The information presented in this document was created from devices in a specific lab environment. All of the devices started with a cleared (default)

Similar documents
Cisco 3745 Gateway - PBX Interoperability: Avaya Definity G3 PBX using Q.931 PRI Network Side Interfaces to an H.323 Gateway

Cisco 2651XM Gateway - PBX Interoperability: Avaya Definity G3 PBX using Analog FXO Interfaces to an H.323 Gateway

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO MEDIA CONVERGENCE SERVER 7845H-2400

Cisco CallManager 4.0-PBX Interoperability: Lucent/Avaya Definity G3 MV1.3 PBX using 6608-T1 PRI NI2 with MGCP

Cisco Extensible Provisioning and Operations Manager 4.5

MULTI-VRF AND IP MULTICAST

CISCO IP PHONE 7970G NEW! CISCO IP PHONE 7905G AND 7912G XML

Cisco AS5300 Gateway - PBX Interoperability: NEC NEAX 2400 PBX using T1 PRI Interfaces to an H.323 Gateway

Cisco Voice Services Provisioning Tool 2.6(1)

ENHANCED INTERIOR GATEWAY ROUTING PROTOCOL STUB ROUTER FUNCTIONALITY

CISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD

NEW CISCO IOS SOFTWARE RELEASE 12.2(25)EY FOR CISCO CATALYST 3750 METRO SERIES SWITCHES

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example

Cisco Router and Security Device Manager Cisco Easy VPN Server

NEW METHOD FOR ORDERING CISCO 1700 SERIES MODULAR ACCESS ROUTERS AND CISCO 1800 SERIES INTEGRATED SERVICES ROUTERS SOFTWARE SPARE IMAGES

ANNOUNCING NEW PRODUCT OFFERINGS FOR THE CISCO CATALYST 6500 SERIES

CONFIGURING EPOLICY ORCHESTRATOR 3.0 AND MCAFEE 8.0i WITH CISCO CALLMANAGER

THE POWER OF A STRONG PARTNERSHIP.

Cisco Catalyst 2950 Series Software Feature Comparison Standard Image (SI) and Enhanced Image (EI) Feature Comparison

USING TREND SERVERPROTECT5 WITH CISCO CALLMANAGER

USING MCAFEE VIRUSSCAN ENTERPRISE 8.0I WITH CISCO CALLMANAGER

Cisco ONS SDH 12-Port STM-1 Electrical Interface Card

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO FLEXWAN MODULE FOR USE WITH THE CISCO 7600 SERIES ROUTERS AND CATALYST 6500 SERIES SWITCHES

Using TAPS with +E.164 Directory Numbers

CISCO SFP OPTICS FOR PACKET-OVER-SONET/SDH AND ATM APPLICATIONS

Cisco MDS 9000 Family and EMC ECC Integration

Cisco Unified CallConnector for Microsoft Office Quick Reference Guide 1

High-Availability Solutions for SIP Enabled Voice-over-IP Networks

Traffic Offload. Cisco 7200/Cisco 7500 APPLICATION NOTE

Configuring IOS to IOS IPSec Using AES Encryption

CISCO FAX SERVER. Figure 1. Example Deployment Scenario. The Cisco Fax Server solution consists of the following components:

NEW JERSEY S HIGHER EDUCATION NETWORK (NJEDGE.NET), AN IP-VPN CASE STUDY

Cisco CallManager Server Upgrade Program

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Cisco Value Incentive Program Advanced Technologies: Period 7

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

Cisco 2651XM Gateway - PBX Interoperability: Ericsson MD-110 PBX using Q.931 BRI User Side Interfaces to an H.323 Gateway

Cisco Unified CallManager 4.0-PBX Interoperability: Mitel 3300 ICP Release 4.1 PBX to a Cisco 6608 Gateway using T1 QSIG with MGCP

Cisco Aironet In-Building Wireless Solutions International Power Compliance Chart

CISCO NETWORK CONNECTIVITY CENTER BUSINESS DASHBOARD

CISCO CATALYST 6500 SERIES CONTENT SWITCHING MODULE

CISCO IOS SOFTWARE RELEASE 12.3(11)YK

Cisco Router and Security Device Manager Intrusion Prevention System

CISCO 7304 SERIES ROUTER PORT ADAPTER CARRIER CARD

CISCO 7200 SERIES NETWORK PROCESSING ENGINE NPE-G1

E-Seminar. Voice over IP. Internet Technical Solution Seminar

CISCO WDM SERIES OF CWDM PASSIVE DEVICES

THE CISCO SUCCESS BUILDER PROGRAM THE CISCO SMALL OFFICE COMMUNICATIONS CENTER: AFFORDABLE, PROVEN COMMUNICATIONS SOLUTIONS FOR SMALL ORGANIZATIONS

CISCO TRANSPORT MANAGER 4.7

CISCO CENTRALIZED WIRELESS LAN SOFTWARE RELEASE 3.0

Cisco Unity 4.0(4) with Cisco Unified CallManager 4.1(2) Configured as Message Center PINX using Cisco WS-X6608-T1 using Q.SIG as MGCP Gateway

IP Communications for Small Offices Using Cisco CallManager Express and Cisco Unity Express

Cisco EtherChannel Technology

NEW CISCO IOS SOFTWARE RELEASE 12.2(25)FY FOR CISCO CATALYST EXPRESS 500 SERIES SWITCHES

END-OF-SALE AND END-OF-LIFE ANNOUNCEMENT FOR THE CISCO CATALYST 6500 SERIES OC-12 ATM MODULE

The Cisco Unified Communications Planning and Design Service Bundle

Взято с сайта

Introducing Cisco Catalyst 4500 Series Supervisor Engine II-Plus-10GE and Cisco Catalyst 4500 Series 48-Port 100BASE-X SFP Line Card

CONFIGURING DYNAMIC MULTIPOINT VPN SPOKE ROUTER IN FULL MESH IPSEC VPN USING SECURITY DEVICE MANAGER

Quick Start Guide Cisco CTE 1400 and Design Studio

Cisco Systems Intelligent Storage Networking

Strategic IT Plan Improves NYCHA Resident Services While Reducing Costs US$150 Million

Third party information provided to you courtesy of Dell

CiscoWorks Security Information Management Solution 3.1

Cisco Unified Wireless Network Software Release 3.1

Cisco Optimization Services

CISCO ONS SONET 12-PORT DS-3 TRANSMULTIPLEXER CARD

Cisco Unified Wireless IP Phone 7920 Multi-Charger

NETWORK ADMISSION CONTROL

Cisco ONS SONET 48-Port DS-3/EC-1 Interface Card

Cisco 7304 Shared Port Adapter Modular Services Card

CISCO AC/DC POWER SOLUTION FOR USE WITH CISCO OPTICAL PLATFORMS

Cisco Unified CallManager Licensing Pricing Model

CISCO 10GBASE XENPAK MODULES

Avaya Definity CM 2.0 to a Cisco IAD243X using PRI T1 5ESS ISDN with SIP

PIX/ASA 7.x and Later : Easy VPN with Split Tunneling ASA 5500 as the Server and Cisco 871 as the Easy VPN Remote Configuration Example

E-Seminar. Wireless LAN. Internet Technical Solution Seminar

Cisco 7200VXR Series NPE-G2 Network Processing Engine

Cisco VPN 3002 Hardware Client

Cisco MCS 7815-I2-UC1 Media Convergence Server

Cisco ubr7200-npe-g1 Network Processing Engine for the Cisco ubr7246vxr Universal Broadband Router

Cisco Catalyst 4500 Series Power Supplies and External AC Power Shelf

Cisco AVVID The Architecture for E-Business

Multicast Virtual Private Networks

Cisco CallManager Release 4.1-PBX Interoperability: Avaya Definity G3 MV1.3 PBX using a Cisco 2621XM Gateway with E1 Q.SIG as a MGCP Gateway

Configuring Layer 2 Tunneling Protocol (L2TP) over IPSec

CISCO GIGABIT INTERFACE CONVERTER

Cisco VIP6-80 Services Accelerator

C ISCO INTELLIGENCE ENGINE 2100 SERIES M OUNTING AND CABLING

Innovation in Accessibility

CISCO AIRONET 1230AG SERIES ACCESS POINT

CISCO CATALYST 6500 SERIES WITH CISCO IOS SOFTWARE MODULARITY

Cisco SCA Series Secure Content Accelerator

Cisco ONS MA SONET Multiservice Platform

WLAN Small Business Guide

Cisco T3/E3 Network Module for Cisco 2600, 3600, and 3700 Series Routers

Cisco StackWise Technology

Cisco 3725 Gateway - PBX Interoperability: NEC 2400 PBX using E1 R2 Interfaces with H.323

Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP

Applying the Tunnel Template on the Home Agent

Transcription:

CONFIGURATION GUIDE CONFIGURING CISCO VPN CLIENT AND CISCO IOS EASY VPN SERVER Figure 1 Network Diagram 30.30.30.0 C1751V Easy VPN Server 20.20.20.0 IPsec Tunnel Easy VPN 20.20.20.10 Cisco VPN Client INTRODUCTION This document describes how to configure a host to router Easy VPN Solution based on the Cisco VPN Client and Cisco IOS Remote Access Server. This configuration uses the Cisco VPN Client as the client and the Cisco 1751 Router as the server. The Cisco Easy VPN negotiates tunnel parameters and establishes IPsec tunnels. PREREQUISITES The sample configuration is based on the following assumptions: The IP address at the Cisco Easy VPN Server is static. The IP address at the Cisco Easy VPN Client is static or dynamic. All traffic, including Internet traffic, from the Cisco Easy VPN Client is forwarded to the hub. Traffic from the remote hosts is forwarded after applying Network Address Translation/Port Address Translation (NAT/PAT). COMPONENTS USED The sample configuration uses the following releases of the software and hardware: Cisco VPN Client Version 3.5 Cisco 1751 with Cisco IOS Software Release 12.2(8)T (C1700-K9O3SV3Y7-M) Figure 1 illustrates the network for the sample configuration. All contents are Copyright 1992 2004 All rights reserved. Important Notices and Privacy Statement. Page 1 of 9

The information presented in this document was created from devices in a specific lab environment. All of the devices started with a cleared (default) configuration. In a live network, it is imperative to understand the potential impact of any command before implementing it. EASY VPN CONFIGURATIONS The Cisco Easy VPN configuration implements the Cisco Unity Client protocol, which simplifies configuring the detailed information on the client router because most VPN parameters are defined at the VPN remote access server. The server can be a dedicated VPN device, such as a VPN 3000 concentrator or a Cisco PIX Firewall, or a Cisco IOS Software router that supports the Cisco Unity Client protocol. The sample configuration uses the Cisco 1751 Router for the Easy VPN Server. The sample configuration also uses client mode on the Cisco VPN Client. In this mode, the public IP address of the client undergoes NAT to the mode config ip address that is pushed down by the Easy VPN Server. The Cisco VPN Client forwards the Internet traffic to the Easy VPN Server. Direct access to the Cisco VPN Client by traffic other than the encrypted traffic from the Easy VPN Server is denied. For additional information about configuring Cisco VPN Client, refer to Cisco VPN Client User Guide Books Cisco Systems. CONFIGURING THE CISCO VPN CLIENT Step 1. After installing the Cisco VPN Client, launch the application. The Cisco Systems VPN Client dialog box is displayed. All contents are Copyright 1992 2004 All rights reserved. Important Notices and Privacy Statement. Page 2 of 9

Step 2. Click New. The New Connection Entry Wizard is displayed. Step 3. Step 4. Enter the name of the new connection entry: Ez VPN Server Click Next. The prompt for the host name or IP address of the server is displayed. Step 5. Enter 20.20.20.2 and click Next. A request for authentication parameters is displayed. Step 6. Enter the following values: Name: hw-client-groupname Password: hw-client-password Confirm password: hw-client-password Step 7. Click Next. A message saying you succeeded in creating the VPN connection is displayed. All contents are Copyright 1992 2004 All rights reserved. Important Notices and Privacy Statement. Page 3 of 9

Step 8. Click Finish. The Cisco Systems VPN Client dialog box is displayed. Step 9. Click Connect. The connecting message is displayed. After the connection is made, the connection status is displayed and the connection is established. All contents are Copyright 1992 2004 All rights reserved. Important Notices and Privacy Statement. Page 4 of 9

The following is a view of the connection statistics: CISCO 1751 VPN ROUTER CONFIGURATION version 12.2 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption service internal hostname Cisco1751 aaa new-model aaa authorization network hw-client-groupname local aaa session-id common enable password cisco memory-size iomem 15 clock timezone - 0 6 ip subnet-zero no ip source-route ip domain-name cisco.com ip audit notify log ip audit po max-events 100 crypto isakmp policy 1 encr 3des authentication pre-share All contents are Copyright 1992 2004 All rights reserved. Important Notices and Privacy Statement. Page 5 of 9

group 2 crypto isakmp client configuration address-pool local dynpool crypto isakmp client configuration group hw-client-groupname key hw-client-password dns 30.30.30.10 30.30.30.11 wins 30.30.30.12 30.30.30.13 domain cisco.com pool dynpool crypto ipsec transform-set transform-1 esp-3des esp-sha-hmac crypto dynamic-map dynmap 1 set transform-set transform-1 reverse-route crypto map dynmap isakmp authorization list hw-client-groupname crypto map dynmap client configuration address respond crypto map dynmap 1 ipsec-isakmp dynamic dynmap interface Ethernet0/0 description connected to INTERNET ip address 20.20.20.2 255.255.255.0 half-duplex no cdp enable crypto map dynmap interface FastEthernet0/0 description connected to HQ LAN ip address 30.30.30.1 255.255.255.0 speed auto no cdp enable ip local pool dynpool 30.30.30.20 30.30.30.30 ip classless ip route 0.0.0.0 0.0.0.0 Ethernet0/0 no ip http server ip pim bidir-enable no cdp run line con 0 line aux 0 line vty 0 4 password cisco end VERIFYING THE RESULTS This section provides information that can be used to confirm that configuration is working properly. All contents are Copyright 1992 2004 All rights reserved. Important Notices and Privacy Statement. Page 6 of 9

Verifying the Cisco 1751 Status Cisco1751#show crypto ipsec sa interface: Ethernet0/0 Crypto map tag: dynmap, local addr. 20.20.20.2 protected vrf: local ident (addr/mask/prot/port): (0.0.0.0/0.0.0.0/0/0) remote ident (addr/mask/prot/port): (30.30.30.20/255.255.255.255/0/0) current_peer: 20.20.20.10:500 PERMIT, flags={} #pkts encaps: 0, #pkts encrypt: 0, #pkts digest 0 #pkts decaps: 260, #pkts decrypt: 260, #pkts verify 260 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 20.20.20.2, remote crypto endpt.: 20.20.20.10 path mtu 1500, media mtu 1500 current outbound spi: C1E4231E inbound esp sas: spi: 0xEC89E882(3968460930) transform: esp-3des esp-sha-hmac, in use settings ={Tunnel, } slot: 0, conn id: 202, flow_id: 3, crypto map: dynmap sa timing: remaining key lifetime (k/sec): (4511772/3455) IV size: 8 bytes replay detection support: Y inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0xC1E4231E(3252953886) transform: esp-3des esp-sha-hmac, in use settings ={Tunnel, } slot: 0, conn id: 203, flow_id: 4, crypto map: dynmap sa timing: remaining key lifetime (k/sec): (4511804/3455) IV size: 8 bytes replay detection support: Y outbound ah sas: outbound pcp sas: protected vrf: local ident (addr/mask/prot/port): (20.20.20.2/255.255.255.255/0/0) remote ident (addr/mask/prot/port): (30.30.30.20/255.255.255.255/0/0) current_peer: 20.20.20.10:500 PERMIT, flags={} #pkts encaps: 50, #pkts encrypt: 50, #pkts digest 50 #pkts decaps: 0, #pkts decrypt: 0, #pkts verify 0 #pkts compressed: 0, #pkts decompressed: 0 #pkts not compressed: 0, #pkts compr. failed: 0 #pkts not decompressed: 0, #pkts decompress failed: 0 #send errors 0, #recv errors 0 local crypto endpt.: 20.20.20.2, remote crypto endpt.: 20.20.20.10 path mtu 1500, media mtu 1500 current outbound spi: 86EA4824 inbound esp sas: spi: 0x28231BBA(673389498) transform: esp-3des esp-sha-hmac, in use settings ={Tunnel, } slot: 0, conn id: 200, flow_id: 1, crypto map: dynmap sa timing: remaining key lifetime (k/sec): (4462296/3451) All contents are Copyright 1992 2004 All rights reserved. Important Notices and Privacy Statement. Page 7 of 9

IV size: 8 bytes replay detection support: Y inbound ah sas: inbound pcp sas: outbound esp sas: spi: 0x86EA4824(2263500836) transform: esp-3des esp-sha-hmac, in use settings ={Tunnel, } slot: 0, conn id: 201, flow_id: 2, crypto map: dynmap sa timing: remaining key lifetime (k/sec): (4462290/3450) IV size: 8 bytes replay detection support: Y outbound ah sas: outbound pcp sas: Cisco1751#sh crypto isakmp sa dst src state conn-id slot 20.20.20.2 20.20.20.10 QM_IDLE 1 0 Cisco1751#show crypto engine connections active ID Interface IP-Address State Algorithm Encrypt Decrypt 1 Ethernet0/0 20.20.20.2 set HMAC_SHA+3DES_56_C 0 0 200 Ethernet0/0 20.20.20.2 set HMAC_SHA+3DES_56_C 0 0 201 Ethernet0/0 20.20.20.2 set HMAC_SHA+3DES_56_C 134 0 202 Ethernet0/0 20.20.20.2 set HMAC_SHA+3DES_56_C 0 770 203 Ethernet0/0 20.20.20.2 set HMAC_SHA+3DES_56_C 0 0 TROUBLESHOOTING THE CONFIGURATION Certain show commands are supported by the Output Interpreter Tool (registered customers only), which analyzes show command output. Note: Before issuing debug commands, see Important Information about Debug Commands. debug crypto isakmp Displays errors during Phase 1. debug crypto ipsec Displays errors during Phase 2. debug crypto engine Displays information from the crypto engine. debug ip your routing protocol Displays information about routing transactions of the routing protocol. clear crypto connection connection-id [slot rsm vip] Terminates an encrypted session currently in progress. Encrypted sessions normally terminate when the session times out. Use the show crypto cisco connections command to see the connection-id value. clear crypto isakmp Clears the Phase 1 security associations. clear crypto sa Clears the Phase 2 security associations. All contents are Copyright 1992 2004 All rights reserved. Important Notices and Privacy Statement. Page 8 of 9

RELATED INFORMATION IPsec Support Page An Introduction to IP Security (IPsec) Encryption Download Cisco VPN Client from CCO Cisco VPN Client Cisco IOS Easy VPN Server Configuring IPSec Network Security Configuring Internet Key Exchange Security Protocol Command Lookup Tool (registered customers only) Technical Support Cisco Systems Corporate Headquarters 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 European Headquarters Cisco Systems International BV Haarlerbergpark Haarlerbergweg 13-19 1101 CH Amsterdam The Netherlands www-europe.cisco.com Tel: 31 0 20 357 1000 Fax: 31 0 20 357 1100 Americas Headquarters 170 West Tasman Drive San Jose, CA 95134-1706 USA www.cisco.com Tel: 408 526-7660 Fax: 408 527-0883 Asia Pacific Headquarters 168 Robinson Road #28-01 Capital Tower Singapore 068912 www.cisco.com Tel: +65 6317 7777 Fax: +65 6317 7799 Cisco Systems has more than 200 offices in the following countries and regions. Addresses, phone numbers, and fax numbers are listed on the Cisco Web site at www.cisco.com/go/offices Argentina Australia Austria Belgium Brazil Bulgaria Canada Chile China PRC Colombia Costa Rica Croatia Cyprus Czech Republic Denmark Dubai, UAE Finland France Germany Greece Hong Kong SAR Hungary India Indonesia Ireland Israel Italy Japan Korea Luxembourg Malaysia Mexico The Netherlands New Zealand Norway Peru Philippines Poland Portugal Puerto Rico Romania Russia Saudi Arabia Scotland Singapore Slovakia Slovenia South Africa Spain Sweden Switzerland Taiwan Thailand T urkey Ukraine United Kingdom United States V enezuela Vietnam Zimbabwe All contents are Copyright 1992 2004 All rights reserved. Cisco, Cisco Systems, and the Cisco Systems logo are registered trademarks of and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0403R) 204026_ETMG_SH_06.04