VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 5.2

Similar documents
VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2

VNS3 to Windows RRAS Instructions. Windows 2012 R2 RRAS Configuration Guide

VNS3 IPsec Configuration. Connecting VNS3 Side by Side via IPsec

AWS VPC Cloud Environment Setup

VNS3 Configuration. Quick Launch for first time VNS3 users in Azure

VPN-Cubed 2.x vpcplus Free Edition

Configuration of an IPSec VPN Server on RV130 and RV130W

VNS3 Configuration. Google Compute Engine

VPN-Cubed Datacenter Connect IBM Trial Edition v201102

VNS3 Configuration. ElasticHosts

VPN-Cubed 2.x vpcplus Enterprise Edition

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

How to Configure Forcepoint NGFW Route-Based VPN to AWS with BGP TECHNICAL DOCUMENT

Integration Guide. Oracle Bare Metal BOVPN

VNS3 Configuration. IaaS Private Cloud Deployments

Microsoft Azure Configuration. Azure Setup for VNS3

VPN-Cubed 2.x Datacenter Connect ElasticHosts

Case 1: VPN direction from Vigor2130 to Vigor2820

VPN-Cubed 2.1 UL for Terremark Datacenter Connect or Cloud Only

CenturyLink Cloud Configuration. CenturyLink Setup for VNS3

VNS3 version 4. Free and Lite Edition Reset Overlay Subnet

VNS3 3.x Trial Edition Configuration Instructions

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

Virtual Private Network. Network User Guide. Issue 05 Date

Configuring LAN-to-LAN IPsec VPNs

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

IPsec NAT Transparency

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

VMware Cloud on AWS Networking and Security. 5 September 2018 VMware Cloud on AWS

VPN-Cubed 2.x Datacenter Connect SME Edition

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Google Cloud VPN Interop Guide

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

Virtual Tunnel Interface

Configuration Summary

IPsec Dead Peer Detection Periodic Message Option

VPN-Cubed 2.x Datacenter Connect Lite Edition

How to Configure an IPsec VPN to an AWS VPN Gateway with BGP

VNS3 4.0 Configuration Guide

VPN Ports and LAN-to-LAN Tunnels

Efficient SpeedStream 5861

How to configure IPSec VPN between a CradlePoint router and a Fortinet router

VPN Overview. VPN Types

VPN-Cubed 2.x Datacenter Connect SME Edition

Configuring VPN from Proventia M Series Appliance to Symantec 5310 Systems

Quick Note. Configure an IPSec VPN tunnel between a Digi TransPort LR router and a Digi Connect gateway. Digi Technical Support 20 September 2016

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Configuring IPsec and ISAKMP

Cisco Exam Questions & Answers

IPsec NAT Transparency

VPN Configuration Guide. Cisco ASA 5500 Series

Configuring a Hub & Spoke VPN in AOS

Cisco Asa 8.4 Ipsec Vpn Client Configuration. Example >>>CLICK HERE<<<

Configuring IPSec tunnels on Vocality units

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

Internet Key Exchange

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Quick Note. Configure an IPSec VPN tunnel in Aggressive mode between a TransPort LR router and a Cisco router. Digi Technical Support 7 October 2016

Configuring L2TP over IPsec

VMware Cloud on AWS Getting Started. 18 DEC 2017 VMware Cloud on AWS

Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP

Cisco CSR1000V Overview. Cisco CSR 1000V Use Cases in Amazon AWS

LAN-to-LAN IPsec VPNs

Firepower Threat Defense Site-to-site VPNs

IPsec and ISAKMP. About Tunneling, IPsec, and ISAKMP

IPsec and ISAKMP. About Tunneling, IPsec, and ISAKMP

Container System Overview

Top 30 AWS VPC Interview Questions and Answers Pdf

Overlay Engine. VNS3 Plugins Guide 2018

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN

IPSec VPN Setup with IKE Preshared Key and Manual Key on WRVS4400N Router

Cisco ASA 5500 LAB Guide

FAQ about Communication

How to configure IPSec VPN between a Cradlepoint router and a SRX or J Series Juniper router

Fundamentals of Network Security v1.1 Scope and Sequence

Network Security 2. Module 4 Configure Site-to-Site VPN Using Pre-Shared Keys

IPSec tunnel for ER75i routers application guide

Configuration Example of ASA VPN with Overlapping Scenarios Contents

SYSLOG Enhancements for Cisco IOS EasyVPN Server

Virtual Private Networks (VPN)

IPsec and ISAKMP. About Tunneling, IPsec, and ISAKMP

Cisco Multicloud Portfolio: Cloud Connect

Proxy Protocol Support for Sophos UTM on AWS. Sophos XG Firewall How to Configure VPN Connections for Azure

Internet. SonicWALL IP Cisco IOS IP IP Network Mask

How to Configure an IKEv1 IPsec Site-to-Site VPN to the Static Microsoft Azure VPN Gateway

VPNC Scenario for IPsec Interoperability

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Chapter 8 Lab Configuring a Site-to-Site VPN Using Cisco IOS

Table of Contents. Cisco Cisco VPN Client FAQ

HOW TO CONFIGURE AN IPSEC VPN

IKE and Load Balancing

VPN Tracker for Mac OS X

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

Cisco Passguide Exam Questions & Answers

VNS Administration Guide

BiGuard C01 BiGuard VPN Client Quick Installation Guide (BiGuard series VPN enabled devices) Secure access to Company Network

Manual Key Configuration for Two SonicWALLs

Exam : Title : Securing Networks with PIX and ASA. Ver :

Virtual Tunnel Interface

Transcription:

VNS3 IPsec Configuration VNS3 to Cisco ASA ASDM 5.2

Site-to-Site IPsec Tunnel IPsec protocol allows you to securely connect two sites together over the public internet using cryptographically secured services. IPsec ensure private and secure communication between two devices. This type of VPN has many use-cases. We will focus on the Site-to-Site or LAN-to-LAN setup most often used with VNS3 to build Hybrid Clouds. Public Cloud Overlay Network Subnet: 172.31.1.0/24 Many network hardware devices support IPsec tunneling functionality. Check your device's data sheet to see if it is compatible with VNS3. The requirements are: IKE1 or IKE2 AES256 or AES128 or 3DES SHA1 or MD5 NAT-Traversal capability (some clouds require NAT-Traversal encapsulation - AWS Generic EC2, Microsoft Azure, etc.) A diagram of the typical secure hybrid cloud setup using VNS3 is provided on the right. The IPsec tunnel provides secure and encrypted connectivity between the office subnet (192.169.3.0/24) and the VNS3 Overlay Network (172.31.1.0/24). This guide will provide steps to setup the Cisco ASA side of the IPsec configuration. Firewall / IPsec Cisco ASA Server A LAN IP: 192.168.3.50 Cloud Server Overlay IP: 172.31.1.1 VNS3 public IP: 184.73.174.250 overlay IP: 172.31.1.250 Active IPsec tunnel 192.168.3.0/24-172.31.1.0/24 Server B LAN IP: 192.168.3.100 The most important thing in any IPsec configuration is to make sure all settings match on both devices that are going to connect to each other. Mismatches are the primary cause for tunnel failure or instability. Customer Remote Office Remote subnet: 192.168.3.0/24 2

Create a new VPN Tunnel. The Cisco ASA used in this guide does this through a VPN Wizard. If you are using another facility to create your IPsec Tunnel, make sure to enter the same information we enter in the following slides. Choose a Site-to-Site Tunnel Type. Click Next Tunnel Configuration Considerations If you want the tunnel to be perpetual and as close to "always on" as IPSec can do, then: Your gateway should be using its "keepalive" feature, VNS3 has this enabled by default Your gateway should be using Dead Peer Detection (DPD) with a "restart" parameter in the event it believes tunnel is dropped Your VNS3 Controller has DPD disabled by default, enable it by adding "dpdaction=restart" dpddelay=30s and dpdtimeout=90s in the extra parameters box (no quotes needed). Your gateway should allow the VNS3 Controller to make a connection "inbound to it", by default the VNS3 Controller allows inbound connections and attempts outbound 3

The first step in setting up an IPsec tunnel is to let the Cisco ASA know where it will be negotiating the tunnel via Public IP address. Enter the VNS3 Controller s IP address in the Peer IP Address field. Enter the same Pre-Shared Key used in the VNS3 Endpoint creation (our example used test ). Click Next. 4

Choose your Key Exchange Policy (IKE). Make sure it is the same as the one used in the VNS3 Controller setup. Click Next. 5

Select the encryption and authentication algos for the Encapsulating Security Payload (ESP). Make sure it is the same as the one used in the VNS3 Controller setup. Our recommended setup uses AES-256. Click Next. 6

Setting up Hosts and Networks. This is where you specify the subnets that will be advertised to one another over the IPsec tunnel. Source is the local subnet behind the Cisco ASA and Destination is the Overlay Subnet behind the VNS3 Controller. You can specify the entire Overlay Subnet or smaller Cidr blocks. Just make sure the settings on the remote device match the settings entered on VNS3. Click Next. 7

Double check that all the information is entered correctly. Click Finish. 8

Make sure the IPsec VPN session is up and running. Goto Monitoring > VPN Statistics > Sessions You should be able to see the session under LAN-to-LAN Click Details. 9

The Session Details will give you expanded information about your Key Exchange and IPsec status. 10

Troubleshooting 11

Cisco Network Group Object Cisco Network Group Objects allow more than one tunnel/subnet/sa be included in a single ACL line. Cisco Network Group Objects create interoperability problems with VNS3 (and other manufactures) and are NOT SUPPORTED. access-list VPN_ACL extended permit ip object-group REMOTE object-group LOCAL object-group network REMOTE network-object 172.31.0.0 255.255.255.0 network-object 172.21.1.0 255.255.255.0 object-group network LOCAL network-object 192.168.0.0 255.255.255.0 It is recommend that you use the non-grouped ACL syntax with specific address statements. access-list VPN_ACL-1 line 1 extended permit ip 192.168.0.0 255.255.255.0 172.31.0.0 255.255.255.0 access-list VPN_ACL-1 line 1 extended permit ip 192.168.0.0 255.255.255.0 172.31.1.0 255.255.255.0 12

Interesting Traffic The first step in initiating the IPsec negotiation process with a Cisco device is sending Interesting Traffic. Interesting traffic as defined by Cisco: Determining what type of traffic is deemed interesting is part of formulating a security policy for use of a VPN. The policy is then implemented in the configuration interface for each particular IPSec peer. For example, in Cisco routers and PIX Firewalls, access lists are used to determine the traffic to encrypt. The access lists are assigned to a crypto policy such that permit statements indicate that the selected traffic must be encrypted, and deny statements can be used to indicate that the selected traffic must be sent unencrypted. With the Cisco Secure VPN Client, you use menu windows to select connections to be secured by IPSec. When interesting traffic is generated or transits the IPSec client, the client initiates the next step in the process, negotiating an IKE phase one exchange. Interesting traffic is tunnel traffic that has a source/destination that fits with the tunnel definition/ ACLs that were created as part of the IPsec configuration. It is recommended that a continuous ping is setup on both sides of the tunnel during configuration to ensure interesting traffic is present to begin the IPsec negotiation process. 13

VPN Idle Timeout VPN Idle Timeout is a Cisco setting that will terminate an IPsec connection if there is no communication activity on the connection in the period defined. Terminated IPsec connections can alarm operations teams and require a specific direction of interesting traffic to re-build/re-negotiate the tunnel. This can be at best a nuisance for production systems. It is recommended this setting is turned off or setting the idle timeout to Unlimited. To turn off the vpn-idle-timeout via ASDM, click Configuration>Site-to-Site VPN>Group Policies then on the Group Policy created for your tunnel. The resulting page will have a Idle Timeout checkbox, make sure it is set to Unlimited. To turn vpn-idle-timeout off via the CLI use the following under the Group Policy associated with the tunnel: vpn-idle-timeout none OR no vpn-idle-timeout group-policy DfltGrpPolicy attributes vpn-idle-timeout none NOTE: when setting up your IPsec configuration via the Site-to-site VPN Wizard, the setting for vpn-idle-timeout will be inherited from your Default Group Policy as configured out your ASA. Double check to make sure it is disabled after tunnel configuration. 14

VNS3 Document Links VNS3 Product Resources - Documentation Add-ons VNS3 Configuration Instructions (Free & Lite Editions BYOL) Instructions and screenshots for configuring a VNS3 Controller in a single or multiple Controller topology. Specific steps include, initializing a new Controller, generating clientpack keys, setting up peering, building IPsec tunnels, and connecting client servers to the Overlay Network. VNS3 Administration Document Covers the administration and operation of a configured VNS3 Controller. Additional detail is provided around the VNS3 Firewall, all administration menu items, upgrade licenses, other routes and SNMP traps. VNS3 Troubleshooting Troubleshooting document that provides explanation issues that are more commonly experienced with VNS3. 15