NAC Appliance (Cisco Clean Access) In Band Virtual Gateway for Remote Access VPN Configuration Example

Similar documents
PIX/ASA 7.x ASDM: Restrict the Network Access of Remote Access VPN Users

ASA Version 7.2(4)30! hostname vpn domain-name hollywood.com enable password BO5OGdtIUElAVJc7 encrypted passwd BO5OGdtIUElAVJc7 encrypted names name

VPN Between Sonicwall Products and Cisco Security Appliance Configuration Example

ASA/PIX: Remote VPN Server with Inbound NAT for VPN Client Traffic with CLI and ASDM Configuration Example

IPSec tunnel for ER75i routers application guide

Configure the ASA for Dual Internal Networks

Downloaded from: justpaste.it/i2os

: Saved : : Serial Number: JMX1813Z0GJ : Hardware: ASA5505, 512 MB RAM, CPU Geode 500 MHz : Written by enable_15 at 09:21: UTC Thu Dec !

Table of Contents. Cisco IPSec Tunnel through a PIX Firewall (Version 7.0) with NAT Configuration Example

Table of Contents. Cisco PIX/ASA 7.x Enhanced Spoke to Spoke VPN Configuration Example

Table of Contents. Cisco Enhanced Spoke to Client VPN Configuration Example for PIX Security Appliance Version 7.0

Configuring the PIX Firewall and VPN Clients Using PPTP, MPPE and IPSec

PIX/ASA as a DHCP Server and Client Configuration Example

co Configuring PIX to Router Dynamic to Static IPSec with

This document is intended to give guidance on how to read log entries from a Cisco PIX / ASA. The specific model in this case was a PIX 501.

PIX/ASA: PPPoE Client Configuration Example

Document ID: Contents. Introduction. Prerequisites. Requirements. Introduction. Prerequisites Requirements

ASA with WebVPN and Single Sign-on using ASDM and NTLMv1 Configuration Example

ASA/PIX 8.x: Radius Authorization (ACS 4.x) for VPN Access using Downloadable ACL with CLI and ASDM Configuration Example

FWSM: Multiple Context Configuration Example

Fundamentals of Network Security v1.1 Scope and Sequence

SSL VPN Configuration of a Cisco ASA 8.0

ASA 7.2(2): SSL VPN Client (SVC) for Public Internet VPN on a Stick Configuration Example

Physical Topology. Logical Topology

How to Configure the Cisco VPN Client to PIX with AES

Virtual Private Network Setup

Permitting PPTP Connections Through the PIX/ASA

Virtual private network setup

Chapter 10 Configure AnyConnect Remote Access SSL VPN Using ASDM

PIX/ASA Active/Standby Failover Configuration Example

Firewalling Avid ISIS in a Cisco environment

PIX/ASA 7.x and Later : Easy VPN with Split Tunneling ASA 5500 as the Server and Cisco 871 as the Easy VPN Remote Configuration Example

Cisco Meraki EMM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

LAN-to-LAN IPsec VPNs

Configuring LAN-to-LAN IPsec VPNs

User Management: Configuring Auth Servers

UniNets CCNA Security LAB MANUAL UNiNets CCNA Cisco Certified Network Associate Security LAB MANUAL UniNets CCNA LAB MANUAL

Symbols. Numerics I N D E X

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Cisco ASA 5500 LAB Guide

CISCO EXAM QUESTIONS & ANSWERS

Router Allows VPN Clients to Connect IPsec and Internet Using Split Tunneling Configuration Example

Secure ACS Database Replication Configuration Example

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

FTD: How to enable TCP State Bypass Configuration using FlexConfig Policy

Configuring Remote Access IPSec VPNs

VPN Connection through Zone based Firewall Router Configuration Example

Cisco PIX. Interoperability Guide

CCNA Security 1.0 Student Packet Tracer Manual

VPN Configuration Guide. Cisco ASA 5500 Series

Chapter 10 - Configure ASA Basic Settings and Firewall using ASDM

Lab Configure and Test Advanced Protocol Handling on the Cisco PIX Security Appliance

LAN to LAN IPsec Tunnel Between a Cisco VPN 3000 Concentrator and Router with AES Configuration Example

Configuration Examples

Monitoring and Troubleshooting Agent Sessions

Mediant MSBR. Version 6.8. Security Setup. Configuration Guide. Version 6.8. AudioCodes Family of Multi-Service Business Routers (MSBR)

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN

Lab 8: Firewalls ASA Firewall Device

Configuring NAC Out-of-Band Integration

Configuring Management Access

Configuring Easy VPN Services on the ASA 5505

CCNA Security PT Practice SBA

upgrade-mp through xlate-bypass Commands

ASA/PIX Security Appliance

Configuring High Availability (HA)

Cisco Passguide Exam Questions & Answers

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Internet. SonicWALL IP Cisco IOS IP IP Network Mask

Cisco Systems, Inc. IOS Router

I N D E X. Numerics. 3DES (triple Data Encryption Standard), 199

IOS/CCP: Dynamic Multipoint VPN using Cisco Configuration Professional Configuration Example

Chapter 9 Lab A: Configuring ASA Basic Settings and Firewall Using CLI

ASA/PIX 8.x: Block Certain Websites (URLs) Using Regular Expressions With MPF Configuration Example

tcp-map through type echo Commands

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

Defining IPsec Networks and Customers

MWA Deployment Guide. VPN Termination from Smartphone to Cisco ISR G2 Router

Lab 8.5.2: Troubleshooting Enterprise Networks 2

Migrating to the Cisco ASA Services Module from the FWSM

Contents. Introduction. Prerequisites. Requirements. Components Used

1.1 Configuring HQ Router as Remote Access Group VPN Server

This chapter covers the following exam topics for the Secure PIX Firewall Advanced Exam (CSPFA 9E0-511): 5. User interface 6. Configuring the PIX

Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0. Issue th October 2009 ABSTRACT

Cisco Exam Questions & Answers

VPN Auto Provisioning

Configuring Dynamic Multipoint VPN Using GRE Over IPsec With OSPF, NAT, and Cisco IOS Firewall

Mediant MSBR. Version 6.8. Security Setup. Configuration Guide. Version 7.2. AudioCodes Family of Multi-Service Business Routers (MSBR)

ASA/PIX: Configure Active/Standby Failover in Transparent Mode Contents

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

See the following screens for showing VPN connection data in graphical or tabular form for the ASA.

Cisco Virtual Office: Easy VPN Deployment Guide

Setting General VPN Parameters

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Chapter 9 Lab A: Configuring ASA Basic Settings and Firewall Using CLI

Remote Access IPsec VPNs

Sample Configurations

Lab 9: VPNs IPSec Remote Access VPN

Wireless LAN Controller Web Authentication Configuration Example

shun through sysopt radius ignore-secret Commands

Transcription:

NAC Appliance (Cisco Clean Access) In Band Virtual Gateway for Remote Access VPN Configuration Example Document ID: 71573 Contents Introduction Prerequisites Requirements Components Used Network Diagram Conventions NAC Appliance (Cisco Clean Access) Configuration Cisco ASA Configuration ASA CLI Configuration Verify Troubleshoot Related Information Introduction This document provides a step by step guide on how to configure the Cisco Network Admission Control (NAC) Appliance (formerly Cisco Clean Access) for remote access VPN in In band Virtual Gateway mode. The Cisco NAC Appliance is an easily deployed NAC product that uses the network infrastructure to enforce security policy compliance on all devices that seek to access network computing resources. With the NAC Appliance, network administrators can authenticate, authorize, evaluate, and remediate wired, wireless, and remote users and their machines prior to network access. It identifies whether networked devices such as laptops, IP phones, or game consoles are compliant with the security policies of your network and repairs any vulnerabilities before access to the network is permitted. Prerequisites Requirements There are no specific requirements for this document. Components Used The information in this document is based on these software and hardware versions: Cisco Clean Access version 4.0.3 Cisco Adaptive Security Appliance (ASA) version 7.2 The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command.

Network Diagram This document uses this network setup: Conventions Refer to the Cisco Technical Tips Conventions for more information on document conventions. NAC Appliance (Cisco Clean Access) Configuration Complete these steps in order to configure the NAC Appliance (Cisco Clean Access). 1. Login to the Clean Access Manager (CAM) using the administrative account. 2. Choose Device Management > CCA Servers and go to the New Server tab in order to add the Cisco Clean Access Server (CAS) to the Cisco CAM. In this example, the IP address of the CAS is 10.10.20.162. Enter the server location for reference purposes. In this example, the CAS is located behind the Cisco ASA that is configured for remote access VPN. The Server Location information is VPN Remote Access CAS. Select Virtual Gateway for the Server Type. The CAS configured as a virtual gateway acts like a bridge for the managed network. The virtual gateway configuration is good when managed clients share a subnet with trusted clients and you do not want to modify the existing gateway or architecture. There is no need to define static routes on any of the routing devices.

3. The CAS appears under the List of Servers. Make sure that the Status reads Connected. Click on Manage in order to access the CAS configuration. Troubleshooting Tip: If the CAM fails to import the CAS, make sure that connectivity is not an issue. You can attempt to ping the CAS from the CAM CLI when you log in as root. You can also attempt an SSH connection from the CAM to the CAS. Make sure that you have done the initial configuration in the CAS. You can use the service perfigo config command in order to initialize the CAS via its CLI.

4. Go to the Network tab. The CAS is typically configured such that the untrusted interface is connected to a trunk port with multiple VLANs trunked to the port. In such a situation, the management VLAN ID is the VLAN ID of the VLAN to which the IP address of the CAS belongs. 5. Check Enable Layer 3 support in order to allow users to be more than one hop away from the CAS. Since this case is a VPN configuration, you need to enable this option.

6. Under the CCA Server Advanced tab click VLAN Mapping and enter the VLAN information in order to map VLAN 10 (untrusted) with VLAN 20 (trusted).

7. Create a filter for the Cisco ASA to be able to communicate with the protected network behind the CAS. Choose Device Management > Filters > Devices > New and add the MAC address and the IP address of the Cisco ASA (00:15:C6:FA:39:F7/10.10.20.100 in this example).

8. The CAM on each CAS automatically adds devices to the Certified Devices list after the user authenticates and the device passes network scanning with no vulnerabilities found and/or meets Clean Access Agent requirements. Certified devices are considered clean until removed from the list. You can remove devices at a specified time or interval from the Certified Devices list in order to force them to repeat network scanning/agent checking. Note that devices for Clean Access Agent users are always scanned for requirements at each login. A floating device requires Clean Access certification at every login and is certified only for the duration of a user session. Floating devices are always added manually. In this case the CAS performs security posture for VPN Clients terminated on the Cisco ASA. The Cisco ASA needs to communicate with devices such as the Cisco Secure ACS server in the trusted side. It is recommended to add the ASA as a floating device. Click on Clean Access under Device Management and choose Certified Devices > Add Floating Device. Enter the MAC address of the ASA (00:15:C6:FA:39:F7 in this example). Set type to 1 to never exempt the ASA from certification list and enter a description.

9. In this example, you create two different roles (sales and engineering). Choose User Management > User Roles and click New Role in order to create a new role. Enter the Role Name and a Description. In this example, the Role Name is sales with its respective description. Click Create Role.

10. Repeat step 9 and create the engineering role. This window displays when you are done.

11. Choose User Management > User Roles and go to the Traffic Control tab in order to configure the policies used by each user role. Under the desired role click on Add Policy.

This window shows that the policy for the sales users is configured. The sales users should only have access to the 10.1.1.0/24 subnet. All TCP traffic to the SALES subnet is allowed in this example.

This window shows all the policies configured for each user role. Step 11 was repeated to allow UDP and TCP traffic for the sales and engineering users to their respective subnets. ICMP is also allowed for both groups. The Quarantined users only have access to a remediation server with the IP 172.18.85.123 over TCP.

12. Choose Device Management > Clean Access, go to the General Setup tab, and click Agent Login. For each role, check Require use of Clean Access Agent. Requiring the use of the Clean Access Agent is configured per user role and operating system. When the Agent is required for a role, users in that role are forwarded to the Clean Access Agent download page after authenticating for the first time using web login. The user is then prompted to download and run the Agent installation file. At the end of the installation, the user is prompted to log into the network using the Agent.

13. The NAC Appliance (Cisco Clean Access) provides integration with Cisco VPN Concentrators and the Cisco ASA (in this example). Cisco Clean Access can enable Single Sign On (SSO) capability for VPN users. This functionality is achieved with the use of RADIUS accounting. The CAS can acquire the IP address of the client from either Framed_IP_address or Calling_Station_ID RADIUS attributes for SSO purposes. VPN users do not need to login to the web browser or the Clean Access Agent because the RADIUS accounting information sent to the CAS/CAM by the VPN Concentrator provides the user ID and IP address of users who log into the VPN Concentrator (RADIUS Accounting Start Message). In order to do this, you need to add the Cisco VPN device (Cisco ASA in this example) as an authentication server. a. Choose User Management > Auth Servers > New Server. b. Choose Cisco VPN Server from the drop down menu. c. Choose the user role assigned to users authenticated by the Cisco VPN Concentrator. Unauthenticated Role is selected in this example. This default role is used if not overridden by a role assignment based on MAC address or IP address, or if RADIUS mapping rules do not result in a successful match. d. Enter an optional description of the Cisco ASA for reference and click Add Server.

14. Choose User Management > Auth Servers > New Server and select RADIUS from the drop down menu in order to add the Cisco Secure ACS server (RADIUS server). This list provides a description of the settings on this window: Provider Name(optional) Type a unique name for this authentication provider. Enter a meaningful or recognizable name if web login users are able to select providers from the web login page. Server NameThe fully qualified host name (for example, auth.cisco.com) or IP address of the RADIUS authentication server. 172.18.124.101 is the IP address of the Cisco Secure ACS server in this example. Server PortThe port number on which the RADIUS server listens. RADIUS TypeThe RADIUS authentication method. Supported methods include EAPMD5, Password Authentication Protocol (PAP), Challenge Handshake Authentication Protocol (CHAP), and Microsoft (MS CHAP). PAP is used in this example. Timeout (sec)the timeout value for the authentication request. Default RoleChoose the unauthenticated role as the user role assigned to users authenticated by this provider. This default role is used if not overridden by a role assignment based on MAC address or IP address, or if RADIUS mapping rules do not result in a successful match. Shared SecretThe RADIUS shared secret bound to the IP address of the specified client. NAS IdentifierThe NAS Identifier value to be sent with all RADIUS authentication packets. Either a NAS Identifier or a NAS IP Address must be specified to send the

packets. NAS IP AddressThe NAS IP Address value to be sent with all RADIUS authentication packets. Either a NAS IP Address or a NAS Identifier must be specified to send the packets. NAS PortThe NAS Port value to be sent with all RADIUS authentication packets. NAS Port TypeThe NAS Port Type value to be sent with all RADIUS authentication packets. Enable FailoverThis enables sending a second authentication packet to a RADIUS failover peer IP if the primary RADIUS authentication server response times out. Failover Peer IPThe IP address of the failover RADIUS authentication server. Allow Badly Formed RADIUS PacketsThis enables the RADIUS authentication client to ignore errors in badly formed RADIUS authentication responses as long as the responses contain a success or failure code. This can be required for compatibility with older RADIUS servers. 15. Complete these steps in order to enable Single Sign On (SSO) on the CAS. a. Choose Device Management > CCA Servers and select the server (in this case 10.10.20.162). b. Go to the Authentication tab and choose VPN Auth. c. Check Single Sign On and Auto Logout and enter the RADIUS Accounting Port (only port 1813 is supported).

16. Under the VPN Concentrators sub tab enter the ASA information and click Add VPN Concentrator.

17. Under the Accounting Servers sub tab enter the RADIUS Accounting Server information and click Add Accounting Server.

18. Under the Accounting Mapping sub tab select the ASA from the VPN Concentrator pull down menu (asa1.cisco.com [10.10.20.100] in this example) and select the Accounting Server (acs1.cisco.com [172.18.85.181:1813] in this example). Cisco ASA Configuration This section demonstrates how to configure the Cisco ASA using the Adaptive Security Device Manager (ASDM). The VPN wizard lets you configure basic LAN to LAN and remote access VPN connections. Use ASDM in order to edit and configure advanced features. 1. Choose Configuration > VPN and click Launch VPN Wizard in order to launch the VPN Wizard.

2. Use the VPN Tunnel Type panel in order to select the type of VPN tunnel to define, remote access or LAN to LAN, and to identify the interface that connects to the remote IPsec peer. Click Remote Access in order to create a configuration that achieves secure remote access for VPN Clients, such as mobile users. This option lets remote users securely access centralized network resources. When you select this option, the VPN Wizard displays a series of panels that let you enter the attributes a remote access VPN requires. Select the interface that establishes a secure tunnel with the remote IPsec peer (the outside interface is used in this example, since the VPN Clients connect from the Internet). If the Security Appliance has multiple interfaces, you need to plan the VPN configuration before you run this wizard and identify the interface to use for each remote IPsec peer with which you plan to establish a secure connection. Enable inbound IPsec sessions to bypass interface access lists. This enables IPsec authenticated inbound sessions to always be permitted through the Security Appliance (that is, without a check of the interface access list statements). Be aware that the inbound sessions bypass only the interface access control lists (ACLs). Configured group policy, user, and downloaded ACLs still apply. Click Next.

3. Select the remote access client type. Cisco VPN Client Release 3.x or higher, or other Easy VPN Remote product is used in this example, since the clients use the Cisco VPN Client. Click Next. 4. In this example, pre shared keys are used for tunnel authentication. Enter the pre shared key (cisco123 in this example) and the VPN Tunnel Group Name (vpngroup in this example). Click Next.

5. Use the Client Authentication panel in order to select the method by which the Security Appliance authenticates remote users. In this example, the VPN Clients are authenticated against a RADIUS server. Click New in order to configure a new AAA server group. 6. Provide this information in order to configure a new AAA server group that contains just one server:

Server Group NameType a name for the server group. You associate this name with users whom you want to authenticate using this server. The Server Group Name in this example is called authgroup. Authentication ProtocolSelect the authentication protocol the server uses. RADIUS is used in this example. Server IP AddressType the IP address for the AAA server. The RADIUS server is 172.18.124.101 in this example. InterfaceSelect the Security Appliance interface on which the AAA server resides. The AAA server in this example is in the inside interface. Server Secret KeyType a case sensitive, alphanumeric keyword of up to 127 characters. The server and Security Appliance use the key to encrypt data that travels between them. The key must be the same on both the Security Appliance and server. You can use special characters, but not spaces. Confirm Server Secret KeyType the secret key again. 7. Configure an address pool for the addresses to be assigned to the VPN Clients. Click New in order to create a new pool.

8. Add the name of the pool, the range, and the subnet mask. 9. Use the Attributes Pushed to Client (Optional) window in order to have the Security Appliance pass information about DNS and WINS servers and the default domain name to remote access clients. Enter the Primary and Secondary DNS and WINS server information. Also enter the Default Domain Name.

10. Use the IKE Policy window in order to set the terms of the Phase 1 IKE negotiations. 3DES, SHA, and Diffie Hellman Group 2 are used in this example as the IKE policy for VPN Client connections. 11. Use this IPSec Encryption and Authentication window in order to select the encryption and authentication methods to use for Phase 2 IKE negotiations, which create the secure VPN tunnel. 3DES and SHA are used in this example.

12. Use the Address Translation Exemption (Optional) window in order to identify local hosts/networks which do not require address translation. By default, the Security Appliance hides the real IP addresses of internal hosts and networks from outside hosts by using dynamic or static Network Address Translation (NAT). NAT minimizes risks of attack by untrusted outside hosts, but might be improper for those who have been authenticated and protected by VPN. For example, an inside host that uses dynamic NAT has its IP address translated by matching it to a randomly selected address from a pool. Only the translated address is visible to the outside. Remote VPN Clients that attempt to reach these hosts by sending data to their real IP addresses cannot connect to these hosts, unless you configure a NAT exemption rule.

13. Verify that the information is accurate in the Summary window and click Finish. 14. This is a very important step. The Cisco ASA needs to send the RADIUS accounting messages to the CAS in order to do SSO and perform security posture checks. Complete these steps in order to add a new AAA Server Group.

a. Choose Configuration > Properties > AAA Setup > AAA Server Groups and click Add. b. Enter the Server Group name (CAS_Accounting in this example). c. Select RADIUS as the Protocol. d. Make sure that the Accounting Mode is Single and Reactivation Mode is Depletion. e. Click OK. 15. Add a new AAA Server entry. In this case the AAA server is the IP address of the CAS (10.10.20.162) which resides in the inside interface. Configure the Server Authentication Port (1812) and Server Accounting Port (1813). Click OK.

The new AAA Server Group and AAA Server appears as this example window shows.

16. Complete these steps in order to add the CAS as the accounting server for the VPN group you configured (vpngroup in this example). a. Choose Configuration > VPN > General > Tunnel Group. b. Select the Tunnel Group. c. Click Edit. 17. Under the Accounting tab select the new AAA Server Group under the Accounting Server Group pull down menu (CAS_Accounting in this example).

ASA CLI Configuration ASA 1#show running config : Saved : ASA Version 7.2(1)! hostname ASA 1 domain name cisco.com enable password 8Ry2YjIyt7RRXU24 encrypted names dns guard! interface GigabitEthernet0/0 description Outside Interface Facing the Internet nameif outside security level 0 ip address 209.165.200.225 255.255.255.0! interface GigabitEthernet0/1 description Inside Interface nameif inside security level 100 ip address 10.10.20.100 255.0.0.0! interface GigabitEthernet0/2

shutdown no nameif no security level no ip address! interface GigabitEthernet0/3 shutdown no nameif no security level no ip address! interface Management0/0 nameif management security level 100 ip address 172.18.85.174 255.255.255.0! passwd 2KFQnbNIdI.2KYOU encrypted boot system disk0:/asa721 k8.bin ftp mode passive dns server group DefaultDNS domain name cisco.com access list outside_cryptomap extended permit ip any 10.10.55.0 255.255.255.0 access list something extended permit ip any any pager lines 24 mtu outside 1500 mtu inside 1500 mtu management 1500 ip local pool pool1 10.10.55.1 10.10.55.254 mask 255.255.255.0 no failover icmp permit any inside icmp permit any management asdm image disk0:/asdm521.bin no asdm history enable arp timeout 14400 access group something in interface outside access group something in interface inside route inside 172.18.85.181 255.255.255.255 10.10.20.1 1 route inside 0.0.0.0 0.0.0.0 10.10.20.1 tunneled route outside 0.0.0.0 0.0.0.0 209.165.200.226 1 route inside 172.18.85.0 255.255.255.0 10.10.20.1 1 timeout xlate 3:00:00 timeout conn 1:00:00 half closed 0:10:00 udp 0:02:00 icmp 0:00:02 timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp pat 0:05:00 timeout sip 0:30:00 sip_media 0:02:00 sip invite 0:03:00 sip disconnect 0:02:00 timeout uauth 0:05:00 absolute aaa server authgroup protocol radius aaa server authgroup host 172.18.85.181 timeout 5 key cisco123 authentication port 1812 accounting port 1813 aaa server test protocol radius aaa server test host 10.10.20.162 key cisco123 accounting port 1813 aaa server CAS_Accounting protocol radius aaa server CAS_Accounting host 10.10.20.162 key cisco123 authentication port 1812 accounting port 1813 radius common pw cisco123 group policy vpngroup internal group policy vpngroup attributes wins server value 172.18.108.40 172.18.108.41 dns server value 172.18.108.40 172.18.108.41 vpn tunnel protocol IPSec

default domain value cisco.com username cisco password ffirpgpdsojh9ylq encrypted http server enable http 0.0.0.0 0.0.0.0 management no snmp server location no snmp server contact snmp server enable traps snmp authentication linkup linkdown coldstart crypto ipsec transform set ESP 3DES SHA esp 3des esp sha hmac crypto ipsec transform set FirstSet esp 3des esp sha hmac crypto dynamic map outside_dyn_map 20 set transform set ESP 3DES SHA crypto map outside_map 20 ipsec isakmp dynamic outside_dyn_map crypto map outside_map interface outside crypto map abcmap 1 set peer 202.83.212.69 crypto isakmp enable outside crypto isakmp policy 1 authentication pre share encryption 3des hash sha group 2 lifetime 86400 tunnel group vpngroup type ipsec ra tunnel group vpngroup general attributes address pool pool1 authentication server group authgroup accounting server group CAS_Accounting default group policy vpngroup tunnel group vpngroup ipsec attributes pre shared key * telnet timeout 5 ssh 0.0.0.0 0.0.0.0 management ssh timeout 5 console timeout 0! class map class_sip_tcp match port tcp eq sip class map class_sip_udp match port udp eq sip class map inspection_default match default inspection traffic!! policy map global_policy class inspection_default inspect ftp inspect h323 h225 inspect h323 ras inspect netbios inspect rsh inspect rtsp inspect skinny inspect sqlnet inspect sunrpc inspect tftp inspect xdmcp class class_sip_tcp inspect sip class class_sip_udp inspect sip! service policy global_policy global prompt hostname context Cryptochecksum:8e30f7ade3dcb3d1ae0da79a9d94371e : end [OK]

Verify There is currently no verification procedure available for this configuration. Troubleshoot There is currently no specific troubleshooting information available for this configuration. Related Information Cisco NAC Appliance (Clean Access) Product Support Technical Support & Documentation Cisco Systems Contacts & Feedback Help Site Map 2013 2014 Cisco Systems, Inc. All rights reserved. Terms & Conditions Privacy Statement Cookie Policy Trademarks of Cisco Systems, Inc. Updated: Oct 03, 2006 Document ID: 71573