Top Banner
© 2007 Cisco Systems, Inc. All rights reserved. ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN
22

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

Mar 26, 2015

Download

Documents

Alexis Cooper
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1

Network Security 2

Module 6 – Configure Remote Access VPN

Page 2: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 2

Lesson 6.2 Configure the EasyVPN Server

Module 6 – Configure Remote Access VPN

Page 3: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 3

Easy VPN Server General Configuration Tasks

The following general tasks are used to configure Easy VPN Server on a Cisco router –

–Task 1 – Create IP address pool.

–Task 2 – Configure group policy lookup.

–Task 3 – Create ISAKMP policy for remote VPN Client access.

–Task 4 – Define group policy for mode configuration push.

–Task 5 – Create a transform set.

–Task 6 – Create a dynamic crypto map with RRI.

–Task 7 – Apply mode configuration to the dynamic crypto map.

–Task 8 – Apply the crypto map to the router interface.

–Task 9 – Enable IKE DPD.

–Task 10 – Configure XAUTH.

–Task 11 – (Optional) Enable XAUTH save password feature.

Page 4: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 4

Task 1 – Create IP Address Pool

Page 5: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 5

Task 2 – Configure Group Policy Lookup

• Creates a user group for local AAA policy lookup

Page 6: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 6

Task 3 – Create ISAKMP Policy for Remote VPN Client Access

Page 7: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 7

Task 4 – Define Group Policy for Mode Configuration Push

Task 4 contains the following steps ––Step 1 – Add the group profile to be defined.

–Step 2 – Configure the ISAKMP pre-shared key.

–Step 3 – Specify the DNS servers.

–Step 4 – Specify the WINS servers.

–Step 5 – Specify the DNS domain.

–Step 6 – Specify the local IP address pool.

Page 8: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 8

Task 4 - Add the Group Profile to Be Defined

Page 9: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 9

Task 5 – Create Transform Set

Page 10: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 10

Task 6 – Create a Dynamic Crypto Map with RRI

Task 6 contains the following steps –

–Step 1 – Create a dynamic crypto map.

–Step 2 – Assign a transform set.

–Step 3 – Enable RRI.

Page 11: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 11

Task 6 - Create a Dynamic Crypto Map

Page 12: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 12

Task 7 – Apply Mode Configuration to Crypto Map

Task 7 contains the following steps –

–Step 1 – Configure the router to respond to mode configuration requests.

–Step 2 – Enable IKE querying for a group policy.

–Step 3 – Apply the dynamic crypto map to the crypto map.

Page 13: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 13

Task 7 – Apply Mode Configuration to Crypto Map

Page 14: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 14

Task 8 – Apply the Crypto Map to Router Outside Interface

Page 15: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 15

Task 9 – Enable ISAKMP DPD

Page 16: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 16

Task 10 – Configure XAUTH

Task 10 contains the following steps –

–Step 1 – Enable AAA login authentication.

–Step 2 – Set the XAUTH timeout value.

–Step 3 – Enable ISAKMP XAUTH for the dynamic crypto map.

Page 17: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 17

Task 10, Step 1 – Enable AAA Login Authentication

Page 18: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 18

Task 10, Step 2 – Set XAUTH Timeout Value

Page 19: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 19

Task 10, Step 3 – Enable ISAKMP XAUTH for Crypto Map

Page 20: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 20

Task 11 – (Optional) Enable XAUTH Save Password

Page 21: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 22

Q and A

Page 22: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 23