Lab Sous Gns3-Configuring A Site-To-Site Ipsec VPN Using CCP and Asdm
Lab Sous Gns3-Configuring A Site-To-Site Ipsec VPN Using CCP and Asdm
and ASDM
Topology
© 2021 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 31
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
IP Addressing Table
Objectives
Part 1: Basic Router/Switch/PC Configuration
• Cable the network and clear previous device settings.
• Configure basic settings for routers and switches.
• Configure static routing, including default routes, between R1, R2 and R3.
• Configure the enable and vty passwords on R3.
• Configure HTTP access, a username, and local authentication prior to starting CCP.
• Configure PC host IP settings.
• Verify connectivity.
Part 2: Basic ASA Configuration
• Access the ASA console.
• Clear the previous ASA configuration settings.
• Bypass Setup mode.
• Use the CLI command script to configure the ASA.
• Verify HTTP ASDM access.
Part 3: Configuring the ISR as a Site-to-Site IPsec VPN Endpoint Using CCP
• Run the CCP application on PC-C and discover R3.
• Start the CCP VPN wizard to configure R3.
• Configure basic VPN connection information settings.
• Specify IKE policy parameters.
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
Background / Scenario
In addition to acting as a remote access VPN concentrator, the ASA can provide Site-to-Site IPsec VPN
tunneling. The tunnel can be configured between two ASAs or between an ASA and another IPsec VPN-
capable device, such as an ISR, as is the case with this lab.
Your company has two locations connected to an ISP. Router R1 represents a CPE device managed by the
ISP. Router R2 represents an intermediate Internet router. Router R3 connects users at the remote branch
office to the ISP. The ASA is an edge security device that connects the internal corporate network and DMZ
to the ISP while providing NAT services to inside hosts.
Management has asked you to provide a dedicated Site-to-Site IPsec VPN tunnel between the ISR router at
the remote branch office and the ASA device at the corporate site. This tunnel will protect traffic between the
branch office LAN and the corporate LAN, as it passes through the Internet. The Site-to-Site VPN does not
require a VPN client on the remote or corporate site host computers. Traffic from either LAN to other Internet
destinations is routed by the ISP and is not protected by the VPN tunnel. The VPN tunnel will pass through
R1 and R2; both are not aware of its existence.
In Part 1 of this lab, you will configure the topology and non-ASA devices. In Part 2, you will prepare the ASA
for ASDM access. In Part 3, you will use the CCP VPN Wizard to configure the R3 ISR as a Site-to-Site IPsec
VPN endpoint. In Part 4, you will configure the ASA as a Site-to-Site IPsec VPN endpoint using the ASDM
VPN wizard.
Note: The router commands and output in this lab are from a Cisco 1841 router with Cisco IOS Release
15.1(4)M8 (Advanced IP Services image). Other routers and Cisco IOS versions can be used. See the Router
Interface Summary Table at the end of this lab to determine which interface identifiers to use based on the
equipment in the lab. Depending on the router model and Cisco IOS version, the commands available, and
output produced might vary from what is shown in this lab.
The ASA that is used with this lab is a Cisco model 5505 with an 8-port integrated switch, running OS version
8.4(2) and ASDM version 7.2(1) and comes with a Base license that allows a maximum of three VLANs.
Note: Ensure that the routers and switches have been erased and have no startup configurations.
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
Required Resources
• 3 Routers (Cisco 1841 with Cisco IOS Release 5.1(4)M8 Advanced IP Services image or comparable)
• 3 Switches (Cisco 2960 or comparable)
• 1 ASA 5505 (OS version 8.4(2) and ASDM version 7.2(1) and Base license or comparable)
• 3 PCs (Windows Vista or Windows 7 with CCP 2.5, latest version of Java, Internet Explorer, and Flash
Player)
• Serial and Ethernet cables as shown in the topology
• Console cables to configure Cisco networking devices
CCP Notes:
• If the PC on which CCP is installed is running Windows Vista or Windows 7, it may be necessary to right-
click the CCP icon or menu item, and select Run as administrator.
• To run CCP, it may be necessary to temporarily disable antivirus programs and O/S firewalls. Make sure
that all pop-up blockers are turned off in the browser.
Step 5: Configure HTTP access, a username, and local authentication prior to starting CCP.
a. From the CLI, configure a username and password for use with CCP on R3.
R3(config)# ip http server
R3(config)# ip http secure-server
R3(config)# username admin privilege 15 secret cisco123
b. Use the local database to authenticate web sessions with CCP.
R3(config)# ip http authentication local
Step 8: Save the basic running configuration for each router and switch.
CCNAS-ASA> enable
Password: class (or press Enter if none set)
Note: The erase startup-config IOS command is not supported on the ASA.
b. Use the reload command to restart the ASA. This will cause the ASA to come up in CLI Setup mode. If
you see the System config has been modified. Save? [Y]es/[N]o: message, respond with
N.
CCNAS-ASA# reload
Proceed with reload? [confirm] <Enter>
CCNAS-ASA#
***
*** --- START GRACEFUL SHUTDOWN ---
Shutting down isakmp
Shutting down File system
***
*** --- SHUTDOWN NOW ---
Process shutdown finished
Rebooting.....
CISCO SYSTEMS
Embedded BIOS Version 1.0(12)13 08/28/08 15:50:37.45
<output omitted>
ciscoasa# conf t
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
ciscoasa(config)#
c. The first time you enter configuration mode after running reload, you will be asked to enable anonymous
reporting. Respond with no.
d. Copy and paste the Pre-VPN Configuration Script commands listed below at the global configuration
mode prompt to bring it to the point where you can start configuring the SSL VPNs.
e. Observe the messages as the commands are applied to ensure that there are no warnings or errors. If
prompted to replace the RSA key pair, respond yes.
f. Issue the write mem (or copy run start) command to save the running configuration to the startup
configuration and the RSA keys to non-volatile memory.
Pre-VPN ASA Configuration Script:
hostname CCNAS-ASA
!
domain-name ccnasecurity.com
!
enable password class
passwd cisco
!
interface Ethernet0/0
switchport access vlan 2
no shut
!
interface Ethernet0/1
switchport access vlan 1
no shut
!
interface Ethernet0/2
switchport access vlan 3
no shut
!
interface Vlan1
nameif inside
security-level 100
ip address 192.168.1.1 255.255.255.0
!
interface Vlan2
nameif outside
security-level 0
ip address 209.165.200.226 255.255.255.248
!
interface Vlan3
no forward interface Vlan1
nameif dmz
security-level 70
ip address 192.168.2.1 255.255.255.0
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
!
object network inside-net
subnet 192.168.1.0 255.255.255.0
!
object network dmz-server
host 192.168.2.3
!
access-list OUTSIDE-DMZ extended permit ip any host 192.168.2.3
!
object network inside-net
nat (inside,outside) dynamic interface
!
object network dmz-server
nat (dmz,outside) static 209.165.200.227
!
access-group OUTSIDE-DMZ in interface outside
!
route outside 0.0.0.0 0.0.0.0 209.165.200.225 1
!
username admin password cisco123
!
aaa authentication telnet console LOCAL
aaa authentication ssh console LOCAL
aaa authentication http console LOCAL
!
http server enable
http 192.168.1.0 255.255.255.0 inside
ssh 192.168.1.0 255.255.255.0 inside
telnet 192.168.1.0 255.255.255.0 inside
telnet timeout 10
ssh timeout 10
!
class-map inspection_default
match default-inspection-traffic
policy-map type inspect dns preset_dns_map
parameters
message-length maximum client auto
message-length maximum 512
policy-map global_policy
class inspection_default
inspect icmp
!
prompt hostname context
no call-home reporting anonymous
!
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
Part 3: Configuring the ISR as a Site-to-Site IPsec VPN Endpoint Using CCP
In Part 3 of this lab, you will configure R3 as an IPsec VPN endpoint for the tunnel between R3 and the ASA.
Routers R1 and R2 are unaware of the tunnel.
b. In the Community Information panel, click Discover to discover and connect to R3. If the PC-C CCP
application can make an HTTP connection to R3, the Discovery Status changes to Discovered. If the
discovery process fails, click Discover Details to determine the problem so that you can resolve the
issue.
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
b. Click Launch the selected task to begin the CCP Site-to-Site VPN wizard.
c. From the initial Site-to-Site VPN wizard screen, select the Step by Step wizard, and then click Next.
c. On the Deliver Configuration to Device screen, select Save running config to device’s startup config
and click Deliver. After the commands have been delivered, click OK.
d. You can also save these configuration commands for later editing or documentation purposes by clicking
Save to file.
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
Note: If you receive an error message that CCP was unable to copy the running-config to the startup
configuration, you can verify that the commands were delivered by using the show startup-config CLI
command on R3. If the startup configuration has not been updated, use the copy run start command on
R3.
e. You can view the running configuration and startup configuration from within CCP. To view the running
config, click Home, and under the Utilities section, click View > Running Configuration.
f. To view the startup configuration, click Home > Utilities > View > IOS Show Commands. Click the pull-
down list next to the command window, select the show startup-config command, and then click Show.
Note: There are several predefined show commands listed in the pull-down list, but you can also enter
any valid IOS command, such as show ip interface brief, and then click Show.
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
Step 8: Review the configuration summary and deliver the commands to the ASA.
a. The Summary page is displayed next. Verify that the information configured in the Site-to-Site VPN
wizard is correct. You can click Back to make changes, or click Cancel, and restart the VPN wizard
(recommended).
b. Click Finish to complete the process and deliver the commands to the ASA. If prompted to authenticate,
log in again as admin with password cisco123.
f. If the debug is successful and the tunnel is up, you should see the screen below. If the testing fails, CCP
displays failure reasons and recommended actions. Click OK to remove the window.
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
g. You can save the report if desired; otherwise, click OK and then Close.
h. On R3, click Configure > Security > VPN > Site-to-Site VPN and select the Edit Site-to-Site VPN tab.
The tunnel Status should now be up.
Note: To reset the tunnel and test again, click Clear Connection on the Edit Site-to-Site VPN window.
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
i. You can further verify tunnel functionality by pinging from branch office PC-C to PC-B on the internal
network. The pings should be successful.
Note: Without the tunnel in place and bypassing NAT, it would be impossible for PC-C on the external
network to ping PC-B on the private internal network.
b. Click Encryption Statistics. You should see one or more sessions using the 3DES encryption algorithm.
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
c. Click Crypto Statistics. You should see values for the number of packets encrypted and decrypted,
security association (SA) requests, etc.
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
Reflection
1. What are some situations where a site-to-site IPsec VPN would be preferable as compared to a remote
access SSL VPN?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
2. What are some situations where a remote access VPN would be preferable as compared to site-to-site VPN?
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
_______________________________________________________________________________________
Lab - Configuring a Site-to-Site IPsec VPN Using CCP and ASDM
Router Model Ethernet Interface #1 Ethernet Interface #2 Serial Interface #1 Serial Interface #2
1800 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(Fa0/0) (Fa0/1)
1900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
2801 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/1/0 (S0/1/0) Serial 0/1/1 (S0/1/1)
(Fa0/0) (Fa0/1)
2811 Fast Ethernet 0/0 Fast Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(Fa0/0) (Fa0/1)
2900 Gigabit Ethernet 0/0 Gigabit Ethernet 0/1 Serial 0/0/0 (S0/0/0) Serial 0/0/1 (S0/0/1)
(G0/0) (G0/1)
Note: To find out how the router is configured, look at the interfaces to identify the type of router and how many
interfaces the router has. There is no way to effectively list all the combinations of configurations for each router
class. This table includes identifiers for the possible combinations of Ethernet and Serial interfaces in the device.
The table does not include any other type of interface, even though a specific router may contain one. An
example of this might be an ISDN BRI interface. The string in parenthesis is the legal abbreviation that can be
used in Cisco IOS commands to represent the interface.