Configuring Cisco Easy VPN and Easy VPN Server Using SDM: Ipsec Vpns
Configuring Cisco Easy VPN and Easy VPN Server Using SDM: Ipsec Vpns
• The VPN client attempts to establish an SA between peer IP addresses by sending multiple
ISAKMP proposals to the Easy VPN Server.
• To reduce manual configuration on the VPN client, these ISAKMP proposals include several
combinations of the following:
– Encryption and hash algorithms
– Authentication methods
– Diffie-Hellman group sizes
Step 3: The Cisco Easy VPN Server
Accepts the SA Proposal
• If the Easy VPN Server is configured for Xauth, the VPN client waits for a
username/password challenge:
– The user enters a username/password combination.
– The username/password information is checked against authentication
entities using AAA.
• All Easy VPN Servers should be configured to enforce user authentication.
Step 5: The Mode Configuration
Process Is Initiated
• If the Easy VPN Server indicates successful authentication, the VPN client requests
the remaining configuration parameters from the Easy VPN Server:
– Mode configuration starts.
– The remaining system parameters (IP address, DNS, split tunneling information,
and so on) are downloaded to the VPN client.
• Remember that the IP address is the only required parameter in a group profile; all
other parameters are optional.
Step 6: The RRI Process Is Initiated
1.
3.
2.
Enabling AAA
2.
1.
Local User Management
3.
2.
1.
Creating Users
1.
2.
7.
3. 8.
4.
5.
6.
Enabling AAA
1.
2.
Starting the Easy VPN Server Wizard
Select Interface for Terminating IPsec
1.
2.
IKE Proposals
IKE Proposals
2.
1.
3.
Transform Set
Transform Set
3.
1.
2.
4.
Group Policy
Configuration
Location
Option 1: Local Router Configuration
1.
2.
Option 2: External Location via RADIUS
1.
2.
Option 2: External Location
via RADIUS (Cont.)
1.
2.
3.
4.
User Authentication
Option 1: Local User Database
1.
2.
3.
Local User Database—Adding Users
1.
6. 2.
3.
4.
5.
Option 2: External User
Database via RADIUS
1.
2.
3.
Local Group Policies
Local Group Policies
General Parameters
1.
2.
3A. 3B.
Domain Name System
1.
2.
Split Tunneling
1.
4.
2.
3.
5.
Advanced Options
1.
3.
4.
2.
Xauth Options
3.
1.
2.
4.
Completing the
Configuration
Review the Generated Configuration
Review the Generated Configuration (Cont.)
Verify the Easy VPN Server Configuration
1.
2.
3.
Verify the Easy VPN
Server Configuration (Cont.)
Monitoring Easy VPN Server
1.
3.
4.
2.
5.
Advanced Monitoring
router#
show crypto isakmp sa
router#
show crypto ipsec sa
• Advanced monitoring can be performed using the default Cisco IOS HTTP server interface.
• Requires knowledge of Cisco IOS CLI commands.
Troubleshooting
router#
debug crypto isakmp
• Debugs IKE communication
router#
debug aaa authentication
• Debugs user authentication via local user database or RADIUS
router#
debug aaa authorization
• Debugs IKE Mode Config
router#
debug radius
• Debugs RADIUS communication