Migrating to ASA 7.2 for VPN 3000 Concentrator Administrators
Getting Started
Downloads: This chapterpdf (PDF - 234.0KB) | Feedback

Getting Started

Table Of Contents

Getting Started

Quick Configuration Tasks and Counterparts in ASDM

Configuring a VPN Tunnel Using the VPN Wizard

Gathering Information

Site-to-Site VPN Tunnels

Remote Access Using Locally Stored User Accounts

Remote Access Using AAA Server Group for Client Authentication

Running the VPN Wizard

Saving the Configuration

Displaying the Configuration

Using ASDM to Learn the CLI


Getting Started


This chapter provides an overview of the VPN 3000 Concentrator's Quick Configuration program and describes where to go in the ASDM to configure the counterpart features. Following the outline of configuration tasks, this chapter lists the information needed to run the VPN wizard to configure site-to-site and remote access tunnels.

Quick Configuration Tasks and Counterparts in ASDM

Table 3-1 describes the following configuration tasks and where to perform these tasks in ASDM.

Configuring IP interfaces

Configuring system information

Configuring tunneling protocols and options

Configuring an address management method

Configuring authentication

Configuring an internal server user database

Configuring IPSec groups

Configuring an administrator password

Table 3-1 Getting Started Tasks

VPN 3000 Quick Configuration Tasks
ASA Counterpart

Configuring IP interfaces

Enter the IP address and subnet mask for private and public ethernet connections. Optionally, enter addresses for the external interface.

Enable/disable

DHCP Client/system name

Static IP addressing (IP addr/subnet mask)

Type of interface (public or private)

MAC address

Filter

Speed

Duplex

MTU

Go to Configuration > Interfaces.

Add/Edit

Select Hardware Port

Check Enable Interface

Enter:

VLAN ID

Sub-interface ID

Interface Name

Security Level

Source of IP Address: Static IP or DHCP

IP Address

Subnet Mask

MTU

Click Configure Hardware Properties...

Select Duplex type: Full, Half, Auto

Select Speed 10, 100, Auto

Optionally enable traffic between two or more interfaces configured with the same security levels.

Configuring system information

System hostname

Time and date

DNS server information (IP address, Internet domain name, default gateway)

Go to Configuration > Properties > Device Administration > Device.

Enter host name and domain name.

Go to Configuration > Properties > Device Administration > Clock to enter time and date.

Go to Configuration > Properties > DNS Client.

Add Servers (up to 6).

Enter timeout in seconds.

Enter number of retries.

Enable DNS lookup on interfaces.

Configuring tunneling protocols and options

PPTP -- encryption option

L2TP -- encryption option

IPSec (allows remote access only. Can't do site-to-site through QC)

To define Tunnel Groups go to Configuration > VPN > General > Tunnel Group.

Two default tunnel groups for IPSec:

DefaultL2LGroup for LAN-to-LAN

DefaultRAGroup for Remote Access

Configuring address management method

Client specifies its own IP address.

Assign IP addresses per user (use auth server).

Use DHCP (specify server address or name).

Configure a pool (start/end ranges).

Go to Configuration > VPN > IP Address Management > Assignment.

Choices:

Use address from authentication server.

Use DHCP.

Use internal address pools.

Configure IP address pools under Configuration > VPN > IP Address Management > IP Pools.

Configuring authentication

Choose a server type: internal, RADIUS, NTDomain, SDI, Kerberos/Active Directory.

Fill in information for selected authentication server. Each has its own screen.

Go to Configuration > Properties > AAA Setup.

Add server groups.

Add servers to server groups.

Configure authentication prompts.

Configuring internal server user database

Enter user information:

User name

Password

Verify password

IP address (if per-user address assignment)

Subnet mask

Go to Configuration > Properties > Device Administration > User Accounts.

Add user account and enter information:

Under Identity:

Username

Password

Confirm Password

Privilege Level

Under VPN Policy (specify or check inherit if from group policy)

Group Policy (previously defined)

Tunneling Protocols

Filter

Tunnel Group Lock

Store Password on Client System

Connection Settings

Dedicated IP address (optional)

Configuring IPSec group

Group name

Password

Verify

Go to Configuration > VPN > General > Tunnel Group.

Add tunnel group of IPSec type.

Configuring administrator password

Go to Configuration > Properties > Device Administration > Password.

Testing the VPN Connection steps

 

Configuring a VPN Tunnel Using the VPN Wizard

The VPN wizard lets you configure a site-to-site or remote access VPN tunnel from the ASA to either another VPN device or a remote client user. You can use the wizard to define new VPN configurations only. Once you have configured a VPN tunnel using the wizard, you can edit it by using the ASDM features, especially in the Configuration > Features > VPN section.

Gathering Information

Before you launch the VPN wizard, gather the information needed to configure the VPN tunnel. To do so, use the section that names the tunnel type you want to configure.

Site-to-Site VPN Tunnels

Remote Access Using Locally Stored User Accounts

Remote Access Using AAA Server Group for Client Authentication

Site-to-Site VPN Tunnels

When you configure a site-to-site VPN tunnel using the VPN wizard, you need to have the following information before you begin.


Note When recording these values, take note of the associated number. These numbers mirror the step numbers that appear in the VPN Wizard that you run after assembling this data.


1. VPN Tunnel Type

Interface for the site-to-site VPN tunnel (for example, "inside" or "outside")—Before you can configure a VPN tunnel, you configure interfaces for the security appliance. When you configure the tunnel, you select an interface to associate with the VPN tunnel you are configuring.

2. Remote Site Peer

IP address of peer device at the other end of the tunnel

Optional name for the tunnel group (which defaults to the peer's IP address)

Authentication type (preshared key or digital certificate). You also need one of the following:

If preshared, the name of the key.

If digital certificate, the certificate signing algorithm (RSA or DSA), and the name of the trustpoint.

See "Key Pairs" for the differences between the RSA and DSA algorithm.

A trustpoint is a representation of a CA or identity pair. A trustpoint contains the identity of the CA, CA-specific configuration parameters, and an association with one enrolled identity certificate.


Note If you choose the digital certificate authentication type, configure the trustpoints (see the "Creating the Trustpoint" section) before running the VPN wizard.


3. IPSec Phase 1 Internet Key Exchange Security Association policy to be used to negotiate the tunnel, which consists of the following:

Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.

Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.

Diffie Hellman Group, which must be the same for both devices—group 1, group 2, group 5, or group 7. The default is group 2.

4. IPSec Phase 2 Encryption and Authentication policy to be applied to the VPN tunnel. The parameters and options consist of the following:

Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.

Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.

5. Local Hosts and Networks—Hosts and networks at the local site of the IP connection. You have the following options for specifying the hosts and networks at the local site of the IP connection:

IP address. You need the following information if you choose this option:

Interface name—The interface, such as "inside" or "outside," to which the host is connected.

IP address—Any, the address of a specific local host, or a subnet. If you choose any, the IP address and subnet mask become 0.0.0.0.

Subnet mask—Values range from 255.255.255.255 to 0.0.0.0.

Name of the host already present in the ASA configuration.

Group containing lists of networks or hosts to protect. You need the following information if you choose this option:

Name of the host already present in the ASA configuration.

Name of the group already present in the ASA configuration.


Note To configure host/networks group names, go to Configuration > Global Objects > Hosts/Networks.


6. Remote hosts and networks—Hosts and networks at the remote site of the IP connection.

The options are the same as those for the local hosts and networks.

After preparing the information described in this section, go to "Running the VPN Wizard."

Remote Access Using Locally Stored User Accounts

Prepare the following information for a remote access VPN tunnel requiring login accounts to be stored in the ASA configuration:


Note When recording these values, take note of the associated number. These numbers mirror the step numbers that appear in the VPN Wizard.


1. VPN Tunnel Type

Interface for the site-to-site VPN tunnel (for example, "inside" or "outside")—Before you can configure a VPN tunnel, you configure interfaces for the security appliance. When you configure the tunnel, you select an interface to associate with the VPN tunnel you are configuring.

2. Remote Access Client

Use the default setting (Cisco VPN Client, Release 3.x or higher, or other Easy VPN Remote product) to specify the type of VPN client supported for tunnels to this ASA. This release does not support other options.

3. VPN Tunnel Group Name and Authentication Method

Name for the tunnel group to be used for both the remote clients and the ASA. The group name specifies common connection and client settings to be specified in the next steps.

Authentication type (preshared key or digital certificate). You also need one of the following:

If preshared, the name of the key.

If digital certificate, the certificate signing algorithm (RSA or DSA), and the name of the trustpoint.

See "Key Pairs" for the differences between the RSA and DSA algorithm.

A trustpoint is a representation of a CA or identity pair. A trustpoint contains the identity of the CA, CA-specific configuration parameters, and an association with one enrolled identity certificate.


Note If you choose the digital certificate authentication type, configure the trustpoints (Configuration > Properties > Certificate > Trustpoint) before running the VPN wizard.


4. Client Authentication, which provides a choice of one of the following options:

Authenticate using the local (internal) user database

This option lets you populate the ASA configuration with user accounts.

Authenticate using an AAA server group

This option let you select an AAA server group to handle client authentication. Go to this same step in the next section if you choose this option.

5. User Accounts

If you chose "Authenticate using the local (internal) user database," list the login name and respective password for each user to be inserted into the local database.

6. Address Pool

You can select the name of an IP address pool already present in the ASA configuration or specify a new one. If you specify a new one, you need a new pool name, the associated IP address range, and optionally a subnet mask.

7. (Optional) Attributes Pushed to Client

You can choose to push the following attributes to the VPN client when it connects:

IP addresses of primary and secondary DNS servers

IP addresses of primary and secondary WINS servers

Default domain name

8. IPSec Phase 1 Internet Key Exchange Security Association policy to be used to negotiate the tunnel, which consists of the following:

Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.

Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.

Diffie Hellman Group, which must be the same for both devices—group 1, group 2, group 5, or group 7. The default is group 2.

9. IPSec Phase 2 Encryption and Authentication policy to be applied to the VPN tunnel. The parameters and options consist of the following:

Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.

Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.

10. (Optional) Address Translation Exemption and Split Tunneling

Hosts and networks in the internal network to expose to authenticated remote users of the VPN. Specify none to expose the entire internal network to authenticated remote users in the tunnel, or specify the internal addresses to expose to them and leave Network Address Translation to hide the remainder. You have the following options for specifying the internal addresses of the hosts and networks at the local site of the IP connection:

IP address. You need the following information if you choose this option:

Interface name—The interface, such as "inside" or "outside," to which the host is connected.

IP address—Any, the address of a specific local host, or a subnet. If you choose any, the IP address and subnet mask become 0.0.0.0.

Subnet mask—Values range from 255.255.255.255 to 0.0.0.0.

Name of the host already present in the ASA configuration.

Group containing lists of networks or hosts to protect. You need the following information if you choose this option:

Name of the host already present in the ASA configuration.

Name of the group already present in the ASA configuration.


Note To configure host/networks group names, go to Configuration > Global Objects > Hosts/Networks.


Split Tunneling—enable to provide VPN users with unencrypted access to the Internet, or leave disabled.


Note If you enable split tunneling, the hosts identified above also serve as the split tunnel access list.


After preparing the information described in this section, go to "Running the VPN Wizard."

Remote Access Using AAA Server Group for Client Authentication

Prepare the following information for a remote access VPN tunnel requiring client authentication using a AAA server group:


Note When recording these values, take note of the associated number. These numbers mirror the step numbers that appear in the VPN Wizard.


1. VPN Tunnel Type

Interface for the site-to-site VPN tunnel (for example, "inside" or "outside")—Before you can configure a VPN tunnel, you configure interfaces for the security appliance. When you configure the tunnel, you select an interface to associate with the VPN tunnel you are configuring.

2. Remote Access Client

Use the default setting (Cisco VPN Client, Release 3.x or higher, or other Easy VPN Remote product) to specify the type of VPN client supported for tunnels to this ASA. This release does not support other options.

3. VPN Tunnel Group Name and Authentication Method

Name for the tunnel group to be used for both the remote clients and the ASA. The group name specifies common connection and client settings to be specified in the next steps.

Authentication type (preshared key or digital certificate). You also need one of the following:

If preshared, the name of the key.

If digital certificate, the certificate signing algorithm (RSA or DSA), and the name of the trustpoint.

See "Key Pairs" for the differences between the RSA and DSA algorithm.

A trustpoint is a representation of a CA or identity pair. A trustpoint contains the identity of the CA, CA-specific configuration parameters, and an association with one enrolled identity certificate.


Note If you choose the digital certificate authentication type, configure the trustpoints (Configuration > Properties > Certificate > Trustpoint) before running the VPN wizard.


4. Client Authentication, which provides a choice of one of the following options:

Authenticate using the local (internal) user database

This option lets you populate the ASA configuration with user accounts. Continue with Step 5 in the previous section if you choose this option.

Authenticate using an AAA server group

If you choose this option, select the name of an AAA server group you already added to the configuration or create a new one. The Configuration > Properties > AAA Setup path lets you examine and manage the AAA server configuration. The Client Authentication panel in the VPN Wizard that provides these authentication options also provides a New button that lets you create a AAA server group. If you choose this option, be ready to give the group a name, choose an authentication protocol (RADIUS, TACACS+, SDI, NT, or Kerberos), specify the IP address of the server, choose the interface (such as "inside" or "outside," and specify the server secret key.

5. Address Pool

You can select the name of an IP address pool already present in the ASA configuration or specify a new one. If you specify a new one, you need a new pool name, the associated IP address range, and optionally a subnet mask.

6. (Optional) Attributes Pushed to Client

You can choose to push the following attributes to the VPN client when it connects:

IP addresses of primary and secondary DNS servers

IP addresses of primary and secondary WINS servers

Default domain name

7. IPSec Phase 1 Internet Key Exchange Security Association policy to be used to negotiate the tunnel, which consists of the following:

Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.

Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.

Diffie Hellman Group, which must be the same for both devices—group 1, group 2, group 5, or group 7. The default is group 2.

8. IPSec Phase 2 Encryption and Authentication policy to be applied to the VPN tunnel. The parameters and options consist of the following:

Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.

Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.

9. (Optional) Address Translation Exemption and Split Tunneling

Hosts and networks in the internal network to expose to authenticated remote users of the VPN. Specify none to expose the entire internal network to authenticated remote users in the tunnel, or specify the internal addresses to expose to them and leave Network Address Translation to hide the remainder. You have the following options for specifying the internal addresses of the hosts and networks at the local site of the IP connection:

IP address. You need the following information if you choose this option:

Interface name—The interface, such as "inside" or "outside," to which the host is connected.

IP address—Any, the address of a specific local host, or a subnet. If you choose any, the IP address and subnet mask become 0.0.0.0.

Subnet mask—Values range from 255.255.255.255 to 0.0.0.0.

Name of the host already present in the ASA configuration.

Group containing lists of networks or hosts to protect. You need the following information if you choose this option:

Name of the host already present in the ASA configuration.

Name of the group already present in the ASA configuration.


Note To configure host/networks group names, go to Configuration > Global Objects > Hosts/Networks.


Split Tunneling—enable to provide VPN users with unencrypted access to the Internet, or leave disabled.


Note If you enable split tunneling, the hosts identified above also serve as the split tunnel access list.


After preparing the information described in this section, go to "Running the VPN Wizard."

Running the VPN Wizard

To run the VPN wizard, follow these steps:


Step 1 Go to Wizards > VPN Wizard.

Step 2 Select the type of tunnel to set up: Site to Site or Remote Access.

Step 3 Select Inside or Outside next to the VPN Tunnel Interface.

Step 4 Click Next and follow the instructions in the VPN wizard. For more information, click Help.

Saving the Configuration

As you work, remember to save the changes to Flash memory to retain them, as follows:

ASDM—Select File > Save Running Configuration to Flash.

CLI—Enter the write memory command.

Displaying the Configuration

You can enter either of the following commands to display the current configuration settings:

hostname# show config

Enter this command to show the startup configuration saved to flash memory.

hostname# show running-config

Enter this command to show the operating configuration.

hostname# show running config all

Enter this command to show the operating configuration including attributes that have default values.


Note The first two commands are equivalent if you have saved the configuration changes you made.


You can also type show run ? to display a detailed list of the show configuration commands you can enter to retrieve a more refined list.

Using ASDM to Learn the CLI

The ASDM Options > Preferences window provides a "Preview commands before sending to the device" option. If you enable this option, ASDM displays the equivalent CLI commands in the Preview CLI Commands window whenever you click Apply.

View the commands, click OK, and then click Proceed in the confirmation window to save the changes to the running configuration.