Vpn-Client Administr-Guide
Vpn-Client Administr-Guide
Release 4.6
August 2004
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCIP, CCSP, the Cisco Arrow logo, the Cisco Powered Network mark, Cisco Unity, Follow Me Browsing, FormShare, and StackWise are trademarks of Cisco Systems, Inc.;
Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, CCDA, CCDP, CCIE, CCNA,
CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, the Cisco IOS logo, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo,
Empowering the Internet Generation, Enterprise/Solver, EtherChannel, EtherSwitch, Fast Step, GigaStack, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net
Readiness Scorecard, LightStream, MGX, MICA, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, RateMUX, Registrar,
ScriptShare, SlideCast, SMARTnet, StrataView Plus, Stratm, SwitchProbe, TeleRouter, The Fastest Way to Increase Your Internet Quotient, TransPath, and VCO are registered
trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.
All other trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0304R)
Setting up the VPN Client for Authentication using Smart Cards—Windows Only 1-20
Updating the VPN Client Software Automatically on Windows 2000 and Windows XP Systems 3-2
INDEX
This VPN Client Administrator Guide tells you how to set up selected features of the Cisco VPN Client
for users. This manual supplements the information provided in accompanying documentation for the
Cisco VPN devices that work with the VPN Client. The chapters and sections in this manual apply to all
platforms supported by the Cisco VPN Client unless otherwise specified.
The VPN Client is a software client that lets users:
• Connect to a Cisco VPN device
• Capture, filter, and display messages generated by the VPN Client software
• Enroll for and manage certificates
• Remove the VPN Client software from the program menu (for InstallShield installation only)
• Manually change the size of the maximum transmission unit (see “Changing the MTU Size”)
For information about how to use this application, see the VPN Client User Guide for your platform.
In this administrator guide, the term Cisco VPN device refers to the following Cisco products:
• Cisco VPN 3000 Series Concentrator
• Cisco Secure PIX Firewall devices
• IOS platform devices, such as the Cisco 7100 Series Routers
Audience
We assume you are an experienced system administrator or network administrator with appropriate
education and training, who knows how to install, configure, and manage internetworking systems. You
should be familiar with system configuration and management for the platform you are administering.
Organization
The VPN Administrator Guide is organized as follows:
Related Documentation
This administrator guide is a companion to the following VPN Client user guides:
• VPN Client User Guide for Windows, Release 4.6— explains to Windows VPN Client users how to
install the VPN Client for Windows software, configure connection entries, connect to Cisco VPN
devices, manage VPN connections, and enroll for digital certificates.
• VPN Client User Guide for Mac OS X, Release 4.6— explains to Mac VPN Client users how to
install the VPN Client for Mac software, configure connection entries, connect to Cisco VPN
devices, manage VPN connections, and enroll for digital certificates. The VPN Client on the
Macintosh platform can be managed through the GUI or the command-line interface.
• VPN Client User Guide for Linux and Solaris, Release 4.6— explains to Linux and Solaris VPN
Client users how to install the VPN Client software, configure connection entries, connect to Cisco
VPN devices, manage VPN connections, and enroll for digital certificates. The VPN Client on the
Linux and Solaris platforms is managed only through the command-line interface.
• Also the VPN Client includes an online HTML-based help system that you can access through a
browser in several ways: clicking the Help icon on the Cisco Systems VPN Client programs menu
(Start>Programs>Cisco Systems VPN Client>Help), pressing F1 while using the applications, or
clicking the Help button on screens that include it.
• Release Notes for the Cisco VPN Client Version 4.6—includes information relevant to all platforms.
To view the latest version of the VPN Client documentation on the Cisco Web site, go to the following
site and click on VPN Clients.
http://www.cisco.com/univercd/cc/td/doc/product/vpn/index.htm
Other References
Other useful references include:
• Cisco Systems, Dictionary of Internetworking Terms and Acronyms. Cisco Press: 2001.
• Virtual Private Networking: An Overview. Microsoft Corporation: 1999. (Available from Microsoft
website.)
• www.ietf.org for Internet Engineering Task Force (IETF) Working Group drafts on IP Security
Protocol (IPSec).
• www.whatis.com, a web reference site with definitions for computer, networking, and data
communication terms.
Conventions
This document uses the following conventions:
Convention Description
boldface font User actions and commands are in boldface.
italic font Arguments for which you supply values are in italics.
screen font Terminal sessions and information the system displays
are in screen font.
boldface screen Information you must enter is in boldface screen font
font in the command-line interface (for example, vpnclient
stat).
italic screen font Arguments for which you supply values are in italic
screen font.
Note Means reader take note. Notes contain helpful suggestions or references to material not
covered in the publication.
Caution Means reader be careful. Cautions alert you to actions or conditions that could result in
equipment damage or loss of data.
Data Formats
As you configure and manage the system, enter data in the following formats unless the instructions
indicate otherwise:
Hostnames Hostnames use legitimate network hostname or end-system name notation (for
example, VPN01). Spaces are not allowed. A hostname must uniquely identify
a specific system on a network.
Text Strings Text strings use upper- and lower-case alphanumeric characters. Most text
strings are case-sensitive (for example, simon and Simon represent different
usernames). In most cases, the maximum length of text strings is 48
characters.
Port Numbers Port numbers use decimal numbers from 0 to 65535. No commas or spaces are
permitted in a number.
Obtaining Documentation
Cisco provides several ways to obtain documentation, technical assistance, and other technical
resources. These sections explain how to obtain technical information from Cisco Systems.
Cisco.com
You can access the most current Cisco documentation on the World Wide Web at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com
International Cisco web sites can be accessed from this URL:
http://www.cisco.com/public/countries_languages.shtml
Documentation CD-ROM
Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM
package, which may have shipped with your product. The Documentation CD-ROM is updated monthly
and may be more current than printed documentation. The CD-ROM package is available as a single unit
or through an annual subscription.
Registered Cisco.com users can order the Documentation CD-ROM (product number
DOC-CONDOCCD=) through the online Subscription Store:
http://www.cisco.com/go/subscription
Ordering Documentation
You can find instructions for ordering documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
Documentation Feedback
You can submit comments electronically on Cisco.com. On the Cisco Documentation home page, click
Feedback at the top of the page.
You can e-mail your comments to [email protected].
You can submit your comments by mail by using the response card behind the front cover of your
document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Cisco.com
Cisco.com offers a suite of interactive, networked services that let you access Cisco information,
networking solutions, services, programs, and resources at any time, from anywhere in the world.
Cisco.com provides a broad range of features and services to help you with these tasks:
• Streamline business processes and improve productivity
• Resolve technical issues with online support
• Download and test software packages
• Order Cisco learning materials and merchandise
• Register for online skill assessment, training, and certification programs
To obtain customized information and service, you can self-register on Cisco.com at this URL:
http://www.cisco.com
Before calling, please check with your network operations center to determine the level of Cisco support
services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network
Supported Accounts (NSA). When you call the center, please have available your service agreement
number and your product serial number.
This chapter provides information to a network administrator that supplements the VPN Client User
Guide for your platform and the VPN 3000 Series Concentrator Reference Volume I: Configuration.
This chapter includes the following major topics:
• VPN 3000 Series Concentrators Configuration Information
• Configuring Entrust Entelligence for the VPN Client—Windows Only
• Setting up the VPN Client for Authentication using Smart Cards—Windows Only
• Configuring Mutual Authentication
• Create and assign attributes to VPN Client users as members of the IPSec group.
• Configure VPN Client users who are using digital certificates instead of pre-shared keys for
authentication.
Step 1 Under the Identity tab, enter a Group Name and Password. VPN Client users need these to configure a
connection entry and connect via the VPN Client; see “Gathering Information You Need” in Chapter 2
of the VPN Client User Guide for your platform.
Step 2 Next, select a method of authentication. The Type parameter determines the group authentication
method, Internal or External. Internal groups are configured on the VPN Concentrator. If you select
External, you must configure an external RADIUS server to authenticate and provide appropriate group
attributes.
Step 3 Under the General tab | Tunneling Protocols, be sure IPSec is checked.
Step 4 Under the IPSec tab | IPSec SA, select ESP-3DES-MD5 to require Triple-DES authentication.
Alternatively, you could choose ESP-DES-MD5, which uses DES authentication and provides a
minimum level of security. Or, to use AES, select one of the AES protocols, such as ESP-AES128-SHA.
AES is the most secure.
Note To create or customize the Security Association (SA), see the Configuration | Policy
Management | Traffic Management | Security Associations screens.
Step 5 Under IPSec > Authentication, choose the method you use for the members of the group; for example,
Internal or RADIUS. If you choose an authentication method other than None or Internal, be sure to
configure the external authentication server appropriately and supply users with the appropriate
information for installing the VPN Client.
Step 6 To require users to enter a password each time they log in, we suggest that you not check Allow Password
Storage on Client, which is on the Client Config tab. Not checking this parameter provides greater
security.
Step 7 To add the group, click Add, and then save the configuration.
Step 1 Enter a User Name, Password, and Verify Password. VPN Client users need a user name and password
to authenticate when they connect to the VPN Concentrator; see “Gathering Information You Need” in
Chapter 2 of the VPN Client User Guide for your platform.
Step 2 Under Group, select the group name you configured under the section “Creating an IPSec Group.”
Step 3 Carefully review and configure other attributes under General and IPSec. Note that if you are adding a
user, the Inherit? checkboxes refer to base-group attributes; if you are modifying a user, the checkboxes
refer to the user’s assigned-group attributes.
Step 4 Click Add or Apply, and save the configuration.
• For details refer to the VPN 3000 Series Concentrator Reference Volume I: Configuration:
– On configuring IKE proposals, see “Tunneling Protocols.”
– On configuring SAs, see “Policy Management.”
– On configuring groups and users, see “User Management.”
Follow these steps:
Step 1 Use the Configuration | System | Tunneling Protocols | IPSec | IKE Proposals screen to activate an IKE
proposal for certificates:
a. Activate one of the IKE protocols such as CiscoVPNClient-3DES-MD5-RSA-DH5,
CiscoVPNClient-3DES-SHA-DSA-DH5, or CiscoVPNClient-AES128-SHA.
Note To use AES, move the AES proposal(s) to the top of the list. You must be running Release 3.6
or higher of the VPN Client software to use AES.
b. If you do not want to modify one of the standard proposals, copy an active proposal and give it a
new name; for example, copy the CiscoVPNClient-3DES-MD5-RSA-DH5 and name it
“IKE-Proposal for digital certificate use.”
c. Click Security Associations, which takes you to the next step.
Step 2 Use the Configuration | Policy Management | Traffic Management | Security Associations screen to
create a new SA. You can use the Security Associations link on the IKE Proposals screen.
a. Add a new SA. For example, name it “Security association for digital certificate use.”
b. Change the Digital Certificates parameter to identify the VPN 3000 Concentrator’s digital
certificate. This is the only field that you need to change.
Step 3 Use the Configuration | User Management | Groups | Add or Modify screen to configure a group for using
digital certificates:
a. To use the Organizational Unit to configure the group, under the Identity tab, enter a group name
that is the same as the OU field of the certificate(s) for this group. For example, if the OU in the
VPN Client certificate is Finance, you would enter Finance as the group name. The OU is a field of
the ASN.1 Distinguished Name (DN). Enter password and verify it.
or
Alternatively, you can configure a policy for certificate group matching. To use this approach, go to
Configuration | Policy Management | Certificate Group Matching | Policy. For instructions on
creating rules, see VPN 3000 Series Concentrator Reference I: Configuration for this section or refer
to online help.
b. Under the IPSec tab > IPSec SA, select the IPSec SA you created in step 2; for example, “Security
association for digital certificate use.”
c. Under IPSec tab > Authentication, select the method you use for user authentication; for example,
Internal. If you select an external authentication method, such as RADIUS, be sure to configure the
external authentication server appropriately and supply users with the appropriate entries for the
“Gathering the Information You Need” section in Chapter 2 of the VPN Client User Guide for your
platform.
d. Click Add or Apply, and save the configuration.
Step 4 Use the Configuration | User Management | Users | Add or Modify | Identity screen to configure VPN
Client users for digital certificates:
a. As the group name, enter the group you have set up in step 3 as the group parameter; continuing the
example, you would enter Finance.
b. Click Add or Apply, and save the configuration.
Overview
This section summarizes how a network administrator can control personal firewall features from a VPN
3000 Concentrator operating as the Secure Gateway communicating policy information to the VPN
Client running on a Windows platform.
The VPN Concentrator can require that a VPN Client use a designated firewall configuration or make this
configuration optional. Making a designated firewall configuration optional gives a VPN Client user a
chance to install the desired firewall on the client PC. When the VPN Client tries to connect, it notifies
the VPN Concentrator about any firewalls installed on the client PC. The VPN Concentrator sends back
information about what firewall the VPN Client must use. If the firewall configuration is optional, the
VPN Concentrator can notify the VPN Client that there is a mismatch but still allow the VPN Client to
establish a tunnel. The optional feature thus lets the network administrator of the VPN Client maintain
the tunneled connection while obtaining and installing the required firewall.
The VPN Client configuration option Stateful Firewall (Always On) is enabled on the VPN Client. This
configuration option is not negotiated. The policy is not controlled from the VPN Concentrator. The VPN
Client user enables this option on the VPN Client under the Options menu or while the VPN Client is
active by right-clicking on the VPN Client icon and selecting the option.
When enabled, this feature allows no inbound sessions from all networks, whether or not a VPN
connection is in effect. Also, the firewall is active for both tunneled and nontunneled traffic. Users who
enable this feature cannot have a server running on their PC and their system can no longer respond to
PING requests. There are two exceptions to allowing no inbound traffic. The first is DHCP, which sends
requests to the DHCP server out one port but receives responses from DHCP through a different port. For
DHCP, the stateful firewall allows inbound traffic. The second is ESP (VPN data). The stateful firewall
allows ESP traffic from the secure gateway, because ESP rules are packet filters and not session-based
filters.
Stateful Firewall (Always On) is the most basic VPN Client firewall and provides the highest level of
security. However, it is also the least flexible, since it blocks almost all incoming traffic and does not allow
outbound traffic to be limited.
Note The Always On personal firewall allows inbound access from the internal (tunneled) network to ensure
that your internal applications work properly, while still providing additional protection for non tunneled
traffic.
The VPN Client on the Windows platform includes a stateful firewall that incorporates Zone Labs
technology. This firewall is used for both the Stateful Firewall (Always On) feature and the Centralized
Protection Policy (see “Centralized Protection Policy (CPP)”). This firewall is transparent to the VPN
Client user, and is called “Cisco Integrated Client Firewall” or CIC. While the “Always On” option lets
the VPN Client user choose to have basic firewall protection in effect, CPP lets an administrator define
rules to enforce for inbound/outbound Internet traffic during split tunneling operation. Since tunnel
everything already forces all traffic back through the tunnel, CPP is not used for tunnel everything.
Centralized Protection Policy (CPP) also known as firewall push policy, lets a network administrator
define a set of rules for allowing or dropping Internet traffic while the VPN Client is tunneled in to the
VPN Concentrator. A network administrator defines this policy on the VPN Concentrator, and the policy
is sent to the VPN Client during connection negotiation. The VPN Client passes the policy to the Cisco
Integrated Client, which then enforces the policy. If the client user has already selected the “Always On”
option, any more restrictive rules are enforced for Internet traffic while the tunnel is established.
Since CIC includes a stateful firewall module, most configurations block all inbound traffic and permit
either all outbound traffic or traffic through specific TCP and UDP ports outbound. Cisco Integrated
Client, Zone Alarm, and Zone Alarm Pro firewalls can assign firewall rules. CPP rules are in effect
during split tunneling and help protect the VPN Client PC from Internet attacks by preventing servers
from running and by blocking any inbound connections unless they are associated with outbound
connections.
CPP provides more flexibility than the Stateful Firewall (Always On) feature, since with CPP, you can
refine the ports and protocols that you want to permit.
As an alternative to CPP, a network manager can define policy on the personal firewall that is installed
on the same PC as the VPN Client. This approach accommodates situations where there is already a
firewall set up and in use on the PC. The VPN Client then polls the personal firewall every 30 seconds
to make sure it is running and if it is not, terminates the secure connection to the VPN Concentrator. In
this case, the VPN Concentrator does not define the firewall policy. The only contact the VPN Client has
with the firewall is polling it to ascertain that it is running, a capability known as Are You There (AYT).
Currently, the VPN Client supports the following personal firewalls:
• BlackIce Defender
• Cisco Security Agent
• Sygate Personal Firewall
• Sygate Personal Firewall Pro
• Sygate Security Agent
• ZoneAlarm
• ZoneAlarmPro
The Zone Labs Integrity solution secures remote PCs on Windows platforms. This feature is a
client/server solution that comprises four components:
Integrity Server (IS)—located on a central organization’s network, IS maintains policies for the firewall
on the remote VPN Client PCs. A network manager defines the policy on the IS, the IS downloads the
policy to the Integrity Agent (IA) on the remote PC through a secure tunnel activated through the VPN
Concentrator. The IS monitors the PC to ensure enforcement of the policy. The IS also communicates
with the VPN Concentrator to establish/terminate connections, exchange session and user information,
and report status information.
Integrity Agent (IA)—on the remote PC enforces the protection policies it receives from IS and
communicates with IS to exchange policy and status information. The IA also communicates with the
VPN Client on the remote PC to obtain server addresses and to exchange status information with the
VPN Concentrator.
VPN Concentrator—provides the means for configuring firewall functionality by group. It reports the
IS’s IP address and other VPN session-related information to the VPN Client, which passes it on to the
IA. The VPN Concentrator also communicates with the IS to establish and terminate sessions, exchange
session and user information, and request and acquire authentication status.
VPN Client—on the remote PC gets the IS addresses and information from the VPN Concentrator and
passes it to the IA. The VPN Client also gets and reports status information from the IA and terminates
sessions.
Once the connection is up and IS has communicated the firewall policy to IA, then IS and IA keep in
touch though a heartbeat mechanism.
Figure 1-1 shows a typical configuration for Cisco Integrated Client, in which the policy (CPP) is pushed
to the VPN Client. This policy blocks inbound traffic from the Internet while split tunneling is in use.
Traffic from the private network is not blocked, however.
Private network
VPN Client PC
Integrated Firewall
67447
Remote Firewall
Figure 1-2 shows a configuration in which the policy is set up on a personal firewall on the PC. In this
case, Are You There (AYT) is the policy. The VPN Client polls the firewall every 30 seconds to ensure
that it is still running and if it is not, the VPN Client terminates the session.
Private network
Internet
VPN Client PC
ZoneAlarm, BlackICE,Custom, etc.
Firewall defines and maintains policy
67448
VPN Client polls (AYT)
Client/Server Approach
VPN Client PC
Integrity Agent (IA)
IA installed and running
VPNC and VPN Client negotiate
VPNC passes User ID/Session ID/Port to Integrity Server
VPN Client
-- initializes IA with cached info
--passes User ID/Session ID to IA
IA connects with IS; gets firewall policy from IS
Caches policy
Example 1-1 Creating a Filter for a Firewall Policy allowing the VPN Client to Act as a Web Server
This example shows step-by-step how to add a filter that allows outbound traffic to any protocol and to
allow inbound traffic from HTTP but none of the other protocols. In this way, you can enable your VPN
Client to become a Web server.
Step 1 First, create a rule that allows inbound traffic only from HTTP. To do this, go to Configuration | Policy
Management | Traffic Management | Rules.
Step 2 Click Add
a. For the Rule Name, enter the name, such as FW-Allow incoming HTTP.
b. For Action, choose Forward.
c. For Protocol, choose TCP.
d. For TCP/UDP Destination Port, choose HTTP(80).
e. Click Add.
Step 3 Next add a filter that drops all inbound traffic except from HTTP but forwards any outbound traffic while
connected through a tunnel. To do this, under Traffic Management, click Filters.
a. Click the Add Filter box.
b. Enter the filter name, such as FW-Allow Incoming HTTP, and select the defaults for the remaining
parameters.
c. Click Add, which brings up the Actions screen.
d. On this screen, highlight the rule you made in Step 2 and click Add to move it to the Current Rules
in Filter column. Do the same for the Any Out (forward/out) rule.
e. Click Done.
Step 4 Save the configuration.
This filter now is available under Base Group and Groups for you to select for the CPP policy.
Configuring the VPN 3000 Concentrator to Enforce Firewall Usage on the VPN Client
This section shows how to configure the VPN Concentrator to require the VPN Client to enforce the use
of a personal firewall on the VPN Client PC. On the VPN 3000 Concentrator side, you configure the
Base Group or a specific group of users to enforce a personal firewall policy on the VPN Client side.
Use the following general procedure.
Step 1 To configure firewalls for the Base Group, choose Configuration | User Management | Base Group
or to configure firewalls for a specific group, choose Configuration | User Management | Groups.
Step 2 To add a firewall, do one of the following:
• For the Base Group, choose the Client FW tab.
• To create a new group for a firewall configuration, click Add Group and then click the Client FW
tab.
• To add a firewall to an existing group, highlight the group name, click Modify Group, and click the
Client FW tab.
Step 3 To require a firewall, under the Firewall Setting attribute, choose Firewall Required.
Step 4 Under the Firewall attribute, choose a firewall from the Firewall pull-down menu. If the firewall you are
using is not on the list, you must use Custom.
Step 5 Choose the Firewall Policy: Policy defined by the remote firewall (AYT) or Policy pushed (CPP). (See
the next section.)
For complete information, refer to VPN 3000 Series Concentrator Reference Volume I: Configuration,
the section “User Management” or the VPN 3000 Concentrator Network Manager’s online help.
Step 1 Configure firewall policy on the Integrity Server (IS), following Zone Labs documentation.
Step 2 On the VPN Concentrator, go to Configuration | System | Servers | Firewall Server. For the Zone Labs
Integrity Server, enter the host name or IP address and the port number.
Step 3 Under Configuration | User Management | Base Group or Groups | Client FW tab (see “Defining a Filter
and Rules to Use with Firewalls for CPP”), configure the following:
a. Firewall Setting = Firewall Required
b. Firewall = Zone Labs Integrity
c. Firewall Policy = Policy from Server
One way to see what is happening during tunnel negotiation between the VPN Client and the VPN
Concentrator is to examine messages in the IPSec Log on the VPN Client. You can use the Log Viewer
application to do this (for information on using Log Viewer, refer to the VPN Client User Guide for
Windows, Chapter 5). During tunnel negotiation, the VPN Client initiates the firewall exchange by
sending the VPN Concentrator a list of firewalls installed and running on the PC, if any. The VPN
Concentrator then sends messages indicating its firewall requirements to the VPN Client.
Following is an example of this exchange.
First, the request from the VPN Client to the VPN Concentrator:
Notifications
If the VPN Client and VPN Concentrator firewall configurations do not match, the VPN Concentrator
notifies the VPN Client when the VPN Client user attempts to connect. If the firewall configuration is
required, the connection attempt fails; if the firewall configuration is optional, the tunnel comes up.
Step 1 To enable Client Update, go to Configuration | System | Client Update and click Enable.
Step 2 At the Configuration | System | Client Update | Enable screen, check Enabled (the default) and then click
Apply.
Step 3 On the Configuration | System | Client Update | screen, click Entries.
Step 4 On the Entries screen, click Add. | The VPN Concentrator Manager, displays the Configuration | System
| Client Update | Entries | Add or Modify screen.
Step 5 For Client Type, enter the operating systems to notify:
• Windows includes all Windows based platforms
• Win9X includes Windows 95, Windows 98, and Windows ME platforms
• WinNT includes Windows NT 4.0, Windows 2000, and Windows XP platforms
• Linux
• Solaris
• Mac OS X
Note The VPN 3000 Concentrator sends a separate notification message for each entry in a Client
Update list. Therefore your client update entries must not overlap. For example, the value
Windows includes all Windows platforms, and the value WinNT includes Windows NT 4.0,
Windows 2000 and Windows XP platforms. So you would not include both Windows and
WinNT. To find out the client types and version information, click on the lock icon at the top left
corner of the Cisco Systems VPN Client main window and choose About VPN Client.
Step 6 In the URL field, enter the URL that contains the notification.
To activate the Launch button on the VPN Client Notification, the message must include the protocol
HTTP or HTTPS and the server address of the site that contains the update. The message can also include
the directory and filename of the update, for example, http://www.oz.org/upgrades/clientupdate. If you
do not want to activate the Launch button for the remote user, you do not need to include a protocol in
the message.
Step 7 In the Revisions field, enter a comma separated list of client revisions that do not need the update
because they are already using the latest software. For example, the value 3.6.5 (Rel), 4.0 (Rel)
identifies the releases that are compliant; all other VPN Clients need to upgrade.
Step 8 Click Add.
The Notification dialog box appears when the remote user first connects to the VPN device or when the
user clicks the Notifications button on the Connection Status dialog box. When the notification pops up,
on the VPN Client, click Launch on the Notification dialog box to open a default browser and access
the URL containing the update.
Step 1 On the VPN Client, enable the Allow Local LAN Access parameter.
When creating or modifying a connection entry, display the Transport tab and check Allow Local LAN
Access.
Figure 1-5 Setting the Allow Local LAN Access Parameter on the VPN Client
Step 2 On the VPN 3000 Concentrator, either add a new group or modify an existing group as follows:
a. To configure local LAN access for a specific group, go to Configuration | User Management |
Groups.
b. Choose either Add to add a new group or Modify to enable Local LAN for an existing group.
c. Go to the Client Config tab.
d. At the Split Tunneling Policy attribute, under Value, click the Tunnel everything radio button and
then click Allow the networks in list to bypass the tunnel. This enables local LAN access on the
VPN Client.
e. At the Split Tunneling Network List, under Value, choose the network list you have created for local
LAN access, if any.
VPN Client Local LAN is the default and is assigned the address 0.0.0.0/0.0.0.0. This IP address
allows access to all hosts on the client side LAN without regard to the network addressing
configured on that network. Since this local LAN access is limited to only one local network, if you
have multiple network cards in the client PC, you can access only the network in which the VPN
Client has established the VPN connection.
For information on creating a network list, see VPN 3000 Series Concentrator Reference
Volume I: Configuration, “Configuration | Policy Management | Traffic Management | Network Lists”.
Note When the VPN Client is connected and configured for local LAN access, you cannot print or browse by
name on the local LAN. When the VPN Client is disconnected, you can print or browse by name.
You can browse or print by IP Address. To print, you can change the properties for the network printer
to use the IP Address instead of names. For example instead of the syntax \\sharename\printername, use
\\x.x.x.x\printername, where x.x.x.x is an IP address.
To print and browse by name, you can use an LMHOSTS file. To do this, add the IP addresses and local
hostnames to a text file named LMHOSTS and place it on all your local PCs in the \Windows directory.
The PC’s TCP/IP stack then uses the IP address to hostname mapping in the LMHOSTS file to resolve
the name when printing or browsing. This approach requires that all local hosts have a static IP address;
or if you are using DHCP, you must configure local hosts to always get the same IP address.
Global Configuration
To configure NAT-T globally, follow these steps on the VPN Concentrator:
Step 1 Go to Configuration | System | Tunneling Protocols| IPSec | NAT Transparency and check the IPSec over
NAT-T check box.
Step 2 Click Apply and then save the configuration.
Step 1 If creating a new connection entry, click New under Connection Entries. If modifying an existing
connection entry, highlight the entry and click Modify. In either case, a properties dialog box displays.
Step 2 Open the Transport tab.
Step 3 Check Enable Transparent Tunneling check box.
Step 4 Click the IPSec over UDP (NAT/PAT) radio button.
Note This feature is supported only for Microsoft Internet Explorer web browser.
When a remote user connects to the VPN Concentrator (a secure gateway), the VPN Client can receive
a web browser proxy setting from the VPN Concentrator and then change the web browser proxy
configuration of the user to operate within the organization’s environment. This setting is in effect only
while the user is connected to the secure gateway. When the user disconnects, the VPN Client
automatically changes the browser proxy of the PC to its original setting.
A network administrator configures this setting on the VPN Concentrator. Use the following procedure
to configure the browser proxy setting for the VPN Client:
Note The browser proxy feature in the VPN Client differs from Internet Explorer in the following ways:
In Internet Explorer, auto detect policy and use proxy server/port are not mutually exclusive.
The VPN Client supports only a single proxy server for all protocols, while for Internet Explorer, you
can configure a proxy server for each protocol.
The VPN Client does not support the Internet Explorer option “Use automatic configuration script.”
Note The VPN Client relies on an up-to-date Entrust DLL file. The name of this file is kmpapi32.dll. If you
are using Entrust Entelligence version 5.1, the DLL file is up to date. If you have version 4.0 or 5.0
installed on the VPN Client system, then the DLL file is not up to date.
If “Entelligence Certificate (Entrust)” does not appear in the Certificate menu on the VPN Client, you
probably do not have the latest version of the DLL file, which ships with the VPN Client software. To
update the kmpapi32.dll file, copy it to the VPN Client system from the Release medium and place it in
the Windows default system directory. For Windows NT, Windows 2000 and Windows XP systems, this
directory is c:\WinNT\System32. For Windows 9x and Windows ME, the directory is \Windows\System.
Step 1 Under Key Options, when you are performing web-based certificate enrollment, choose your smart card
provider from the pull-down menu.
Step 2 For Key usage choose Signature and verify that Create new key set is selected.
Step 3 Install the certificate. The keys are generated on the smart card and a copy of the certificate is stored in
the Microsoft store on your PC and listed on the VPN Client Certificates tab.
Step 4 Go to the Connection Entry > Modify dialog, and do the following:
a. Open the Authentication tab and check the Certificate Authentication radio button
b. Display the drop-down Name menu and click the smartcard certificate.
Now a VPN Client user can complete authentication only when the smart card is inserted in its reader
that is plugged into the proper port on the PC and when the user enters the correct PIN or passcode.
Note With most vendors, when the smart card is not plugged in, the Certificates tab still displays the
certificate. However when disconnected, e-token by Aladdin removes the certificate from the list. The
certificate appears in the list only when the e-token is inserted and active.
During the first stage, the two sides exchange security parameters and create a secure channel. During
the second stage, user authentication takes place. The VPN central-site device asks for username and
password to verify that the remote user is a legitimate member of a group configured on the VPN
central-site device.
Mutual group authentication is asymmetrical in that each side uses a different method to authenticate the
other while establishing a secure tunnel to form the basis for group authentication. In this method,
authentication happens in two stages. During the first stage, the VPN central-site device authenticates
itself using public-key techniques (digital signature) and the two sides negotiate to establish a secure
channel for communication. During the second stage, the actual authentication of the VPN Client user
by the central-site VPN device takes place. since this approach does not use pre-shared keys for peer
authentication, it provides greater security than group authentication alone as it is not vulnerable to a
man-in-the-middle attack.
To use mutual group authentication, the remote user’s VPN Client system must have a root certificate
installed. If needed, you can install a root certificate automatically by placing it on the VPN Client
system during installation. The certificate must be in a file named rootcert, with no extension and must
be placed in the installation directory for the remote user’s VPN Client system. For more information on
loading a rootcert, see the installation instructions in the user guide for the remote user’s platform
Step 1 Select an IKE proposal that allows HYBID mode authentication, such as those listed “Valid VPN Client
IKE Proposals” (table) in Chapter 8 of this manual. For example, in the VPN Concentrator, select
HYBRID-AES256-SHA-RSA as the IKE proposal. For information on configuring IKE proposals, see
VPN 3000 Series Concentrator Reference, Volume I, Configuration, the section on Configuration |
Tunneling and Security | IPSec | IKE Proposals:
(http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/products_configuration_guide_chapter091
86a00801f1e36.html#1137591)
Note IKE proposals that include HYBRID mode authentication are not in the 4.1 Rel release of the
VPN 3000 Concentrator. However, you can select them in the VPN 3000 Concentrator release
that accompanies Release 4.6.
Step 2 If the VPN Concentrator does not yet have an identity certificate, you need to enroll with the CA for the
certificate. You can find information for doing so in VPN 3000 Series Concentrator Reference, Volume
II, Administration and Monitoring, the section on Configuration Management:
(http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/products_administration_guide_chapter09
186a00801f1dc5.html).
Step 3 Configure an IPSec SA to use an identity certificate to be authenticated with the CA certificate of the
VPN Client. You can find information in VPN 3000 Series Concentrator Reference, Volume I,
Configuration, the section on Configuration | Policy Management | Traffic Management | Security
Associations:
(http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/products_configuration_guide_chapter091
86a00801f1dbb.html#1563342)
Step 4 Configure a VPN Group on the VPN Concentrator to use the new IPSec SA from Step 3. For information
on configuring VPN groups, see VPN 3000 Series Concentrator Reference, Volume I, Configuration, the
section on Configuration | User Management | Groups, IPSec tab:
(http://www.cisco.com/en/US/products/hw/vpndevc/ps2284/products_configuration_guide_chapter091
86a00801f1df7.html#1907522.)
This chapter explains how to prepare configurations for remote users and how to distribute them. This
chapter includes the following sections:
• User Profiles
• Creating a Global Profile
• Creating Connection Profiles
User Profiles
Groups of configuration parameters define the connection entries that remote users use to connect to a
VPN central-site device. Together these parameters form files called profiles. There are two profiles: a
global profile and an individual profile.
• A global profile sets rules for all remote users; it contains parameters for the VPN Client as a whole.
The name of the global profile file is vpnclient.ini.
• Individual profiles contain the parameter settings for each connection entry and are unique to that
connection entry. Individual profiles have a .pcf extension.
Profiles are created in two ways:
1. When an administrator or a remote user creates connection entries using the VPN Client graphical
user interface (Windows and Macintosh only)
2. When you create profiles using a text editor
In the first case, the remote user is also creating a file that can be edited through a text editor. You
can start with a profile file generated through the GUI and edit it. This approach lets you control
some parameters that are not available in the VPN Client GUI application. For example,
auto-initiation or dial-up wait for third-party dialers.
The default location for individual profiles is:
• For Windows platforms—C:\Program Files\Cisco Systems\VPN Client\Profiles.
• For the Linux, Solaris, and Mac OS X platforms— /etc/CiscoSystemsVPNClient/Profiles/
This chapter explains how to create and edit the vpnclient.ini and individual profiles. Both files use the
same conventions.
Note The easiest way to create a profile for the Windows platforms is to run the VPN Client and use the VPN
Client GUI to configure the parameters. When you have created a profile in this way, you can copy the
.pcf file to a distribution disk for your remote users. This approach eliminates errors you might introduce
by typing the parameters and the group password gets automatically converted to an encrypted format.
Note Profiles for the VPN Client are interchangeable between platforms. Keywords that are specific to the
Windows platform are ignored by other platforms.
This sample file shows what you might see if you open it with a text editor
[main]
IncompatibleGinas=PALGina.dll,theirgina.dll
RunAtLogon=0
EnableLog=1
DialerDisconnect=1
AutoInitiationEnable=1
AutoInitiationRetryInterval=1
AutoInitiationRetryLimit=50
AutoInitiationList=techsupport,admin
[techsupport]
Network=175.55.0.0
Mask=255.255.0.0
ConnectionEntry=ITsupport
[admin]
Network=176.55.0.0
Mask=255.255.0.0
ConnectionEntry=Administration
Connectonopen=1
[LOG.IKE]
LogLevel=1
[LOG.CM]
LogLevel=1
[LOG.PPP]
LogLevel=2
[LOG.DIALER]
LogLevel=2
[LOG.CVPND]
LogLevel=1
[LOG.CERT]
LogLevel=0
[LOG.IPSEC]
LogLevel=3
[LOG.FIREWALL]
LogLevel=1
[LOG.CLI]
LogLevel=1
[CertEnrollment]
SubjectName=Alice Wonderland
Company=University of OZ
Department=International Relations
State=Massachusetts
Country=US
[email protected]
CADomainName=CertsAreUs
CAHostAddress=10.10.10.10
CACertificate=CAU
[Application Launcher]
Enable=1
Command=c:\apps\apname.exe
[ForceNetLogin]
Force=1
Wait=10
DefaultMsg=For authorized users only
Separator=**************************************
[GUI]
WindowWidth=578
WindowHeight=367
WindowX=324
WindowY=112
VisibleTab=0
ConnectionAttribute=0
AdvancedView=1
DefaultConnectionEntry=ACME
MinimizeOnConnect=1
UseWindowSettings=1
ShowToolTips=1
ShowConnectHistory=1
AccessibilityOption=1
The rest of this section explains the parameters that can appear in the vpnclient.ini file, what they mean,
and how to use them.
Step 1 Specify the name of a default connection entry in the DefaultConnectionEntry parameter; for example,
DefaultConnectionEntry=myprofile.
DNS Suffixes and the VPN Client—Windows 2000 and Windows XP Only
When a command or program such as ping server123 passes a hostname without a suffix to a Windows
2000 or Windows XP platform, Windows 2000/XP has to convert the name into a fully-qualified domain
name (FQDN). The Windows operating system has two methods for adding suffixes to domain names:
Method 1 and Method 2. This section describes these two methods.
A primary DNS suffix is global across all adapters. A connection-specific DNS suffix is only for a
specific connection (adapter), so that each connection can have a different DNS suffix.
A primary suffix comes from the computer name. To find or assign a primary DNS suffix, use the
following procedure according to your operating system:
On Windows 2000
Step 1 On a Windows 2000 desktop, right click the My Computer icon, and select Properties from the menu.
The System Properties dialog displays.
Step 2 Open the Network Identification tab.
The entry next to Full Computer Name identifies the computer’s name and DNS suffix on this screen, for
example, SILVER-W2KP.tango.dance.com. The part after the first dot is the primary DNS suffix, in this
example: tango.dance.com.
Step 3 To change the primary DNS suffix, click Properties on the Network Identification tab.
The Identification Changes dialog displays.
Step 4 Click More....
This action displays the DNS Suffix and Net BIOS Computer Name dialog. The Primary DNS suffix of
this computer entry identifies the primary suffix. You can edit this entry.
On Windows XP
Step 1 Right click My Computer, and select Properties from the menu.
The System Properties dialog displays.
Step 2 Open the Computer Name tab.
The entry next to Full Computer Name identifies the computer’s name and DNS suffix on this screen (for
example, SILVER-W2KP.tango.dance.com). The part after the first dot is the primary DNS suffix (in this
example: tango.dance.com).
Step 3 To change the primary DNS suffix, click Change on the Computer Name tab.
The Computer Name Changes dialog displays.
Step 4 Click More....
This action displays the DNS Suffix and Net BIOS Computer Name dialog. The Primary DNS suffix of
this computer entry identifies the primary suffix. You can edit this entry.
Note The following instructions are for a Windows 2000 platform. There may be slight variations on a
Windows XP platform.
To display the Advanced TCP/IP Settings dialog, use the following procedure:
Step 1 Right click the My Network Places icon to display the Properties dialog, which lists your connections.
Step 2 Double-click on a connection (for example, local) to display its Properties dialog. The connection uses
the checked components, such as those shown in Figure 2-1, which shows components of a connection
named Local Area Connection.
For this method, you can provide specific suffixes. You can view and change suffixes in the DNS tab of
the connection properties page. The Append these DNS suffixes (in order) edit box supplies the name
that you can edit. The values you provide here are global to all adapters.
When the VPN Client establishes a VPN tunnel to the VPN central device (for example, the VPN 3000
Concentrator), the VPN Client uses Method 2 without regard for the method that the Windows platform
uses. If the Windows platform is using Method 2, the VPN Client appends the suffix provided by the
VPN central device. This is the default behavior and works correctly with no problem.
However if Windows is using Method 1, the VPN Client does not append the primary or
connection-specific suffix. To fix this problem, you can set the AppendOriginalSuffix option in the
vpnclient.ini file. In Table 2-1, the [DNS] section contains this option:
[DNS]
AppendOriginalSuffix=1:
In this case, the VPN Client appends the primary DNS suffix to the suffix provided by the VPN
Concentrator. While the tunnel is established, Windows has two suffixes: one provided by the VPN
Concentrator and the primary DNS suffix.
AppendOriginalSuffix=2:
In this case, the VPN Client appends the primary and connection-specific DNS suffixes to the suffix
provided by the VPN Concentrator. While the tunnel is established, Windows has three suffixes: one
provided by the VPN Concentrator, the primary DNS suffix, and the connection-specific DNS suffix.
Note If Windows is using Method 2, adding these values to the vpnclient.ini file has no effect.
The VPN Client sets these values every time a tunnel is established and then restores the original
configuration when tearing down the tunnel.
• In the profile (connection entry) file under the Main section, enter the parameter “RadiusSDI = 1”.
(See Table 2-2.)
Now when the request comes in to the VPN Client, the software identifies it as a RADIUS SDI extended
authentication request and knows how to process the request.
Note Connection profiles for the VPN Client are interchangeable between platforms. Keywords that are
specific to the Windows platform are ignored by other platforms.
When you open the Doc Server.pcf file, it looks like the example below. This is a connection entry that
uses preshared keys. Note that the enc_ prefix (for example, enc_GroupPwd) indicates that the value for
that parameter is encrypted.
[main]
Description=connection to TechPubs server
Host=10.10.99.30
AuthType=1
GroupName=docusers
GroupPwd=
enc_GroupPwd=158E47893BDCD398BF863675204775622C494B39523E5CB65434D3C851ECF2DCC8BD488857EFA
FDE1397A95E01910CABECCE4E040B7A77BF
EnableISPConnect=0
ISPConnectType=0
ISPConnect=
ISPCommand=
Username=alice
SaveUserPassword=0
UserPassword=
enc_UserPassword=
NTDomain=
EnableBackup=1
BackupServer=Engineering1, Engineering2, Engineering 3, Engineering4
EnableMSLogon=0
MSLogonType=0
EnableNat=1
EnableLocalLAN=0
TunnelingMode=0
TCPTunnelingPort=10000
CertStore=0
CertName=
CertPath=
CertSubjectName
SendCertChain=0
VerifyCertDN=CN=”ID Cert”,OU*”Cisco”,ISSUER-CN!=”Entrust”,ISSURE-OU!*”wonderland”
DHGroup=2
PeerTimeOut=90
ForceNetLogin=1
You can configure the VPN Client for remote users by creating a profile configuration file for each
connection entry and distribute the .pcf files with the VPN Client software. These configuration files can
include all, or only some, of the parameter settings. Users must configure those settings not already
configured.
You can also distribute the VPN Client to users without a configuration file and let them configure it on
their own. In this case, when they complete their configuration using the VPN Client program, they are
in effect creating a .pcf file for each connection entry, which they can edit and share.
To protect system security you should not include key security parameters such as the IPSec group
password, authentication username, or authentication password in .pcf files for remote users.
Note Whatever preconfiguring you provide, you must supply users with the information they need to
configure the VPN Client. See “Gathering Information You Need” in Chapter 2 of the VPN Client User
Guide for your platform.
DHGroup Allows a network administrator to 1 = modp group 1 Does not appear in GUI
override the default group value on a 2 = modp group 2 (default)
VPN device used to generate Diffie- 5 = modp group 5
Hellman key pairs. Note: This value is preset
only for pre-shared keys; for
a certificate-authenticated
connection, the DHGroup
number is negotiated.
RadiusSDI Tells the VPN Client to assume that 0 = No (default) If this parameter is enabled,
Radius SDI is being used for 1 = Yes the prompts in the GUI for
extended authentication (XAuth). SDI authentication are from
Radius SDI and configured
using parameters in the
vpnclient.ini file.
SDIUseHardwareToken Enables a connection entry to avoid 0 = Yes, use RSA SoftID Does not appear in GUI
using RSA SoftID software. (default)
1 = No, ignore RSA SoftID
software installed on the PC.
EnableSplitDNS Determines whether the connection 0 = No Does not appear in GUI
entry is using splitDNS, which can 1 = Yes (default)
direct packets in clear text over the
Internet to domains served through
an external DNS or through an IPSec
tunnel to domains served by a
corporate DNS. This feature is
configured on the VPN 3000
Concentrator and is used in a
split-tunneling connection.
Note You must also enable this
feature on the VPN
central-site device you are
connecting to.
Separate Distribution
To distribute the configuration file separately and have users import it to the VPN Client after they have
installed it on their PCs, follow these steps:
Note For the Mac OS X platform, the configuration file is placed in the Profiles folder before the VPN Client
is installed. See Chapter 2 of the VPN Client User Guide for Mac OS X for more information.
Step 1 Distribute the appropriate profile files to users on whatever media you prefer.
Step 2 Supply users with necessary configuration information.
Step 1 Copy the VPN Client software files from the distribution CD-ROM into each directory where you
created an vpnclient.ini (global) file and separate connection profiles for a set of users.
Note For the Mac OS X platform, preconfigured files are placed in the Profiles and Resources folders before
the VPN Client is installed. The vpnclient.ini file is placed in the installer directory. See Chapter 2 of
the VPN Client User Guide for Mac OS X for more information.
There are two ways to update VPN Client software. You can place a new release or update on a web
server, called the update server, and notify remote users of all client types (Linux, Windows, Mac OS X
and so on) where to retrieve and install the updated software. Or, starting with Release 4.6, you can
automatically update VPN Client software for Windows 2000 and Windows XP remote users.
This section has the following sections:
Enabling Client Update (All Client Types)
Updating the VPN Client Software Automatically on Windows 2000 and Windows XP Systems
Managing Autoupdates
How Automatic Update Works
Note Each update folder on the web server must contain only one version package from Cisco. If you need
more than one version, configure more groups on the VPN Concentrator to update from different web
server folders.
Use the Client Update procedure at the VPN 3000 Concentrator to configure a client notification:
Step 1 To enable Client Update, go to Configuration | System | Client Update and click Enable.
Step 2 At the Configuration | System | Client Update | Enable screen, check Enabled (the default) and then click
Apply.
Step 3 On the Configuration | System | Client Update | screen, click Entries.
Step 4 On the Entries screen, click Add. The VPN Concentrator Manager, displays the Configuration | System
| Client Update | Entries | Add or Modify screen.
Note The VPN 3000 Concentrator sends a separate notification message for each entry in a Client
Update list. Therefore your client update entries must not overlap. For example, the value
Windows includes all Windows platforms, and the value WinNT includes Windows NT 4.0,
Windows 2000 and Windows XP platforms. So you would not include both Windows and
WinNT. To find out the client types and version information, click on the lock icon at the top left
corner of the Cisco Systems VPN Client main window and choose About VPN Client.
Step 6 In the URL field, enter the URL that contains the notification.
To activate the Launch button on the VPN Client Notification, the message must include the protocol
HTTP or HTTPS and the server address of the site that contains the update. The message can also include
the directory and filename of the update, for example, http://www.oz.org/upgrades/clientupdate. If you
do not want to activate the Launch button for the remote user, you do not need to include a protocol in
the message.
Step 7 In the Revisions field, enter a comma separated list of client revisions that do not need the update
because they are already using the latest software. For example, the value 4.0 (Rel), 4.0.3 identifies
the releases that are compliant; all other VPN Clients need to upgrade.
Step 8 Click Add.
The Notification dialog box appears when the remote user first connects to the VPN device or when the
user clicks the Notifications button on the Connection Status dialog box. When the notification pops up,
on the VPN Client, click Launch on the Notification dialog box to open a default browser and access
the URL containing the update.
If a new version requires reboots (during a major upgrade), the remote user has to reboot only twice,
when the program uninstalls the old version and when download completes. If the new version does not
require a reboot, as in a minor update, autoupdate notifies users that they do not need to reboot. Also, if
a user interrupts the download by disconnecting the VPN Client and then later reconnects, the download
resumes at the point where it was interrupted.
Managing Autoupdates
This section explains the manager tasks needed to automatically update VPN Client software. Generally,
an administrator is responsible for performing the following tasks:
• Setting up a web server to contain the download packages, called the update server. The packages
contain update-x.x.xx.xxxx-minor/major-K9 files, provided by Cisco Systems. This procedure
outline assumes that you already know how to set up web servers and does not include instructions
for doing so.
• Enabling the VPN Concentrator to perform autoupdates
• Obtaining the latest version package from Cisco
• Creating the profile bundle—a package containing new or revised profiles (.pcf files) (optional)
• Changing the version information file (new_update_config.ini)
• Creating oem zip packages and enter the names of these packages into the new_update_config.ini
file.
Prerequisite
Remote users must have the VPN Client for Windows 4.6 or greater installed on their PCs to use the
automatic update feature.
Step 1 To enable Client Update at the VPN group level, go to Configuration | User Management | Groups.
Step 2 To add a new group especially for automatic updates, click Add and enter the name of the group. Then
click Apply. The new group appears in the Current list. Now you can select the group and modify it for
Client Update.
Step 3 Next too modify a group in the Current list for Client Update, select the group and click Client Update.
The manager displays the Client Update screen.
Step 4 When you get to the Client Update | Entries | Add or Modify screen, enter information into the fields as
follows:
a. Enter the Client Type information. Since autoupdate runs only on Windows 2000 and Windows XP,
all other client types update manually. So for example, enter WinNT. This choice automatically
updates Windows 2000 and Windows XP users, while Windows NT users get notified and can get
an update manually from the update server.
b. In the URL field, enter the URL of the update server that contains the update download package and
the notification. The URL must contain http://; for example, http://update_server_engineering.
c. Enter the revision for this autoupdate; for example, update-4.6.
Step 5 Click Add or Apply.
When the VPN Client software gets the notification, it launches the autoupdate program and gives it the
location from which to download the updated version and profiles (if there are any).
• binary_config.ini—a configuration file listing the version available on the update server.
Autoupdate uses this file to determine whether it needs to go get the update. If the last major version
number (for example, 4.6.1.0) in this file is greater than the current version, autoupdate downloads
a full install. If not, then autoupdate looks at the version field. If the version number (for example,
4.6.1.1) is greater than the current version on the PC, autoupdate downloads an update. In any case,
after autoupdate finishes downloading the update package, it deletes this file.
• new_update_config.ini—the configuration file that the autoupdate program uses to determine what
to download. An administrator who is adding profiles and oem packages to an update must enter the
names of the files that contain new or updated profiles and oem packages into this file. Once
autoupdate has completed the update, this file becomes update_config.ini on the user’s system.
Of these six objects, an administrator is responsible only for updating the new_update_config.ini file
when distributing new or updated profiles. You must not modify the other files in the package. Cisco
supplies these files and they are secured by the signature in the sig.dat file.
An update installation consists of a zip file called binary.zip and includes the following files:
Filename Description
CSGina.dll The VPN Client’s GINA file (see “Start Before
Logon and GINAs—Windows Only”)
cvpnd.exe The VPN Client Daemon (main daemon), which
initializes client service and controls messaging
process and flow.
CVPNDRVA.sys The name of the network driver.
ipsecdialer.exe The IPSec module, which obtains network traffic
and applies IPSec rules to it.
ipseclog.exe The logging application
ppptool.exe The point-to-point protocol application
SetMTU.exe The application that automatically sets the MTU
file size and lets users change the MTU size
vpnclient.exe The VPN Client executable
vpngui.exe The VPN Client graphical user interface program
vpnapi.dll The VPN API library file
ppptool_fc.qm
ppptool_jp.qm
qt_jp.qm Language files used in localization
vpnclient_fc.qm
vpnclient_jp.qm
Note The transform within the zip file for modifying an MSI installation must be named oem.mst.
Step 1 Create the new profile files or modify your current profile files. For information on how to create and
modify individual profiles (.pcf files), see “Creating Connection Profiles.”
Step 2 Create a zip file containing the updated profiles; for example, name it profiles.zip.
Step 3 Enter the name of this .zip file into the new_update_config.ini file nd increment the version number
under the [Update] section of this file.
Note Although you do not need to update the VPN Client to update the profiles, the update server must
also contain all of the required Cisco distributed update files for the VPN Client to accept the
new profiles.
Step 4 Copy the new_update_config.ini and the zip file containing the new profiles onto the update server.
Note Before you begin, we highly recommend that you read “SAFE: Wireless LAN Security in Depth,” which
you can access at http://www.cisco.com/go/safe
This document analyzes the best practices of implementing security for wireless LANs using VPNs. For
a sample configuration demonstrating complete step-by-step instructions covering the group/user
configuration on the VPN Concentrator, auto initiation configuration on the VPN Client, and wireless
configuration in the Aironet, refer to the TAC technical note “Configuring Automatic VPN Initiation on
a Cisco VPN Client in a Wireless LAN Environment.”
Automatic VPN initiation (auto initiation) provides secure connections within an on-site wireless LAN
(WLAN) environment through a VPN Concentrator. When auto initiation is configured on the VPN
Client, the VPN Client:
• Becomes active immediately when a user starts his/her PC or when the PC becomes active after
being on standby or hibernating
• Detects that the PC has an IP address defined as requiring auto initiation
• Establishes a VPN tunnel to the VPN Concentrator defined for its network, prompts the user to
authenticate, and allows that user network access
It is worth mentioning that although auto initiation was designed for wireless environments, you can use
it in any networking environment. Auto initiation provides a generic way for the VPN Client to auto
initiate a connection whether the VPN Client PC is based on specific networks or not.
Figure 4-1 depicts a simple network configuration that employs VPN for securing on-site WLANs. The
VPN 3000 Concentrators, which may or may not be using load balancing, provide the gateway between
the untrusted and the trusted networks. The DHCP Server can be on either side of the VPN 3000
Concentrator. VPN Client users with laptops that have wireless NIC cards can connect through access
points (APs) throughout the campus or building and tunnel to the trusted 30.30.30.x network from the
untrusted 10.10.10.x network. The network administrator can set this type of scenario up to be largely
transparent to the VPN Client user.
Note You can set up auto initiation configurations that both include and exclude networks for auto initiation.
RADIUS File
Server Server
30.30.30.3 30.30.30.4 30.30.30.X
network
DHCP
Server 30.30.30.2
30.30.30.1
Routed
network
20.20.A.1 20.20.B.1
(Access point) (Access point)
20.20.A.2 20.20.B.2
20.20.A.3 (Access point) (Access point) 20.20.B.3
30.30.30.5 20.20.A.X 20.20.B.X 30.30.30.6
71727
PN assigned) network network (VPN assigned)
In Figure 4-1 the trusted (wired) network, numbered 30.30.30, is at the top of the diagram with a VPN
Concentrator separating it from other networks considered untrusted. The untrusted networks contain
wireless subnets, such as 20.20.A.x and 20.20.B.x. Every device on the untrusted network must use a
VPN tunnel to access resources on the trusted network. Access to a DHCP server must be available to
provide the devices on the untrusted network with initial IP connectivity to the VPN Concentrator. The
figure shows the placement of the DHCP server as optional, since it can be placed either on the untrusted
network or on the trusted network with DHCP Relay enabled in the VPN Concentrator.
To configure auto initiation for users on the network, you add parameters to the VPN Client’s global
profile (vpnclient.ini). For information on how to create or use a global profile, see “Creating a Global
Profile.”
Using the VPN Client GUI, users can only enable/disable auto initiation and change the retry interval.
These features are available through the Options menu when auto initiation has been configured through
the global profile. If auto initiation is not configured, these options do not appear in the Options menu.
For a complete explanation of how auto initiation appears to the VPN Client user on a Windows system,
see Cisco VPN Client User Guide for Windows, “Using Automatic VPN Initiation.”
The auto initiation feature can be used in WLAN environments containing NIC cards and access points
from any vendor.
Preparation
Before you begin, you should gather the information you need to configure auto initiation:
• The network IP addresses for the client network
• The subnet mask for the client network
• The names for all connection entries that users are using for their connections
[Franklin]
Network=10.10.200.0
Subnet=255.255.255.0
ConnectionEntry=robron
Connect=0
Suppose a sales manager travels among three locations (Chicago, Denver, and Laramie) within a
corporation, attending sales meetings, and wants to securely and easily initiate a wireless connection at
these locations. The vpnclient.ini contains the entries shown in this example. The connection entry
named in each network section points to the individual’s profile (.pcf) for that on-site wireless LAN
network.
[Main]
AutoInitiationEnable=1
AutoInitiationRetryInterval=3
AutoInitiationList=ChicagoWLAN,DenverWLAN,LaramieWLAN
[ChicagoWLAN]
Network=110.110.110.0
Mask=255.255.255.0
ConnectionEntry=Chicago (points to a connection profile named chicago.pcf)
[DenverWLAN]
Network=220.220.220.0
Mask=255.255.255.0
ConnectionEntry=Denver (points to a connection profile named denver.pcf)
[LaramieWLAN]
Network=221.221.221.0
Mask=255.255.255.0
ConnectionEntry=Laramie (points to a connection profile named laramie.pcf)
Example 4-2 Section of vpnclient File for Auto Initiation that excludes and includes auto initiation
In this example, the exceptions (more specific) network addresses appear first in the vpnclient.ini file
followed by the connection entries for auto initiation. The connection entries for auto initiation do not
need to include the Connect parameter.
[Main]
AutoInitiationEnable=1
AutoInitiationRetryInterval=3
AutoInitiationList=NetworkAExceptions,NetworkA,NetworkBexceptions,NetworkB
[NetworkAExceptions]
Network=192.168.0.0
Mask=255.255.255.0
ConnectionEntry=VPNprofileA1
Connect=0
[NetworkA]
Network=192.0.0.0
Mask=255.0.0.0
ConnectionEntry=VPNprofileA2
[NetworkBExceptions]
Network=161.200.100.0
Mask=255.255.255.0
ConnectionEntry=VPNprofileB1
Connect=0
[NetworkB]
Network=161.200.0.0
Mask=255.255.0.0
ConnectionEntry=VPNprofileB2
Step 1 Display the Options menu, and select Automatic VPN Initiation.
Step 2 On the Automatic VPN Initiation dialog, verify that Enable automatic VPN initiation is selected. If not,
then click to select it.
Step 3 Click Apply to close the window.
Alternatively you can verify the auto initiation configuration from the command line by executing the
following command:
vpnclient verify autoinitconfig
This display shows configuration information for each setting plus a list of your network entries.
This chapter explains how to use the VPN Client command-line interface (CLI) to connect to a Cisco
VPN device, generate statistical reports, and disconnect from the device. You can create your own script
files that use the CLI commands to perform routine tasks, such as connect to a corporate server, run
reports, and then disconnect from the server.
CLI Commands
This section lists each command, its syntax, and gives sample output for each command. It is organized
by task.
Note The vpnclient command lists all the commands and parameters available for your platform. Not all
commands and parameters are available on all platforms.
Table 5-1 lists the command options you can use with the vpnclient connect command, includes the task
that each option performs, and gives an example of each option.
This example shows the vpnclient connect command that connects you to the Engineering Server using
the profile name “engineering”
At this point, the VPN Client displays an authentication dialog box that prompts for your username and
password.
After you enter your name and password, authentication succeeds, and the command continues
executing.
Alternatively, to suppress the User Authentication window shown in Example 4-1, you can use the
cliauth parameter. The command line then prompts for username and password. Using the cliauth
parameter avoids having a password display in clear text on the command line.
The following command connects to the remote network without user interaction. Notice that the
password appears on the command line in clear text.
The following session shows how to use the vpnclient notify command to display a notification from a
network administrator.
Notification:
Your network administrator has placed an update of the Cisco Systems VPN Client at the
following location:
http://www.mycompany.com/clientupdate
Note If the mask in the output display does not match the value in the profile, then the mask is invalid. An
invalid mask is displayed as 255.255.255.255
The following command shows your auto initiation configuration for one access point.
The following commands control the setting of the stateful firewall. The first command output shows the
response displayed when the stateful firewall is not enabled when the command is executed. The next
two commands, executed after enabling the stateful firewall, first suspend the firewall and then resume it.
Note If you reboot the PC after suspending the stateful firewall, the software restores the Stateful Firewall
setting to enable and this will block traffic.
When entered without any of the optional parameters, the vpnclient stat command displays all status
information. The following parameters are optional:
The following examples show sample output from the vpnclient stat command. For more information
on statistical output, see VPN Client User Guide for Windows.
Following is an example of the information that the vpnclient stat command displays.
Here is a sample of the information that the vpnclient stat traffic command generates.
To display only tunneling information, use the vpnclient stat tunnel command. Here is a sample.
The vpnclient stat route command displays information similar to the following display.
The vpnclient stat firewall command displays information similar to the following display.
Note The maximum size of any VPN Client statistics count is 4,294,967,296. Once the VPN Client software
reaches this limit, the statistics count rolls back to zero and starts again.
Return Codes
This section lists the error levels (return codes) that you can receive when using the VPN Client
command-line interface.
This chapter describes how use the command-line interface to manage digital certificates in your
certificate store. Your certificate store is the location in your local file system for storing digital
certificates. The store for the VPN Client is the Cisco store.
• A prompting mode in which you enter minimum arguments for a given command and are prompted
for any remaining information.
The minimum command line argument follows this basic form:
cisco_cert_mgr -U -op operation
cisco_cert_mgr -R -op operation
cisco_cert_mgr -E -op operation
Where:
– -U applies to the user or private certificate.
You can use the -U flag for all certificate management command operations, except
enroll_resume.
Certificate Contents
This section describes the type of information contained in a digital certificate.
A typical digital certificate contains the following information:
• Common name—The name of the owner, usually both the first and last names. This field identifies
the owner within the Public Key Infrastructure (PKI) organization.
• Department—The name of the owner’s department. This is the same as the organizational unit.
– If you are connecting to a VPN 3000 concentrator, this field must match the Group Name
configured for the owner in the concentrator.
• Company—The company in which the owner is using the certificate. This is the same as the
organization.
• State—The state in which the owner is using the certificate.
• Country—The two-character country code in which the owner’s system is located.
• Email—The e-mail address of the owner of the certificate.
• Thumbprint—An MD5 hash of the certificate’s complete contents. The thumbprint provides a means
for validating the authenticity of the certificate. For example, if you contact the issuing CA, you can
use this identifier to verify that this certificate is the correct one to use.
• Key size—The size of the signing key pair in bits.
• Subject—The fully qualified domain name (FQDN) of the certificate’s owner. This field uniquely
identifies the owner of the certificate in a format that can be used for LDAP and X.500 directory
queries. A typical subject includes the following fields:
– common name (cn)
– organizational unit, or department (ou)
– organization or company (o)
– locality, city, or town (l)
– state or province (st)
– country (c)
– e-mail address (e)
Certificate Passwords
Each digital certificate is protected by a password. Many operations performed by the certificate
management command require that you enter the password before the operation can take place.
The operations that require you to enter a password are:
• Delete
• Import
• Export
• Enroll
Note For the enroll operation, the password to protect the digital certificate is a separate password from the
optional challenge password that you enter for the server certificate.
You are prompted for any passwords that are required to complete the command. You must enter the
password and verify the password again before the command can execute. If the password is not
accepted, you must re-enter the command.
When you establish a VPN connection with a certificate, a certificate password is also required.
All passwords can be up to 32 alphanumeric characters in length, and are case sensitive.
Certificate Tags
A certificate tag is the identifier for each unique certificate. Each certificate added to the certificate store
is assigned a certificate tag. An enroll operation also generates a certificate tag, even if the enroll
operation does not complete.
Some certificate management operations require that you enter a certificate tag argument before the
operation can take place. Operations that require certificate tags are listed in Table 6-1. Use the list
operation to find your certificate tag.
To enter a certificate tag argument, use the -ct command followed by the certificate identifier, listed as
-ct Cert # next to the operation.
The following example shows the view command with a required certificate tag:
cisco_cert_mgr -U -op view -ct 0
Table 6-1 describes the operations that can be used with the certificate management command.
Parameter Description
list Lists all certificates in the certificate store. Each certificate in the
list is identified by a unique certificate tag (Cert #).
view -ct Cert # Views the specified certificate. You must enter a certificate tag.
Parameter Description
verify -ct Cert # Verifies that the specified certificate is valid. You must enter a
certificate tag.
If the certificate is verified, the message ‘Certificate Cert # verified’
appears.
If the certificate fails verification for any reason, the message
‘Certificate Cert # failed verification’ appears. Following this
message is a text string that describes the reason for the failure.
delete -ct Cert # Deletes the specified certificate. You must enter a certificate tag.
export -ct Cert # -f filename Exports the identified certificate from the certificate store to a
specified file. You must enter a certificate tag and a filename. If
either is omitted, the command line prompts you for them.
You must enter the full path of the destination. If you enter only the
filename, the file is placed in your working directory.
import -f filename Imports a certificate from a specified file to the certificate store.
This operation requires two different passwords: the password that
protects the file (assigned by your administrator), and the password
you select to protect the certificate.
enroll For user certificates only.
-cn common_name Obtains a certificate by enrolling you with a Certificate Authority
-ou organizational_unit (CA) over the network.
-o organization
-st state Enter each keyword individually on the command line.
-c country See the “Enrolling Certificates” for more information.
-e email
-ip IP_Address You can obtain a challenge phrase from your administrator or from
-dn domain_name the CA.
-caurl url_of _CA
-cadn domain_name
[-chall challenge_phrase]
enroll_file For user certificates only.
-cn common_name Generates an enrollment request file that you can e-mail to the CA
-ou organizational_unit -o
or paste into a webpage form. When CA generates the certificate,
organization
you must import it using the import operation.
-st state
-c country See the “Enrolling Certificates” for more information.
-e email
-ip IP_Address
-dn domain_name
-f filename
-enc [ base64 | binary ]
Parameter Description
enroll_resume -E -ct Cert # You cannot use this operation with user or root certificates.
Resumes an interrupted network enrollment. You must enter the -E
argument and a certificate tag.
changepassword -ct Changes a password for a specified digital certificate. You must
Cert # enter a certificate tag.
You must enter the current password before you select the new
password and confirm it.
Enrolling Certificates
A Certificate Authority (CA) is a trusted organization that issues digital certificates to users for verifying
that they are who they claim to be. The certificate enrollment operations allow you to obtain your
certificate from a CA over the network or from an enrollment request file.
There are three types of certificate enrollment operations.
• The enroll operation allows you to obtain a certificate by enrolling with a CA over the network. You
must enter the URL of the CA, the domain name of the CA, and the common name.
• The enroll_file operation generates an enrollment request file that you can e-mail to a CA or post
into a webpage form. You must enter a filename, a common name, and an encoding type.
With the enroll and enroll_file operations, you can include keywords to supply additional
information (see Table 6-2).
• The enroll_resume operation resumes an interrupted network enrollment. You must enter the -E
argument and a certificate tag. To find your certificate tag, use the list operation.
Enrollment Operations
To use enrollment operations, enter the certificate manager command, an enroll operation, and the
associated keywords on the command line.
• The following example shows the enroll command with the minimum required keywords for
common name (-cn), URL of the CA (-caurl) and domain name of the CA (-cadn):
cisco_cert_mgr -U -op enroll -cn Ren Hoek -caurl
http://172.168.0.32/certsrv/mscep/mscep.dll -cadn nobody.fake
• The following example shows the enroll_file command with the minimum required keywords for
filename (-f), common name (-cn), and encoding type (-enc):
cisco_cert_mgr -U -op enroll_file -f filename -cn Ren Hoek -enc base64
• The following example shows the enroll_file command with the required minimum arguments and
additional keywords:
cisco_cert_mgr -U -op enroll_file -f filename -cn Ren Hoek -ou Customer Service -o
Stimpy, Inc, -st CO -c US -e [email protected] -ip 10.10.10.10 -dn fake.fake -enc binary
Table 6-2 describes options for the enroll, enroll_file, and enroll_resume operations.
Parameter Description
-cn common_name The common name for the certificate.
-ou organizational_unit The organizational unit for the certificate.
-o organization The organization for the certificate.
-st state The state for the certificate.
-c country The country for the certificate.
-e email The user e-mail address for the certificate.
-ip IP_Address The IP address of the user’s system.
-dn domain_name The FQDN of the user’s system.
-caurl url_of_CA The URL or network address of the CA.
-cadn domain_name The CA’s domain name.
[-chall challenge_phrase ] You can obtain the challenge phrase from your administrator or
from the CA.
-enc [ base64 | binary ] Select encoding of the output file. The default is base64.
• base64 is an ASCII-encoded PKCS10 file that you can display
because it is in a text format. Choose this type when you want
to cut and paste the text into the CA’s website.
• binary is a base-2 PKCS10 (Public-Key Cryptography
Standards) file. You cannot display a binary-encoded file.
Note If the CA’s certificate contains multiple department (multiple ou fields), you can add multiple
departments to the VPN Client enrollment request by using the plus sign (+) between the department
fields.
This chapter explains how to replace the Cisco Systems brand with your own organization’s brand. When
you install and launch the VPN Client software, you see your own organization name, program name,
and application names on menus, windows, dialogs, and icons.
For the Windows platform, it also explains how to set up the software so that your users can install it
automatically without being prompted. This feature is called silent install.
To customize the VPN Client software, you create your own distribution image combining the following
elements, which this chapter describes.
For all platforms, you can customize the following:
• Cisco Systems image that you receive on the Cisco Systems software distribution CD.
• Your own portable network graphics (PNG) (Table 7-2) and icon files to replace the Cisco Systems
brand.
• A vpnclient.ini file for configuring the VPN Client software globally (see Chapter 2,
“Preconfiguring the VPN Client for Remote Users”).
• Individual profile (.pcf) files for each connection entry (see Chapter 2, “Preconfiguring the VPN
Client for Remote Users”).
For the Windows platform, you can also customize the following:
• An oem.ini file that you create. Cisco supplies a sample oem.ini file that you can use as a template
and customize.
• setup.bmp—a bitmap file that displays on the first InstallShield® window when you install the VPN
Client. (InstallShield only)
These elements should all be in the same directory and folder. Because some of the files may be too large
to distribute the oem software on diskettes, we recommend that you make a CD ROM distribution image.
Installation Bitmap
The InstallShield uses a bitmap when installing the VPN Client software: the setup bitmap (setup.bmp).
Figure 7-1 shows the setup bitmap that displays as the first screen during installation via InstallShield.
VPN Client
Figure 7-3 shows a lock image (title_bar.png), window title (AppNameText in the oem.ini file), and
organization logo (logo.png file). The oem.ini file can replace the window title, the image at the left end
of the title bar, and the organization or company logo in the VPN Client software. It can replace the open
lock and closed lock icons in the system tray (see Figure 7-4 and Figure 7-5).
1 2 3
60706
1 Title bar lock image (title_bar.png) 3 Organization logo (logo.png)
2 Window title (oem.ini file)
Setup Bitmap—setup.bmp
The InstallShield version of VPN Client includes a bitmap on the distribution CD that is not in the
oem.ini file: setup.bmp. You can substitute your own image for this .bmp file, as long as you keep the
current filename (setup.bmp) and make sure that the file is in the same directory and folder as the oem.ini
file. This file displays a logo on the window when you start the InstallShield installation program. The
size of the Cisco Systems setup bitmap is 330x330 pixels and it uses 256 colors.
Note You can edit the oem.ini file that Cisco Systems supplies.
The format of the oem.ini file is the same as a standard Windows ini file:
• Use a semicolon (;) to begin a comment.
• Set values by entering keyword=value.
• If you don’t specify a value for a keyword, the application uses the default.
• Keywords are not case-sensitive, but using upper and lowercase makes them more readable.
[Main]
DisableKerberosOverTCP = 1
; The [Brand] section controls window titles during installation and in the
; destination folder for the product and applications.
;
[Brand]
CompanyText = Wonderland University
ProductText = Wonderland Client
;
; The [Default] section establishes the default bitmap and icon to use if
; assignments are left blank. This section also sets up silent installation.
; Silent mode installation proceeds without user intervention.
;
[Default]
SilentMode = 1
InstallPath = C:\Program Files\Wonderland University\Wonderland Client
DefGroup = Wonderland Client
Reboot = 1
;
; The [Dialer] section controls the text and icons for the dialer software.
; AppNameText appears on the application selection menu. DialerBitMap
; appears on connection windows. AllowSBLLaunches controls whether a remote user can
; launch an application before connecting and logging on to a Windows NT platform.
;
[Dialer]
MainIcon=is_install.ico
AppNameText = Wonderland Dialer
AllowSBLLaunches = 0
;
; The [Set MTU] section controls the text and icon for the
; Set MTU applications. AppNameText appears on the application
; selection menu and the title screen. MainIcon appears on the window title.
; bar.
;
[Set MTU]
AppNameText = MTU Setter Application
MainIcon = MtuIcon.ico
AutoSetMtu = 1
SetMtuValue = 1300
VAMtu=1252
MTUAdjustmentOverride = 144
DefGroup= InstallShield only After the keyword and equal sign, enter the
name of the destination folder in the
Identifies the name of the folder to contain the
suggested format:
client software.
foldername
Reboot= InstallShield only After the keyword and equal sign, enter 0, 1,
or 2:
Specifies whether to restart the system after the
silent installation. If SilentMode is on (1) and 0 = display the reboot dialog.
Reboot is 1, the system automatically reboots 1 (and SilentMode = 1) = automatically reboot
after installation finishes. the system when installation finishes.
2 (and SilentMode = 1) = do not reboot after
installation finishes.
[Dialer] Required field that identifies the section that Enter exactly as shown, as the Dialer section
contains the name of the Dialer application, the of the file.
bitmap to use on the connections window, and
the connection icons.
AppNameText= Identifies the name of the dialer application. After the keyword and equal sign, enter the
name of the dialer application. The name can
contain spaces and is not case sensitive.
MainIcon= This is used only by InstallShield for shortcuts After the keyword and equal sign, enter the
to the vpngui.exe. name of the icon file.
AllowSBLLaunches InstallShield only After the keyword and equal sign, enter 1 to
enable or 0 to disable this feature. The default
Specifies whether a VPN Client user is allowed
is 0 (to disable). (See Note after table.)
to launch a third party application before
logging on to a Windows NT platform.
[Set Mtu] Required field that identifies the section that Enter exactly as shown; identifies the Set
contains the name of the Set MTU application, MTU section of the file.
the name of the Set MTU icon, and other
settings.
Note When AllowSBLLaunches is 0, “Allow launching of third party applications before logon” under
Windows Logon Properties is unavailable. There might be cases when you need to launch an application
before starting your connection, for example, to authenticate your access credentials. In this case you
can use the following procedure:
In the VPN Dialer program, choose Options > Windows Logon Properties.
Uncheck Disconnect VPN connection when logging off.
Log out.
Log in with cached credentials.
Make your VPN Dialer connection.
Log out.
Log in again while already connected.
Table 7-2 lists the GUI image (portable network graphic) files that the VPN Client uses. If you want to
replace any of them with your own image files, you must name your image files exactly as shown in the
list; otherwise, the VPN Client GUI does not recognize them.
You can also replace the following icon files (as long as your icon files have these same names):
• connected.ico—the tray icon when connected (also in resource file for vpngui.exe icon)
• unconnected.ico—the tray icon when not connected
• disconnecting.ico—the tray icon when disconnecting
Caution Do not modify the MSI file. To customize MSI, use a transform. Failure to follow recommended
procedure will limit the level of support you can expect from Cisco.
Note For information on using Orca, see the technical note “How to Create or Modify a Transform Using
Microsoft Orca”.
Note This section does not include instructions on using ORCA. Do not attempt the following procedure
unless you have experience using ORCA. If you are unfamiliar with ORCA, we recommend that you use
an MSI installation package, such as Wise or InstallShield.
Table 7-3 outlines the changes to make in the tables in the oem.mst file. The columns in the table are
defined as follows:
• Table Name—the name of the table to edit
• Changes Needed—a list of the changes to make to the table
• Install Requirement—the entries that modify the installation software
• Client Requirement—the entries that modify the way the VPN Client operates at runtime
If you want to record errors that might occur during the installation, you can create a log file as follows:
msiexec /i vpnclient_en_msi /l*v! c:oeminstall.log TRANSFORMS=oem.mst
Note You can launch silent installation from the command line by using the -sd parameter with the
vpnclient.exe command. For example, vpnclient -sd toVPN. For information on the vpnclient
command, refer to “Configuring Automatic VPN Initiation”.
Note If the installation program detects a 2.x version of the VPN Client, the program still prompts the user for
input when converting the connection entry profiles.
.ini parameter
(keyword) Parameter Description Values
SilentMode= Identifies whether to activate After the keyword and equal sign, enter either 0 or
noninteractive installation. 1. 1 activates silent installation:
0 = prompt the user during installation.
1= do not prompt the user during installation.
InstallPath= Identifies the directory for After the keyword and equal sign, enter the name of
the client software the directory in the suggested format:
installation. root:\programs\organization\product
.ini parameter
(keyword) Parameter Description Values
DefGroup= Identifies the name of the After the keyword and equal sign, enter the name of
folder to contain the client the destination folder in the suggested format:
software. foldername
Reboot= Identifies whether to restart After the keyword and equal sign, enter 0, 1, or 2:
the system after the silent
0 = display the reboot dialog.
installation. If SilentMode is
on (1) and Reboot is 1, the 1 (and SilentMode = 1) = automatically reboot the
system automatically reboots system when installation finishes.
after installation finishes. 2 (and SilentMode = 1) = do not reboot after
installation finishes.
To distribute custom images, replace the image files in the Resources folder with your own custom
images. For example:
• To customize the logo, replace the file /etc/CiscoSystems/Resources/logo.png with your own
custom logo.
• To customize the splash screen, replace the file /etc/CiscoSystems/Resources/splash_screen.png
with your own custom splash screen.
When the VPN Client is installed, the images in the Resources file are used for the client GUI.
This chapter contains information to help you resolve problems installing or running the VPN Client. It
also contains notes helpful for writing programs for special needs.
This chapter includes the following main topics:
• Troubleshooting the VPN Client
• Changing the MTU Size
• Delete With Reason
• Start Before Logon and GINAs—Windows Only
• Programmer Notes
• IKE Proposals
Select a category and the screen displays details for that category. You can then execute the Export
command and choose a name and destination. Windows creates a text file, which you can attach to an
e-mail message and send to the support center.
Step 1 Go to the Start menu and select Programs > Command Prompt.
This action displays a window with a DOS prompt, such as c:\.
Step 2 Type the following command at the DOS prompt:
C:\>winmsd /a /f
where /a = all and /f = write to file.
This command generates a text (.txt) file with the name of your computer and places the file in the
directory from which you run the command. For example, if the name of your machine is SILVER and
you execute the command from the c: drive (as shown above), the text file name is silver.txt.
If you open the file with a text editor, such as Notepad, you see a file such as the one shown in
Figure 8-2, which was from a Windows NT system.
You can attach this file to an e-mail message and send it to the support center.
Copy the output from the above commands, paste it into an e-mail message, and send it to
Support.
Step 1 At the Microsoft System Information screen (shown in Figure 8-1), select Tools> System Configuration.
Microsoft displays a Properties page.
Step 2 From the General page, select the Advanced button.
Step 3 Choose the Disable Fast Shutdown option.
Note The VPN Client automatically adjusts the MTU size to suit your environment, so running this
application is not recommended.
The maximum transmission unit (MTU) parameter determines the largest packet size in bytes that the
client application can transmit through the network. If the MTU size is too large, the packets may not
reach their destination. Adjusting the size of the MTU affects all applications that use the network
adapter. Therefore the MTU setting you use can affect your PC’s performance on the network.
MTU sizing affects fragmentation of IPSec and IPSec through NAT mode packets to your connection
destination, because IPSec encapsulation increases packet size. A large size (for example, over 1300)
can increase fragmentation. Using 1300 or smaller usually prevents fragmentation. Fragmentation and
reassembly of packets at the destination causes slower tunnel performance. Also, many firewalls do not
let fragments through.
Step 1 Select Start > Programs > Cisco Systems VPN Client > SetMTU.
The Set MTU window appears.
(Replace the en0 with the appropriate interface, and replace 1200 with the desired mtu.)
Step 3 The changes take effect immediately.
Switch Description
/s value Set the MTU for all adapters to value. This sets the MTU at the IP layer.
This action requires a reboot.
/r Reset the MTU for all adapters to the operating system default at the IP
layer. This action requires a reboot.
/va value Set the MTU for the virtual adapter to value. This sets the MTU at the MAC
layer. This action does not require a reboot.
/vaReset Reset the MTU for the virtual adapter to the default (1500) at the MAC
layer. This action does not require a reboot.
/? Display help on the SetMTU switches.
The new setting remains in effect the next time a tunnel is established.
Note The VPN Concentrator you are connecting to must be running software version 4.0 or later to support
delete with reason functionality.
Table 8-1 describes the reason codes and the corresponding messages.
All text messages for client-initiated disconnects begin with “Secure VPN Connection terminated
terminated locally by the client”.
All text messages for concentrator-initiated disconnects begin with “Secure VPN Connection terminated
by Peer X.X.X.X”, where X.X.X.X is the IP address of the concentrator.
The translated reason code or the reason text follows.
The VPN Client replaces the msgina.dll with the VPN Client’s GINA (csgina.dll), and then points to it
so that you can still see and use the MS GINA. When you start your PC and press Ctrl+Alt+Del, you are
launching the VPN Client Dialer application and the MS logon dialog box. The VPN Client detects
whether the necessary Windows services are running and if not, displays a message asking you to wait.
If you look in the VPN Client registry, you see the following parameters and values:
HKLM\Software\Cisco Systems\VPN Client\
GinaInstalled = 1
PreviousGinaPath = msgina.dll
Note When you enable start before logon for the first time, you must reboot for the system to load csgina.
Fallback Mode
In some cases a third-party program replaces the MS GINA, and in some of these cases the VPN Client
works with the third-party program, while in other cases, it does not. The VPN Client maintains a list of
incompatible GINAs that it does not work with, and does not replace the GINA file in use. This is called
fallback mode. The list of incompatible GINAs resides in the vpnclient.ini file, and the VPN Client refers
to the list only during installation. The following entry is an example.
IncompatibleGinas=PALgina.dll,nwgina.dll,logonrem.dll,ngina.dll
In fallback mode, the VPN Client performs differently when start before logon is in use. Instead of
loading when you press Ctrl+Alt+Del, the VPN Dialer loads as soon as the VPN service starts. When
operating in fallback mode, the VPN Client does not check to see if the necessary Windows services have
started. As a result, the VPN connection could fail if initiated too quickly. In fallback mode, when the
VPN connection succeeds, you then press Ctrl+Alt+Del to get to the Microsoft logon dialog box. In this
mode, you see the following VPN Client registry parameters and values:
HKLM\Software\Cisco Systems\VPN Client\
GinaInstalled = 0
PreviousGinaPath = msgina.dll
Incompatible GINAs
If a new problem GINA is discovered after the VPN Client is released, you can add the GINA to the
incompatible GINA list in the vpnclient.ini file. Adding the GINA to this list places it in the
IncompatibleGinas list in the registry when you install the VPN Client and puts the VPN Client into
fallback mode, thus avoiding possible conflicts (see section “oem.ini File Keywords and Values”).
Programmer Notes
This section contains information to aid a programmer in writing programs that perform routine tasks.
To see this entry, bring up the Registry Editor and go to SOFTWARE > Cisco Systems > VPN Client.
(See Figure 8-4.) In the list of entries, you see TunnelEstablished. This entry can have only two values:
1 or 0. If the connection is working, the value is 1; if not, the value is 0.
IKE Proposals
Table 8-3 lists the IKE proposals that the VPN Client supports.
Table 8-4 lists phase 2 proposals that the VPN Client sends.
This chapter describes how to use the Microsoft Windows Installer for the network administrator. For
end user instructions, see Cisco VPN Client for Windows User Guide, Chapter 2. For information on
customizing the VPN Client applications, see “Customizing the VPN Client Using an MSI Transform.”
For installing MSI without user interaction, see “Installing the VPN Client Without User Interaction.”
This chapter includes the following main topics:
Differences Between InstallShield and MSI
Starting the VPN Client MSI
Logging During Installation
InstallShield MSI
Supported on all platforms including Windows Supported only on Windows NT SP6, Windows
9.x 2000, and Windows XP.
Detects and uninstalls an older VPN Client. Detects but does not automatically uninstall an
older VPN Client. Remove previous versions via
Add/Remove programs.
Provides a proprietary installation package and Provides a standard installation package and
customizing process. customizing process.
Silent installation suppresses all dialogs and Silent installation can be customized to include
messages, including errors. error reporting.
Provides no automatic rollback when installation Provides automatic rollback in case of installation
fails. failure; undoes changes to the system made
during attempted installation.
No automatic replacement of deleted or corrupted Automatic replacement of deleted or corrupted
files upon first use files upon first use. Replaces registry keys
associated with shortcuts under Start | Program
Files.
Note For complete documentation on the msiexec.exe command, see Windows Installer version 2.0, Microsoft
Platform SDK, August 2001.
The following command installs the VPN Client and includes a log of all information (*v). It also
specifies sending each line to the log file (!).
msiexec /i vpnclient_en.msi /l*v! vpnclient_msi.log
Example 9-2 Installing via the Executable from the Command Line with Logging
The following command installs the VPN Client and logs all information to a log file.
vpnclient_en.exe /l*v! vpnclient_msi.log
Note You should always include the ! option for logging, since many of the installer events are not recorded
if you do not include this option.
managing 3-3
A
Windows 2000 and Windows XP 3-2
activating an IKE proposal 1-4 AYT firewall policy 1-7
adding an SA 1-4
AppendOriginalSuffix Option parameter 2-16
ApplicationLauncher parameters 2-10
B
authentication BackupServer parameter (.pcf file) 2-22
mutual group backup servers
authentication types 1-20 configured on VPN Concentrator for VPN Client 1-16
types 2-20 Baltimore Technologies 1-5
authentication parameters (.pcf file) 2-21 bitmaps
AuthType parameter (.pcf file) 2-20 setup.bmp 7-2, 7-5
auto initiation 4-5 BlackIce Defender
AutoInitiationEnable (vpnclient.ini) 2-6, 4-3 firewall on remote PC 1-7
AutoInitiationList (vpnclient.ini) 2-7, 4-3 bmp files
AutoInitiationRetryInterval (vpnclient.ini) 2-6, 4-3 for installation 7-2
AutoInitiationRetry IntervalType (vpnclient.ini) 2-7 setup 7-5
AutoInitiationRetryIntervalType (vpnclient.ini) 4-3 branding software
AutoInitiationRetry Limit (vpnclient.ini) 2-7 see customizing VPN Client software
configuring 4-1 brand parameters (oem.ini file) 7-6
connect parameter 4-3 browser proxy configuration 1-17
creating in vpnclient.ini file 4-3 bypassing DHCP server 2-8
examples 4-4
excluding networks from 4-3
parameters 4-1 C
automatic browser configuration Centralized Protection Policy (CPP) 1-6
configuring on VPN Concentrator 1-17 certificate
autoupdating VPN Client software connecting 1-5
creating configuration file 3-6 contents 6-2
creating profile distribution package 3-7 enrolling a CA 6-6
enabling on VPN Concentrator 3-3 enrollment 6-2
how it works 3-8 PKI 1-5
example 6-3
D E
enrolling firewalls
in a PKI 1-5 AYT 1-7
enrolling a CA for certificates 6-2, 6-6 BlackIce Defender 1-7
enrollment keywords 6-7 Cisco Integrated Client 1-6
enroll operation 6-5 Cisco Security Agent 1-7
enroll resume operation 6-6 client/server
Entrust configuring 1-11
Technologies 1-5 configurations
Entrust certificates group 1-11
enabling VPN Client 1-18 matching 1-6
EntrustIni parameter (vpnclient.ini) 2-5 scenarios 1-8
error messages 5-11 CPP 1-6
errors custom 1-12
reporting defining filters and rules 1-10
faultlog.txt file 8-2 Integrity Server 1-7
ESP inbound traffic notifications during negotiations 1-13
stateful firewall 1-6 personal firewall
events enforcement on remote PC 1-7
severity 1 requiring 1-6
faultlog.txt file 8-2 stateful on VPN Client 1-6
excluding networks from auto initiation 4-3 Sygate Personal Firewall 1-7
export operation 6-5 Sygate Personal Firewall Pro 1-7
Sygate Security Agent 1-7
Zone Alarm Firewall 1-7
F
Zone Alarm Pro Firewall 1-7
fallback mode 8-9 ForceNetlogin parameter (.pfc file) 2-26
faultlog.txt file 8-2 formats
files data xii
.bmp 7-2 FQDN (fully qualified domain name) 6-2
.pcf 2-17 fragmentation
.png 7-8 preventing 8-5
oem.ini 7-5
vpnclient.ini 2-2
G
sample 2-3
filters global profile
defining for CPP 1-10 creating 2-2
firewall information 5-7 GroupName parameter (.pcf file) 2-20
GroupPwd parameter (.pcf file) 2-20
GUI parameters 2-12
InstallShield
H
installation differences from MSI 9-1
hash 6-2 setup.bmp file 7-2
HKEY_LOCAL_MACHINE 8-9 silent install 7-16
Host parameter (.pcf file) 2-20 Integrity Server firewall
configuring 1-11
feature description 1-7
I
IP addresses
icons certificate enrollment 2-9
connected.ico 7-10 IPSec group
disconnecting.ico 7-10 creating on VPN Concentrator 1-2
lock 7-4 IPSec log file
unconnected.ico 7-10 troubleshooting firewall configurations 1-12
IKE proposals ISPCommand parameter (.pcf file) 2-21
activating 1-4 ISPConnect parameter (.pcf file) 2-21
list 8-13 ISPConnectType parameter (.pcf file) 2-21
phase 2 8-16
images
K
lock 7-4
import operation 6-5 key size 6-2
incompatible ginas keywords for enrollment operations 6-7
adding 8-9
fallback mode 8-9
start before logon feature 8-8
L
IncompatibleGinas parameter (vpnclient.ini file) 2-5 Legacy IKE Port
initializing VA changing 2-26
changing method 2-7 list operation 6-4
Installation LMHOSTS file 1-16
MSI requirements 9-2 local LAN access
installation configuring 1-14
automatic 7-1 lock image
differences between MSI and Installshield 9-1 in title lines 7-4
installer next to active connection entry 7-9
directory 7-18 logging during MSI installation 9-3
package 7-18 LogLevel parameter 2-8
installing logo.png 7-9
MSI transform 7-15 log parameters (vpnclient.ini) 2-8
InstallPath parameter (oem.ini file) 7-7
SilentMode (oem.ini file) 7-7 distributing with VPN Client software 2-27
AutoInitiationRetryType 2-7
stat 5-6
firewall 5-7
repeat 5-7
reset 5-7
route 5-7
traffic 5-7
tunnel 5-7
verify autoinitconfig 5-5
VPN Concentrator
configuring personal firewalls for VPN Client 1-5
creating user profiles 1-3
VPN Dialer
customizing 7-4
Windows 98
generating system information 8-3
shut down problem 8-5
Windows NT or Windows 2000
generating system information 8-3
WINMSD utility
Windows NT or Windows 2000 8-3
Xauth dialog
password_logo.png 7-9