VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2

Similar documents
VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 5.2

VNS3 to Windows RRAS Instructions. Windows 2012 R2 RRAS Configuration Guide

VNS3 IPsec Configuration. Connecting VNS3 Side by Side via IPsec

Virtual Tunnel Interface

Configuration of an IPSec VPN Server on RV130 and RV130W

AWS VPC Cloud Environment Setup

VNS3 Configuration. Quick Launch for first time VNS3 users in Azure

Configuring LAN-to-LAN IPsec VPNs

Google Cloud VPN Interop Guide

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

Integration Guide. Oracle Bare Metal BOVPN

VPN Ports and LAN-to-LAN Tunnels

Virtual Private Network. Network User Guide. Issue 05 Date

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

LAN-to-LAN IPsec VPNs

Virtual Tunnel Interface

VMware Cloud on AWS Networking and Security. 5 September 2018 VMware Cloud on AWS

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Microsoft Azure Configuration. Azure Setup for VNS3

How to Configure an IKEv1 IPsec Site-to-Site VPN to the Static Microsoft Azure VPN Gateway

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

Proxy Protocol Support for Sophos UTM on AWS. Sophos XG Firewall How to Configure VPN Connections for Azure

VNS3 Configuration. IaaS Private Cloud Deployments

VPN Overview. VPN Types

VNS3 Configuration. ElasticHosts

Firepower Threat Defense Site-to-site VPNs

Internet. SonicWALL IP Cisco IOS IP IP Network Mask

Cisco ASA 5500 LAB Guide

VNS3 version 4. Free and Lite Edition Reset Overlay Subnet

VNS3 Configuration. Google Compute Engine

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

Configuring IPsec and ISAKMP

CenturyLink Cloud Configuration. CenturyLink Setup for VNS3

Quick Note. Configure an IPSec VPN tunnel between a Digi TransPort LR router and a Digi Connect gateway. Digi Technical Support 20 September 2016

IKE and Load Balancing

Configuring VPN from Proventia M Series Appliance to Symantec 5310 Systems

VMware Cloud on AWS Getting Started. 18 DEC 2017 VMware Cloud on AWS

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

How to Configure an IPsec VPN to an AWS VPN Gateway with BGP

Virtual Private Networks

Cisco CSR1000V Overview. Cisco CSR 1000V Use Cases in Amazon AWS

Cloud Security Best Practices

Top 30 AWS VPC Interview Questions and Answers Pdf

IPsec and ISAKMP. About Tunneling, IPsec, and ISAKMP

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP

IPsec and ISAKMP. About Tunneling, IPsec, and ISAKMP

How to Configure an IPsec Site-to-Site VPN to a Windows Azure VPN Gateway

Efficient SpeedStream 5861

How to Configure Forcepoint NGFW Route-Based VPN to AWS with BGP TECHNICAL DOCUMENT

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Cisco Exam Questions & Answers

Google Cloud VPN Interop Guide

Configuring a Hub & Spoke VPN in AOS

IPSec Transform Set Configuration Mode Commands

High Availability Options

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

Configuration Summary

IPsec and ISAKMP. About Tunneling, IPsec, and ISAKMP

Configuring IPSec tunnels on Vocality units

IPSec VPN Setup with IKE Preshared Key and Manual Key on WRVS4400N Router

Container System Overview

Sample excerpt. Virtual Private Networks. Contents

Chapter 8 Lab Configuring a Site-to-Site VPN Using Cisco IOS

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

IPSec Transform Set Configuration Mode Commands

Virtual Private Cloud. User Guide. Issue 03 Date

VPN Tracker for Mac OS X

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

Google Cloud VPN Interop Guide

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN

Overlay Engine. VNS3 Plugins Guide 2018

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

Case 1: VPN direction from Vigor2130 to Vigor2820

Table of Contents 1 IKE 1-1

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Network Security 2. Module 4 Configure Site-to-Site VPN Using Pre-Shared Keys

Configuring VPNs in the EN-1000

Internet Key Exchange

Configuring Security for VPNs with IPsec

Greenbow VPN Client Example

BiGuard C01 BiGuard VPN Client Quick Installation Guide (BiGuard series VPN enabled devices) Secure access to Company Network

Configuring Internet Key Exchange Security Protocol

Cisco Multicloud Portfolio: Cloud Connect

VPN Configuration Guide. Cisco ASA 5500 Series

Network Security CSN11111

Configuration Guide. How to connect to an IPSec VPN using an iphone in ios. Overview

Site-to-Site VPN. VPN Basics

The EN-4000 in Virtual Private Networks

VNS3 3.5 Container System Add-Ons

VPNC Scenario for IPsec Interoperability

IKE. Certificate Group Matching. Policy CHAPTER

Fundamentals of Network Security v1.1 Scope and Sequence

FAQ about Communication

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

VPN Auto Provisioning

Transcription:

VNS3 IPsec Configuration VNS3 to Cisco ASA ASDM 9.2

Site-to-Site IPsec Tunnel IPsec protocol allows you to securely connect two sites together over the public internet using cryptographically secured services. IPsec ensure private and secure communication between two devices. This type of VPN has many use-cases. We will focus on the Site-to-Site or LAN-to-LAN setup most often used with VNS3 to build Hybrid Clouds. Public Cloud Overlay Network Subnet: 172.31.1.0/24 Many network hardware devices support IPsec tunneling functionality. Check your device's data sheet to see if it is compatible with VNS3. The requirements are: IKE1 or IKE2 AES256 or AES128 or 3DES SHA1 or MD5 NAT-Traversal capability (some clouds require NAT-Traversal encapsulation - AWS Generic EC2, Microsoft Azure, etc.) A diagram of the typical secure hybrid cloud setup using VNS3 is provided on the right. The IPsec tunnel provides secure and encrypted connectivity between the office subnet (192.169.3.0/24) and the VNS3 Overlay Network (172.31.1.0/24). Firewall / IPsec Cisco ASA Cloud Server Overlay IP: 172.31.1.1 VNS3 public IP: 184.73.174.250 overlay IP: 172.31.1.250 Active IPsec tunnel 192.168.3.0/24-172.31.1.0/24 This guide will provide steps to setup the Cisco ASA side of the IPsec configuration. The most important thing in any IPsec configuration is to make sure all settings match on both devices that are going to connect to each other. Mismatches are the primary cause for tunnel failure or instability. Server A LAN IP: 192.168.3.50 Server B LAN IP: 192.168.3.100 Customer Remote Office Remote subnet: 192.168.3.0/24 2

Use the Cisco VPN Wizard - Site-to-Site Unless you are familiar with the Cisco ASA CLI or ASDM, the configuration wizards are the easiest way to configure an IPsec tunnel. From the Cisco ASDM menu click Wizards>VPN Wizards>Site-to-site VPN Wizard. 3

IPsec VPN Wizard: 1. Introduction The first page of the Site-to-site VPN Connection Setup Wizard provides a diagram (similar to the one on page 2 of this document) and a link to a video that explains the configuration process. Click Next. 4

IPsec VPN Wizard: 2. Peer Device Identification The first step in setting up an IPsec tunnel is to let the Cisco ASA know where it will be negotiating the tunnel via Public IP address. Enter the VNS3 Manager's Public IP address in the Peer IP Address field. Choose outside as the VPN Access Interface as this tunnel will be negotiated out via the public Internet. Click Next. 5

IPsec VPN Wizard: 3. Traffic to protect Once the ASA knows where the other device is located that it will be building the IPsec to with, the next step is to configure what traffic will be allowed to pass over the tunnel. This is done by entering in network ranges: one range for the local (what is available "behind" the Cisco ASA) and one range for the remote (what is available "behind" the VNS3 instance). NOTE: Use CIDR notation (CIDR Subnet Calculator) here and avoid using the network group objects (see page 13). If you need to advertise more than one subnet range simply enter them in a comma separated list (e.g 172.31.1.0/25, 172.31.1.128/25). Enter your Local Subnet in the Local Network field. Enter the VNS3 Overlay Subnet/Unencrypted VLAN* in the Remote Network field. Click Next. *If you are unsure which network to use for the remote network, contact our support team. 6

IPsec VPN Wizard: 3. Security - PSK and IKE Version VNS3 supports IPsec tunnel authentication using a pre-shared key (PSK). A PSK is a shared secret between the two connecting parties (in this case owner of the Cisco and the owner of the ASA). Even if a VPN IPsec connection is encrypted, the PSK confirms the peer or device you are establishing connection with is the one you intend to use. Encryption provides confidentiality in the connection and PSK ensures that only you and the other party can provide the required authentication. VNS3 does not currently support certificate based authentication. If this is a requirement for your deployment contact our support team. Enter a PSK that will be used for both sides of the connection in the Pre-shared Key field. In our VNS3 Configuration PDF we use test. NOTE: There may be more fields than displayed to the left for IKEv2. Enter in the same PSK for each field. Click IKE Version and select IKE Version 1*. *IKE Version 2 is supported in 3.5+ versions of VNS3. To ensure the highest interop, use IKE v1. 7

IPsec VPN Wizard: 3. Security - Encryption Algorithms and PFS The next step in setting up the security profile for an IPsec configuration is to choose the encryption algorithms that will be used to encapsulate the traffic moving through the tunnel. The settings must match on both sides of the tunnel configuration. Policies are made of of an algorithm, hashing and potentially Diffie-Hellman Group. Click Encryption Algorithms from the Custom Configuration pane menu. Select the IKE (Phase1) policy and enter it into the IKE Policy field. NOTE: the IKE Policy is a ASA global setting and is shared will all connections. If you change this, you may experience problems with other existing connections. Select the IPsec SA (Phase2) policy and enter it into the IPsec Proposal field PFS ensures you never regenerate the same key that will be used in encapsulating IPsec VPN traffic. Enabling PFS significantly limits the what a malicious third party can do/see if they compromise a key. Cohesive recommends enabling PFS as best practice. Click Perfect Forward Secrecy from the Custom Configuration pane menu. Click the PFS check box and choose a PFS Diffie-Hellman Group from the drop down menu. Click Next. 8

IPsec VPN Wizard: 4. NAT Exempt The NAT Exempt setting simply tells the ASA not to translate the traffic associated with the tunnel. Source and destination traffic retain the untranslated version of their subnets. In a standard/traditional configuration, NAT Exempt should be checked. NOTE: If the local subnet (address range "behind" the ASA) is not the actual range and you are using Network Address Translation, this box will need to be left uncheck. For this example we will assume the Traffic configuration on page 6 is using the actual subnet ranges. Check the NAT Exempt Box. Click Next. 9

IPsec VPN Wizard: Summary Review the IPsec tunnel configuration parameters to make sure everything is entered as expected and matches the VNS3 configuration. Click Finish. 10

IPsec VPN Wizard: Summary Once the tunnel has been established, you can monitor the tunnel session information for any issues. Click Monitoring on the ASDM top menu. Click VPN from the bottom left menu. Click VPN Statistics>Sessions from the VPN left column menu pane. Select the Connection Profile and click Details. 11

Troubleshooting 12

Cisco Network Group Object Cisco Network Group Objects allow more than one tunnel/subnet/sa be included in a single ACL line. Cisco Network Group Objects create interoperability problems with VNS3 (and other manufactures) and are NOT SUPPORTED. access-list VPN_ACL extended permit ip object-group REMOTE object-group LOCAL object-group network REMOTE network-object 172.31.0.0 255.255.255.0 network-object 172.21.1.0 255.255.255.0 object-group network LOCAL network-object 192.168.0.0 255.255.255.0 It is recommend that you use the non-grouped ACL syntax with specific address statements. access-list VPN_ACL-1 line 1 extended permit ip 192.168.0.0 255.255.255.0 172.31.0.0 255.255.255.0 access-list VPN_ACL-1 line 1 extended permit ip 192.168.0.0 255.255.255.0 172.31.1.0 255.255.255.0 13

Interesting Traffic The first step in initiating the IPsec negotiation process with a Cisco device is sending Interesting Traffic. Interesting traffic as defined by Cisco: Determining what type of traffic is deemed interesting is part of formulating a security policy for use of a VPN. The policy is then implemented in the configuration interface for each particular IPSec peer. For example, in Cisco routers and PIX Firewalls, access lists are used to determine the traffic to encrypt. The access lists are assigned to a crypto policy such that permit statements indicate that the selected traffic must be encrypted, and deny statements can be used to indicate that the selected traffic must be sent unencrypted. With the Cisco Secure VPN Client, you use menu windows to select connections to be secured by IPSec. When interesting traffic is generated or transits the IPSec client, the client initiates the next step in the process, negotiating an IKE phase one exchange. Interesting traffic is tunnel traffic that has a source/destination that fits with the tunnel definition/ ACLs that were created as part of the IPsec configuration. It is recommended that a continuous ping is setup on both sides of the tunnel during configuration to ensure interesting traffic is present to begin the IPsec negotiation process. 14

VPN Idle Timeout VPN Idle Timeout is a Cisco setting that will terminate an IPsec connection if there is no communication activity on the connection in the period defined. Terminated IPsec connections can alarm operations teams and require a specific direction of interesting traffic to re-build/re-negotiate the tunnel. This can be at best a nuisance for production systems. It is recommended this setting is turned off or setting the idle timeout to Unlimited. To turn off the vpn-idle-timeout via ASDM, click Configuration>Site-to-Site VPN>Group Policies then on the Group Policy created for your tunnel. The resulting page will have a Idle Timeout checkbox, make sure it is set to Unlimited. To turn vpn-idle-timeout off via the CLI use the following under the Group Policy associated with the tunnel: vpn-idle-timeout none OR no vpn-idle-timeout group-policy DfltGrpPolicy attributes vpn-idle-timeout none NOTE: when setting up your IPsec configuration via the Site-to-site VPN Wizard, the setting for vpn-idle-timeout will be inherited from your Default Group Policy as configured out your ASA. Double check to make sure it is disabled after tunnel configuration. 15

VNS3 Document Links VNS3 Product Resources - Documentation Add-ons VNS3 Configuration Instructions (Free & Lite Editions BYOL) Instructions and screenshots for configuring a VNS3 Controller in a single or multiple Controller topology. Specific steps include, initializing a new Controller, generating clientpack keys, setting up peering, building IPsec tunnels, and connecting client servers to the Overlay Network. VNS3 Administration Document Covers the administration and operation of a configured VNS3 Controller. Additional detail is provided around the VNS3 Firewall, all administration menu items, upgrade licenses, other routes and SNMP traps. VNS3 Troubleshooting Troubleshooting document that provides explanation issues that are more commonly experienced with VNS3. 16