Network Security 2 Module 6 Configure Remote Access

  • Slides: 22
Download presentation
Network Security 2 Module 6 – Configure Remote Access VPN ISCW-Mod 3_L 7 ©

Network Security 2 Module 6 – Configure Remote Access VPN ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 1

Module 6 – Configure Remote Access VPN Lesson 6. 2 Configure the Easy. VPN

Module 6 – Configure Remote Access VPN Lesson 6. 2 Configure the Easy. VPN Server ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 2

Easy VPN Server General Configuration Tasks § The following general tasks are used to

Easy VPN Server General Configuration Tasks § The following general tasks are used to configure Easy VPN Server on a Cisco router – –Task 1 – Create IP address pool. –Task 2 – Configure group policy lookup. –Task 3 – Create ISAKMP policy for remote VPN Client access. –Task 4 – Define group policy for mode configuration push. –Task 5 – Create a transform set. –Task 6 – Create a dynamic crypto map with RRI. –Task 7 – Apply mode configuration to the dynamic crypto map. –Task 8 – Apply the crypto map to the router interface. –Task 9 – Enable IKE DPD. –Task 10 – Configure XAUTH. –Task 11 – (Optional) Enable XAUTH save password feature. ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 3

Task 1 – Create IP Address Pool ISCW-Mod 3_L 7 © 2007 Cisco Systems,

Task 1 – Create IP Address Pool ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 4

Task 2 – Configure Group Policy Lookup • Creates a user group for local

Task 2 – Configure Group Policy Lookup • Creates a user group for local AAA policy lookup ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 5

Task 3 – Create ISAKMP Policy for Remote VPN Client Access ISCW-Mod 3_L 7

Task 3 – Create ISAKMP Policy for Remote VPN Client Access ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 6

Task 4 – Define Group Policy for Mode Configuration Push § Task 4 contains

Task 4 – Define Group Policy for Mode Configuration Push § Task 4 contains the following steps – –Step 1 – Add the group profile to be defined. –Step 2 – Configure the ISAKMP pre-shared key. –Step 3 – Specify the DNS servers. –Step 4 – Specify the WINS servers. –Step 5 – Specify the DNS domain. –Step 6 – Specify the local IP address pool. ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 7

Task 4 - Add the Group Profile to Be Defined ISCW-Mod 3_L 7 ©

Task 4 - Add the Group Profile to Be Defined ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 8

Task 5 – Create Transform Set ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc.

Task 5 – Create Transform Set ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 9

Task 6 – Create a Dynamic Crypto Map with RRI § Task 6 contains

Task 6 – Create a Dynamic Crypto Map with RRI § Task 6 contains the following steps – –Step 1 – Create a dynamic crypto map. –Step 2 – Assign a transform set. –Step 3 – Enable RRI. ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 10

Task 6 - Create a Dynamic Crypto Map ISCW-Mod 3_L 7 © 2007 Cisco

Task 6 - Create a Dynamic Crypto Map ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 11

Task 7 – Apply Mode Configuration to Crypto Map § Task 7 contains the

Task 7 – Apply Mode Configuration to Crypto Map § Task 7 contains the following steps – –Step 1 – Configure the router to respond to mode configuration requests. –Step 2 – Enable IKE querying for a group policy. –Step 3 – Apply the dynamic crypto map to the crypto map. ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 12

Task 7 – Apply Mode Configuration to Crypto Map ISCW-Mod 3_L 7 © 2007

Task 7 – Apply Mode Configuration to Crypto Map ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 13

Task 8 – Apply the Crypto Map to Router Outside Interface ISCW-Mod 3_L 7

Task 8 – Apply the Crypto Map to Router Outside Interface ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 14

Task 9 – Enable ISAKMP DPD ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc.

Task 9 – Enable ISAKMP DPD ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 15

Task 10 – Configure XAUTH § Task 10 contains the following steps – –Step

Task 10 – Configure XAUTH § Task 10 contains the following steps – –Step 1 – Enable AAA login authentication. –Step 2 – Set the XAUTH timeout value. –Step 3 – Enable ISAKMP XAUTH for the dynamic crypto map. ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 16

Task 10, Step 1 – Enable AAA Login Authentication ISCW-Mod 3_L 7 © 2007

Task 10, Step 1 – Enable AAA Login Authentication ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 17

Task 10, Step 2 – Set XAUTH Timeout Value ISCW-Mod 3_L 7 © 2007

Task 10, Step 2 – Set XAUTH Timeout Value ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 18

Task 10, Step 3 – Enable ISAKMP XAUTH for Crypto Map ISCW-Mod 3_L 7

Task 10, Step 3 – Enable ISAKMP XAUTH for Crypto Map ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 19

Task 11 – (Optional) Enable XAUTH Save Password ISCW-Mod 3_L 7 © 2007 Cisco

Task 11 – (Optional) Enable XAUTH Save Password ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 20

Q and A ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved.

Q and A ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 22

ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 23

ISCW-Mod 3_L 7 © 2007 Cisco Systems, Inc. All rights reserved. 23