How Do I Setup Cisco VPN Client
How Do I Setup Cisco VPN Client
Zones:
Virtual Private Networking (VPN), Networking Hardware Firewalls
Tags:
Setup of Cisco ASA 5505 VPN Remote Access
I am fairly familiar with these devices, but I use the ASA's ASDM pretty exclusively for setting up them up.
My problem is that the VPN wizard is hit or miss at best. Lately I'm running into issues with creating VPN's
that either won't attach, or won't talk to the inside interface from the VPN Pool (created on a different
subnet).
Can someone post a step by step CLI setup of a client access VPN? Ideally it would include some info on
what each line does if its not intuitive? ( I'm looking to understand the setup not just regurgitate the
commands.)
Thanks
Rank: Master
bignewf:
Here is a sample CLI config right from cisco:
Config of User Policy here a user accound is mapped to the user group policy in the previous config above:
This the tunnel group name that needs to be configured on the cisco vpn client
This pre-shared key is also known as the group password in the Cisco remote access VPN
All cisco vpn clients that are configured for the tunnel group cisco must use the preshared key cisco123indicated
above
(not: this pool should be on a different subnet than your internal lans hosts)
asa(config)#vpn-addr-assign dhcp
asa(config)#tunnel-group cisco general-attributes
asa(config-general)#dhcp-server 192.168.1.1
asa(config)# crypto ipsec transfore-set myset esp-aes-256 esp-sha-hmac (the transform set specifies the
encryption and hashing method used on the data packets once the tunnel is up)
You must allow decrypted traffic to pass thru the asa. The correct way to do this would be to restrict traffic to
pass, but initially to get this working, I would allow all decrypted IPSec packets to pass without inspecting them
agianst the configured ACL's:
Finally, You need to create a connection entry on the cisco vpn client with the group authentication name, group
preshared key, and type of tunnel encapsulation