WebVPN

As discussed in Chapter 16, "Remote Access VPNs," Cisco ASA allows mobile and home users to create a secure WebVPN tunnel to access corporate resources. ASDM allows you to configure and customize the WebVPN service. In this section, Figure 21-32 is used as a reference topology in which a Cisco ASA is being set up to accept the WebVPN connections on the outside interface from the web clients. The inside interface of Cisco ASA in Chicago is directly connected to the 192.168.10.0/24 subnet, while another inside network, 192.168.20.0/24, is behind Router1. The public interface's IP address is 209.165.200.225/27, and the default route sends all traffic to the next-hop router toward the Internet.

Figure 21-32. WebVPN Topology

By setting up WebVPN, SecureMe wants to accomplish the following:

  • Customize the WebVPN page and include SecureMe's name and logo.
  • Allow access to a web server behind Cisco ASA at 192.168.20.10.
  • Allow access to a Telnet server located at 192.168.20.20.
  • Allow access to an e-mail server running the IMAP, POP3, and SMTP services. The server is located at 192.168.20.30.
  • Set up DNS and WINS servers to permit access to the inside hosts by the domain and NetBIOS names.

The following steps guide you through configuring the ASA to meet the preceding objectives:

Step 1.

Enable WebVPN.

The first step in setting up WebVPN is to enable it on the interface that is going to terminate the connections. To configure the WebVPN parameters, choose Configuration > Features > VPN > WebVPN. Figure 21-33 illustrates that WebVPN is being enabled on the outside interface under the WebVPN Access parameter. After you are done, click Apply to commit the changes.
 

Figure 21-33. Enabling WebVPN

 

Note

ASDM and WebVPN are not supported on the same interface.

Step 2.

Customize the look and feel.

To customize the WebVPN homepage, click the Homepage parameter and configure the organization-specific values. In Figure 21-34, the administrator has changed the title of the page to SecureMe WebVPN Service and has formatted the logo of the organization.
 

Figure 21-34. Customizing Look and Feel

 

Step 3.

Set up WebVPN group attributes.

You can configure group policies by choosing Configuration > Features > VPN > General > Group Policy. To set up a new policy, click Add and enter the name of the group policy, as shown in Figure 21-35. The group policy name is SecureMeWebGrp and it is configured as type internal.
 

Figure 21-35. Creating a Group Policy


By default, a new group policy inherits all values from the default group policy, which allows both IPSec and WebVPN as the tunneling protocols. In Figure 21-36, the administrator has disabled policy inheritance for tunneling protocols and has selected WebVPN as the tunneling protocol under the General tab.
 

Figure 21-36. Selecting WebVPN as the Tunneling Protocol


ASDM can restrict users to use certain functions such as port forwarding and Windows file browsing. These functions can be enabled under the WebVPN tab, as shown in Figure 21-37.
 

Figure 21-37. Setting Up WebVPN Functions

 

Step 4.

Set up URL mangling.

Configure URL mangling by creating a URL list. Choose Configuration > Features > VPN > WebVPN > Servers and URLs. Click Add and specify a list name. This list name is later applied to the group policy. Figure 21-38 shows a URL list name called HTTP_link set up to provide URL mangling services to an internal web server at 192.168.20.10. The display name shown on the front web page is Internal.
 

Figure 21-38. Creating a URL List


After you create a list, you map it to a group policy under the WebVPN tab, as shown in Figure 21-39. Click OK to submit these changes.
 

Figure 21-39. Applying the URL List

 

Step 5.

Configure port forwarding.

As discussed in Chapter 16, the port-forwarding feature allows users to gain access to the TCP-based applications over the WebVPN connection. Configure port forwarding under Configuration > Features > VPN > WebVPN > Port Forwarding. To create a new port-forwarding entry, click Add and specify a list name, similar to URL mangling in the previous step. In Figure 21-40, the administrator has set up a list called telnet_inside with the local TCP port of 1100 and the remote TCP port of 23. The server is located at 192.168.20.20 and a description of Telnet Service is added to the entry.
 

Figure 21-40. Creating a Port-Forwarding List


After you create a port-forwarding list, you apply it to the group policy, as shown in Figure 21-41. Click the WebVPN tab and select the list from the drop-down menu under Port Forwarding.
 

Figure 21-41. Applying a Port-Forwarding List

 

Step 6.

Specify WINS and DNS servers.

A WINS server is necessary to resolve NetBIOS names. To set up these servers, choose Configuration > Features > VPN > WebVPN > NetBIOS Servers. As shown in Figure 21-42, ASDM is setting up three NetBIOS servers located at 192.168.20.50, 192.168.20.51, and 192.168.20.52. The first server in the list also acts as a master browser in addition to being a WINS server.
 

Figure 21-42. Setting Up WINS Servers


DNS servers resolve the domain names of the network devices to their configured IP addresses. To specify DNS servers, choose Configuration > Features > Properties > DNS Client. Cisco ASA allows up to six DNS server for name resolution. You have to instruct Cisco ASA which interface to use to send the DNS requests. Figure 21-43 illustrates that two DNS servers, located at 192.168.20.60 and 192.168.20.61, are set up for name resolution on the inside interface. You click Apply to submit the changes to Cisco ASA.
 

Figure 21-43. Setting Up DNS Servers

 

Step 7.

Configure e-mail proxy functionality.

E-mail proxy functionality allows WebVPN users to access e-mail over a secured connection. Cisco ASA supports SMTPS, POP3S, and IMAPS as e-mail protocols. To enable any or all of them, choose Configuration > Features > VPN > E-mail Proxy > Access. You can enable one or all of these protocols per interface, as shown in Figure 21-44, where all three protocols are enabled for the outside interface.
 

Figure 21-44. Enabling E-Mail Proxy


Cisco ASA needs to know where the e-mail server(s) resides. To specify the host name or the IP addresses of the servers, choose Configuration > Features > VPN > E-mail Proxy > Default Servers. Figure 21-45 illustrates that Cisco ASA is being configured for secureme-email as the POP3S, IMAPS, and SMTPS servers using the default TCP ports of 995, 993, and 988, respectively. The DNS server resolves secureme-email as 192.168.20.30.
 

Figure 21-45. Setting Up the E-Mail Proxy Servers

 

Cisco ASA allows the use of three different types of authentication:

  • AAA
  • Piggyback HTTPS
  • Certificate

E-mail authentication methods are configured under Configuration > Features > VPN > E-mail Proxy > Authentication. In Figure 21-46, Cisco ASA is being configured to use AAA authentication for all three supported e-mail protocols.

Figure 21-46. E-Mail Proxy Authentication

Because AAA has been selected as the authentication method, ASDM needs to map an authentication server to the e-mail protocol. In Figure 21-47, a predefined authentication group called Rad, which is using RADIUS authentication, is linked to the protocols. A group policy, called SecureMeWebGrp, is also applied to the e-mail users when they establish a connection using any one of the three e-mail protocols.

Figure 21-47. E-Mail Proxy AAA Servers

Figure 21-48 shows the username and server delimiters for the three supported e-mail protocols, which are set to their default values of colon (:) and at (@), respectively.

Figure 21-48. E-Mail Proxy Delimiters

Example 21-3 shows the complete WebVPN configuration generated by ASDM.

Example 21-3. Complete WebVPN Configuration Created by ASDM

!DNS server configuration for hostname resolution

dns domain-lookup inside

dns name-server 192.168.20.60

dns name-server 192.168.20.61

!URL-List for URL-Mangling

url-list HTTP_link "Internal" http://192.168.20.10

!Port-forward List for Port Forwarding

port-forward telnet_inside 1100 192.168.20.20 telnet Telnet Service

!AAA server configuration for Email Proxy authentication

aaa-server Rad protocol radius

aaa-server Rad host 192.168.20.40

 key cisco123

!Group-policy configuration for WebVPN users

group-policy SecureMeWebGrp internal

group-policy SecureMeWebGrp attributes

!Allowed tunneling protocol is WebVPN

 vpn-tunnel-protocol webvpn

 webvpn

!Allowed functions for WebVPN

 functions url-entry file-access file-entry file-browsing mapi port-forward filter

!URL-List is applied to the group-policy

 url-list value HTTP_link

!Port-forward List is applied to the group-policy

 port-forward value telnet_inside

!WebVPN global configuration

webvpn

!WebVPN is enabled on the outside interface

 enable outside

!WebVPN homepage title and logo are modified

 title SecureMe WebVPN Service

 logo file disk0:/secureme.png

!WINS servers are setup for NetBIOS name resolution

nbns-server 192.168.20.50 master timeout 2 retry 2

nbns-server 192.168.20.51 timeout 2 retry 2

nbns-server 192.168.50.52 timeout 2 retry 2

!Email Proxy for IMAP protocol is setup on the outside interface

imap4s

 enable outside

!Declaration of IMAP Email Server

 server secureme-email

!AAA authentication for IMAP users

 authentication-server-group Rad

 authentication aaa

!Group-policy is applied to the IMAP users

 default-group-policy SecureMeWebGrp

!Email Proxy for POP3 protocol is setup on the outside interface

pop3s

 enable outside

!Declaration of POP3 Email Server

 server secureme-email

!AAA authentication for POP3 users

 authentication-server-group Rad

 authentication aaa

!Group-policy is applied to the POP3 users

 default-group-policy SecureMeWebGrp

!Email Proxy for SMTP protocol is setup on the outside interface

smtps

 enable outside

!Declaration of SMTP Email Server

 server secureme-email

!AAA authentication for SMTP users

 authentication-server-group Rad

 authentication aaa

!Group-policy is applied to the SMTP users

 default-group-policy SecureMeWebGrp


Part I: Product Overview

Introduction to Network Security

Product History

Hardware Overview

Part II: Firewall Solution

Initial Setup and System Maintenance

Network Access Control

IP Routing

Authentication, Authorization, and Accounting (AAA)

Application Inspection

Security Contexts

Transparent Firewalls

Failover and Redundancy

Quality of Service

Part III: Intrusion Prevention System (IPS) Solution

Intrusion Prevention System Integration

Configuring and Troubleshooting Cisco IPS Software via CLI

Part IV: Virtual Private Network (VPN) Solution

Site-to-Site IPSec VPNs

Remote Access VPN

Public Key Infrastructure (PKI)

Part V: Adaptive Security Device Manager

Introduction to ASDM

Firewall Management Using ASDM

IPS Management Using ASDM

VPN Management Using ASDM

Case Studies



Cisco Asa(c) All-in-one Firewall, IPS, And VPN Adaptive Security Appliance
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
ISBN: 1587052091
EAN: 2147483647
Year: 2006
Pages: 231

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net