuration.

Task 1 Configure the DHCP Server Pool router(config)# ip dhcp pool pool-name router(dhcp-config)# network ip-address [ mask /prefix-length] default-router address [address2... addressn] import all lease {days [ hours][ minutes] infinite} exit router(config)# ip dhcp excluded-address lan-ip-address

Task 1 Example DHCP Server Pool 10.10.10.0.1.1 20.20.20.0.2 30.30.30.0 VPNREMOTE1 VPNGATE1 vpnremote1(config)# ip dhcp pool CLIENT vpnremote1(dhcp-config)# network 10.10.10.0 255.255.255.0 vpnremote1(dhcp-config)# default-router 10.10.10.1 vpnremote1(dhcp-config)# import all vpnremote1(dhcp-config)# lease 3 vpnremote1(dhcp-config)# exit vpnremote1(config)# ip dhcp excluded-address 10.10.10.1

Task 2 Configure the Cisco Easy VPN Client Profile router(config)# crypto ipsec client ezvpn name router(config-crypto-ezvpn)# group group-name key group-key peer [ ip-address hostname] mode {client network-extension network-plus} exit

Task 2 Example Configure the Cisco Easy VPN Client Profile VPNGATE1 10.10.10.0 20.20.20.0 30.30.30.0 Group: VPN-REMOTE-ACCESS Peer: 20.20.20.2 Key: MYVPNKEY Mode: Client.1.1 VPNREMOTE1.2 VPNGATE1 vpnremote1(config)# crypto ipsec client ezvpn VPNGATE1 vpnremote1(config-crypto-ezvpn)# group VPNREMOTE1 key MYVPNKEY vpnremote1(config-crypto-ezvpn)# peer 20.20.20.2 vpnremote1(config-crypto-ezvpn)# mode client vpnremote1(config-crypto-ezvpn)# exit vpnremote1(config)#

Task 2 Example Assign Easy VPN Remote to the Interface VPNGate1 10.10.10.0 20.20.20.0 30.30.30.0.1.1.2 VPNREMOTE1 VPNGATE1 router(config-if)# crypto ipsec client ezvpn name [inside outside] vpnremote1(config)# interface ethernet1 vpnremote1(config-if)# crypto ipsec client ezvpn VPNGATE1 vpnremote1(config-if)# exit

Task 3 (Optional) Configure XAUTH Save Password Feature router(config)# crypto ipsec client ezvpn name router(config-crypto-ezvpn)# username aaa-username password aaa-password vpnremote1(config)# crypto ipsec client ezvpn VPNGATE1 vpnremote1(config-crypto-ezvpn)# username VPNUSER password VPNPASS vpnremote1(config-crypto-ezvpn)# exit

Task 4 (Optional) Initiate the VPN Tunnel (XAUTH) 01:34:42: EZVPN: Pending XAuth Request, Please enter the following command: 01:34:42: EZVPN: crypto ipsec client ezvpn xauth Cisco IOS message: Waiting for valid XAUTH username and password. router# crypto ipsec client ezvpn xauth vpnremote1# crypto ipsec client ezvpn xauth Enter Username and Password: vpnusers Password: ******** With XAUTH: When SA expires, username and password must be manually entered. With XAUTH Password Save enabled: When SA expires, the last valid username and password will be reused automatically.

Task 5 Verify the Cisco Easy VPN Configuration vpnremote1# show crypto ipsec client ezvpn Easy VPN Remote Phase: 2 Tunnel name : VPNGATE1 Inside interface list: Ethernet0, Outside interface: Ethernet1 Current State: IPSEC_ACTIVE Last Event: SOCKET_UP Address: 30.30.30.24 Mask: 255.255.255.255 DNS Primary: 30.30.30.10 DNS Secondary: 30.30.30.11 NBMS/WINS Primary: 30.30.30.12 NBMS/WINS Secondary: 30.30.30.13 Default Domain: cisco.com

Easy VPN Remote Configuration Example version 12.2 hostname VPNREMOTE1! username admin privilege 15 password 7 070E25414707485744 ip subnet-zero ip domain-name cisco.com ip dhcp excluded-address 10.10.10.1! ip dhcp pool CLIENT import all network 10.10.10.0 255.255.255.0 default-router 10.10.10.1 lease 3! crypto ipsec client ezvpn VPNGATE1 connect auto group VPNREMOTE1 key 0 MYVPNKEY mode client peer 20.20.20.2 username VPNUSER password 0 VPNPASS

Easy VPN Remote Configuration Example (Cont.) interface Ethernet0 ip address 10.10.10.1 255.255.255.0 crypto ipsec client ezvpn VPNGATE1 inside! interface Ethernet1 ip address 20.20.20.1 255.255.255.0 crypto ipsec client ezvpn VPNGATE1! ip classless ip route 0.0.0.0 0.0.0.0 Ethernet1 ip route 30.30.30.0 255.255.255.0 Ethernet1 ip http server no ip http secure-server! line con 0 no modem enable stopbits 1 line aux 0 line vty 0 4! end

2005, Cisco Systems, Inc. All rights reserved. 66