In-depth Configuration Information

Throughout the configuration of groups and users, selections were made from pre-defined lists contained in fields and drop-down boxes. Several of those lists can be modified or defined in the concentrator menus. The following sections look into how those particular list options are created or modified.

graphics/tip_icon.gif

In practice, it is most appropriate to configure these options before the actual configuration of users and groups.


IPSec Security Association Activation

In the user and group configurations, you could define the type of IPSec and IKE security associations for remote access clients. The Cisco VPN 3000 Concentrator series has several common security associations active in the drop-down menu of the IPSec Parameters tab. If the attaching clients require different security associations, additional associations must be created. In some instances, it might also be necessary to define or activate IKE proposals to be assigned to these security associations. To avoid putting the cart before the horse, first consider an example in which the IKE proposal needs to be defined, followed by another in which that IKE proposal is applied to a security association.

Figure 4.15 depicts the IKE Proposal screen located at the Configuration | System | Tunneling Protocols | IPSec | IKE Proposals menu of the Concentrator Manager. Here you can either modify, create, or delete an IKE proposal. In addition, you can also prioritize the IKE proposals that are checked during IKE Phase 1 by moving a selected proposal up or down.

Figure 4.15. Group Definition screen.

graphics/04fig15.gif

If you decide to modify or add an IKE proposal, a subsequent screen is displayed in which you have to define the following IKE parameters:

  • Proposal Name Identify the proposal with a unique name that will be populated in the list.

  • Authentication Mode Here you can determine whether the IKE phase 1 authentication is to utilize preshared keys or RSA/DSA digital certificates. You can also choose a variant of these options that requires Extended Authentication (XAUTH) for user-based authentication.

  • Authentication Algorithm You can determine whether this proposal utilizes MD5 or SHA-1 for a packet authentication algorithm.

  • Encryption Algorithm To secure the tunnel for subsequent IKE communications, you must select either DES, 3DES, or AES for an encryption algorithm.

  • Diffie-Hellman Group After an encryption algorithm is chosen, a respective Diffe-Hellman group is automatically chosen. To change the value, select from Diffe-Hellman groups 1, 2, 5, and 7, depending on your security requirements.

  • Lifetime Measurement The lifetime of this IKE SA is defined here by data bits, seconds, or both.

  • Data Lifetime The amount of data in kilobytes until a new SA key needs to be renegotiated.

  • Time Lifetime The amount of time in seconds until a new SA key needs to be renegotiated.

After the IKE proposal has been created and activated, the next step is to add it to a security association. At the Configuration | Policy Management | Traffic Management | Security Associations screen, you can add, modify, and delete security associations. Figure 4.16 displays the Add/Modify screen that enables you to define the parameters for an SA.

Figure 4.16. Group Definition screen.

graphics/04fig16.gif

The security association process begins similarly to the IKE proposal in which a name has to be defined for the SA. The "Inheritance" attribute enables you to utilize a single tunnel with multiple hosts, versus multiple tunnels for each pair of addresses for this particular SA.

Following these general parameters, the Security Association Add/Modify page lets you define the IPSec SA elements in phase 2 of IKE negotiation. Here you can determine the type of packet authentication and encryption strength, as well as whether ESP is going to operate in tunnel mode or transparent mode. You can also enable something called Perfect Forward Secrecy (PFS), which disables an attacker's ability to discover a new or prior session key if he happens to learn of a session key. This property, which is established during quick mode in IKE phase 2, entails both peers recalculating another Diffie-Hellman secret key in case the IKE phase 1 DH key was compromised. The Diffie-Hellman key exchange can be utilized with varying encryption strengths for the IKE phase 2 session key regeneration. The default is to have this disabled, which entails using a session key based upon the phase 1 keys. Also comparable to the IKE activation, you can also define the lifetime of the IPSec SA in seconds, kilobytes, or both.

The bottom of the Security Association page is designated for IKE phase 1 parameters. The first field is used to specify the remote gateway address for LAN-to-LAN connections. If this SA is primarily used for remote access, then this field can be ignored. In the Negotiation field you can determine whether this security association uses Main Mode or Aggressive Mode for IKE Phase 1 establishment. Here you can also define the method in which peer authentication is managed. The default is to use preshared keys as opposed to digital certificates. In instances where digital certificates is the chosen attribute, you can further define whether the concentrator sends additional certificates to validate your identity certificate (discussed in the next chapter). The final parameter to define the security association is to select the IKE proposal that was created and activated in the previous steps.

Network Lists

Recall that in the Client Config tab you can specify networks in which you either allow or disallow split tunneling. This section illustrates how to define those network lists.

After you navigate to the Configuration | Policy Management | Traffic Management | Network Lists page, you are given the standard options of creating, modifying, or deleting the network list. After clicking on the Add button, you are presented with a screen that is depicted in Figure 4.17. Here you can define a name for the list (The Farm), followed by the actual definition of the networks. In the field provided for the network lists, add the network, followed by the wildcard subnet mask on each line. Recollect that the wildcard mask is the inverse of a subnet mask, in which 0s represent a match and 1s mean to ignore the corresponding bit in the IP address. For our example, to create a list for network 10.2.2.0 255.255.255.0, then the syntax to enter it in the list is 10.2.2.0/0.0.0.255. After this network list is defined, it can be applied in the split tunneling policy to define which network the Cisco Unity Client will encrypt and send over the tunnel.

graphics/tip_icon.gif

The VPN Concentrator automates network list configuration by utilizing the "Generate Local List" button. This utility automatically adds the first 200 reachable private interface networks in the routing table to the network list.


Access Hours

From the example, in the General tab, recall that Mr. Ed was restricted to remote access connectivity during business hours. These business hours, which are based on Monday Friday from 9 a.m. to 5 p.m., are pre-configured access hour entries. If you need to create or modify the existing times, the Configuration | Policy Management | Access Hours | Add/Modify page enables you to customize access hours to match your company's schedule.



CSVPN Exam Cram 2 (Exam 642-511)
CCSP CSVPN Exam Cram 2 (Exam Cram 642-511)
ISBN: 078973026X
EAN: 2147483647
Year: 2002
Pages: 185

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net