CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication
html
Company Technology Services Knowledge Base Corporate IT Training Customer Portal Tools
Home Knowledge Base CCIE Security Pursuit CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication
Search
This is a basic CCIE Security lab setup. Diagram and configurations are compatible with Proctor Labs.
Moving your apps to
You can simply paste configs in the proper routers and topology will work. Amazon or
Miscrosoft Clouds?
You can go to http://www.proctorlabs.com/ and purchase rack time. 8 hour slot will be enough to test this configuration.
We can help you analyze your
existing infrastructure, identify
the cost savings we can
Proctor Labs Configurations (POD 108):
achieve by migrating to a cloud
R2 provider. We can then execute
R4 end-to-end migration plan of
your infrastructure and bringing
R5
down your TCO.
R6
ASA1
CAT1
CAT2
CAT3 Ready for IPv6
CAT4 Migration?
PC The Internet is running out of
ACS the equivalent of phone
numbers - familiar problem,
Tasks: non-trivial solution.
1. Configure R6 to be Remote Access VPN Hub. The world has to move to IPv6,
Use local authentication and authorization on R6. with its 128-bit addresses. But
Configure R4 as RA Client. The only interface on R4 that is allowed to initiate communications to R2 L22 is Lo44. that's easier said than done.
1 of 10 12/18/2012 8:32 AM
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication http://www.isrcomputing.com/knowledge-base/ccie-security-pursuit/181-ccie-security-vpn-study-guide-dynamic-vti-local-authentication.html
Who's Online
We have 6 guests and no
members online
R6 configuration uses two (2) ISAKMP profiles. Once for R4 and one for R2. Later in the exercise you will understand why we split
them in two.
R4's ISAKMP profile will be also used by TEST-PC vpn. Since both of the will run client mode, and follow same model we will put
them in VPN_GROUP1.
R6#
conf t
netwoaaa new-model
aaa authentication login LOCALAUTH local
aaa authorization network LOCALAUTH local
aaa authentication login TACAUTH none
aaa authorization network TACAUTH none
username vpnuser1 password 0 cisco123
username vpnuser2 password 0 cisco123
2 of 10 12/18/2012 8:32 AM
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication http://www.isrcomputing.com/knowledge-base/ccie-security-pursuit/181-ccie-security-vpn-study-guide-dynamic-vti-local-authentication.html
3 of 10 12/18/2012 8:32 AM
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication http://www.isrcomputing.com/knowledge-base/ccie-security-pursuit/181-ccie-security-vpn-study-guide-dynamic-vti-local-authentication.html
end
wr mem
R2 will be running in network extension mode which allows host on it's "inside" network to be accessible from the other side of the
VPN tunnel.
R2# conf t
line vty 0 4
privilege level 15
password cisco123
exit
interface GigabitEthernet0/0
description Outside interface
crypto ipsec client ezvpn CLIENT outside
exit
interface GigabitEthernet0/1
description Inside interface
crypto ipsec client ezvpn CLIENT inside
exit
interface Lo22
description Inside interface
crypto ipsec client ezvpn CLIENT inside
exit
end
4 of 10 12/18/2012 8:32 AM
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication http://www.isrcomputing.com/knowledge-base/ccie-security-pursuit/181-ccie-security-vpn-study-guide-dynamic-vti-local-authentication.html
wr mem
#---------------------------------------
#--- Outputs
#---------------------------------------
R2#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
R2#
5 of 10 12/18/2012 8:32 AM
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication http://www.isrcomputing.com/knowledge-base/ccie-security-pursuit/181-ccie-security-vpn-study-guide-dynamic-vti-local-authentication.html
R6#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
R6#
R6#telnet 22.22.22.22 /source-interface Lo66
Trying 22.22.22.22 ... Open
Password: xyz
R2#show users
Line User Host(s) Idle Location
0 con 0 idle 00:00:24
*578 vty 0 idle 00:00:00 66.66.66.66
R2#
R4#
conf t
line vty 0 4
privilege level 15
password cisco123
exit
6 of 10 12/18/2012 8:32 AM
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication http://www.isrcomputing.com/knowledge-base/ccie-security-pursuit/181-ccie-security-vpn-study-guide-dynamic-vti-local-authentication.html
exit
interface Loopback4
crypto ipsec client ezvpn CLIENT inside
exit
interface Loopback44
crypto ipsec client ezvpn CLIENT inside
exit
interface FastEthernet0/0
description Internet Connection
crypto ipsec client ezvpn CLIENT
exit
end
wr mem
#---------------------------------------
#--- Outputs
#---------------------------------------
R4#show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
7 of 10 12/18/2012 8:32 AM
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication http://www.isrcomputing.com/knowledge-base/ccie-security-pursuit/181-ccie-security-vpn-study-guide-dynamic-vti-local-authentication.html
interface: Virtual-Access2
Crypto map tag: Virtual-Access2-head-0, local addr 44.44.4.4
inbound ah sas:
outbound ah sas:
8 of 10 12/18/2012 8:32 AM
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication http://www.isrcomputing.com/knowledge-base/ccie-security-pursuit/181-ccie-security-vpn-study-guide-dynamic-vti-local-authentication.html
R4#
R4#ping 66.66.66.66
9 of 10 12/18/2012 8:32 AM
CCIE Security - VPN Study Guide - Dynamic VTI - Local Authentication http://www.isrcomputing.com/knowledge-base/ccie-security-pursuit/181-ccie-security-vpn-study-guide-dynamic-vti-local-authentication.html
Go to top
Copyright © 2004 - 2011 ISR Computing, Inc. All rights reserved. Valid Sitemap , XHTML and CSS
10 of 10 12/18/2012 8:32 AM