[an error occurred while processing this directive]

Support

VPN Client Tunnels

Hierarchical Navigation

Downloads

 Feedback

Table Of Contents

VPN Client Tunnels

VPN Group Configuration Dialog Box

Current VPN Group

New

Rename

Delete

VPN Group Configuration General Tab

Bind To

Max Connections

Keep Alive Interval

Inactivity Timeout

Minimum Client Version

Allow L2TP

Allow PPTP

Encrypt Method

Exclude Local LAN

SLA Enable Client

Tunnel NetBT

VPN Group Configuration IKE Configuration Tab

Transform

Perfect Forward Secrecy

Save Secrets

Authentication

Encryption

VPN Group Configuration Manual Tab

Encryption Method

VPN Group Configuration IP Connection Tab

Start IP Address

Local IP Net

Assign IP Radius

Allow Connections To

Add

Edit

Remove

VPN Group Configuration IP Filters Tab

Input Filters

Output Filters

VPN Group Configuration IPX Connection Tab

Local IPX Net

Block Type 20

Assign IPX Radius

VPN Group Configuration IPX Filters Tab

Input Filters

Output Filters

VPN Group Configuration Rollover Tab

Alternate VPN 5000 Concentrator Addresses

VPN Group Configuration SecurID Tab

SecurID Required

SecurID User Name

VPN Group Configuration DNS Redirection Tab

Primary Server

Secondary Server

Split Server

Local Domain Names

VPN Group Configuration WINS Redirection Tab

Primary Server

Secondary Server

VPN User Configuration Dialog Box

VPN User

Name

VPN Group

IKE Shared Key

STEP/STAMP Authentication Secret

STEP/STAMP Encryption Secret

IKE Policy

Allowed Authentication Protocol for PPTP Client Connections

IPsec Gateway Dialog Box

IPsec Gateway


VPN Client Tunnels


VPN Group Configuration Dialog Box

To access this dialog box (Figure 7-1), select VPN Group Configuration from the Device View.

Figure 7-1 VPN Group Configuration Dialog Box and General Tab

This dialog box displays and allows editing of all VPN Group Configurations for an VPN 5000 concentrator. VPN group configurations define tunneling profiles for a group of one or more VPN 5000 concentrator users.

Table 7-1 lists the maximum number of VPN group configurations allowed per device type.

Table 7-1 Maximum VPN Group Configurations

.

Device Type
Maximum Number of VPN Groups

Cisco VPN 5001 Concentrator

100

Cisco VPN 5002 Concentrator

Cisco VPN 5008 Concentrator

1,000

1,000


Current VPN Group

This edit box allows a VPN group configuration to be selected. Any changes made in the tab windows will be stored to the selected group configuration.

New

Clicking on this button will bring up a dialog box which allows the creation of a new group configuration.

Rename

Clicking on this button will bring up a dialog box to allow the currently selected VPN group configuration to be renamed.

Delete

Clicking on this button will delete the presently selected group configuration.

VPN Group Configuration General Tab

Bind To

This drop-down menu allows the selection of an interface on the device. The interface selected will act as the local end point for the tunnels defined by this configuration.

Some VPN devices may only have one interface available for this function. In this case, the pull-down will not have any other choices available.

Max Connections

This is the maximum number of simultaneous client connections using this configuration which will be allowed by the device.

This setting can be used to limit the number of connections for certain classes of users by assigning users to different group configurations. This number may not exceed the maximum number of tunnel connections supported by the device. If the sum of the Max Connections for all VPN Group sections exceeds the maximum number of tunnel connections supported by the device, tunnel connections will be served on a first-come, first-served basis.

Keep Alive Interval

This is the number of seconds between keep-alive packets sent to each connected client by the device.

Clients which do not answer these packets and/or generate other traffic within several keep-alive intervals will have their connections shut down.

Keep-alive packets are only sent in the case where no other traffic has been received from the client in the specified number of seconds.

Inactivity Timeout

This is the number of seconds the device will wait without receiving any traffic from a client belonging to this VPN Group configuration before ending the tunnel session.

Keep-alive packets and ICMP (ping) traffic do not affect this timeout. This prevents users from using ping to keep their tunnels up. The range is 1 to 65535 seconds. The default of 0 seconds means there is no timeout.

Minimum Client Version

This places a limit on the VPN Client Software version number which will be allowed.

A value of 0 or 1 will allow any software version number.

A value of 2 will prevent older STAMP Clients from having access.

A value of 3 will prevent both older STAMP Clients and any other Clients with version numbers less than 3.0.

A value greater than three will prevent all clients from having access.

Allow L2TP

This checkbox enables L2TP connections for client sessions using this configuration.

Allow PPTP

PPTP is currently not supported.

Encrypt Method

This pulldown menu specifies which encryption method will be used for PPTP clients. PPTP is currently not supported.

Exclude Local LAN

This checkbox specifies whether remote client LAN traffic will be tunneled.

If checked, remote LAN traffic will not be tunneled when a wildcard of 0.0.0.0/0 has been used as the Local IPNet specified on the IP Connection Tab.

The user login in the VPN Client software must also have the Exclude Local LAN from Tunnel checkbox checked.

SLA Enable Client

This checkbox specifies that Service Level Agreement (SLA) information will be gathered for tunnel sessions using this VPN Group Configuration. SLA measures the speed of traffic across the tunnel and can be used to ensure that service guarantees are met.

SNMP is used to display the gathered information. This requires that SNMP be enabled in the Advanced SNMP dialog box. Refer to "General Configuration Windows," for more information on SNMP Configuration.

Tunnel NetBT

If this box is checked, all traffic using Microsoft's networking protocol, Windows NetBT, will be tunneled.

VPN Group Configuration IKE Configuration Tab

To access this dialog box (Figure 7-2), click the IKE Configuration tab in the VPN Group Configuration dialog box.

Figure 7-2 VPN Group Configuration IKE Configuration Tab

Transform

This specifies the protection types and algorithms that will be used for IKE tunnel sessions for this group configuration. Each option is a protection piece which specifies authentication and/or encryption parameters.

Use the Move Up and Move Down buttons to arrange the priority of the protection options.

Perfect Forward Secrecy

Perfect Forward Secrecy (PFS) allows you to add an additional security parameter to tunnel sessions. PFS means that every time encryption and/or authentication key are computed, a new Diffie-Hellman Key Exchange is included.

Diffie-Hellman Key Exchange uses a complex algorithm and public and private keys to encrypt and then decrypt tunneled data. Adding PFS to a tunneled session greatly increases the difficulty of finding the session keys used to encrypt a VPN session. It also means that even if the keys are somehow cracked, only a portion of the traffic is recoverable.

If No PFS is selected, this security parameter will not be added for this group configuration.

If Phase 1 Group is selected, the group used in Phase 1 of the IKE negotiation is used as the group for the PFS Diffie-Hellman Key Exchange. This group is set (as G1 or G2) in the IKE Policy dialog box. The IKE Policy dialog box is discussed later in this chapter.

If DH Group 1 is selected, the Diffie-Hellman Group 1 algorithm will be used for the Diffie-Hellman Key Exchange.

If DH Group 2 is selected, the Diffie-Hellman Group 2 algorithm will be used for the Diffie-Hellman Key Exchange. Because larger numbers are used by the DH Group 2 algorithm, it is more secure than DH Group 1.

If DH Group 5 is selected, the Diffie-Hellman Group 5 algorithm will be used for the Diffie-Hellman Key Exchange. DH Group 5 uses 1535-bit encryption.

Save Secrets

This checkbox allows all users assigned to this particular VPN Group Configuration to save their shared secret to disk. If checked, users in this Group will not be prompted for their secret after the first session.

To add, edit, or remove a Transform, you must access the IKE Configuration dialog box by selecting the Add..., Edit..., or Remove... buttons on the IKE Configuration tab of the VPN Group Configuration dialog box (Figure 7-3).

Figure 7-3 IKE Configuration Dialog Box

Authentication

This set of checkboxes specifies the authentication algorithm to be used for the tunnel session. MD5 is the Message-Digest 5 hash algorithm. SHA is the Secure Hash Algorithm.

Choosing either of the top two checkboxes means that the Encapsulating Security Payload (ESP) header will be used to encrypt and authenticate packets.

Choosing either of the bottom two checkboxes specifies that the Authentication Header (AH) will be used to authenticate packets.

Encryption

This set of checkboxes specifies the encryption algorithm to be used for the tunnel session.

DES (Data Encryption Standard) uses a 56-bit key to scramble the data. 3DES uses three different keys and three applications of the DES algorithm to scramble the data.

You may choose only one authentication and one encryption method. The default setting of ESP (MD5,DES) is recommended for most setups.

VPN Group Configuration Manual Tab

To access this dialog box (Figure 7-4), click the Manual tab in the VPN Group Configuration dialog box.

Figure 7-4 VPN Group Configuration Manual Tab

Encryption Method

This drop-down menu allows the selection of the encryption algorithm for non-IKE client sessions for this group configuration.

If None is selected, the tunnel session will be sent in the clear in both directions.

If Fixed is selected, Personal Level Encryption will be used to scramble the data using a fixed key.

If PLE is selected, Personal Level Encryption will be used to scramble the data using a key generated from the encryption secret.

If DES56 is selected, the DES algorithm will be used. DES provides better security than PLE, but also requires more time to compute.

If 3DES is selected, the Triple DES algorithm will be used. In Triple DES, the data is processed three times, each time with a different 56-bit key.

PLE, DES56 and 3DES all require that an Encryption Secret be configured for each user in the VPN Users dialog box. Some VPN devices may not allow 3DES as an option.

VPN Group Configuration IP Connection Tab

To access this dialog box (Figure 7-5), click the IP Connection tab in the VPN Group Configuration dialog box.

Figure 7-5 VPN Group Configuration IP Connection Tab

Start IP Address

The Start IP Address specifies the first IP address to be assigned to client sessions under this configuration. This start address will be incremented by one for each new client session, until the Max Connections limit (specified using the General Tab) is reached. The IP address is freed when the client is finished.

Each of the addresses thus generated must be a valid, unique, and unused IP address. Also, these addresses must not conflict with any networks specified in other VPN Group configuration or with any other IP address within the server.

These addresses must be on the internal TCP/IP network (i.e., for an VPN 5000 concentrator, on the same network as Ethernet 0 or a subinterface thereof).

There is no default value for the Start IP Address or Local IP Net. In order for IP-in-IP tunneling to operate with this VPN Group configuration, a group of local IP addresses must be set. Use the Start IP Address, the Local IP Net, or configure a Radius server to serve the addresses (see the "Assign IP Radius" section).

Local IP Net

This edit box sets the local network or subnet to be assigned to client sessions under this configuration. For each new client session, an available IP address from this network or subnet is assigned to that session, until the Max Connections limit (specified using the General tab) is reached. The IP address is freed when the client session is finished.

This network or subnet must be unused and completely unique in the IP network to which the concentrator is connected (i.e., not part of any Class C network in use) and may not conflict with address ranges specified in other group configurations. The mask may be between 8 and 30 bits.

The address should be entered as four decimal numbers separated by periods (e.g. 198.238.9.1). The part of this address which identifies the network segment is determined by the size of the mask, specified in bits.

If Local IP Net is selected, either a dynamic routing protocol or static routes must be configured into the controlling router (e.g., the firewall) in order for traffic to find the Local IP Net.

Assign IP Radius

This checkbox specifies whether a RADIUS server can be used to assign IP addresses to VPN users.

If checked, communication with a RADIUS server must be configured, and be set up to serve the IP addresses.

If left unchecked, IP addresses will be assigned using the address pool specified by either the Start IP Address or the Local IP Net.

For more information on RADIUS configuration, see"General Configuration Windows."

Allow Connections To

This scrolling list displays the IP networks which the client will be told are reachable via the tunnel.

Any communications with an address which is part of one of the networks in the list will be tunneled. Communications with any other addresses will occur normally, without tunneling.

Add

Clicking on this button will bring up a dialog box (Figure 7-6), which allows an IP network address and mask size to be entered.

Figure 7-6 Add IP Address Dialog Box

The part of this address which identifies the network segment is determined by the size of the mask, specified in bits. For example, an entry of 192.168.32.0/19 would specify that traffic with all IP addresses from 192.168.32.1 through 192.168.63.255 will be tunneled. As a special case, the entry, 0.0.0.0/0, specifies that all IP traffic should be tunneled. To tunnel to only a single host, specify 32 in the bits portion.

Following convention, mask values in the VPN 5000 Manager are generally entered as decimal numbers separated by periods (e.g. 255.255.255.0) where both the network portion and the host portion of an address are significant. Entry of mask size in bits is an alternative but equivalent way of specifying the size of the network portion of the IP address when only that portion is significant to the function being performed.

Edit

Clicking on this button brings up a dialog box which allows editing of a previously entered network and mask.

Remove

This button removes a network/mask entry from the list.

VPN Group Configuration IP Filters Tab

To access this dialog box (Figure 7-7), click the IP Filters tab in the VPN Group Configuration dialog box.

Figure 7-7 VPN Config IP Filters Tab

Input Filters

These pulldowns allow the selection of previously created filter scripts which will be applied to tunnel packets coming into the device from users who are connected according to the selected configuration.

Up to four separate filters may be selected.

Output Filters

These pulldowns allow the selection of previously created filter scripts which will be applied to tunnel packets sent out of the device to users who are connected according to the selected configuration.

Up to four separate filters may be selected.

IP Filters are created using the TCP/IP Filter Editor. For more information on creating and editing IP Filters, refer to "TCP/IP Filtering."

VPN Group Configuration IPX Connection Tab

To access this dialog box (Figure 7-8), click the IPX Connection tab in the VPN Group Configuration dialog box.

Figure 7-8 VPN Config IPX Connection Tab

Local IPX Net

This edit box specifies the entry of the first local IPX network number to be assigned to client sessions under this configuration. This address will be incremented by one for each new client session, until the Max Connection limit (specified on the General Tab) is reached. When a client is connected to the device, the first available IPX address from this range is assigned to that session. The IPX address is freed when the client session is finished.

Each of the addresses thus generated must be a valid, unique and unused IPX address. Also, these addresses must not conflict with any networks specified in other VPN Group configurations or with any other IPX address within the server.

There is no default value for the Local IPX Net. In order for IPX-in-IP tunneling to operate with this VPN Group configuration, a group of local IPX addresses must be set using either the Local IPX Net, or a RADIUS server must be configured to serve the addresses (see the "Assign IPX Radius" section).

Block Type 20

In order for certain protocol implementations, like NetBIOS, to function in the NetWare environment, routers must allow a broadcast packet to be propagated throughout an internet. The IPX Packet Type 20 is designated to perform broadcast propagation for these protocols. This checkbox specifies whether IPX Packet Type 20 should be rebroadcast through the tunnel.

If checked, IPX Packet Type 20 packets will not be rebroadcast during tunnel sessions. This is useful for reducing the bandwidth load on the tunnel.

If left unchecked, these propagated packets will be rebroadcast during tunnel sessions.

Assign IPX Radius

This checkbox specifies whether a RADIUS server can be used to assign IPX addresses to VPN users.

If checked, communication with a RADIUS server must be configured, and be set up to serve the IPX addresses.

If left unchecked, IPX addresses will be assigned using the address pool specified by the Local IPX Net.

VPN Group Configuration IPX Filters Tab

To access this dialog box (Figure 7-9), click the IPX Filters tab in the VPN Group Configuration dialog box.

Figure 7-9 VPN Group Configuration IPX Filters Tab

Input Filters

These pulldowns allow the selection of previously created filter scripts which will be applied to tunnel packets coming into the device from users who are connected according to the selected configuration.

Up to four separate filters may be selected.

Output Filters

These pulldowns allow the selection of previously created filter scripts which will be applied to tunnel packets sent out of the device to users who are connected according to the selected configuration.

Up to four separate filters may be selected.

IPX Filters are created using the IPX Filter Editor. For more information on creating and editing IPX Filters, refer to "IPX Filtering.".

VPN Group Configuration Rollover Tab

To access this dialog box (Figure 7-10), click the Rollover tab in the VPN Group Configuration dialog box.

Figure 7-10 VPN Group Configuration Rollover Tab

Alternate VPN 5000 Concentrator Addresses

This list displays all entered alternate concentrator addresses. If an alternate address (or addresses) has been set, a concentrator which is full will be able to roll a client over to the specified alternate server. The IP address should be in standard dotted-decimal notation.

VPN Group Configuration SecurID Tab

To access this dialog box (Figure 7-11), click the SecurID tab in the VPN Group Configuration dialog box.

Figure 7-11 VPN Group Configuration SecurID Tab

SecurID Required

Check this box to specify that all users assigned to this VPN Group configuration will undergo SecurID authentication. SecurID is Security Dynamic's proprietary system which requires ACE/Server software and SecurID tokens to perform dynamic two-factor authentication.

SecurID User Name

Check this box if the VPN user name will also serve as the SecurID user name. If this box is checked, all users assigned to this VPN Group configuration will be prompted for their SecurID user name for authentication. If unchecked, the names for each user entered in the concentrator and the ACE/Server must be the same.

VPN Group Configuration DNS Redirection Tab

To access this dialog box (Figure 7-12), click the DNS Redirection tab in the VPN Group Configuration dialog box.

Figure 7-12 VPN Group Configuration DNS Redirecton Tab

Primary Server

The primary server specifies the primary IP address of a DNS server. If a Primary Server has been set, then the VPN Client will tunnel all DNS queries to the concentrator and the concentrator will take all DNS queries bound for the client's primary DNS server and send them to the specified address. The IP address should be in standard dotted-decimal notation.

Secondary Server

The secondary server specifies the IP address of a backup DNS server. A primary server must be specified before a secondary server is chosen. The IP address should be in standard dotted-decimal notation.

Split Server

The split server specifies the IP address of a "split" DNS server. This is useful for setups where queries for internal names are handled by one server (the primary server) while queries for external names are handled by another server (the "split" server). The IP address should be in standard dotted-decimal notation.

Local Domain Names

This list specifies the domain names that will be compared to the name in DNS queries to the DNS server in order to determine whether the query is for an internal or external domain.

To add or modify the Local Domain Names, click on the appropriate button to access the Add Local Domain dialog box (Figure 7-13).

Figure 7-13 Add Local Domain Dialog Box

Local Domain Names can be between 1 and 255 characters in length.

VPN Group Configuration WINS Redirection Tab

To access this dialog box (Figure 7-14), click the WINS Redirection tab in the VPN Group Configuration dialog box.

Figure 7-14 VPN Group Configuration WINS Tab

Primary Server

The primary server specifies the primary IP address of a WINS server. If a Primary Server has been set, then the VPN Client software will tunnel all WINS queries to the concentrator and the concentrator will take all WINS queries bound for the client's primary WINS server and send them to the specified address. The IP address should be in standard dotted-decimal notation.

Secondary Server

The secondary server specifies the IP address of a backup WINS server. A primary server must be specified before a secondary server is chosen. The IP address should be in standard dotted-decimal notation.

VPN User Configuration Dialog Box

You can access the VPN User Configuration dialog box (Figure 7-15) by selecting VPN User Configuration from the Device View. This dialog box displays all VPN users configured on an VPN 5000 concentrator, but is not used to add or modify the entries.

Figure 7-15 VPN User Configuration Dialog Box

VPN User

To add or modify user entries, you must access the VPN User dialog box by selecting the Add... or Modify... buttons in the VPN User Configuration dialog box (Figure 7-16).

This user database is global to the device.

Figure 7-16 VPN User Dialog Box

Name

This is the name of a user who will connect to the device using VPN client software.

VPN Group

The user whose name is entered in the first column will be given the privileges and session parameters described in the specified VPN Group Configuration.

Any number of user entries may specify the same VPN Group Configuration in the database, but the VPN Group Configuration itself may allow a limited number of simultaneous users to actually have open VPN sessions with a device.

IKE Shared Key

This is a shared alphanumeric secret between 1-255 characters long. It is used to generate session keys which are used to authenticate and/or encrypt each packet received or sent through the tunnel.

STEP/STAMP Authentication Secret

This is a shared alphanumeric long term secret between 1-255 characters long. It is used to generate a series of short term keys which will authenticate traffic from this user on a packet-by-packet basis.

The same secret must be entered into the VPN client in order for authentication to succeed.

STEP/STAMP Encryption Secret

This is a shared alphanumeric long term secret between 1-255 characters long. It is used to generate a series of short term keys which will be used to encrypt/decrypt information to and from the user.

The same secret must be entered into the VPN client in order for encryption and decryption to succeed.

IKE Policy

This section is used to set the Internet Security Association Key Management Protocol/Internet Key Exchange (ISAKMP/IKE) parameters. These settings control how the concentrator and client will identify and authenticate each other. This initial negotiation is referred to as Phase 1.

To access this dialog box (Figure 7-17), select Global/IKE Policy from the Device View.

Figure 7-17 IKE Policy Global Dialog Box

The parameters set in this dialog box are global to the device and are not associated with a particular interface. These parameters specify a protection suite for the IKE negotiation between the concentrator and client. There are pieces to the IKE protection suite.

1. The first piece of each option is the authentication algorithm to be used for the negotiation. MD5 is the message-digest 5 hash algorithm. SHA is the Secure Hash Algorithm, which is considered to be somewhat more secure than MD5.

2. The second piece is the encryption algorithm. DES (Data Encryption Standard) uses a 56-bit key to scramble the data. 3DES uses three different keys and three applications of the DES algorithm to scramble the data.

3. The third piece is the Diffie-Hellman group to be used for key exchange. Because larger numbers are used by the Group 2 (G2) algorithm, it is more secure than Group 1 (G1). Group 5 (G5) uses 1535-bit encryption and is more secure than G1 or G2.

Use the Move Up and Move Down buttons to arrange the priority of the protection suites.

Phase 2 IKE negotiation sets how the concentrator and client will handle individual tunnel sessions. Phase 2 IKE negotiation parameters are set in the VPN Group Configuration dialog box, in the IKE Configuration Tab.

Allowed Authentication Protocol for PPTP Client Connections

PPTP is currently not supported.

IPsec Gateway Dialog Box

To access this dialog box (Figure 7-18), select Global/IPsecGateway in the Device View.

Figure 7-18 IPsec Gateway Configuration Dialog Box

IPsec Gateway

This is the IP address that will be used as the gateway to the Internet for IPsec traffic on a dual-Ethernet VPN 5000 concentrator. This is a required parameter only when the device is set to operate in parallel with your existing firewall (i.e. using both Ethernet ports) as the IPsec component of your security system.

The address should be entered as four decimal numbers separated by periods (e.g. 198.238.9.1).

This IP address must be on the same IP network as the IPsec interface, which is configured using the IP Connection dialog box (under Ethernet/IP Connection on the IPsec port of an VPN 5000 concentrator with two or more Ethernet interfaces).


[an error occurred while processing this directive]