+ All Categories
Home > Documents > VPN Configuration

VPN Configuration

Date post: 06-Apr-2018
Category:
Upload: ramace
View: 232 times
Download: 0 times
Share this document with a friend
112
170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Cisco Systems, Inc. Corporate Headquarters Tel: 800 553-NETS (6387) Fax: 408 526-4000 408 526-4100 Cisco 7100 Series VPN Configuration Guide Customer Order Number: DOC-786342= Text Part Number: 78-6342-01
Transcript
Page 1: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 1/112

170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.com

Cisco Systems, Inc.Corporate Headquarters

Tel:800 553-NETS (6387)

Fax:

408 526-4000

408 526-4100

Cisco 7100 Series VPNConfiguration Guide

Customer Order Number: DOC-786342=Text Part Number: 78-6342-01

Page 2: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 2/112

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUTNOTICE. ALL STATEMENTS, INFORMATION,AND RECOMMENDATIONSIN THISMANUAL ARE BELIEVEDTO BE ACCURATE BUTAREPRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIRAPPLICATION OF ANY PRODUCTS.

THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATIONPACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TOLOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOU R CISCO REPRESENTATIVE FOR A COPY.

The following information is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class Adigital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when theequipment is operated in a commercial environment. This equipment generates, uses, and can radiateradio-frequencyenergyand, if not installed andusedin accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area islikely to cause harmful interference, in which case users will be required to correct the interference at their own expense.

The following informationis for FCCcompliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequencyenergy. If it is notinstalled in accordance withCisco’sinstallationinstructions,it maycauseinterference withradio andtelevision reception. This equipmenthas been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. Thesespecifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee thatinterference will not occur in a particular installation.

Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC requirements for Class A orClass B digitaldevices.In that event,yourrightto usethe equipmentmay be limitedby FCCregulations, andyou maybe requiredto correct anyinterferenceto radio or television communications at your own expense.

Youcan determine whether your equipmentis causing interferenceby turning it off. If theinterferencestops, it wasprobablycaused by theCiscoequipmentor oneof its peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures:

• Turn the television or radio antenna until the interference stops.

• Move the equipment to one side or the other of the television or radio.

• Move the equipment farther away from the television or radio.

• Plugthe equipment into anoutlet that is ona different circuit from the television orradio.(That is, makecertain theequipment and the televisionor radioare on circuits controlled by different circuit breakers or fuses.)

Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.

TheCisco implementation of TCPheader compression is an adaptation of a program developedby the Universityof California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.

NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS AREPROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSEDOR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE ANDNONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTALDAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE ORINABILITYTO USETHIS MANUAL,EVEN IF CISCO OR ITSSUPPLIERS HAVEBEENADVISED OF THEPOSSIBILITYOF SUCH DAMAGES.

Access Registrar, AccessPath, Any to Any, AtmDirector, CCDA, CCDE, CCDP, CCIE, CCNA, CCNP, CCSI, CD-PAC, the Cisco logo, Cisco CertifiedInternetwork Expert logo, CiscoLink , the Cisco Management Connection logo, theCisco Net Works logo, the Cisco Powered Networklogo,Cisco SystemsCapital, the Cisco Systems Capital logo, Cisco Systems Networking Academy, the Cisco Technologies logo, ControlStream, Fast Step, FireRunner,GigaStack, IGX, JumpStart, Kernel Proxy, MGX, Natural Network Viewer, NetSonar, Network Registrar, Packet , PIX, Point and Click Internetworking,PolicyBuilder, Precept, RouteStream, SecureScript, ServiceWay,SlideCast,SMARTnet,StreamView, TheCell , TrafficDirector, TransPath,ViewRunner,VirtualStream, VisionWay, VlanDirector,Workgroup Director, andWorkgroup Stack aretrademarks; Changing theWay We Work, Live, Play, andLearn,Empowering the Internet Generation, The Internet Economy, and The New Internet Economy are service marks; and Asist, BPX, Catalyst, Cisco, Cisco

IOS, the Cisco IOS logo, Cisco Systems, the Cisco Systems logo, the Cisco Systems Cisco Press logo, Enterprise/Solver, EtherChannel, EtherSwitch,FastHub, FastLink, FastPAD, FastSwitch, IOS, IP/TV,IPX, LightStream,LightSwitch, MICA, NetRanger, Registrar, StrataView Plus, Stratm, TeleRouter,andVCO are registeredtrademarks of Cisco Systems, Inc. in the U.S. andcertain other countries. All other trademarks mentioned in thisdocument are theproperty of their respective owners. (9904R)

Cisco 7100 Series VPN Conguration GuideCopyright © 1999, Cisco Systems, Inc.All rights reserved.

Page 3: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 3/112

Preface vii

PrefaceThis preface describes the purpose, objectives, audience, organization, and conventions of the Cisco 7100 Series VPN Conguration Guide.

PurposeThis software conguration guide explains the basic tasks necessary to congure IP-based,multiservice intranet and extranet Virtual Private Networks (VPNs) on your Cisco 7100series router that integrate security and quality of service (QoS) through network technologies such as generic routing encapsulation (GRE) and IP Security Protocol (IPSec)tunneling, and high-speed encryption to ensure private transactions over public datanetworks. This guide does not cover every available feature; it is not intended to be acomprehensive VPN conguration guide. Instead, this guide simply explains the basictasks necessary to congure an intranet and extranet VPN on your Cisco 7100 series router

based on the GRE and IPSec tunneling protocols.

Note Although supported by Cisco 7100 series routers, this guide does not explain how tocongure access VPNs using the Layer 2 Forwarding (L2F) or Layer 2 Tunnel Protocol(L2TP) tunneling protocols. Conguring access VPNs using the L2TP tunneling protocolwill be covered in a later release of this guide. For detailed information on conguringclient-initiated and network access server (NAS)-initiated access VPNs using the L2Ftunneling protocol, refer to the Access VPN Solutions Using Tunneling Technologypublication.

Page 4: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 4/112

Audience

Cisco 7100 Series VPN Configuration Guideviii

The intranet and extranet business scenarios introduced in this guide include specic tasksand conguration examples. The examples are the recommended methods for conguringthe specied tasks. Although they are typically the easiest or the most straightforwardmethod, they are not the only methods of conguring the tasks. If you know of anotherconguration method not presented in this guide, you can use it.

Note Use this guide after you install, power up, and initially congure your Cisco 7100series router for network connectivity. For instructions on how to install, power up, andinitiallycongure your Cisco 7100 series router, refer to the Cisco 7100 SeriesVPN Router

Installation and Conguration Guide that shipped with your Cisco 7100 series router.

AudienceThis software conguration guide is intended primarily for the following audiences:

• System administrators who are responsible for installing and conguringinternetworking equipment, are familiar with the fundamentals of router-basedinternetworking, and who are familiar with Cisco IOS software and Cisco products

• System administrators who are familiar with the fundamentals of router-basedinternetworking and who are responsible for installing and conguring internetworkingequipment, but who might not be familiar with the specics of Cisco products or the

routing protocols supported by Cisco products• Customers with technical networking background and experience

Page 5: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 5/112

Preface ix

Organization

OrganizationThe major sections of this guide are as follows:

Where to Get the Latest Version of This GuideThe hard copy of this guide is updated at major releases only and does not always containthe latest material for enhancements occurring between major releases. You are shippedseparate release notes or conguration notes for spares, hardware, and softwareenhancements occurring between major releases.

The online copy of this guide is always up-to-date and integrates the latest enhancementsto the product. You can also access Cisco documentation on the World Wide Web athttp://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

Chapter Title Description

1 Using Cisco IOS Software Provides helpful tips for understandingand conguring Cisco IOS software usingthe command-line interface (CLI).

2 Before You Begin Provides an overview of the businessscenarios covered in this guide, items youshould consider before conguring a VPNon your Cisco 7100 series router, and theassumptions this guide makes.

3 Intranet VPN Business Scenario Explains the basic tasks for conguring anintranet VPN on a Cisco 7100 seriesrouter using GRE as the tunnelingprotocol.

4 Extranet VPN Business Scenario Explains the basic tasks for conguring anextranet VPN on a Cisco 7100 seriesrouter using IPSec as the tunnelingprotocol.

Page 6: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 6/112

Related Documentation

Cisco 7100 Series VPN Configuration Guidex

Related DocumentationYour Cisco 7100 series router and the Cisco IOS software running on it contain extensivefeatures and functionality, which are documented in the following resources:

• For Cisco 7100 series hardware installation and initial software congurationinformation, refer to the following publications:

— Cisco 7100 Series VPN Router Quick Start Guide

— Cisco 7100 Series VPN Router Installation and Conguration Guide

•For international agency compliance, safety, and statutory information for WANinterfaces for the Cisco 7100 series routers, refer to the Regulatory Compliance and Safety Information for Cisco 7100 Series VPN Routers publication that shipped withyour router.

• For information on installing and replacing Cisco 7100 series eld-replaceable units(FRUs), refer to the Installing Field-Replaceable Units in Cisco 7100 Series VPN

Routers publication that shipped with your router.

• For information on using the Flash Disk, refer to the Using the Flash Disk publicationthat shipped with your router.

• For information on installing and replacing Integrated Service Module (ISM), refer tothe Integrated Service Adapter and Integrated Service Module Installation and Conguration publication.

• For information on the port adapter installed in the router, refer to the individualinstallation and conguration notes that ships with each port adapter. For example, if you ordered a PA-4E Ethernet port adapter, the PA-4E Ethernet 10BaseT Port Adapter

Installation and Conguration note is shipped with the router.

• For additional Cisco IOS software conguration information and support, refer to themodular conguration and modular command reference publications in the Cisco IOSsoftware conguration documentation set that corresponds to the software releaseinstalled on your Cisco hardware. Specically, you should refer to the followingpublications:

— For detailed information on conguring access VPNs using the L2F tunnelingprotocol, refer to the Access VPN Solutions Using Tunneling Technology

publication.

Page 7: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 7/112

Preface xi

Related Documentation

— For information on setting up quality of service (QoS), refer to the Quality of Service Solutions Conguration Guide and Quality of Service Solutions Command

Reference publications.

— For information on encryption, refer to the Security Conguration Guide and theSecurity Command Reference publications.

— For information on interfaces, refer to the Cisco IOS Interface CongurationGuide and the Cisco IOS Interface Command Reference publications.

— For information on IP, refer to the Network Protocols Conguration Guide,Part 1 and the Network Protocols Command Reference, Part 1 publications.

You can also refer to the Cisco IOS software release notes for the version of software you are using on your hardware.

• For information on network management applications, refer to the network management product documentation on Cisco Connection Online (CCO) and theDocumentation CD-ROM.

On CCO, follow this path:

Service and Support : Technical Documents : Documentation Home Page : CiscoProduct Documentation : Network Management

On the Documentation CD-ROM, follow this path:

Documentation CD Home Page : Cisco Product Documentation : NetworkManagement

• To view Cisco documentation or obtain general information about the documentation,see the “Cisco Connection Online” section on page xiii and the “Documentation CD-ROM” section on page xiv, or call customer service at 800 553-6387 or 408 526-7208.Customer service hours are 5:00 a.m. to 6:00 p.m. Pacic time, Monday through Friday(excluding Cisco-observed holidays). You can also send e-mail to [email protected].

Page 8: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 8/112

Conventions

Cisco 7100 Series VPN Configuration Guidexii

ConventionsCommand descriptions use the following conventions:

Convention Description

boldface font Commands and keywords are in boldface .

italic font Arguments for which you supply values are in italics .

[ ] Elements in square brackets are optional.

{ x | y | z} Alternative keywords are grouped in braces and separated by verticalbars.

[ x | y | z] Optional alternative keywords a re grouped i n brackets a nd separated byvertical bars.

string A nonquoted set of characters. Do not use quotation marks around thestring or the string will include the quotation marks.

screen font Terminal sessions and information the system displays are in screen

font.

boldface screenfont

Information you must enter is in boldface screen font.

italic screen font Arguments for which you supply values are in italic screen font.

This pointer highlights an important line of text in

an example.

^ The symbol ^ represents the key labeled Control—for example, the keycombination ^D in a screen display means hold down the Control keywhile you press the D key.

< > Nonprinting characters, such as passwords, are in angle brackets.

[ ] Default responses to system prompts are in square brackets.

!, # An exclamation point ( ! ) or a pound sign ( # ) at the beginning of aline of code indicates a comment line.

Note Means reader take note . Notes contain helpful suggestions orreferences to material not covered in the publication.

Tips Means t he following are useful tips .

Page 9: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 9/112

Preface xiii

Cisco Connection Online

Cisco Connection OnlineCisco Connection Online (CCO) is Cisco Systems’ primary, real-time support channel.Maintenance customers and partners can self-register on CCO to obtain additional

information and services.Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco’s customers and business partners. CCO services include productinformation, product documentation, software updates, release notes, technical tips, theBug Navigator, conguration notes, brochures, descriptions of service offerings, anddownload access to public and authorized les.

CCO serves a wide variety of users through two interfaces that are updated and enhancedsimultaneously: a character-based version and a multimedia version that resides on theWorld Wide Web. The character-based CCO supports Zmodem, Kermit, Xmodem, FTP,and Internet e-mail, and it is excellent for quick access to information over lowerbandwidths. The web version of CCO provides richly formatted documents withphotographs, gures, graphics, and video, as well as hyperlinks to related information.

You can access CCO in the following ways:

• WWW: http://www.cisco.com

• WWW: http://www-europe.cisco.com

• WWW: http://www-china.cisco.com

• Telnet: cco.cisco.com

• Modem: From North America, 408 526-8070; from Europe, 33 1 64 46 40 82. Use thefollowing terminal settings:VT100 emulation; databits:8; parity: none; stop bits: 1; andconnection rates up to 28.8 kbps.

Fora copy of CCO’s Frequently Asked Questions (FAQ), contact [email protected]. For

additional information, contact [email protected].

Caution This symbol means reader be careful . In this situation, youmight do something that could result in equipment damage or loss of data.

Convention Description

Page 10: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 10/112

Documentation CD-ROM

Cisco 7100 Series VPN Configuration Guidexiv

Note If you are a network administrator and need personal technical assistance with aCisco product that is under warranty or covered by a maintenance contract, contact Cisco’sTechnical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or [email protected]. Toobtain general information about Cisco Systems, Cisco products, or upgrades, contact800 553-6387, 408 526-7208, or [email protected].

Documentation CD-ROMCisco documentation and additional literature are available in a CD-ROM package, whichships with your product. The Documentation CD-ROM, a member of the Cisco ConnectionFamily, is updated monthly. Therefore, it might be more current than printeddocumentation. To order additional copies of the Documentation CD-ROM, contact yourlocal sales representative or call customer service. The CD-ROM package is available as asingle package or as an annual subscription. You can also access Cisco documentation onthe World Wide Web at http://www.cisco.com, http://www-china.cisco.com, orhttp://www-europe.cisco.com.

If you are reading Cisco product documentation on the World Wide Web, you can submitcomments electronically. Click Feedback in the toolbar and select Documentation . Afteryou complete the form, click Submit to send it to Cisco. We appreciate your comments.

Page 11: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 11/112

C H A P T E R

Using Cisco IOS Software 1-1

1

Using Cisco IOS SoftwareThis chapter provides helpful tips for understanding and conguring Cisco IOS softwareusing the command-line interface (CLI) and contains the following sections:

• Getting Help, page 1-2

• Understanding Command Modes, page 1-8

• Using the no and default Forms of Commands, page 1-11

• Saving Conguration Changes, page 1-11

For an overview of Cisco IOS software conguration, refer to the CongurationFundamentals Conguration Guide .

For information on the conventions used in this guide, see the “Conventions” section onpage xii.

Page 12: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 12/112

Getting Help

Cisco 7100 Series VPN Configuration Guide1-2

Getting HelpEntering a question mark ( ?) at the system prompt displays a list of commands available foreach command mode. You can also get a list of any command’s associated keywords andarguments with the context-sensitive help feature.

To get help specic to a command mode, a command, a keyword, or an argument, use oneof the following commands:

Note Press Ctrl-P or the up arrow key to recall commands in the history buffer, beginning

with the most recent command. Repeat the key sequence to recall successively oldercommands. Press Ctrl-N or the down arrow key to return to more recent commands in thehistory buffer after recalling commands with Ctrl-P or the up arrow key. Repeat the keysequence to recall successively more recent commands.

The arrow keys function only on ANSI-compatible terminals such as VT100s.

Command Purpose

help Obtain a brief description of the help system in any command mode.

abbreviated-command-entry ? Obtain a list of commands that begin with a particular character string.(No space between command and question mark.)

abbreviated-command-entry <Tab > Complete a partial command name.

? List all commands available for a particular command mode.

command ? List a command’s associated keywords. (Space between command andquestion mark.)

command keyword ? List a keyword’s associated arguments. (Space between the keyword andquestion mark.)

Page 13: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 13/112

Using Cisco IOS Software 1-3

Finding Command Options

Finding Command OptionsThis section provides an example of how to display syntax for a command. The syntax canconsist of optional or required keywords. To display keywords for a command, enter aquestion mark ( ?) at the congurationprompt, or after entering part of a command followedby a space. The Cisco IOS software displays a list of keywords available along with a brief description of the keywords. For example, if you were in global conguration mode, typedthe command arap , and wanted to see all the keywords for that command, you would typearap ? .

Table 1-1 shows how to use the question mark ( ?) to nd the command options for the

following two commands:• controller t1 1

• cas-group 1 timeslots 1-24 type e&m-fgb dtmf

Table 1-1 How to Find Command Options

Command Comment

Router> enablePassword: < password >Router#

Enter the enable command andpassword to access privilegedEXEC commands.

You have entered privileged EXEC

mode when the prompt changes toRouter#.

Router# configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)#

Enter global conguration mode.

You have entered globalconguration mode when theprompt changes to Router(cong)#.

Page 14: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 14/112

Getting Help

Cisco 7100 Series VPN Configuration Guide1-4

Router(config)# controller t1 ?<0-3> Controller unit number

Router(config)# controller t1 1Router(config-controller)#

Enter controller conguration modeby specifying the T1 controller thatyou want to congure using thecontroller t1 global congurationcommand.

Enter a ? to display what you mustenter next on the command line. Inthis example, you must enter acontroller unit number from 0 to 3.

You have entered controllerconguration mode when theprompt changes toRouter(cong-controller)#.

Router(config-controller)# ?Controller configuration commands:

cablelength Specify the cable length for a DS1 linkcas-group Configure the specified timeslots for CAS

(Channel Associate Signals)channel-group Specify the timeslots to channel-group

mapping for an interfaceclock Specify the clock source for a DS1 link

default Set a command to its defaultsdescription Controller specific descriptionds0 ds0 commandsexit Exit from controller configuration modefdl Specify the FDL standard for a DS1 data linkframing Specify the type of Framing on a DS1 linkhelp Description of the interactive help systemlinecode Specify the line encoding method for a DS1

linkloopback Put the entire T1 line into loopbackno Negate a command or set its defaultspri-group Configure the specified timeslots for PRIshutdown Shut down a DS1 link (send Blue Alarm)

Router(config-controller)#

Enter a ? to display a list of all thecontroller conguration commandsavailable for the T1 controller.

Table 1-1 How to Find Command Options (continued)

Command Comment

Page 15: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 15/112

Using Cisco IOS Software 1-5

Finding Command Options

Router(config-controller)# cas-group ?<0-23> Channel number

Router(config-controller)# cas-group

Enter the command that you want tocongure for the controller. In thisexample, the cas-group commandis used.

Enter a ? to display what you mustenter next on the command line. Inthis example, you must enter achannel number from 0 to 23.

When the system redisplays thecommand, it indicates that you mustenter more keywords to completethe command.

Router(config-controller)# cas-group 1 ?t imeslots List of timeslots in the cas-group

Router(config-controller)# cas-group 1

After you enter the channel number,enter a ? to display what you mustenter next on the command line. Inthis example, you must enter thetimeslots keyword.

When the system redisplays thecommand, it indicates that you mustenter more keywords to complete

the command.

Table 1-1 How to Find Command Options (continued)

Command Comment

Page 16: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 16/112

Getting Help

Cisco 7100 Series VPN Configuration Guide1-6

Router(config-controller)# cas-group 1 timeslots ?<1-24> List of timeslots which comprise the

cas-groupRouter(config-controller)# cas-group 1 timeslots

After you enter the timeslotskeyword, enter a ? to display whatyou must enter next on thecommand line. In this example, youmust enter a list of timeslots from 1to 24.

You can specify timeslot ranges (forexample, 1-24), individual timeslotsseparated by commas (for example1, 3, 5), or a combination of the two(for example 1-3, 8, 17-24). The16th time slot is not specied in thecommand line, because it isreserved for transmitting thechannel signaling.

When the system redisplays thecommand, it indicates that you mustenter more keywords to completethe command.

Router(config-controller)# cas-group 1 timeslots 1-24 ?service Specify the type of servicetype Specify the type of signaling

Router(config-controller)# cas-group 1 timeslots 1-24

After you enter the timeslot ranges,enter a ? to display what you mustenter next on the command line. Inthis example, you must enter theservice or type keyword.

When the system redisplays thecommand, it indicates that you mustenter more keywords to completethe command.

Table 1-1 How to Find Command Options (continued)

Command Comment

Page 17: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 17/112

Using Cisco IOS Software 1-7

Finding Command Options

Router(config-controller)# cas-group 1 timeslots 1-24 type ?e&m-fgb E & M Type II FGBe&m-fgd E & M Type IIFGDe&m-immediate-start E & M Immediate Startfxs-ground-start FXS Ground Startfxs-loop-start FXS Loop Startsas-ground-start SAS Ground Startsas-loop-start SAS Loop Start

Router(config-controller)# cas-group 1 timeslots 1-24 type

In this example, the type keyword isentered. After you enter the typekeyword, enter a ? to display whatyou must enter next on thecommand line. In this example, youmust enter one of the signalingtypes.

When the system redisplays thecommand, it indicates that you mustenter more keywords to completethe command.

Router(config-controller)# cas-group 1 timeslots 1-24 typee&m-fgb ?

dtmf DTMF tone signalingmf MF tone signalingservice Specify the type of service<cr>

Router(config-controller)# cas-group 1 timeslots 1-24 typee&m-fgb

In this example, the e&m-fgbkeyword is entered. After you enterthe e&m-fgb keyword, enter a ? todisplay what you must enter next onthe command line. In this example,you can enter the dtmf , mf , orservice keyword to indicate the typeof channel-associated signalingavailable for the e&m-fgb signalingtype.

When the system redisplays thecommand, it indicates that you canenter more keywords or press <cr>to complete the command.

Table 1-1 How to Find Command Options (continued)

Command Comment

Page 18: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 18/112

Understanding Command Modes

Cisco 7100 Series VPN Configuration Guide1-8

Understanding Command ModesThe Cisco IOS user interface is divided into many different modes. The commandsavailable to you at any given time depend on which mode you are currently in. Entering a

question mark ( ?) at the system prompt allows you to obtain a list of commands availablefor each command mode.

When you start a session on the router, you begin in user mode, often called EXEC mode.Only a limited subset of the commands are available in EXEC mode. To have access to allcommands, you must enter privileged EXEC mode (also called enable mode). Normally,you must enter a password to enter privileged EXEC mode. From privileged mode, you canenter any EXEC command or enter global conguration mode. Most of the EXECcommands are one-time commands, such as show commands, which show the currentstatus of something, and clear commands, which clear counters or interfaces. The EXECcommands are not saved across reboots of the router.

Router(config-controller)# cas-group 1 timeslots 1-24 typee&m-fgb dtmf ?

dnis DNIS addr info provisionedservice Specify the type of service<cr>

Router(config-controller)# cas-group 1 timeslots 1-24 typee&m-fgb dtmf

In this example, the dtmf keywordis entered. After you enter the dtmf keyword, enter a ? to display whatyou must enter next on thecommand line. In this example, youcan enter the dnis or servicekeyword to indicate the optionsavailable for dtmf tone signaling.

When the system redisplays thecommand, it indicates that you canenter more keywords or press <cr>to complete the command.

Router(config-controller)# cas-group 1 timeslots 1-24 typee&m-fgb dtmfRouter(config-controller)#

In this example, enter a <cr> tocomplete the command.

Table 1-1 How to Find Command Options (continued)

Command Comment

Page 19: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 19/112

Using Cisco IOS Software 1-9

Summary of Main Command Modes

The conguration modes allow you to make changes to the running conguration. If youlater save the conguration, these commands are stored across router reboots. To get to thevarious conguration modes, you must start at global conguration mode. From globalconguration mode, you can enter interfaceconguration mode, subinterface congurationmode, and a variety of protocol-specic modes.

ROM monitor mode is a separate mode used when the router cannot boot properly. If yourrouter or access server does not nd a valid system image when it is booting, or if itsconguration le is corrupted at startup, the system might enter ROM monitor mode.

Summary of Main Command ModesTable 1-2 summarizes the main command modes of the Cisco IOS software.

Table 1-2 Summary of Main Command Modes

CommandMode Access Method Prompt Exit Method

User EXEC Log in. Router> Use the logout command.

PrivilegedEXEC

From user EXECmode, use the enableEXEC command.

Router# To exit back to user EXEC mode, use thedisable command.

To enter global conguration mode, use thecongure terminal privileged EXECcommand.

Globalconguration

From privilegedEXEC mode, use thecongure terminalprivileged EXECcommand.

Router(config)# To exit to privileged EXEC mode, use the exitor end command or press Ctrl-Z .

To enter interfacecongurationmode, enter aninterface conguration command.

Page 20: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 20/112

Understanding Command Modes

Cisco 7100 Series VPN Configuration Guide1-10

For more information regarding command modes, refer to the “Using the Command LineInterface” chapter of the Conguration Fundamentals Conguration Guide .

Interfaceconguration

From globalconguration mode,enter by specifyingan interface with aninterface command.

Router(config-if)# To exit to global conguration mode, use theexit command.

To exit to privileged EXEC mode, use the exitcommand or press Ctrl-Z .

To enter subinterface conguration mode,specify a subinterface with the interface

command.Subinterfaceconguration

From interfaceconguration mode,specify asubinterface with aninterface command.

Router(config-subif)# To exit to global conguration mode, use theexit command.

To enter privileged EXEC mode, use the endcommand or press Ctrl-Z .

ROMmonitor

From privilegedEXEC mode, use thereload EXECcommand. Press theBreak key during therst 60 secondswhile the system is

booting.

> To exit to user EXEC mode, type continue .

Table 1-2 Summary of Main Command Modes (continued)

CommandMode Access Method Prompt Exit Method

Page 21: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 21/112

Using Cisco IOS Software 1-11

Using the no and default Forms of Commands

Using the no and default Forms of CommandsAlmost every conguration command also has a no form. In general, use the no form todisable a function. Use the command without the keyword no to reenable a disabledfunction or to enable a function that is disabled by default. For example, IP routing isenabled by default. To disable IP routing, specify the no ip routing command and specifyip routing to reenable it. The Cisco IOS software command references provide thecomplete syntax for the conguration commands and describes what the no form of acommand does.

Conguration commands can also have a default form. The default form of a command

returns the command setting to its default. Most commands are disabled by default, so thedefault form is the same as the no form. However, some commands are enabled by defaultand have variables set to certain default values. In these cases, the default commandenables the command and sets variables to their default values. The Cisco IOS softwarecommand references describe what the default form of a command does if the commandis not the same as the no form.

Saving Conguration ChangesEnter the copy system:running-cong nvram:startup-cong command to save yourconguration changes to your startup conguration so that they will not be lost if there is asystem reload or power outage. For example:

Router# copy system:running-config nvram:startup-configBuilding configuration...

It might take a minute or two to save the conguration. After the conguration has beensaved, the following output appears:

[OK]Router#

On most platforms, this step saves the conguration to nonvolatile random-access memory(NVRAM). On Class A Flash memory le systems, such as Cisco 7100 series routers, thisstep saves the conguration to the location specied by the CONFIG_FILE environmentvariable. The CONFIG_FILE variable defaults to NVRAM.

Page 22: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 22/112

Saving Configuration Changes

Cisco 7100 Series VPN Configuration Guide1-12

Page 23: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 23/112

C H A P T E R

Before You Begin 2-1

2

Before You BeginThis chapter provides an overview of the business scenarios covered in this guide, itemsyou should consider before attempting to congure a Virtual Private Network (VPN) onyour Cisco 7100 series router, and the assumptions this guide makes.

This chapter includes the following sections:

• Overview of Business Scenarios, page 2-1

• Considerations, page 2-3

• Assumptions, page 2-7

Overview of Business ScenariosThe business scenarios explained in this guide provide a remote ofce and a businesspartner access to a corporate headquarters network through secure generic routingencapsulation (GRE) and IP Security Protocol (IPSec) tunnels. (See Figure 2-1.)

Note Although supported by Cisco 7100 series routers, this guide does not explain how tocongure access VPNs using the Layer 2 Forwarding (L2F) or Layer 2 Tunnel Protocol(L2TP) tunneling protocols. Conguring access VPNs using the L2TP tunneling protocolwill be covered in a later release of this guide. For detailed information on conguringclient-initiated and network access server (NAS)-initiated access VPNs using the L2Ftunneling protocol, refer to the Access VPN Solutions Using Tunneling Technologypublication.

Page 24: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 24/112

Overview of Business Scenarios

Cisco 7100 Series VPN Configuration Guide2-2

In each scenario, a tunnel is constructed, encryption is applied on the tunnel, and differenttrafc types (for example, IP, User Datagram Protocol [UDP], and Transmission ControlProtocol [TCP]) are either permitted or denied access to the tunnel. This controls the levelof access the remote ofce and business partner have to the corporate intranet, and securesthe data exchanged between the sites.

Figure 2-1 Business Scenarios

The intranet VPN business scenario explained in Chapter 3, “Intranet VPN BusinessScenario,” links the corporate headquarters to a remote ofce using connections across theInternet. Users in the remote ofce are able to access resources as if they were part of theprivate corporate intranet.

The extranet VPN business scenario explained in Chapter 4, “Extranet VPN BusinessScenario,” builds on the VPN scenario by linking the same corporate headquarters to abusiness partner using connections across the Internet; however, the business partner isgiven limited access to the headquarters network—the business partner can access only theheadquarters’ public Web server.

Remoteoffice

Businesspartner

Internet

IPSec tunnel

GRE tunnel

Headquarters 2 3 2 8 9

Page 25: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 25/112

Before You Begin 2-3

Considerations

ConsiderationsThe following are considerations to observe when conguring a VPN on your Cisco 7100series router:

• Syslog—Set up a syslog host, such as a CiscoWorks Essentials Workstation, andcongure all the routers in the network to use the syslog host. Logging all syslogmessages from the routers allows you to determine when signicant events, likeconguration changes, occurred.

• Telnet and Console Access—In client-initiated or network access server(NAS)-initiated access VPN environments, implement Terminal Access ControllerAccess Control System Plus (TACACS+) or Remote Access Dial-In User Service(RADIUS) security for Telnet and console access to the router. Doing so logs all accessto the router. The addition of access lists to only allow Telnet access from particularsource IP addressees helps to secure the router.

• Access Lists—Use access list numbers and names consistently to help manage andtroubleshoot congurations.

• Template Congurations—Use a conguration template when deploying many routersthat require consistent congurations.

• Tunneling—Observe the following when conguring tunneling:

— To avoid anomalies that occur on physical interfaces, congure each tunnel source

and destination on a loopback interface. A loopback interface is a virtual interfacethat is always up and allows routing protocols to stay up even if the physicalinterface is down.

— Process switching and fast switching of the GRE, IPSec, L2F, and L2TP tunnelingprotocols, and Cisco Express Forwarding (CEF) of the IPSec tunneling protocol issupported on Cisco 7100 series routers in Cisco IOS Release 12.0(4)XE or a later12.0 XE software release, or Cisco IOS Release 12.0(6)T or a later 12.0 T softwarerelease. CEF support of the L2F and L2TP tunneling protocols will be supported onCisco 7100 series routers in a futuremaintenance release of Cisco IOSsoftware andwill be announced in the release notes that ship with the software.

Page 26: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 26/112

Considerations

Cisco 7100 Series VPN Configuration Guide2-4

— Be careful not to violate access control lists. You can congure a tunnel with asource and destination that are not restricted by rewall routers.

— Routing protocols that make their decisions based solely on hop count will oftenprefer a tunnel over a multipoint real link. A tunnel might appear to be a one-hop,point-to-point link and have the lowest-cost path, but may actually cost more.

• IPSec—Observe the following when conguring IPSec:

— IPSec works with the following serial encapsulations: High-Level Data Link Control (HDLC), Point-to-Point Protocol (PPP), and Frame Relay. IPSec alsoworks with the GRE and IPinIP Layer 3, L2F, and L2TP tunneling protocols;however, multipoint tunnels are not supported. Other Layer 3 tunneling protocols(data-link switching [DLSW], source-route bridging [SRB], and so forth) arecurrently not supported for use with IPSec.

— IPSec and Internet Key Exchange (IKE) must be congured on the router and acrypto map assigned to all interfaces that require encryption services from theIntegrated Service Module (ISM) in slot 5 of Cisco 7100 series routers.

— IPSec can be applied to unicast IP datagrams only. Because the IPSec WorkingGroup has not yet addressed the issue of group key distribution, IPSec does notcurrently work with multicasts or broadcast IP datagrams.

— If you use Network Address Translation (NAT), you should congure static NATredundant so that IPSec works properly. In general, NAT should occur before the

router performs IPSec encapsulation; in other words, IPSec should be working withglobal addresses.

• Firewall—Observe the following when conguring Cisco IOS Firewall features (whenconguring your Cisco 7100 series router as a rewall):

— When setting passwords for privileged access to the rewall, use the enable secretcommand rather than the enable password command, which does not have asstrong an encryption algorithm.

— Congure a password on the console port. In authentication, authorization, andaccounting (AAA) environments, use the same authentication for the console as forelsewhere. In a non-AAA environment, at a minimum, congure the login andpassword password commands.

Page 27: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 27/112

Before You Begin 2-5

Considerations

— Think about access control before you connect a console port to the network in anyway, including attaching a modem to the port. Be aware that a break on the consoleport might give total control of the rewall, even with access control congured.

— Apply access lists and password protection to all virtual terminal ports. Use accesslists to limit who can Telnet into your router.

— Do not enable any local service (such as Simple Network Management Protocol[SNMP] or Network Time Protocol [NTP]) that you do not plan to use. CiscoDiscovery Protocol (CDP) and NTP are on by default, and you should turn these off if you do not need them.

To turn off CDP, enter the no cdp run global conguration command. To turn off NTP, enter the ntp disable interface conguration command on each interface notusing NTP.

If youmust runNTP, congure NTP only on required interfaces, andcongure NTPto listen only to certain peers.

Any enabled service could present a potential security risk. A determined, hostileparty might be able to nd creative ways to misuse the enabled services to accessthe rewall or the network.

For local services that are enabled, protect against misuse. Protect by conguringthe services to communicate only with specic peers, and protect by conguringaccess lists to deny packets for the services at specic interfaces.

— Protect against spoong: protect the networks on both sides of the rewall frombeing spoofed from the other side. You could protect against spoong byconguring input access lists at all interfaces to pass only trafc from expectedsource addresses, and to deny all other trafc.

You should also disable source routing. For IP, enter the no ip source-route globalconguration command. Disabling source routing at all routers can also helpprevent spoong.

You should also disable minor services. For IP, enter the no servicetcp-small-servers and no service udp-small-servers global congurationcommands.

— Prevent the rewall from being used as a relay by conguring access lists on anyasynchronous Telnet ports.

Page 28: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 28/112

Considerations

Cisco 7100 Series VPN Configuration Guide2-6

— Normally, you should disable directed broadcasts for all applicable protocols onyour rewall and on all your other routers. For IP, use the no ip directed-broadcastcommand. Rarely, some IP networks do require directed broadcasts; if this is thecase, do not disable directed broadcasts.

Directed broadcasts can be misused to multiply the power of denial-of-serviceattacks, because every denial-of-service packet sent is broadcast to every host on asubnet. Furthermore, some hosts have other intrinsic security risks present whenhandling broadcasts.

— Congure the no proxy-arp command to prevent internal addresses from being

revealed. (This is important to do if you do not already have NAT congured toprevent internal addresses from being revealed).

— Whenever possible, keep the rewall in a secured (locked) room.

• VPN Management—Implement one or more of the following applications on yourCisco 7100 series router for centralized, end-to-end management of both the services(for example, QoS and security features) and hardware (for example, deviceconguration and performance) across your VPN:

— CiscoWorks 2000 and CiscoView enable management of device security andconguration, and performance monitoring.

— CiscoWorks 2000 Access Control List Manager enables management of accesscontrol lists.

— Cisco QoS Policy Manager enables management of advanced bandwidth policies.

— Cisco Internetwork Performance Monitor 2.0 enables monitoring of service-levelagreements across the service provider network.

To access the documentation for the above applications on CCO, follow this path:

Service and Support : Technical Documents : Documentation Home Page : CiscoProduct Documentation : Network Management

To access the documentation for the above applications on the DocumentationCD-ROM, follow this path:

Documentation CD Home Page : Cisco Product Documentation : NetworkManagement

Page 29: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 29/112

Before You Begin 2-7

Assumptions

AssumptionsThis guide assumes the following:

• You have successfully installed, powered on, and initially congured your Cisco 7100series router for network connectivity based on the procedures explained in theCisco 7100 Series VPN Router Installation and Conguration Guide.

• You are conguring a service provider transparent VPN, whereby the tunnel endpointsare outside of the service provider network (on the headquarters and remote siterouters).

• You are conguring your VPN based on IP and the Border Gateway Protocol (BGP)routing protocol, and cryptography and tunneling technologies such as IPSec and GRE.

• You have Certication Authority (CA) interoperability congured on your Cisco 7100series router. CA interoperability is provided by the ISM in support of the IPSecstandard. It permits Cisco IOS devices and CAs to communicate so that your Cisco IOSdevice can obtain and use digital certicates from the CA. Although IPSec can beimplemented in your network without the use of a CA, using a CA providesmanageability and scalability for IPSec.

Note The scenarios in this guide do not explain how to congure CA interoperabilityon your Cisco 7100 series router. For detailed conguration information on CAinteroperability, refer to the “Conguring Certication Authority Interoperability”chapter in the Security Conguration Guide .

• You have a network management solution, such as CiscoWorks 2000, CiscoView,CiscoWorks 2000 Access Control List Manager, Cisco QoS Policy Manager, or CiscoInternetwork Performance Monitor 2.0, congured on your Cisco 7100 series router.

For information on network management applications, refer to the network management product documentation on Cisco Connection Online (CCO) and theDocumentation CD-ROM.

Page 30: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 30/112

Assumptions

Cisco 7100 Series VPN Configuration Guide2-8

On CCO, follow this path:

Service and Support : Technical Documents : Documentation Home Page : CiscoProduct Documentation : Network Management

On the Documentation CD-ROM, follow this path:

Documentation CD Home Page : Cisco Product Documentation : NetworkManagement

• You have identied the Cisco IOS Firewall features that you plan to congure on yourCisco 7100 series router. The business scenarios in this guide explain how to congure

extended access lists, which are sequential collections of permit and deny conditionsthat apply to an IP address.

Note For advanced rewall conguration information, refer to the “Trafc Filteringand Firewalls” part of the Security Conguration Guide.

Page 31: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 31/112

C H A P T E R

Intranet VPN Business Scenario 3-1

3

Intranet VPN BusinessScenarioThis chapter explains the basic tasks for conguring an IP-based, intranet Virtual PrivateNetwork (VPN) on a Cisco 7100 series router using generic routing encapsulation (GRE)as the tunneling protocol. Only basic security, Cisco IOS weighted fair queuing (WFQ),and extended access lists for basic trafc ltering are congured.

This chapter includes the following sections:

• Scenario Description, page 3-2

• Step 1—Conguring the Tunnel, page 3-4

• Step 2—Conguring Quality of Service, page 3-8

• Step 3—Conguring Encryption, page 3-11

• Step 4—Conguring Cisco IOS Firewall Features, page 3-32

• Comprehensive Conguration Examples, page 3-37

Note Throughout this chapter, there are numerous conguration examples and sampleconguration outputs that include unusable IP addresses. Be sure to use your own IPaddresses when conguring your Cisco 7100 series router.

Page 32: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 32/112

Scenario Description

Cisco 7100 Series VPN Configuration Guide3-2

Scenario DescriptionFigure 3-1 shows a headquarters network providing a remote ofce access to the corporateintranet. In this scenario, the headquarters and remote ofce are connected through a secureGRE tunnel that is established over an IP infrastructure (the Internet). Employees in theremote ofce are able to access internal, private web pages and perform various IP-basednetwork tasks.

Figure 3-1 Intranet VPN Business Scenario

Figure 3-2 shows the physical elements of the scenario. The Internet provides the coreinterconnecting fabric between the headquarters and remote ofce routers. Both theheadquarters and remote ofce are using a Cisco 7140-2T3 as a gateway router. Bothrouters have two high-speed synchronous serial T3 interfaces, two Fast Ethernet

10/100BaseT autosensing interfaces, and one Integrated Service Module (ISM) installed.The ISM provides hardware-based encryption services for any interface installed in therouter.

The GRE tunnel is congured on the rst serial interface in chassis slot 1 (serial 1/0) of theheadquarters and remote ofce routers. Fast Ethernet interface 0/0 of the headquartersrouter is connected to a corporate server and Fast Ethernet interface 0/1 is connected to aWeb server. Fast Ethernet interface 0/0 of the remote ofce router is connected to a PCclient.

CorporateIntranet

Headquartersrouter (hq-sanjose)

Remote officerouter (ro-rtp)

Remoteofficenetwork

Internet

Serial line Serial line

GRE tunnel

2 3 2 4 4

Page 33: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 33/112

Intranet VPN Business Scenario 3-3

Scenario Description

Figure 3-2 Intranet VPN Scenario Physical Elements

The conguration steps in the following sections are for the headquarters router, unlessnoted otherwise. Comprehensive conguration examples for both the headquarters andremote ofce routers are provided in the “Comprehensive Conguration Examples” sectionon page 3-37.

Table 3-1 lists the scenario’s physical elements.

Fast Ethernet0/010.1.3.3/24

Fast Ethernet0/010.1.4.2/24

Fast Ethernet0/1

10.1.6.4/24

Headquartersrouter (hq-sanjose)

Remote officerouter (ro-rtp)

InternetSerial 1/0

172.17.2.4/24

PublicWeb server10.1.6.5/24

Privatecorporateserver10.1.3.6/24

Tunnel interface 0172.17.3.3/24

Tunnel interface 1172.17.3.6/24

Serial 1/0172.17.2.5/24

PC A10.1.4.3/24

GRE tunnel

2 3 2 4 5

Page 34: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 34/112

Step 1—Configuring the Tunnel

Cisco 7100 Series VPN Configuration Guide3-4

Table 3-1 Physical Elements

Step 1—Conguring the TunnelTunneling provides a way to encapsulate packets inside of a transport protocol. Tunnelingis implemented as a virtual interface to provide a simple interface for conguration. Thetunnel interface is not tied to specic “passenger” or “transport” protocols, but rather, it isan architecture that is designed to provide the services necessary to implement any standardpoint-to-point encapsulation scheme. Because tunnels are point-to-point links, you mustcongure a separate tunnel for each link.

Tunneling has the following three primary components:

• Passenger protocol, which is the protocol you are encapsulating (AppleTalk, BanyanVINES, Connectionless Network Service [CLNS], DECnet, IP, or Internetwork PacketExchange [IPX])

• Carrier protocol, such as the generic routing encapsulation (GRE) protocol

• Transport protocol, such as IP, which is the protocol used to carry the encapsulatedprotocol

Figure 3-3 illustrates IP tunneling terminology and concepts.

Headquarters Network Remote Ofce Network

SiteHardware

WAN IPAddress

Ethernet IPAddress

SiteHardware

WAN IPAddress

Ethernet IPAddress

hq-sanjose Serial interface 1/0:172.17.2.4255.255.255.0

Tunnel interface 0:172.17.3.3

255.255.255.0

Fast EthernetInterface 0/0:10.1.3.3255.255.255.0

Fast Ethernet

Interface 0/1:10.1.6.4255.255.255.0

ro-rtp Serial interface 1/0:172.17.2.5255.255.255.0

Tunnel interface 1:172.17.3.6

255.255.255.0

Fast EthernetInterface 0/0:10.1.4.2255.255.255.0

Corporateserver

– 10.1.3.6 PC A – 10.1.4.3

Web server – 10.1.6.5

Page 35: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 35/112

Intranet VPN Business Scenario 3-5

Step 1—Configuring the Tunnel

Figure 3-3 IP Tunneling Terminology and Concepts

GRE is capable of handling the transportation of multiprotocol and IP multicast trafcbetween two sites, which only have IP unicast connectivity. The importance of usingtunnels in a VPN environment is based on the fact that IPSec encryption only works on IPunicast frames. Tunneling allows for the encryption and the transportation of multiprotocoltrafc across the VPN since the tunneled packets appear to the IP network as an IP unicastframe between the tunnel endpoints. Tunnels also enable the use of private network addressing across a service provider’s backbone without the need for running the Network Address Translation (NAT) feature, if all connectivity must go through the home gatewayrouter.

This section contains basic steps to congure a GRE tunnel and includes the followingtasks:

1 Conguring the Tunnel Interface, Source, and Destination

2 Verifying the Tunnel Interface, Source, and Destination

802.3 802.2 Payload

PayloadEthernet IP GRE

Normal packet

Tunnel packet

Passenger protocol

Encapsulation protocol

Transport protocol

2 4 2 1 7

Page 36: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 36/112

Step 1—Configuring the Tunnel

Cisco 7100 Series VPN Configuration Guide3-6

Conguring the Tunnel Interface, Source, and DestinationTo congure a GRE tunnel between the headquarters and remote ofce routers, you mustcongure a tunnel interface, source, and destination on the headquarters and remote ofcerouters. To do this, complete the following steps starting in global conguration mode.

Note The following procedureassumes the tunnel interface, source, and destination on theremote ofce router are congured with the values listed in Table 3-1.

Step Command Purpose

1 hq-sanjose(config)# interface tunnel 0hq-sanjose(config-if)# ip address 172.17.3.3255.255.255.0

Specify a tunnel interface number,enter interfacecongurationmode, andcongure an IP address and subnetmask on the tunnel interface. Thisexample congures IP address andsubnet mask 172.17.3.3 255.255.255.0for tunnel interface 0 on theheadquarters router.

2 hq-sanjose(config-if)# tunnel source 172.17.2.4255.255.255.0

Specify the tunnel interface’s sourceaddress and subnet mask. This example

uses the IP address and subnet mask of T3 serial interface 1/0 of theheadquarters router.

3 hq-sanjose(config-if)# tunnel destination172.17.2.5 255.255.255.0

Specify the tunnel interface’sdestination address. This example usesthe IP address and subnet mask of T3serial interface 1/0 of the remote ofcerouter.

4 hq-sanjose(config-if)# tunnel mode gre ip Congure GRE as the tunnel mode.

GRE is the default tunnelencapsulation mode, so this commandis considered optional.

Page 37: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 37/112

Intranet VPN Business Scenario 3-7

Verifying the Tunnel Interface, Source, and Destination

Note When conguring GRE, you must have only Cisco routers or access servers at bothends of the tunnel connection.

Verifying the Tunnel Interface, Source, and DestinationTo verify the conguration:

• Enter the show interfaces tunnel 0 EXEC command to view the tunnel interface’sstatus (both the interface and the interface’s line protocol should be “up”) andcongured IP addresses and encapsulation type.

hq-sanjose# show interfaces tunnel 0Tunnel0 is up, line protocol is up

Hardware is TunnelInternet address is 172.17.3.3/24MTU 1514 bytes, BW 180 Kbit, DLY 500000 usec,

reliablility 255/255, txload 1/255, rxload 1/255Encapsulation TUNNEL, loopback not setKeepalive set (10 sec)Tunnel source 172.17.2.4, destination 172.17.2.5Tunnel protocol/transport GRE/IP, key disabled, sequencing disabledChecksumming of packets disabled, fast tunneling enabled

Last input never, output 00:10:44, output hang neverLast clearing of "show interface" counters never

5 hq-sanjose(config)# interface tunnel 0hq-sanjose(config-if)# no shutdown%LINK-3-UPDOWN: Interface Tunnel0, changed stateto up

Bring up the tunnel interface. 1

6 hq-sanjose(config-if)# exithq-sanjose(config)# ip route 10.1.4.0255.255.255.0 tunnel 0

Exit back to global conguration modeand congure trafc from the remoteofce’s network through the tunnel.This example congures trafc fromthe remote ofce’s Fast Ethernet

network (10.1.4.0 255.255.255.0)through GRE tunnel 0.

1 This command changes the state of the tunnel interface from administratively down to up.

Step Command Purpose

Page 38: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 38/112

Step 2—Configuring Quality of Service

Cisco 7100 Series VPN Configuration Guide3-8

Queueing strategy:fifoOutput queue 0/0, 0 drops; input queue 0/75, 0 drops5 minute input rate 0 bits/sec, 0 packets/sec5 minute output rate 0 bits/sec, 0 packets/sec

0 packets input, 0 bytes, 0 no bufferReceived 0 broadcasts, 0 runts, 0 giants, 0 throttles0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort29 packets output, 2348 bytes, 0 underruns0 output errors, 0 collisions, 0 interface resets0 output buffer failures, 0 output buffers swapped out

• Try pinging the tunnel interface of the remote ofce router (this example uses the IP

address of tunnel interface 1 [172.17.3.6]):hq-sanjose(config)# ping 172.17.3.6

Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 172.17.3.6, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 4/5/8 ms

Tips

If you have trouble, make sure you are using the correct IP address and that you enabled thetunnel interface with the no shutdown command.

Step 2—Conguring Quality of ServiceCisco IOS quality of service (QoS) refers to the ability of a network to provide betterservice to selected network trafc over various underlying technologies including FrameRelay, Asynchronous Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, andIP-routed networks. In particular, QoS features provide better and more predictablenetwork service by:

• Supporting dedicated bandwidth

• Improving loss characteristics

• Avoiding and managing network congestion

• Shaping network trafc• Setting trafc priorities across the network

Page 39: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 39/112

Intranet VPN Business Scenario 3-9

Step 2—Configuring Quality of Service

You congure QoS features throughout a network to provide for end-to-end QoS delivery.The following three components are necessary to deliver QoS across a heterogeneousnetwork:

• QoS within a single network element, which includes queuing, scheduling, and trafcshaping features.

• QoS signaling techniques for coordinating QoS from end-to-end between network elements.

• QoS policing and management functions to control and administer end-to-end trafcacross a network.

Not all QoS techniques are appropriate for all network routers. Because edge routers andbackbone routers in a network do not necessarily perform the same operations, the QoStasks they perform might differ as well.

In general, edge routers perform the following QoS functions:

• Packet classication and prioritization

• Admission control, such as queuing and policing

• Bandwidth management

In general, backbone routers perform the following QoS functions:

• Congestion management

• Congestion avoidance

Cisco IOS QoS service models, features, and sample congurations are explained in detailin the Quality of Service Solutions Conguration Guide and the Quality of ServiceSolutions Command Reference . Refer to these two publications as you plan and implementa QoS strategy for your VPN, because there are various QoS service models and featuresthat you can implement on your VPN.

This section contains basic steps to congure QoS weighted fair queuing (WFQ), whichapplies priority (or weights) to identied trafc, on the GRE tunnel you congured in the“Step 1—Conguring the Tunnel” section on page 3-4 and includes the following tasks:

1 Conguring Weighted Fair Queuing

2 Verifying Weighted Fair Queuing

Page 40: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 40/112

Step 2—Configuring Quality of Service

Cisco 7100 Series VPN Configuration Guide3-10

Conguring Weighted Fair QueuingWFQ provides trafc priority management that automatically sorts among individual trafcstreams without requiring that you rst dene access lists. WFQ can also manage duplexdata streams such as those between pairs of applications, and simplex data streams such asvoice or video. There are two categories of WFQ sessions: high bandwidth and lowbandwidth. Low-bandwidth trafc has effective priority over high-bandwidth trafc, andhigh-bandwidth trafc shares the transmission service proportionally according to assignedweights.

When WFQ is enabled for an interface, new messages for high-bandwidth trafc streams

are discarded after the congured or default congestive messages threshold has been met.However, low-bandwidth conversations, which include control message conversations,continue to enqueue data. As a result, the fair queue may occasionally contain moremessages than its congured threshold number species.

With standard WFQ, packets are classied by ow. Packets with the same source IPaddress, destination IP address, source Transmission Control Protocol (TCP) or UserDatagram Protocol (UDP) port, or destination TCP or UDP port belong to the same ow.WFQ allocates an equal share of the bandwidth to each ow. Flow-based WFQ is alsocalled fair queuing because all ows are equally weighted.

To congure fair queuing on an interface, complete the following steps starting in globalconguration mode:

Step Command Purpose1 hq-sanjose(config)# interface serial 1/0 Specify an interface and enter interface

conguration mode. This example species serialinterface 1/0 on the headquarters router.

2 hq-sanjose(config-if)# fair-queue Congure fair queuing on the interface.

3 hq-sanjose(config-if)# exithq-sanjose(config)#

Exit back to global conguration mode.

Page 41: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 41/112

Intranet VPN Business Scenario 3-11

Verifying Weighted Fair Queuing

Verifying Weighted Fair QueuingTo verify the conguration:

• Enter the show interfaces serial 1/0 fair-queue EXEC command to see information onthe interface that is congured for WFQ.

hq-sanjose# show interfaces serial 1/0 fair-queueSerial1/0 queue size 0

packets output 35, drops 0WFQ: global queue limit 401, local queue limit 200

• Enter the show interfaces serial 1/0 EXEC command to verify the queuing for theinterface is WFQ.

hq-sanjose# show interfaces serial 1/0Serial1/0 is up, line protocol is up

Hardware is M2T-T3 pa

-Display text omitted-

Queueing strategy:weighted fairOutput queue:0/1000/64/0 (size/max total/threshold/drops)

Conversations 0/0/256 (active/max active/max total)Reserved Conversations 0/0 (allocated/max allocated)

-Display text omitted-

Step 3—Conguring EncryptionThe most important part of building a VPN is maintaining security, while allowingauthorized users access. The Integrated Service Module (ISM) in slot 5 of Cisco 7100series routers provides hardware-based data encryption services for Cisco 7100 seriesrouters. The hardware-based service provided by the ISM improves the overallperformance of Cisco 7100 series routers by off-loading data encryption processing fromthe main system processor. The ISM supports IP Security Protocol (IPSec), Internet KeyExchange (IKE), and Certication Authority (CA) interoperability features.

Page 42: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 42/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-12

IPSec is a framework of open standards, developed by the Internet Engineering Task Force(IETF), that provides data condentiality, data integrity, and data authentication betweenparticipating peers. IPSec provides these security services at the IP layer; it uses IKE tohandle negotiation of protocols and algorithms based on local policy, and to generate theencryption and authentication keys to be used by IPSec. IPSec can be used to protect oneor more data ows between a pair of hosts, between a pair of security gateways, or betweena security gateway and a host.

IKE is a hybrid security protocol that implements Oakley and SKEME key exchangesinside the Internet Security Association & Key Management Protocol (ISAKMP)framework. While IKE can be used with other protocols, its initial implementation is withthe IPSec protocol. IKE provides authentication of the IPSec peers, negotiates IPSecsecurity associations, and establishes IPSec keys. IPSec can be congured without IKE, butIKE enhances IPSec by providing additional features, exibility, and ease of congurationfor the IPSec standard.

CA interoperability is provided by the ISM in support of the IPSec standard. It permitsCisco IOS devices and CAs to communicate so that your Cisco IOS device can obtain anduse digital certicates from the CA. Although IPSec can be implemented in your network without the use of a CA, using a CA provides manageability and scalability for IPSec.

For the ISM in slot 5 of Cisco 7100 series routers to provide encryption services on theGRE tunnel congured in the “Step 1—Conguring the Tunnel” section on page 3-4, youmust complete the following steps:

1 Conguring IKE Policies (Creating policies)

2 Conguring IPSec (Creating access lists and transform sets)

3 Conguring Crypto Maps (Creating crypto maps and assigning maps to interfaces)

Optionally, you can congure CA interoperability. This guide does not explain how tocongure CA interoperability on your Cisco 7100 series router. Refer to the “IP Securityand Encryption” part of the Security Conguration Guide and the Security Command

Reference publications for detailed information on conguring CA interoperabilty.

Page 43: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 43/112

Intranet VPN Business Scenario 3-13

Configuring IKE Policies

Note This section only contains basic conguration information for enabling encryptionservices on the GRE tunnel congured in the “Step 1—Conguring the Tunnel” section onpage 3-4. Refer to the “IP Security and Encryption” part of the Security CongurationGuide and the Security Command Reference publications for detailed congurationinformation on IPSec, IKE, and CA.

Refer to the Integrated Service Adapter and Integrated Service Module Installation and Conguration publication for detailed conguration information on the ISM.

Conguring IKE PoliciesIKE is enabled by default. IKE does not have to be enabled for individual interfaces, but isenabled globally for all interfaces in the router. You must create IKE policies at each peer.An IKE policy denes a combination of security parameters to be used during the IKEnegotiation.

You can create multiple IKE policies, each with a different combination of parametervalues. If you do not congure any IKE policies, the router uses the default policy, whichis always set to the lowest priority, and which contains each parameter’s default value.

For each policy that you create, you assign a unique priority (1 through 10,000, with 1 beingthe highest priority). You can congure multiple policies on each peer—but at least one of these policies must contain exactly the same encryption, hash, authentication, andDife-Hellman parameter values as one of the policies on the remote peer. If you do notspecify a value for a parameter, the default value is assigned.

Note The default policy and the default values for congured policies do not show up inthe conguration when you issue a show running-cong EXEC command. Instead, to seethe default policy and any default values within congured policies, use the show cryptoisakmp policy EXEC command.

This section contains basic steps to congure IKE policies and includes the following tasks:

1 Creating Policies

2 Additional Conguration Required for IKE Policies

3 Verifying IKE Policies

Page 44: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 44/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-14

Creating PoliciesTo create an IKE policy, complete the following steps starting in global conguration mode:

Step Command Purpose

1 hq-sanjose(config)# crypto isakmp policy 1 Enter cong-isakmp command mode and identifythe policy to create. (Each policy is uniquelyidentied by the priority number you assign.) Thisexample congures policy 1.

2 hq-sanjose(config-isakmp)# encryption des Specify the encryption algorithm—56-bit DataEncryption Standard (DES [ des ]) or 168-bit

Triple DES ( 3des ). This example congures theDES algorithm, which is the default.

3 hq-sanjose(config-isakmp)# hash sha Specify the hash algorithm—Message Digest 5(MD5 [ md5 ]) or Secure Hash Algorithm (SHA[sha ]). This example congures SHA, which isthe default.

4 hq-sanjose(config-isakmp)# authentication pre-share

Specify the authentication method—presharedkeys ( pre-share ), RSA 1 encrypted nonces(rsa-encr ), or RSA signatures ( rsa-slg ). Thisexample congures preshared keys. The default isRSA signatures.

1 RSA = Rivest, Shamir, and Adelman.

5 hq-sanjose(config-isakmp)# group 1 Specify the Dife-Hellman groupidentier—768-bit Dife-Hellman ( 1) or 1024-bitDife-Hellman ( 2). This example congures768-bit Dife-Hellman, which is the default.

6 hq-sanjose(config-isakmp)# lifetime 86400 Specify the security association’s lifetime—inseconds. This example congures 86400 seconds(one day).

7 hq-sanjose(config-isakmp)# exithq-sanjose(config)#

Exit back to global conguration mode.

Page 45: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 45/112

Intranet VPN Business Scenario 3-15

Configuring IKE Policies

Additional Conguration Required for IKE PoliciesDepending on which authentication method you specify in your IKE policies, you need tocomplete an additional companion conguration before IKE and IPSec can successfullyuse the IKE policies.

Each authentication method requires an additional companion conguration as follows:

• RSA signatures method:

If you specify RSA signatures as the authentication method in a policy, you mustcongure the peers to obtain certicates from a Certication Authority (CA). (And, of

course, the CA must be properly congured to issue the certicates.) Congure thiscerticate support as described in the “Conguring Certication AuthorityInteroperability” chapter of the Security Conguration Guide.

The certicates are used by each peer to securely exchange public keys. (RSAsignatures requires that each peer has the remote peer’s public signature key.) Whenboth peers have valid certicates, they will automatically exchange public keys witheach other as part of any IKE negotiation in which RSA signatures are used.

• RSA encrypted nonces method:

If you specify RSA encrypted nonces as the authentication method in a policy, you needto ensure that each peer has the other peers’ public keys.

Unlike RSA signatures, the RSA encrypted nonces method does not use certicates to

exchange public keys. Instead, you ensure that each peer has the others’ public keys bydoing the following:

— Manually congure RSA keys as described in the “Conguring Internet KeyExchange Security Protocol” chapter of the Security Conguration Guide.

— Ensure that an IKE exchange using RSA signatures has already occurred betweenthe peers. (The peers’ public keys are exchanged during the RSA-signatures-basedIKE negotiations.)

To make this happen, specify two policies: a higher-priority policy with RSAencrypted nonces, and a lower-priority policy with RSA signatures. When IKEnegotiations occur, RSA signatures will be used the rst time because the peers donot yet have each others’ public keys. Then, future IKE negotiations will be able touse RSA-encrypted nonces because the public keys will have been exchanged.

Of course, this alternative requires that you have CA support congured.

Page 46: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 46/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-16

• Preshared keys authentication method:

If you specify preshared keys as the authentication method in a policy, you mustcongure these preshared keys as described in the following section “ConguringPreshared Keys.”

If RSA encryption is congured and signature mode is negotiated, the peer will requestboth signature and encryption keys. Basically, the router will request as many keys as theconguration will support. If RSA encryption is not congured, it will just request asignature key.

Conguring Preshared KeysTo congure preshared keys, perform these tasks at each peer that uses preshared keys inan IKE policy:

1 Set each peer’s ISAKMP identity. Each peer’s identity should be set to either its hostname or by its IP address. By default, a peer’s identity is set to its IP address.

2 Specify the shared keys at each peer. Note that a given preshared key is shared betweentwo peers. At a given peer, you could specify the same key to share with multiple remotepeers; however, a more secure approach is to specify different keys to share betweendifferent pairs of peers.

To specify preshared keys at a peer, complete the following steps in global conguration

mode:Step Command Purpose

1 hq-sanjose(config)# crypto isakmpidentity address

At the local peer : Specify the ISAKMP identity(address o r hostname ) the headquarters router willuse when communicating with the remote ofcerouter during IKE negotiations. This examplespecies the address keyword, which uses IPaddress 172.17.2.4 (serial interface 1/0 of theheadquarters router) as the identity for theheadquarters router.

Page 47: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 47/112

Intranet VPN Business Scenario 3-17

Configuring IKE Policies

Note Set an ISAKMP identity whenever you specify preshared keys. The addresskeyword is typically used when there is only one interface (and therefore only one IPaddress) that will be used by the peer for IKE negotiations, and the IP address is known.Use the hostname keyword if there is more than one interface on the peer that might beused for IKE negotiations, or if the interface’s IP address is unknown (such as withdynamically-assigned IP addresses).

2 hq-sanjose(config)# crypto isakmp key12345 address 172.17.2.5

At the local peer : Specify the shared key theheadquarters router will use with the remote ofcerouter. This example congures the shared key12345 to be used with the remote peer 172.17.2.5(serial interface 1/0 on the remote ofce router).

3 ro-rtp(config)# crypto isakmp identityaddress

At the remote peer : Specify the ISAKMP identity(address o r hostname ) the remote ofce router willuse when communicating with the headquartersrouter during IKE negotiations. Again, this examplespecies the address keyword, which uses IPaddress 172.17.2.5 (serial interface 1/0 of the remoteofce router) as the identity for the remote ofcerouter.

4 ro-rtp(config)# crypto isakmp key 12345address 172.17.2.4

At the remote peer : Specify the shared key to beused with the local peer. This is the same key you

just specied at the local peer. This examplecongures the shared key 12345 to be used with thelocal peer 172.17.2.4 (serial interface 1/0 on theheadquarters router).

Step Command Purpose

Page 48: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 48/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-18

Verifying IKE PoliciesTo verify the conguration:

• Enter the show crypto isakmp policy EXEC command to see the default policy and anydefault values within congured policies.

hq-sanjose# show crypto isakmp policyProtection suite priority 1

encryption algorithm: DES - Data Encryption Standard (56 bit keys)hash algorithm: Secure Hash Standardauthentication method: Pre-Shared KeyDiffie-Hellman group: #1 (768 bit)

lifetime: 86400 seconds, no volume limit

Note Although the above output shows “no volume limit” for the lifetimes, you cancurrentlyonly congure a time lifetime (such as 86400 seconds); volume limit lifetimesarenot congurable.

Tips

If you have trouble, use the show version command to ensureyour Cisco 7100 series routeris running a Cisco IOS software image that supports crypto.

hq-sanjose# show versionCisco Internetwork Operating System SoftwareIOS (tm) EGR Software (c7100-JOS56I-M), Release Version 12.0(4)XECopyright (c) 1986-1999 by cisco Systems, Inc.Compiled Mon 22-Mar-99 21:41 by biffImage text-base:0x600088F8, data-base:0x611CE000

ROM:System Bootstrap, Version 12.0(4)XE RELEASE SOFTWARE

router uptime is 20 hours, 34 minutesSystem restarted by reload at 22:36:57 PST Fri Dec 31 1999System image file is "c7100-jos56i-mz"

cisco 7140 (EGR) processor with 188416K/139264K bytes of memory.R7000 CPU at 262Mhz, Implementation 39, Rev 1.0, 256KB L2, 2048KB L3CacheLast reset from power-on

Page 49: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 49/112

Intranet VPN Business Scenario 3-19

Configuring IPSec

Bridging software.X.25 software, Version 3.0.0.SuperLAT software copyright 1990 by Meridian Technology Corp).TN3270 Emulation software.3 FastEthernet/IEEE 802.3 interface(s)2 Serial network interface(s)125K bytes of non-volatile configuration memory.

40960K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).8192K bytes of Flash internal SIMM (Sector size 256K).Configuration register is 0x0

Conguring IPSecAfter you have completed IKE conguration, congure IPSec at each participating IPSecpeer. This section contains basic steps to congure IPSec and includes the following tasks:

1 Setting Global Lifetimes for IPSec Security Associations

2 Verifying Global Lifetimes for IPSec Security Associations

3 Creating Crypto Access Lists

4 Verifying Crypto Access Lists

5 Dening Transform Sets

6 Verifying Transform Sets

Note IKE uses UDP port 500. The IPSec encapsulating security payload (ESP) andauthentication header (AH) protocols use IP protocol numbers 50 and 51. Ensure that youraccess lists are congured so that IP protocol 50, 51, and UDP port 500 trafc is not blockedat interfaces used by IPSec. In some cases, you might need to add a statement to your accesslists to explicitly permit this trafc.

Page 50: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 50/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-20

Setting Global Lifetimes for IPSec Security AssociationsYou can change theglobal lifetime values which areused when negotiating new IPSec SAs.(These global lifetime values can be overridden for a particular crypto map entry). Theselifetimes only apply to security associations established using IKE. Manually establishedsecurity associations do not expire.

There are two lifetimes: a “timed” lifetime and a “trafc-volume” lifetime. An SA expiresafter therst of these lifetimes is reached. Thedefault lifetimesare3600 seconds (one hour)and 4,608,000 kilobytes (10 megabytes per second for one hour).

If you change a global lifetime, the new lifetime value will not be applied to currently

existing SAs, but will be used in the negotiation of subsequently established SAs. To usethe new values immediately, you can clear all or part of the SA database using the clearcrypto sa command.

IPSec SAs use one or more shared secret keys. These keys and their SAs time out together.

To change a global lifetime for IPSec SAs, enter one or more of the following commandsin global conguration mode:

Verifying Global Lifetimes for IPSec Security AssociationsTo verify the conguration:

• Enter the show crypto ipsec security-association-lifetime EXEC command to seeglobal security association lifetime values.

hq-sanjose# show crypto ipsec security-association-lifetimeSecurity association lifetime:4608000 kilobytes/3600 seconds

Command Purpose

hq-sanjose(config)# crypto ipsecsecurity-association lifetime seconds 3600

Change the global timed lifetime for IPSec SAs.This example congures the SA to time out after3600 seconds.

hq-sanjose(config)# crypto ipsecsecurity-association lifetime kilobytes 4608000

Change the global trafc-volume lifetime for IPSecSAs. This example congures the SA to time outafter 4,608,000 kilobytes of trafc have passedthrough the IPSec tunnel using the SA.

Page 51: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 51/112

Intranet VPN Business Scenario 3-21

Configuring IPSec

Creating Crypto Access ListsCrypto access lists are used to dene which IP trafc will be protected by crypto and whichtrafc will not be protected by crypto. (These access lists are not the same as regular accesslists, which determine what trafc to forward or block at an interface.) For example, youcan create access lists to protect all IP trafc between the headquarters router and remoteofce router or Telnet trafc between the headquarters router and remote ofce router.

The access lists themselves are not specic to IPSec. It is the crypto map entry referencingthe specic access list that denes whether IPSec processing is applied to the trafcmatching a permit in the access list.

To create a crypto access list, enter the following command in global conguration mode:

Verifying Crypto Access ListsTo verify the conguration:

• Enter the show access-lists 101 EXEC command to see the access list’s attributes.

hq-sanjose# show access-lists 101Extended IP access list 101

permit gre host 172.17.2.4 host 172.17.2.5

Tips

If you have trouble, make sure you are specifying the correct access list number.

Command Purpose

hq-sanjose(config)# access-list 101 permitgre host 172.17.2.4 host 172.17.2.5

Specify conditions to determine which IP packets areprotected. 1 (Enable or disable crypto for trafc thatmatches these conditions.) This example conguresaccess list 101 to encrypt all GRE trafc between serialinterface 1/0 on the headquarters router (IP address172.17.2.4) and serial interface 1/0 on the remote ofcerouter (IP address 172.17.2.5).

1 You specify conditions using an IP access list designated by either a number or a name. The access-list command designates anumbered extended access list; the ip access-list extended command designates a named access list.

Page 52: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 52/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-22

Dening Transform SetsA transform set represents a certain combination of security protocols and algorithms.During the IPSec SA negotiation, the peers agree to use a particular transform set forprotecting a particular data ow.

You can specify multiple transform sets, and then specify one or more of these transformsets in a crypto map entry. The transform set dened in the crypto map entry will be usedin the IPSec SA negotiation to protect the data ows specied by that crypto map entry’saccess list.

During IPSec SA negotiations with IKE, the peers search for a transform set that is the same

at both peers. When such a transform set is found, it is selected and is applied to theprotected trafc as part of both peers’ IPSec SAs.

With manually established SAs, there is no negotiation with the peer, so both sides mustspecify the same transform set.

If you change a transform set denition, the change is only applied to crypto map entriesthat reference the transform set. The change will not be applied to existing SAs, but will beused in subsequent negotiations to establish new SAs.

To dene a transform set, complete the following steps starting in global congurationmode:

Step Command Purpose

1 hq-sanjose(config)# crypto ipsectransform-set proposal1 ah-sha-hmacesp-des esp-sha-hmac

Dene a transform set and enter crypto-transformconguration mode. This example combines AH 1

transform ah-sha-hmac, ESP 2 encryption transformesp-des, and ESP 2 authentication transformesp-sha-hmac in the transform set proposal1.

There are complex rules dening which entries youcan use for the transform arguments. These rules areexplained in the command description for the cryptoipsec transform-set command. You can also use thecrypto ipsec transform-set? command, in globalconguration mode, to view the available transformarguments.

Page 53: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 53/112

Intranet VPN Business Scenario 3-23

Configuring IPSec

Note AH and ESP can be used independently or together, although for most applications just one of them is sufcient. For both of these protocols, IPSec does not dene the specicsecurity algorithms to use, but rather, provides an open framework for implementingindustry-standard algorithms.

2 hq-sanjose(cfg-crypto-trans)# modetransport

Change the mode associated with the transform set.The mode setting is only applicable to trafc whosesource and destination addresses are the IPSec peeraddresses; it is ignored for all other trafc. (All othertrafc is in tunnel mode only.) This examplecongures transport mode for the transport setproposal1.

3 hq-sanjose(cfg-crypto-trans)# exithq-sanjose(config)#

Exit back to global conguration mode.

1 AH= authentication header. This header, when added toan IP datagram, ensures the integrity and authenticityof the data, includingthe invariant fields in the outer IP header. It does not provide confidentiality protection. AH uses a keyed-hash function rather thandigital signatures.

2 ESP = encapsulating security payload. This header, when added to an IP datagram, protects the confidentiality, integrity, andauthenticity of the data. If ESP is used to validate data integrity, it does not include the invariant fields in the IP header.

Step Command Purpose

Page 54: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 54/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-24

Note In IPSec transport mode, only the IP payload is encrypted, and the original IPheaders are left intact. (See Figure 3-4.) This mode has the advantage of adding only a fewbytes to each packet. It also allows devices on the public network to see the nal source anddestination of the packet. This capability allows you to enable special processing (forexample, QoS) in the intermediate network based on the information in the IP header.However, the Layer 4 header will be encrypted, limiting the examination of the packet.Unfortunately, by passing the IP header in the clear, transport mode allows an attacker toperform some trafc analysis.

In IPSec tunnel mode, the entire original IP datagram is encrypted, and it becomes thepayload in a new IP packet. This mode allows a network device, such as a router, to act asan IPSec proxy. That is, the router performs encryption on behalf of the hosts. The source’srouter encrypts packets and forwards them along the IPSec tunnel. The destination’s routerdecrypts the original IP datagram and forwards it on to the destination system. The majoradvantage of tunnel mode is that the end systems do not need to be modied to receive thebenets of IPSec. Tunnel mode also protects against trafc analysis; with tunnel mode anattacker can only determine the tunnel endpoints and not the true source and destination of the tunneled packets, even if they are the same as the tunnel endpoints. (See the “DeningTransform Sets and Conguring IPSec Tunnel Mode” section on page 4-13 for an IPSectunnel conguration example.)

Page 55: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 55/112

Intranet VPN Business Scenario 3-25

Configuring IPSec

Figure 3-4 IPSec in Tunnel and Transport Modes

Verifying Transform Sets

To verify the conguration:

• Enter the show crypto ipsec transform-set EXEC command to see the type of transform set congured on the router.

hq-sanjose# show crypto ipsec transform-setTransform set proposal1: { ah-sha-hmac }

will negotiate = { Mode, },{ esp-des esp-sha-hmac }will negotiate = { Mode, },

IP HDR

2 3 2 4 6

Data

EncryptedTunnel mode

IP HDR Data

Encrypted

IPSec HDRNew IP HDR

IP HDR Data

Transport mode

DataIPSec HDRIP HDR

Page 56: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 56/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-26

Conguring Crypto MapsCrypto map entries created for IPSec pull together the various parts used to set up IPSecSAs, including:

• Which trafc should be protected by IPSec (per a crypto access list).

• The granularity of the ow to be protected by a set of SAs.

• Where IPSec-protected trafc should be sent (who the remote IPSec peer is).

• The local address to be used for the IPSec trafc. (See the “Applying Crypto Maps toInterfaces” section on page 3-30 for more details.)

• What IPSec security should be applied to this trafc (selecting from a list of one or moretransform sets).

• Whether SAs are manually established or are established via IKE.

• Other parameters that might be necessary to dene an IPSec SA.

Crypto map entries with the same crypto map name (but different map sequence numbers)are grouped into a crypto map set. Later, you will apply these crypto map sets to interfaces;then, all IP trafc passing through the interface is evaluated against the applied crypto mapset. If a crypto map entry sees outbound IP trafc that should be protected and the cryptomap species the use of IKE, a security association is negotiated with the remote peeraccording to the parameters included in the crypto map entry; otherwise, if the crypto map

entry species the use of manual security associations, a security association should havealready been established via conguration. (If a dynamic crypto map entry sees outboundtrafc that should be protected and no security association exists, the packet is dropped.)

The policy described in the crypto map entries is used during the negotiation of securityassociations. If the local router initiates the negotiation, it will use the policy specied inthe static crypto map entries to create the offer to be sent to the specied IPSec peer. If theIPSec peer initiates the negotiation, the local router will check the policy from the staticcrypto map entries, as well as any referenced dynamic crypto mapentries to decidewhetherto accept or reject the peer’s request (offer).

For IPSec to succeed between twoIPSec peers, both peers’crypto map entries must containcompatible conguration statements.

Page 57: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 57/112

Intranet VPN Business Scenario 3-27

Configuring Crypto Maps

When two peers try to establish a SA, they must each have at least one crypto map entrythat is compatible with one of the other peer’s crypto map entries. For two crypto mapentries to be compatible, they must at least meet the following criteria:

• The crypto map entries must contain compatible crypto access lists (for example, mirrorimage access lists). In thecase where the responding peer is using dynamic cryptomaps,the entries in the local crypto access list must be “permitted” by the peer’s crypto accesslist.

• The crypto map entries must each identify the other peer (unless the responding peer isusing dynamic crypto maps).

• The crypto map entries must have at least one transform set in common.

When IKE is used to establish SAs, the IPSec peers can negotiate the settings they will usefor the new SAs. This means that you can specify lists (such as lists of acceptabletransforms) within the crypto map entry.

After you have completed conguring IPSec at each participating IPSec peer, congurecrypto map entries and apply the crypto maps to interfaces. This section contains basicsteps to congure crypto maps and includes the following tasks:

1 Creating Crypto Map Entries

2 Verifying Crypto Map Entries

3 Applying Crypto Maps to Interfaces

4 Verifying Crypto Map Interface Associations

Page 58: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 58/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-28

Creating Crypto Map EntriesTo create a crypto map entry that will use IKE to establish the SAs, complete the followingsteps starting in global conguration mode:

Step Command Purpose

1 hq-sanjose(config)# crypto map s1firstlocal-address serial 1/0

Create the crypto map and specify alocal address (physical interface) to beused for the IPSec trafc. This examplecreates crypto map s1rst and speciesserial interface 1/0 of the headquarters

router as the local address.2 hq-sanjose(config)# crypto map s1first 1

ipsec-isakmpEnter crypto map conguration mode,specify a sequence number for thecrypto map you created in Step 1, andcongure the crypto map to use IKE toestablish SAs. This example conguressequence number 1 and IKE for cryptomap s1rst.

3 hq-sanjose(config-crypto-map)# match address 101 Specify an extended access list. Thisaccess list determines which trafc isprotected by IPSec and which trafc isnot be protected by IPSec. Thisexample congures access list 101,

which was created in the “CreatingCrypto Access Lists” section onpage 3-21.

4 hq-sanjose(config-crypto-map)# set peer172.17.2.5

Specify a remote IPSec peer (by hostname or IP address). This is the peer towhich IPSec protected trafc can beforwarded. This example speciesserial interface 1/0 (172.17.2.5) on theremote ofce router.

Page 59: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 59/112

Intranet VPN Business Scenario 3-29

Configuring Crypto Maps

Verifying Crypto Map EntriesTo verify the conguration:

• Enter the show crypto map EXEC command to see the crypto map entries conguredon the router.

In the following example, peer 172.17.2.5 is the IP address of the remote IPSec peer.“Extended IP access list 101” lists the access list associated with the crypto map.“Current peer” indicates the current IPSec peer. “Security-association lifetime”indicates the lifetime of the SA. “PFS N” indicates that IPSec will not negotiate perfectforward secrecy when establishing new SAs for this crypto map. “Transform sets”indicates the name of the transform set that can be used with the crypto map.

hq-sanjose# show crypto mapCrypto Map: “s1first” idb: Serial1/0 local address: 172.17.2.4Crypto Map “s1first” 1 ipsec-isakmp

Peer = 172.17.2.5Extended IP access list 101

access-list 101 permit gresource: addr = 172.17.2.4/255.255.255.0dest: addr = 172.17.2.5/255.255.255.0

Current peer: 172.17.2.5Security-association lifetime: 4608000 kilobytes/3600 secondsPFS (Y/N): NTransform sets={proposal1,}

5 hq-sanjose(config-crypto-map)# set transform-set proposal1

Specify which transform sets areallowed for this crypto map entry. Listmultiple transform sets in order of priority (highest priority rst). Thisexample species transform setproposal1, which was congured in the“Dening Transform Sets” section onpage 3-22.

6 hq-sanjose(config-crypto-map)# exithq-sanjose(config)#

Exit back to global conguration mode.

Step Command Purpose

Page 60: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 60/112

Step 3—Configuring Encryption

Cisco 7100 Series VPN Configuration Guide3-30

Tips

If you have trouble, make sure you are using the correct IP addresses.

Applying Crypto Maps to InterfacesYou need to apply a crypto map set to each interface through which IPSec trafc will ow.Applying the crypto map set to an interface instructs the router to evaluateall the interface’strafc against the crypto map set and to use the specied policy during connection or SAnegotiation on behalf of trafc to be protected by crypto.

To apply a crypto map set to an interface, complete the following steps starting in globalconguration mode:

Step Command Purpose

1 hq-sanjose(config)# interfaceserial 1/0

Specify a physical interface on which to apply thecrypto map and enter interface congurationmode. This example species serial interface 1/0on the headquarters router.

2 hq-sanjose(config-if)# crypto maps1first

Apply the cryptomap set to thephysical interface.This example congures crypto map s1rst,which was created in the “Creating Crypto MapEntries” section on page 3-28.

3 hq-sanjose(config-if)# exithq-sanjose(config)#

Exit back to global conguration mode.

4 hq-sanjose(config)# interfacetunnel 0

Specify the tunnel interface on which to apply thecrypto map and enter interface congurationmode. This example species tunnel interface 0on the headquarters router.

5 hq-sanjose(config-if)# crypto maps1first

Apply the crypto map set to the tunnel interface.This example congures crypto map s1rst on thetunnel interface 0.

6 hq-sanjose(config-if)# exithq-sanjose(config)#

Exit back to global conguration mode.

Page 61: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 61/112

Intranet VPN Business Scenario 3-31

Configuring Crypto Maps

For redundancy, you could apply the same crypto map set to more than one interface. Thedefault behavior is as follows:

• Each interface will have its own piece of the SA database.

• The IP address of the local interface will be used as the local address for IPSec trafcoriginating from or destined to that interface.

If you apply the same crypto map set to multiple interfaces for redundancy purposes, youneed to specify an identifying interface. This has the following effects:

• The per-interface portion of the IPSec SA database will be established one time andshared for trafc through all the interfaces that share the same crypto map.

• The IP address of the identifying interface will be used as the local address for IPSectrafc originating from or destined to those interfaces sharing the same crypto map set.

One suggestion is to use a loopback interface as the identifying interface.

Use the crypto map map-name local-address interface-id command in globalconguration mode to specify redundant interfaces and name an identifying interface. Thiscommand permits redundant interfaces to share the same crypto map, using the same localidentity.

7 hq-sanjose# clear crypto sa In privileged EXEC mode, clear the existingIPSec SAs so that any changes are usedimmediately. (Manually established SAs arereestablished immediately.)

Note Using the clear crypto sa commandwithoutparameters clears out the fullSA database,which clears out active security sessions. You mayalso specify the peer , map , or entry keywords toclear out only a subset of the SA database.

Step Command Purpose

Page 62: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 62/112

Step 4—Configuring Cisco IOS Firewall Features

Cisco 7100 Series VPN Configuration Guide3-32

Verifying Crypto Map Interface AssociationsTo verify the conguration:

• Enter the show crypto map interface serial 1/0 EXEC command to see the cryptomaps applied to the interface.

hq-sanjose# show crypto map interface serial 1/0Crypto Map "s1first" 1 ipsec-isakmp

Peer = 172.17.2.5Extended IP access list 101

access-list 101 permit gre host 172.17.2.4 host 172.17.2.5Current peer:172.17.2.5

Security association lifetime:4608000 kilobytes/1000 secondsPFS (Y/N):NTransform sets={ proposal1, }

• Enter the show crypto map interface tunnel 0 EXEC command to see the crypto mapsapplied to the tunnel interface.

hq-sanjose# show crypto map interface tunnel 0Crypto Map "s1first" 1 ipsec-isakmp

Peer = 172.17.2.5Extended IP access list 101

access-list 101 permit gre host 172.17.2.4 host 172.17.2.5Current peer:172.17.2.5Security association lifetime:4608000 kilobytes/1000 secondsPFS (Y/N):N

Transform sets={ proposal1, }

Step 4—Conguring Cisco IOS Firewall FeaturesCisco IOS software provides an extensive set of security features that allow you tocongure a simple or elaborate rewall, according to your particular requirements. Whenyou congure Cisco IOS Firewall features on your Cisco router, you turn your router intoan effective, robust rewall.

Cisco IOS Firewall features are designed to prevent unauthorized, external individuals fromgaining access to your internal network, and to block attacks on your network, while at thesame time allowing authorized users to access network resources.

Page 63: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 63/112

Intranet VPN Business Scenario 3-33

Step 4—Configuring Cisco IOS Firewall Features

You can use Cisco IOS Firewall features to congure your Cisco IOS router as:

• An Internet rewall or part of an Internet rewall

• A rewall between groups in your internal network

• A rewall providing secure connections to or from branch ofces

• A rewall between your company’s network and your company’s partners’ networks

Cisco IOS Firewall features provides the following benets:

• Protects internal networks from intrusion

• Monitors trafc through network perimeters

• Enables network commerce using the World Wide Web

At a minimum, you must congure basic trafc ltering to provide a basic rewall. You cancongure your Cisco 7100 series router to function as a rewall by using the followingCisco IOS security features:

• Static Access Lists and Static or Dynamic Extended Access Lists

• Lock-and-Key (Dynamic Extended Access Lists)

• Reective Access Lists

• TCP Intercept

• Context-Based Access Control

• Security Server Support

• Network Address Translation

• Cisco Encryption Technology

• IPSec Network Security

• Neighbor Router Authentication

• Event Logging

• User Authentication and Authorization

Page 64: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 64/112

Page 65: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 65/112

Intranet VPN Business Scenario 3-35

Creating Extended Access Lists Using Access List Numbers

Creating Extended Access Lists Using Access List NumbersTo create an extended access list that denies and permits certain types of trafc, completethe following steps starting in global conguration mode:

Verifying Extended Access ListsTo verify the conguration:

• Enter the show access-lists 102 EXEC command to display the contents of the accesslist.

hq-sanjose# show access-list 102Extended IP access list 102

deny tcp any anydeny udp any anypermit ip any any

Step Command Purpose

1 hq-sanjose(config)# access-list 102 deny tcp any any Dene access list 102 andcongure the access list to deny allTCP trafc.

2 hq-sanjose(config)# access-list 102 deny udp any any Congure access list 102 to denyall UDP trafc.

3 hq-sanjose(config)# access-list 102 permit ip any any Congure access list 102 to permitall IP trafc.

Page 66: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 66/112

Step 4—Configuring Cisco IOS Firewall Features

Cisco 7100 Series VPN Configuration Guide3-36

Applying Access Lists to InterfacesAfter you create an access list, you can apply it to one or more interfaces. Access lists canbe applied on either outbound or inbound interfaces.

To apply an access list inbound and outbound on an interface, complete the following stepsstarting in global conguration mode:

For inbound access lists, after receiving a packet, the Cisco IOS software checks the sourceaddress of the packet against the access list. If the access list permits the address, the

software continues to process the packet. If the access list rejects the address, the softwarediscards the packet and returns an “ICMP Host Unreachable” message.

For outbound access lists, after receiving and routing a packet to a controlled interface, thesoftware checks the destination address of the packet against the access list. If the accesslist permits the address, the software transmits the packet. If the access list rejects theaddress, the software discards the packet and returns an “ICMP Host Unreachable”message.

When you apply an access list that has not yet been dened to an interface, the softwareacts as if the access list has not been applied to the interface and will accept all packets. Beaware of this behavior if you use undened access lists as a means of security in yournetwork.

Step Command Purpose

1 hq-sanjose(config)# interface serial 1/0 Specify serial interface 1/0 on theheadquarters router and enter interface

conguration mode.2 hq-sanjose(config-if)# ip access-group 102 in Congure access list 102 inbound on

serial interface 1/0 on the headquartersrouter.

3 hq-sanjose(config-if)# ip access-group 102 out Congure access list 102 outbound onserial interface 1/0 on the headquartersrouter.

4 hq-sanjose(config-if)# exithq-sanjose(config)#

Exit back to global conguration mode.

Page 67: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 67/112

Intranet VPN Business Scenario 3-37

Verifying Extended Access Lists Are Applied Correctly

Verifying Extended Access Lists Are Applied CorrectlyTo verify the conguration:

• Enter the show ip interface serial 1/0 EXEC command to conrm the access list isapplied correctly (inbound and outbound) on the interface.

hq-sanjose# show ip interface serial 1/0Serial1/0 is up, line protocol is up

Internet address is 172.17.2.4Broadcast address is 255.255.255.255Address determined by setup commandPeer address is 172.17.2.5MTU is 1500 bytesHelper address is not setDirected broadcast forwarding is disabledOutgoing access list is 102Inbound access list is 102

-Display text omitted-

Tips

If you have trouble, ensure that you specied the correct interface when you applied theaccess list.

Comprehensive Conguration ExamplesFollowing are comprehensive sample congurations for the headquarters router and remoteofce router.

Headquarters Router Congurationhq-sanjose# show running-configBuilding configuration...

Current configuration:!version 12.0service timestamps debug uptime

service timestamps log uptimeno service password-encryption

Page 68: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 68/112

Comprehensive Configuration Examples

Cisco 7100 Series VPN Configuration Guide3-38

!hostname hq-sanjose!boot system flash bootflash:boot bootldr bootflash:c7100-boot-mz.120-1.1.Tboot config slot0:hq-sanjose-cfg-smallno logging buffered!crypto isakmp policy 1

authentication pre-sharelifetime 84600

crypto isakmp key 12345 address 172.17.2.5

!crypto ipsec transform-set proposal1 ah-sha-hmac esp-des esp-sha-hmacmode transport!

!crypto map s1first local-address Serial1/0crypto map s1first 1 ipsec-isakmpset peer 172.17.2.5set transform-set proposal1match address 101

!interface Tunnel0

bandwidth 180ip address 172.17.3.3 255.255.255.0no ip directed-broadcasttunnel source 172.17.2.4tunnel destination 172.17.2.5crypto map s1first

!interface FastEthernet0/0

ip address 10.1.3.3 255.255.255.0no ip directed-broadcastno keepalivefull-duplexno cdp enable

!interface FastEthernet0/1

ip address 10.1.6.4 255.255.255.0no ip directed-broadcastno keepalivefull-duplex

no cdp enable!

Page 69: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 69/112

Intranet VPN Business Scenario 3-39

Headquarters Router Configuration

interface Serial1/0ip address 172.17.2.4 255.255.255.0no ip directed-broadcastno ip mroute-cacheno keepalivefair-queue 64 256 0framing c-bitcablelength 10dsu bandwidth 44210clock source internalno cdp enablecrypto map s1first

!ip route 10.1.4.0 255.255.255.0 Tunnel0!access-list 101 permit gre host 172.17.2.4 host 172.17.2.5access-list 102 deny tcp any anyaccess-list 102 deny udp any anyaccess-list 102 permit ip any any!line con 0

transport input noneline aux 0line vty 0 4

login!end

Page 70: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 70/112

Comprehensive Configuration Examples

Cisco 7100 Series VPN Configuration Guide3-40

Remote Ofce Router Congurationro-rtp# show running-configBuilding configuration...

Current configuration:!version 12.0service timestamps debug uptimeservice timestamps log uptimeno service password-encryption!

hostname ro-rtp!boot system flash bootflash:boot bootldr bootflash:c7100-boot-mz.120-1.1.Tboot config slot0:ro-rtp-cfg-smallno logging buffered!crypto isakmp policy 1

authentication pre-sharelifetime 84600

crypto isakmp key 12345 address 172.17.2.4!crypto ipsec transform-set proposal1 ah-sha-hmac esp-des esp-sha-hmacmode transport!

!crypto map s1first local-address Serial1/0crypto map s1first 1 ipsec-isakmpset peer 172.17.2.4set transform-set proposal1match address 101

!interface Tunnel1

bandwidth 180ip address 172.17.3.6 255.255.255.0no ip directed-broadcasttunnel source 172.17.2.5tunnel destination 172.17.2.4crypto map s1first

!

Page 71: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 71/112

Intranet VPN Business Scenario 3-41

Remote Office Router Configuration

interface FastEthernet0/0ip address 10.1.4.2 255.255.255.0no ip directed-broadcastno keepalivefull-duplexno cdp enable

!interface Serial1/0

ip address 172.17.2.5 255.255.255.0no ip directed-broadcastno ip mroute-cacheno keepalive

fair-queue 64 256 0framing c-bitcablelength 10dsu bandwidth 44210clock source internalno cdp enablecrypto map s1first

!ip route 10.1.3.0 255.255.255.0 Tunnel1ip route 10.1.6.0 255.255.255.0 Tunnel1!access-list 101 permit gre host 172.17.2.5 host 172.17.2.4access-list 102 deny tcp any anyaccess-list 102 deny udp any anyaccess-list 102 permit ip any any!line con 0

transport input noneline aux 0line vty 0 4

login

!end

Page 72: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 72/112

Comprehensive Configuration Examples

Cisco 7100 Series VPN Configuration Guide3-42

Page 73: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 73/112

C H A P T E R

Extranet VPN Business Scenario 4-1

4

Extranet VPN BusinessScenarioThis chapter explains the basic tasks for conguring an IP-based, extranet Virtual PrivateNetwork (VPN) on a Cisco 7100 series router using IP Security Protocol (IPSec) as thetunneling protocol. Only Network Address Translation (NAT), basic security, Cisco IOSweighted fair queuing (WFQ), and extended access lists for basic trafc ltering arecongured.

This chapter includes the following sections:

• Scenario Description, page 4-2

• Step 1—Conguring Network Address Translation, page 4-4

• Step 2—Conguring Encryption and an IPSec Tunnel, page 4-9

• Step 3—Conguring Quality of Service, page 4-22

•Step 4—Conguring Cisco IOS Firewall Features, page 4-23

• Comprehensive Conguration Examples, page 4-27

Note Throughout this chapter, there are numerous conguration examples and sampleconguration outputs that include unusable IP addresses. Be sure to use your own IPaddresses when conguring your Cisco 7100 series router.

Page 74: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 74/112

Scenario Description

Cisco 7100 Series VPN Configuration Guide4-2

Scenario DescriptionThe extranet scenario introduced in Figure 4-1 builds on the intranet scenario introduced inChapter 3, “Intranet VPN Business Scenario,” by providing a business partner access to thesame headquarters network. In the extranet scenario, the headquarters and business partnerare connected through a secure IPSec tunnel and the business partner is given access onlyto the headquarters public Web server to perform various IP-based network tasks, such asplacing and managing product orders.

Figure 4-1 Extranet VPN Business Scenario

Figure 4-2 shows the physical elements of the scenario. As in the intranet business scenarioexplained in Chapter 3, “Intranet VPN Business Scenario,” the Internet provides the coreinterconnecting fabric between the headquarters and business partner routers. Like theheadquartersofce, thebusinesspartner is also using a Cisco 7140-2T3 as a gateway router,which has two high-speed synchronous serial T3 interfaces, two Fast Ethernet10/100BaseT autosensing interfaces, and one Integrated Service Module (ISM) installed.The ISM provides hardware-based encryption for all interfaces installed in the router,including the IP Security Protocol (IPSec) tunneling services for the serial connection

between the headquarters and business partner routers.

CorporateIntranet

Headquartersrouter (hq-sanjose) Remote office

router (ro-rtp)

Remoteofficenetwork

Internet

Serial line Serial line

GRE tunnel

2 4 2 1 9

Business partnerrouter (bus-ptnr)

Internet

Serial line

Serial line

IPSec tunnel

Businesspartnernetwork

Page 75: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 75/112

Extranet VPN Business Scenario 4-3

Scenario Description

The IPSec tunnel between the two sites is congured on the second serial interface inchassis slot 2 (serial 2/0) of the headquarters router and the rst serial interface in chassisslot 1 (serial 1/0) of the business partner router. Fast Ethernet interface 0/0 of theheadquarters router is still connected to a private corporate server and Fast Ethernetinterface 0/1 is connected to a public Web server. Fast Ethernet interface 0/0 of the businesspartner router is connected to a PC client.

Figure 4-2 Extranet VPN Scenario Physical Elements

The conguration steps in the following sections are for the headquarters router, unlessnoted otherwise. Comprehensive conguration examples for both the headquarters and

business partner routers are provided in the “Comprehensive Conguration Examples”section on page 4-27.

PC A

Fast Ethernet0/010.1.3.3/24

Fast Ethernet0/1

10.1.6.4/24

Fast Ethernet0/010.1.5.2/24

Headquartersrouter (hq-sanjose)

Remote officerouter (ro-rtp)

Business partnerrouter (bus-ptnr)

Internet

Internet

Serial 2/0172.16.2.2/24

Serial 1/0172.16.2.7/24

Public

Web server10.1.6.5/24

Privatecorporateserver

10.1.3.6/24

PC B10.1.5.3/24

GRE tunnel

IPSec tunnel

2 4 2 1 8

Page 76: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 76/112

Step 1—Configuring Network Address Translation

Cisco 7100 Series VPN Configuration Guide4-4

Table 4-1 lists the scenario’s physical elements.

Table 4-1 Physical Elements

Step 1—Conguring Network Address TranslationNetwork Address Translation (NAT) enables private IP internetworks that usenonregistered IP addresses to connect to the Internet. NAT is congured on the router at theborder of a stub domain (referred to as the inside network ) and a public network such as theInternet (referred to as the outside network ). NAT translates the internal local addresses toglobally unique IP addresses before sending packets to the outside network. NAT alsoallows a more graceful renumbering strategy for organizations that are changing serviceproviders or voluntarily renumbering into classless interdomain routing (CIDR) blocks.

This section only explains how to congure static translation to translate internal local IPaddresses into globally unique IP addresses before sending packets to an outside network,which includes the following tasks:

1 Conguring Static Inside Source Address Translation

Headquarters Network Business Partner Network

SiteHardware

WAN IPAddress

Ethernet IPAddress

SiteHardware

WAN IPAddress

Ethernet IPAddress

hq-sanjose Serial interface 2/0:172.16.2.2255.255.255.0

Fast EthernetInterface 0/0:10.1.3.3255.255.255.0

Fast EthernetInterface 0/1:10.1.6.4255.255.255.0

bus-ptnr Serial interface 1/0:172.16.2.7255.255.255.0

Fast EthernetInterface 0/0:10.1.5.2255.255.255.0

Corporateserver

– 10.1.3.6 PC B – 10.1.5.3

Web server – 10.1.6.5 1

1 The inside local IP address of the headquarters network’s public Web server (10.1.6.5) is translated to inside global IP address10.2.2.2 in the “Step 1—Configuring Network Address Translation” section on page 4-4.

Page 77: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 77/112

Extranet VPN Business Scenario 4-5

Step 1—Configuring Network Address Translation

2 Verifying Static Inside Source Address Translation

Static translation establishes a one-to-onemapping between your internal localaddress andan inside global address. Static translation is useful when a host on the inside must beaccessible by a xed address from the outside.

Note For detailed, additional conguration information on NAT—for example,instructions on how to congure dynamic translation—refer to the “Conguring IPAddressing” chapter in the Network Protocols Conguration Guide, Part 1 . NAT is alsodescribed in RFC 1631.

NAT uses the following denitions:

• Inside local address —The IP address that is assigned to a host on the inside network.The address is probably not a legitimate IP address assigned by the Network Information Center (NIC) or service provider.

• Inside global address —A legitimate IP address (assigned by the NIC or serviceprovider) that represents one or more inside local IP addresses to the outside world.

• Outside local address —The IP address of an outside host as it appears to the insidenetwork. Not necessarily a legitimate address, it was allocated from address spaceroutable on the inside.

• Outside global address —The IP address assigned to a host on the outside network bythe host’s owner. The address was allocated from globally routable address or network space.

Figure 4-3 illustrates a router that is translating a source address inside a network to asource address outside the network.

Page 78: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 78/112

Step 1—Configuring Network Address Translation

Cisco 7100 Series VPN Configuration Guide4-6

Figure 4-3 NAT Inside Source Translation

The following process describes inside source address translation, as shown in Figure 4-3:

1 The user at Host 10.1.1.1 opens a connection to Host B.

2 The rst packet that the router receives from Host 10.1.1.1 causes the router to check itsNAT table.

If a static translation entry was congured, the router goes to Step 3.

If no translation entry exists, the router determines that source address (SA) 10.1.1.1must be translated dynamically, selects a legal, globaladdress from the dynamic addresspool, and creates a translation entry. This type of entry is called a simple entry .

3 The router replaces the inside local source address of Host 10.1.1.1 with the translationentry’s global address, and forwards the packet.

4 Host B receives the packet and responds to Host 10.1.1.1 by using the inside global IPdestination address (DA) 10.2.2.2.

10.1.1.2

Host B10.6.7.3

10.1.1.1

Internet

Inside

Insideinterface Outsideinterface

Outside

10.1.1.210.1.1.1

10.2.2.310.2.2.2

Inside localIP address

NAT tableInside globalIP address

1

3

2 4 7 1 3

SA10.2.2.2

5DA

10.1.1.1

SA10.1.1.1

410.2.2.2

2

Page 79: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 79/112

Extranet VPN Business Scenario 4-7

Configuring Static Inside Source Address Translation

5 When the router receives the packet with the inside global IP address, it performs a NATtable lookup by using the inside global address as a key. It then translates the address tothe inside local address of Host 10.1.1.1 and forwards the packet to Host 10.1.1.1.

6 Host 10.1.1.1 receives the packet and continues the conversation. The router performsSteps 2 through 5 for each packet.

Conguring Static Inside Source Address TranslationTo congure static inside source address translation, complete the following steps starting

in global conguration mode:

The previous steps are the minimum you must congure for static inside source addresstranslation. You could congure multiple inside and outside interfaces.

Step Command Purpose

1 hq-sanjose(config)# ip nat inside source static10.1.6.5 10.2.2.2

Establish static translation between aninside local address and an insideglobal address. This example translatesinside local address 10.1.6.5 (the Webserver) to inside global address10.2.2.2.

2 hq-sanjose(config)# interface fastethernet 0/1 Specify the inside interface. Thisexample species Fast Ethernetinterface 0/1 on the headquarters router.

3 hq-sanjose(config-if)# ip nat inside Mark the interface as connected to theinside.

4 hq-sanjose(config-if)# interface serial 2/0 Specify the outside interface. Thisexample species serial interface 2/0on the headquarters router.

5 hq-sanjose(config-if)# ip nat outside Mark the interface as connected to theoutside.

6 hq-sanjose(config-if)# exithq-sanjose(config)#

Exit back to global conguration mode.

Page 80: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 80/112

Step 1—Configuring Network Address Translation

Cisco 7100 Series VPN Configuration Guide4-8

Verifying Static Inside Source Address TranslationTo verify the conguration:

• Enter the show ip nat translations verbose EXEC command to see the global and localaddress translations and to conrm static translation is congured.

hq-sanjose# show ip nat translations verbosePro Inside global Inside local Outside local Outsideglobal--- 10.2.2.2 10.1.6.5 --- ---

create 00:10:28, use 00:10:28, flags:static

• Enter the show running-cong EXEC command to see the inside and outsideinterfaces, global and local address translations, and to conrm static translation iscongured (display text has been omitted from the following sample output for clarity).

hq-sanjose# show running-config

interface FastEthernet0/1ip address 10.1.6.5 255.255.255.0no ip directed-broadcastip nat inside

interface serial2/0ip address 172.16.2.2 255.255.255.0ip nat outside

ip nat inside source static 10.1.6.5 10.2.2.2

Page 81: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 81/112

Extranet VPN Business Scenario 4-9

Step 2—Configuring Encryption and an IPSec Tunnel

Step 2—Conguring Encryption and an IPSec TunnelFor the ISM in slot 5 of Cisco 7100 series routers to provide encryption and IPSectunneling services, you must complete the following steps:

1 Conguring a Different Shared Key

Note The headquarters router and business partner router congured in this chapter usethe same Internet Key Exchange (IKE) policy and priority number—policy 1— that wascongured in the “Conguring IKE Policies” section on page 3-13, but with a different

shared key. Only a different key for policy 1 is congured in this chapter. See the“Conguring IKE Policies” section on page 3-13 for instructions on how to congure IKEpolicies. If you choose to congure additional IKE policies, we recommend using a uniquehash algorithm and authentication method for each additional IKE policy.

2 Conguring IPSec and IPSec Tunnel Mode (Creating access lists and transform sets,and conguring IPSec in tunnel mode)

3 Conguring Crypto Maps (Creating crypto maps and assigning maps to interfaces)

Optionally, you can congure Certication Authority (CA) interoperability. This guidedoes not explain how to congure CA interoperability on your Cisco 7100 series router.Refer to the “IP Security and Encryption” part of the Security Conguration Guide and the

Security Command Reference publications for detailed information on conguring CAinteroperabilty.

Note This section only contains basic conguration information for enablingencryption and IPSec tunneling services. For overview information on the ISM andconguring IKE policies, IPSec, and crypto maps, see the “Step 3—ConguringEncryption” section on page 3-11. Refer to the “IP Security and Encryption” part of theSecurity Conguration Guide and the Security Command Reference publications fordetailed conguration information on IPSec, IKE, and CA.

Refer to the Integrated Service Adapter and Integrated Service Module Installation and Conguration publication for detailed conguration information on the ISM.

Page 82: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 82/112

Step 2—Configuring Encryption and an IPSec Tunnel

Cisco 7100 Series VPN Configuration Guide4-10

Conguring a Different Shared KeyBecause preshared keys were specied as the authentication method for policy 1 in the“Conguring IKE Policies” section on page 3-13, (the policy that will also be used on thebusiness partner router) complete the following tasks at the headquarters router as well asthe business partner router:

1 Set each peer’s Internet Security Association & Key Management Protocol (ISAKMP)identity. Each peer’s identity should be set to either its host name or by its IP address.By default, a peer’s identity is set to its IP address. In this scenario, you only need tocomplete this task at the business partner router.

2 Specify the shared keys at each peer. Note that a given preshared key is shared betweentwo peers. At a given peer, you could specify the same key to share with multiple remotepeers; however, a more secure approach is to specify different keys to share betweendifferent pairs of peers.

To congure a different preshared key for use between the headquarters router and thebusiness partner router, complete the following steps in global conguration mode:

Step Command Purpose

1 hq-sanjose(config)# crypto isakmp key67890 address 172.16.2.7

At the local peer : Specify the shared key theheadquarters router will use with the businesspartner router. This example congures the sharedkey 67890 to be used with the remote peer

172.16.2.7 (serial interface 1/0 on the businesspartner router).

2 bus-ptnr(config)# crypto isakmpidentity address

At the remote peer : Specify the ISAKMP identity(address o r hostname ) the business partner routerwill use when communicating with the headquartersrouter during IKE negotiations. (This task wasalready completed on the headquarters router whenpolicy 1 was congured in the “Conguring IKEPolicies” section on page 3-13.) This examplespecies the address keyword, which uses IPaddress 172.16.2.7 (serial interface 1/0 of thebusiness partner router) as the identity for thebusiness partner router.

Page 83: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 83/112

Extranet VPN Business Scenario 4-11

Configuring IPSec and IPSec Tunnel Mode

Note Set an ISAKMP identity whenever you specify preshared keys. The addresskeyword is typically used when there is only one interface (and therefore only one IPaddress) that will be used by the peer for IKE negotiations, and the IP address is known.Use the hostname keyword if there is more than one interface on the peer that might beused for IKE negotiations, or if the interface’s IP address is unknown (such as withdynamically-assigned IP addresses).

Conguring IPSec and IPSec Tunnel ModeAfter you have congured a different shared key, congure IPSec at each participatingIPSec peer. This section contains basic steps to congure IPSec and includes the followingtasks:

1 Setting Global Lifetimes for IPSec Security Associations

2 Verifying Global Lifetimes for IPSec Security Associations

Note If you set global lifetimes for IPSec SAs while conguring IPSec in Chapter 3,“Intranet VPN Business Scenario,” there is no need to set lifetimes again here. If you havenot congured global lifetimes for IPSec SAs on your Cisco 7100 series router, see the“Setting Global Lifetimes for IPSec Security Associations” section on page 3-20 beforecreating your crypto access lists.

3 Creating Crypto Access Lists

4 Verifying Crypto Access Lists

3 bus-ptnr(config)# crypto isakmp key67890 address 172.17.2.4

At the remote peer : Specify the shared key to beused with the local peer. This is the same key you

just specied at the local peer. This examplecongures the shared key 67890 to be used with thelocal peer 172.16.2.2 (serial interface 2/0 on theheadquarters router).

Step Command Purpose

Page 84: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 84/112

Step 2—Configuring Encryption and an IPSec Tunnel

Cisco 7100 Series VPN Configuration Guide4-12

5 Dening Transform Sets and Conguring IPSec Tunnel Mode

6 Verifying Transform Sets and IPSec Tunnel Mode

Note IKE uses User Datagram Protocol (UDP) port 500. The IPSec encapsulatingsecurity payload (ESP) and authentication header (AH) protocols use IP protocol numbers50 and 51. Ensure that your access lists are congured so that IP protocol 50, 51, and UDPport 500 trafc is not blocked at interfaces used by IPSec. In some cases, you might needto add a statement to your access lists to explicitly permit this trafc.

Creating Crypto Access ListsCrypto access lists are used to dene which IP trafc will be protected by crypto and whichtrafc will not be protected by crypto. (These access lists are not the same as regular accesslists, which determine what trafc to forward or block at an interface.) For example, youcan create access lists to protect all IP trafc between the headquarters router and businesspartner router.

The access lists themselves are not specic to IPSec. It is the crypto map entry referencingthe specic access list that denes whether IPSec processing is applied to the trafcmatching a permit in the access list.

To create crypto a access list, enter the following command in global conguration mode:

Command Purpose

hq-sanjose(config)# access-list 111 permitip host 10.2.2.2 host 10.1.5.3

Specify conditions to determine which IP packets areprotected. 1 (Enable or disable crypto for trafc thatmatches these conditions.) This example conguresaccess list 111 to encrypt all IP trafc between theheadquarters Web server (translated inside global IPaddress 10.2.2.2) and PC B (IP address 10.1.5.3) in thebusiness partner ofce.

We recommend that you congure “mirror image” cryptoaccess lists for use by IPSec and that you avoid using theany keyword.

1 You specify conditions using an IP access list designated by either a number or a name. The access-list command designates anumbered extended access list; the ip access-list extended command designates a named access list.

Page 85: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 85/112

Extranet VPN Business Scenario 4-13

Configuring IPSec and IPSec Tunnel Mode

Verifying Crypto Access ListsTo verify the conguration:

• Enter the show access-lists 111 EXEC command to see access list’s attributes.

hq-sanjose# show access-lists 111Extended IP access list 111

permit ip host 10.2.2.2 host 10.1.5.3

Tips

If you have trouble, make sure you are specifying the correct access list number.

Dening Transform Sets and Conguring IPSec Tunnel ModeTo dene a transform set and congure IPSec tunnel mode, complete the following stepsstarting in global conguration mode:

Step Command Purpose

1 hq-sanjose(config)# crypto ipsectransform-set proposal4 ah-sha-hmacesp-des esp-sha-hmac

Dene a transform set and enter crypto-transformconguration mode. This example combines AH 1

transform ah-sha-hmac, ESP 2 encryption transformesp-des, and ESP 2 authentication transformesp-sha-hmac in the transform set proposal4.

There are complex rules dening which entries youcan use for the transform arguments. These rules areexplained in the command description for the cryptoipsec transform-set command. You can also use thecrypto ipsec transform-set? command, in globalconguration mode, to view the available transformarguments.

Page 86: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 86/112

Step 2—Configuring Encryption and an IPSec Tunnel

Cisco 7100 Series VPN Configuration Guide4-14

Note AH and ESP can be used independently or together, although for most applications just one of them is sufcient. For both of these protocols, IPSec does not dene the specicsecurity algorithms to use, but rather, provides an open framework for implementingindustry-standard algorithms.

2 hq-sanjose(cfg-crypto-trans)# modetunnel

Change the mode associated with the transform set.The mode setting is only applicable to trafc whosesource and destination addresses are the IPSec peeraddresses; it is ignored for all other trafc. (All othertrafc is in tunnel mode only.) This examplecongures tunnel mode for the transport set proposal4,which creates an IPSec tunnel between the IPSec peeraddresses.

3 hq-sanjose(cfg-crypto-trans)# exithq-sanjose(config)#

Exit back to global conguration mode.

1 AH= authentication header. This header, when added toan IP datagram, ensures the integrity and authenticityof the data, includingthe invariant fields in the outer IP header. It does not provide confidentiality protection. AH uses a keyed-hash function rather thandigital signatures.

2 ESP = encapsulating security payload. This header, when added to an IP datagram, protects the confidentiality, integrity, andauthenticity of the data. If ESP is used to validate data integrity, it does not include the invariant fields in the IP header.

Step Command Purpose

Page 87: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 87/112

Extranet VPN Business Scenario 4-15

Configuring IPSec and IPSec Tunnel Mode

Note In IPSec tunnel mode, the entire original IP datagram is encrypted, and it becomesthe payload in a new IP packet. This mode allows a network device, such as a router, to actas an IPSec proxy. That is, the router performs encryption on behalf of the hosts. Thesource’s router encrypts packets and forwards them along the IPSec tunnel. Thedestination’s router decrypts the original IP datagram and forwards it on to the destinationsystem. The major advantage of tunnel mode is that the end systems do not need to bemodied to receive the benets of IPSec. Tunnel mode also protects against trafc analysis;with tunnel mode an attacker can only determine the tunnel endpoints and not the truesource and destination of the tunneled packets, even if they are the same as the tunnelendpoints.

In IPSec transport mode, only the IP payload is encrypted, and the original IP headers areleft intact. (See Figure 4-4.) This mode has the advantage of adding only a few bytes to eachpacket. It also allows devices on the public network to see the nal source and destinationof the packet. This capability allows you to enable special processing (for example, QoS)in the intermediatenetwork based on the information in the IP header. However, theLayer 4header will be encrypted, limiting the examination of the packet. Unfortunately, by passingthe IP header in the clear, transport mode allows an attacker to perform some trafcanalysis. (See the “Dening Transform Sets” section on page 3-22 for an IPSec transportmode conguration example.)

Page 88: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 88/112

Step 2—Configuring Encryption and an IPSec Tunnel

Cisco 7100 Series VPN Configuration Guide4-16

Figure 4-4 IPSec in Tunnel and Transport Modes

Verifying Transform Sets and IPSec Tunnel ModeTo verify the conguration:

• Enter the show crypto ipsec transform-set EXEC command to see the type of transform set congured on the router.

hq-sanjose# show crypto ipsec transform-setTransform set proposal4: { ah-sha-hmac }

will negotiate = { Tunnel, },{ esp-des esp-sha-hmac }will negotiate = { Tunnel, },

-Display text omitted-

IP HDR

2 3 2 4 6

Data

EncryptedTunnel mode

IP HDR Data

Encrypted

IPSec HDRNew IP HDR

IP HDR Data

Transport mode

DataIPSec HDRIP HDR

Page 89: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 89/112

Extranet VPN Business Scenario 4-17

Configuring Crypto Maps

Conguring Crypto MapsFor IPSec to succeed between twoIPSec peers, both peers’crypto map entries must containcompatible conguration statements.

When two peers try to establish a security association (SA), they must each have at leastone crypto map entry that is compatible with one of the other peer’s crypto map entries. Fortwo crypto map entries to be compatible, they must at least meet the following criteria:

• The crypto map entries must contain compatible crypto access lists (for example, mirrorimage access lists). In thecase where the responding peer is using dynamic cryptomaps,the entries in the local crypto access list must be “permitted” by the peer’s crypto accesslist.

• The crypto map entries must each identify the other peer (unless the responding peer isusing dynamic crypto maps).

• The crypto map entries must have at least one transform set in common.

When IKE is used to establish SAs, the IPSec peers can negotiate the settings they will usefor the new SAs. This means that you can specify lists (such as lists of acceptabletransforms) within the crypto map entry.

After you have completed conguring IPSec at each participating IPSec peer, congurecrypto map entries and apply the crypto maps to interfaces. This section contains basicsteps to congure crypto maps and includes the following tasks:

1 Creating Crypto Map Entries

2 Verifying Crypto Map Entries

3 Applying Crypto Maps to Interfaces

4 Verifying Crypto Map Interface Associations

Page 90: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 90/112

Step 2—Configuring Encryption and an IPSec Tunnel

Cisco 7100 Series VPN Configuration Guide4-18

Creating Crypto Map EntriesTo create crypto map entries that will use IKE to establish the SAs, complete the followingsteps starting in global conguration mode:

Step Command Purpose

1 hq-sanjose(config)# crypto map s4secondlocal-address serial 2/0

Create the crypto map and specify alocal address (physical interface) to beused for the IPSec trafc. This examplecreates crypto map s4second andspecies serial interface 2/0 of the

headquarters router as the local address.2 hq-sanjose(config)# crypto map s4second 2

ipsec-isakmpEnter crypto map conguration mode,specify a sequence number for thecrypto map you created in Step 1, andcongure the crypto map to use IKE toestablish SAs. This example conguressequence number 2 and IKE for cryptomap s4second.

3 hq-sanjose(config-crypto-map)# match address 111 Specify an extended access list. Thisaccess list determines which trafc isprotected by IPSec and which trafc isnot be protected by IPSec. Thisexample congures access list 111,

which was created in the “CreatingCrypto Access Lists” section onpage 4-12.

4 hq-sanjose(config-crypto-map)# set peer172.16.2.7

Specify a remote IPSec peer (by hostname or IP address). This is the peer towhich IPSec protected trafc can beforwarded. This example speciesserial interface 1/0 (172.16.2.7) on thebusiness partner router.

Page 91: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 91/112

Extranet VPN Business Scenario 4-19

Configuring Crypto Maps

Verifying Crypto Map EntriesTo verify the conguration:

• Enter the show crypto map EXEC command to see the crypto map entries conguredon the router.

In the following example, peer 172.16.2.7 is the IP address of the remote IPSec peer.“Extended IP access list 111” lists the access list associated with the crypto map.“Current peer” indicates the current IPSec peer. “Security-association lifetime”indicates the lifetime of the SA. “PFS N” indicates that IPSec will not negotiate perfectforward secrecy when establishing new SAs for this crypto map. “Transform sets”indicates the name of the transform set that can be used with the crypto map.

hq-sanjose# show crypto mapCrypto Map: “s4second” idb: Serial2/0 local address: 172.16.2.2Crypto Map “s4second” 2 ipsec-isakmp

Peer = 172.16.2.7Extended IP access list 111

access-list 111 permit ipsource: addr = 10.2.2.2/255.255.255.0dest: addr = 10.1.5.3/255.255.255.0S

Current peer: 172.16.2.7Security-association lifetime: 4608000 kilobytes/3600 secondsPFS (Y/N): NTransform sets={proposal4,}

-Display text omitted-

5 hq-sanjose(config-crypto-map)# set transform-set proposal4

Specify which transform sets areallowed for this crypto map entry. Listmultiple transform sets in order of priority (highest priority rst). Thisexample species transform setproposal4, which was congured in the“Dening Transform Sets andConguring IPSec Tunnel Mode”section on page 4-13.

6 hq-sanjose(config-crypto-map)# exithq-sanjose(config)#

Exit back to global conguration mode.

Step Command Purpose

Page 92: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 92/112

Step 2—Configuring Encryption and an IPSec Tunnel

Cisco 7100 Series VPN Configuration Guide4-20

Tips

If you have trouble, make sure you are using the correct IP addresses.

Applying Crypto Maps to InterfacesYou need to apply a crypto map set to each interface through which IPSec trafc will ow.Applying the crypto map set to an interface instructs the router to evaluateall the interface’strafc against the crypto map set and to use the specied policy during connection or SAnegotiation on behalf of trafc to be protected by crypto.

To apply a crypto map set to an interface, complete the following steps starting in globalconguration mode:

Step Command Purpose

1 hq-sanjose(config)# interfaceserial 2/0

Specify a physical interface on which to apply thecrypto map and enter interface congurationmode. This example species serial interface 2/0on the headquarters router.

2 hq-sanjose(config-if)# crypto maps4second

Apply the cryptomap set to thephysical interface.This example congures crypto map s4second,which was created in the “Creating Crypto MapEntries” section on page 4-18.

3 hq-sanjose(config-if)# exithq-sanjose(config)#

Exit back to global conguration mode.

4 hq-sanjose# clear crypto sa In privileged EXEC mode, clear the existingIPSec SAs so that any changes are usedimmediately. (Manually established SAs arereestablished immediately.)

Note Using the clear crypto sa commandwithoutparameters clears out the fullSA database,which clears out active security sessions. You mayalso specify the peer , map , or entry keywords toclear out only a subset of the SA database.

Page 93: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 93/112

Extranet VPN Business Scenario 4-21

Configuring Crypto Maps

For redundancy, you could apply the same crypto map set to more than one interface. Thedefault behavior is as follows:

• Each interface will have its own piece of the SA database.

• The IP address of the local interface will be used as the local address for IPSec trafcoriginating from or destined to that interface.

If you apply the same crypto map set to multiple interfaces for redundancy purposes, youneed to specify an identifying interface. This has the following effects:

• The per-interface portion of the IPSec SA database will be established one time andshared for trafc through all the interfaces that share the same crypto map.

• The IP address of the identifying interface will be used as the local address for IPSectrafc originating from or destined to those interfaces sharing the same crypto map set.

One suggestion is to use a loopback interface as the identifying interface.

Use the crypto map map-name local-address interface-id command in globalconguration mode to specify redundant interfaces and name an identifying interface. Thiscommand permits redundant interfaces to share the same crypto map, using the same localidentity.

Verifying Crypto Map Interface AssociationsTo verify the conguration:

• Enter the show crypto map interface serial 2/0 EXEC command to see the cryptomaps applied to a specic interface.

hq-sanjose# show crypto map interface serial 2/0Crypto Map "s4second" 2 ipsec-isakmp

Peer = 172.16.2.7Extended IP access list 111

access-list 111 permit ip host 10.2.2.2 host 10.1.5.3Current peer:172.16.2.7Security association lifetime:4608000 kilobytes/1000 secondsPFS (Y/N):NTransform sets={ proposal4, }

Page 94: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 94/112

Step 3—Configuring Quality of Service

Cisco 7100 Series VPN Configuration Guide4-22

Step 3—Conguring Quality of ServiceCisco IOS QoS service models, features, and sample congurations are explained in detailin the Quality of Service Solutions Conguration Guide and the Quality of ServiceSolutions Command Reference . Refer to these two publications as you plan and implementa QoS strategy for your VPN, because there are various QoS service models and featuresthat you can implement on your VPN.

This section just contains basic steps to congure QoS weighted fair queuing (WFQ),which applies priority (or weights) to identied trafc, on the IPSec tunnel you conguredin the “Step 2—Conguring Encryption and an IPSec Tunnel” section on page 4-9 and

includes the following tasks:1 Conguring Weighted Fair Queuing

2 Verifying Weighted Fair Queuing

Note For overview information on WFQ, see the “Step 2—Conguring Quality of Service” section on page 3-8.

Conguring Weighted Fair QueuingTo congure fair queuing on an interface, complete the following steps starting in globalconguration mode:

Step Command Purpose

1 hq-sanjose(config)# interface serial 2/0 Specify an interface and enter interfaceconguration mode. This example species serialinterface 2/0 on the headquarters router.

2 hq-sanjose(config-if)# fair-queue Congure fair queuing on the interface.

3 hq-sanjose(config-if)# exithq-sanjose(config)#

Exit back to global conguration mode.

Page 95: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 95/112

Extranet VPN Business Scenario 4-23

Verifying Weighted Fair Queuing

Verifying Weighted Fair QueuingTo verify the conguration:

• Enter the show interfaces serial 2/0 fair-queue EXEC command to see information onthe interface that is congured for WFQ.

hq-sanjose# show interfaces serial 2/0 fair-queueSerial2/0 queue size 0

packets output 35, drops 0WFQ: global queue limit 401, local queue limit 200

• Enter the show interfaces serial 2/0 EXEC command to verify the queuing for theinterface is WFQ.

hq-sanjose# show interfaces serial 2/0Serial2/0 is up, line protocol is up

Hardware is M2T-T3 pa

-Display text omitted-

Queueing strategy:weighted fairOutput queue:0/1000/64/0 (size/max total/threshold/drops)

Conversations 0/0/256 (active/max active/max total)Reserved Conversations 0/0 (allocated/max allocated)

-Display text omitted-

Step 4—Conguring Cisco IOS Firewall FeaturesAs discussed in Chapter 3, “IntranetVPN Business Scenario,” Cisco IOSsoftware providesan extensive set of security features that allow you to congure a simple or elaboraterewall, according to your particular requirements. An extended access list was conguredin Chapter 3 to provide basic trafc ltering between the headquarters and remote ofcenetworks and to provide users in the remote ofce access to private and public resources onthe headquarters network. The following section explains how to congure anotherextended access list forbasic trafc ltering between theheadquartersand businesspartner;however, the access list congured in this section provides users in the business partnerofce access only to the headquarters public Web server.

Page 96: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 96/112

Step 4—Configuring Cisco IOS Firewall Features

Cisco 7100 Series VPN Configuration Guide4-24

Note Refer to the “Trafc Filtering and Firewalls” part of the Security CongurationGuide and the Security Command Reference for advanced rewall congurationinformation.

This section explains how to congure an extended access list, which is a sequentialcollection of permit and deny conditions that apply to an IP address, and includes thefollowing tasks:

1 Creating Extended Access Lists Using Access List Numbers

2 Verifying Extended Access Lists

3 Applying Access Lists to Interfaces

4 Verifying Extended Access Lists Are Applied Correctly

The above tasks give the PC client in the business partner ofce access only to the publicWeb server in the headquarters ofce. First, an extended access list is created with theappropriate deny and permit statements, then the access list is applied to the serial interfacethat connects the headquarters and business partner routers.

Creating Extended Access Lists Using Access List NumbersTo create an extended access list that denies and permits certain types of trafc, completethe following steps starting in global conguration mode:

Step Command Purpose

1 hq-sanjose(config)# access-list 112 deny tcp any any Dene access list 112 andcongure the access list to deny allTCP trafc.

2 hq-sanjose(config)# access-list 112 deny udp any any Congure access list 112 to denyall UDP trafc.

3 hq-sanjose(config)# access-list 112 permit ip host10.2.2.2 host 10.1.5.3

Congure access list 112 to permitIP trafc between the headquartersWeb server (translated insideglobal IP address 10.2.2.2) andPC B (IP address 10.1.5.3) in thebusiness partner ofce.

Page 97: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 97/112

Extranet VPN Business Scenario 4-25

Step 4—Configuring Cisco IOS Firewall Features

Verifying Extended Access ListsTo verify the conguration:

• Enter the show access-lists 112 EXEC command to display the contents of the accesslist.

hq-sanjose# show access-list 112Extended IP access list 112

deny tcp any anydeny udp any anypermit ip host 10.2.2.2 host 10.1.5.3

Applying Access Lists to InterfacesAfter you create an access list, you can apply it to one or more interfaces. Access lists canbe applied on either outbound or inbound interfaces.

To apply an access list inbound and outbound on an interface, complete the following stepsstarting in global conguration mode:

Step Command Purpose

1 hq-sanjose(config)# interface fastethernet 0/1 Specify Fast Ethernet interface 0/1 on theheadquarters router and enter interfaceconguration mode.

2 hq-sanjose(config-if)# ip access-group 112 in Congure access list 112 inbound on FastEthernet interface 0/1 on the headquartersrouter.

3 hq-sanjose(config-if)# interface serial 2/0 Specify serial interface 2/0 on theheadquarters router and enter interfaceconguration mode.

4 hq-sanjose(config-if)# ip access-group 112 out Congure access list 112 outbound onserial interface 2/0 on the headquartersrouter.

5 hq-sanjose(config-if)# exithq-sanjose(config)#

Exit back to global conguration mode.

Page 98: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 98/112

Step 4—Configuring Cisco IOS Firewall Features

Cisco 7100 Series VPN Configuration Guide4-26

For inbound access lists, after receiving a packet, the Cisco IOS software checks the sourceaddress of the packet against the access list. If the access list permits the address, thesoftware continues to process the packet. If the access list rejects the address, the softwarediscards the packet and returns an “ICMP Host Unreachable” message.

For outbound access lists, after receiving and routing a packet to a controlled interface, thesoftware checks the destination address of the packet against the access list. If the accesslist permits the address, the software transmits the packet. If the access list rejects theaddress, the software discards the packet and returns an “ICMP Host Unreachable”message.

When you apply an access list that has not yet been dened to an interface, the softwareacts as if the access list has not been applied to the interface and will accept all packets. Beaware of this behavior if you use undened access lists as a means of security in yournetwork.

Verifying Extended Access Lists Are Applied CorrectlyTo verify the conguration:

• Enter the show ip interface EXEC command to conrm the access list is appliedcorrectly (inbound and outbound) on the interfaces.

hq-sanjose# show ip interfaceFastEthernet0/1 is up, line protocol is up

Internet address is 10.2.2.2

Inbound access list is 112

-Display text omitted-

Serial2/0 is up, line protocol is upInternet address is 172.16.2.2

Outgoing access list is 112

-Display text omitted-

Tips

If you have trouble, ensure that you specied the correct interface when you applied theaccess list.

Page 99: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 99/112

Extranet VPN Business Scenario 4-27

Comprehensive Configuration Examples

Comprehensive Conguration ExamplesFollowing are comprehensive sample congurations for the headquarters router and remotebusiness partner router.

Headquarters Router Congurationhq-sanjose# show running-configBuilding configuration...

Current configuration:!

version 12.0service timestamps debug uptimeservice timestamps log uptimeno service password-encryption!hostname hq-sanjose!boot system flash bootflash:boot bootldr bootflash:c7100-boot-mz.120-1.1.Tboot config slot0:hq-sanjose-cfg-smallno logging buffered!crypto isakmp policy 1

authentication pre-sharelifetime 84600

crypto isakmp key 12345 address 172.17.2.5crypto isakmp key 67890 address 172.16.2.7!crypto ipsec transform-set proposal1 ah-sha-hmac esp-des esp-sha-hmacmode transport!crypto ipsec transform-set proposal4 ah-sha-hmac esp-des esp-sha-hmac!

!crypto map s1first local-address Serial1/0crypto map s1first 1 ipsec-isakmpset peer 172.17.2.5set transform-set proposal1match address 101!crypto map s4second local-address Serial2/0crypto map s4second 2 ipsec-isakmp

Page 100: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 100/112

Comprehensive Configuration Examples

Cisco 7100 Series VPN Configuration Guide4-28

set peer 172.16.2.7set transform-set proposal4match address 111

!interface Tunnel0

bandwidth 180ip address 172.17.3.3 255.255.255.0no ip directed-broadcasttunnel source 172.17.2.4tunnel destination 172.17.2.5crypto map s1first

!

interface FastEthernet0/0ip address 10.1.3.3 255.255.255.0no ip directed-broadcastno keepalivefull-duplexno cdp enable

!interface FastEthernet0/1

ip address 10.1.6.4 255.255.255.0no ip directed-broadcastip nat insideno keepalivefull-duplexno cdp enable

!interface Serial1/0

ip address 172.17.2.4 255.255.255.0no ip directed-broadcastno ip mroute-cacheno keepalivefair-queue 64 256 0framing c-bitcablelength 10dsu bandwidth 44210clock source internalno cdp enablecrypto map s1first

!interface Serial2/0

ip address 172.16.2.2 255.255.255.0no ip directed-broadcast

ip nat outsideno ip mroute-cache

Page 101: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 101/112

Extranet VPN Business Scenario 4-29

Headquarters Router Configuration

no keepalivefair-queue 64 256 0framing c-bitcablelength 10dsu bandwidth 44210clock source internalno cdp enablecrypto map s4second

!router bgp 10

network 10.2.2.2 mask 255.255.255.0network 172.16.2.0 mask 255.255.255.0

!ip route 10.1.4.0 255.255.255.0 Tunnel0!ip nat inside source static 10.1.6.5 10.2.2.2!access-list 101 permit gre host 172.17.2.4 host 172.17.2.5access-list 102 deny tcp any anyaccess-list 102 deny udp any anyaccess-list 102 permit ip any anyaccess-list 111 permit ip host 10.2.2.2 host 10.1.5.3access-list 112 deny tcp any anyaccess-list 112 deny udp any anyaccess-list 112 permit ip host 10.2.2.2 host 10.1.5.3!line con 0

transport input noneline aux 0line vty 0 4

login!end

Page 102: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 102/112

Comprehensive Configuration Examples

Cisco 7100 Series VPN Configuration Guide4-30

Business Partner Router Congurationbus-ptnr# show running-configBuilding configuration...

Current configuration:!version 12.0service timestamps debug uptimeservice timestamps log uptimeno service password-encryption!

hostname bus-ptnr!boot system flash bootflash:boot bootldr bootflash:c7100-boot-mz.120-1.1.Tboot config slot0:bus-ptnr-cfg-smallno logging buffered!crypto isakmp policy 1

authentication pre-sharelifetime 84600

crypto isakmp key 67890 address 172.16.2.2!crypto ipsec transform-set proposal4 ah-sha-hmac esp-des esp-sha-hmac!

!crypto map s4second local-address Serial1/0crypto map s4second 2 ipsec-isakmpset peer 172.16.2.2set transform-set proposal4match address 111

!interface FastEthernet0/0

ip address 10.1.5.2 255.255.255.0no ip directed-broadcastno keepalivefull-duplexno cdp enable

!interface Serial1/0

ip address 172.16.2.7 255.255.255.0no ip directed-broadcast

no ip mroute-cacheno keepalive

Page 103: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 103/112

Extranet VPN Business Scenario 4-31

Business Partner Router Configuration

fair-queue 64 256 0framing c-bitcablelength 10dsu bandwidth 44210clock source internalno cdp enablecrypto map s4second

!router bgp 10

network 10.1.5.0 mask 255.255.255.0network 172.16.2.0 mask 255.255.255.0

!

access-list 111 permit ip host 10.1.5.3 host 10.2.2.2access-list 112 deny tcp any anyaccess-list 112 deny udp any anyaccess-list 112 permit ip host 10.1.5.3 host 10.2.2.2!line con 0

transport input noneline aux 0line vty 0 4

login!end

Page 104: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 104/112

Comprehensive Configuration Examples

Cisco 7100 Series VPN Configuration Guide4-32

Page 105: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 105/112

Index 1

I N D E X

Symbols

? command 1-2

A

abbreviating commands, context-sensitive help 1-2access control

planning 2-5undefined packets and 3-36, 4-26

access groups, IP 4-26access list numbers, using 4-24access lists

protecting from spoofing 2-5special considerations 2-3violating 2-4WFQ and 3-10See also crypto access listsSee also extended access listsSee also IP access lists

access-list (encryption) command 3-21, 4-12access-list (IP extended) command 4-24access-list command 3-35access-list permit ip host command 3-21, 4-12address keyword, using (note) 3-17, 4-11AH

description 3-23ESP and (note) 4-14IP numbers 3-19, 4-12

arrow keys, on ANSI-compatible terminals (note) 1-2authentication command 3-14authentication header

See AH

B

backbone routers, QoS functions 3-9broadcasts, disabling directed 2-6business scenarios

figure 2-2overview 2-1

C

CA interoperabilitydescription 3-12features 2-7

carrier protocols (tunneling) 3-4CDP, turning off 2-5CEF support 2-3Certification Authority interoperability

See CA interoperabilitychanges, saving 1-11Cisco 7100 series routers

installation assumptions 2-7ISM features 3-11

Cisco Connection Online xiiiCisco Discovery Protocol

See CDPCisco Express Forwarding

See CEF supportCisco IOS firewalls

See firewallsclear crypto sa command 3-20, 3-31, 4-20command modes

command options 1-3online help 1-2summary (table) 1-9understanding 1-8

configuration examplesextranet

Page 106: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 106/112

Cisco 7100 Series VPN Configuration GuideIndex 2

business partner router 4-30 to 4-31headquarters router 4-27 to 4-29

intranetheadquarters router 3-37 to 3-39remote office router 3-40 to 3-41

configuration filescorrupted 1-9saving changes 1-11saving to NVRAM 1-11

configuration modes, using 1-9configuring

authentication methods with IKE policies 3-15crypto maps 3-26, 4-17encryption 3-11, 3-19, 4-11extended access lists 4-24fair queuing 3-10, 4-22firewalls 3-32, 4-23GRE

tunnel destinations 3-6tunnel interfaces 3-6tunnel modes 3-6tunnel sources 3-6tunnel traffic 3-7tunnels 3-2, 3-6

IKE policies 3-14

IPSec tunnel mode 4-13ISM 3-12NAT 4-4preshared keys 3-16, 4-10QoS 3-8, 4-22

console access considerations 2-3console ports

breaks on 2-5configuring passwords on 2-4

crypto access listscommands (table) 4-12compatibility 3-27, 4-17creating 3-21, 4-12extended access lists versus 3-34

verifying 3-21, 4-13

crypto ipsec security-association lifetimecommand 3-20

crypto ipsec transform-set command 3-22, 4-13crypto isakmp enable command 3-14crypto isakmp identity address command 3-16, 3-17crypto isakmp key address command 3-17crypto isakmp key command 3-17, 4-10crypto map command 3-28, 4-18crypto map entries

actions of 3-21changing transform sets 3-22

commands for creating (table) 3-28compatibility of 3-27configuring 4-17creating 3-28, 4-18defining IPSec processing 4-12dynamic 3-26in sets 3-26purpose 3-26specifying transform sets in 3-22transform sets and 3-27verifying 3-29, 4-19

crypto map local-address command 3-31, 4-21crypto map s1first command 3-30crypto map s4second command 4-20

crypto mapsapplying 3-30applying to interfaces 3-31, 4-20verifying interface associations 3-32, 4-21

customer service and support xiii

D

default commands, using 1-11denial-of-service attacks, directed broadcasts and 2-6Diffie-Hellman group identifier, specifying 3-14directed broadcasts

See broadcastsDMZ network description 3-34

Page 107: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 107/112

Index 3

documentationaudience viiiCD-ROM xivconventions xiifeedback xivlatest version ixorganization ixpurpose viirelated x

E

edge routers, QoS functions 3-9enable password command 2-4enable secret command 2-4encapsulating security payload

See ESPencryption

configuring 4-9description 3-11tunnels and 3-5

encryption command 3-14error messages

ICMP Host Unreachable 3-36, 4-26ESP

AH and (note) 4-14description 3-23IP numbers 3-19, 4-12

extended access listscreating 3-35, 4-24description 3-33verifying 3-35, 3-37, 4-25, 4-26See also IP access lists

extranet VPN scenariodescription 2-2, 4-2figure 4-2physical elements 4-2

physical elements (figure) 4-3physical elements (table) 4-4

F

fair queuingconfiguring 3-10, 4-22flow-based WFQ 3-10

fair-queue command 3-10, 4-22fast switching support 2-3firewalls

basic traffic filtering configurations 3-33benefits 3-33configuring 3-32, 4-23special considerations 2-4

flow classification of packets 3-10

G

global configuration mode, summary 1-9GRE tunnels

Cisco routers or access servers (note) 3-7configuring 3-2protocol 3-4troubleshooting configurations 3-8verifying 3-7

See also intranet VPN scenariogroup command 3-14

H

hash command 3-14headquarters network scenario

See intranet VPN scenariohelp

command-line interface 1-2finding command options 1-3technical support xiii

help command 1-2hostname keyword, using (note) 3-17, 4-11

Page 108: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 108/112

Cisco 7100 Series VPN Configuration GuideIndex 4

I

ICMP Host Unreachable message 3-36, 4-26IKE

description 3-12keys

See keys, preshared 3-16, 4-10policies

configuration, required 3-15configuring 3-14default values (note) 3-13defaults, viewing 3-7enabling by default 3-13identifying 3-14requirements 3-15requirements, RSA signatures method 3-15troubleshooting 3-18verifying 3-18viewing 3-18

SAs and 4-17UDP port 3-19, 4-12

inside global address 4-5inside local address 4-5inside network 4-4Integrated Service Module

See ISMinterface configuration mode, summary 1-10interface fastethernet command 4-7interface serial command 3-10, 3-30interface tunnel command 3-6, 3-30interfaces

applying crypto maps 3-30, 4-20applying crypto maps to multiple 3-31, 4-21applying IP access lists 3-36loopback 3-31, 4-21verifying crypto map associations 4-21

Internet Key ExchangeSee IKE

Internet Security Association & Key ManagementProtocol

See ISAKMP identitiesintranet VPN scenario

configuring 3-6description 2-2, 3-2figure 3-2physical elements 3-2physical elements (figure) 3-3physical elements (table) 3-4

IP access listsapplying to interface 3-36, 4-25for security 2-3

inbound or outbound 3-36, 4-25software checking of 3-36undefined 3-36, 4-26See also extended access lists 3-35

ip access-group command 3-36, 4-25ip access-list extended command 4-12IP addresses

NAT definitions 4-5nonregistered 4-4protecting internal 2-6renumbering 4-4static translation 4-5

IP datagramsin IPSec transport mode 3-24

in IPSec tunnel mode 3-24, 4-15ip nat inside command 4-7ip nat inside source command 4-7ip nat outside command 4-7ip route command 3-7IP tunneling concepts and terminology (figure) 3-5IP unicast frames, IPSec and 3-5IPSec

configuring 3-19, 4-11description 3-12proxies 3-24, 4-15SAs

clearing 4-20IKE negotiations 3-27

See also SAsspecial considerations 2-4

Page 109: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 109/112

Index 5

tunnelsconfiguring 4-9

verifying SA global lifetimes 3-20IPSec access lists

explicitly permitting traffic (note) 4-12requirements 3-19, 4-12

IPSec tunnel modeconfiguring 4-13

IPSec, IP unicast frames and 3-5ISAKMP identities, setting 3-17, 4-10ISM

configuring encryption services 3-12in Cisco 7100 series routers 3-11services 3-2

K

keyspreshared

configuring 3-16, 4-10specifying 3-16, 4-10

secret 3-20

L

lifetime command 3-14lifetime values

changing 3-20default 3-20verifying 3-20

loopback interfacesemulating an interface 2-3using 3-31, 4-21

M

match address command 3-28, 4-18mode transport command 3-23mode tunnel command 4-14modes

See command modes

N

NATaddress definitions 4-5configuring 4-4inside source translation (figure) 4-6source address translation process 4-6static translation process 4-7tunnels and 3-5verifying static inside source address translation 4-8

Network Address TranslationSee NAT

network management applicationsassumptions 2-7special considerations 2-6

Network Time ProtocolSee NTP

no cdp run command 2-5no commands, using 1-11no ip directed-broadcast command 2-6no ip source-route command 2-5no proxy-arp command 2-6no service tcp-small-servers command 2-5no service udp-small-servers command 2-5no shutdown command 3-7ntp disable command 2-5NTP, turning off 2-5NVRAM, saving configuration to 1-11

Page 110: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 110/112

Cisco 7100 Series VPN Configuration GuideIndex 6

O

outside global address 4-5outside local address 4-5outside network 4-4

P

packets, flow classification 3-10

passenger protocols (tunneling) 3-4passwordscommands for setting 2-4port for configuring 2-4

ping command 3-8policies

See IKE policiespriority traffic

See WFQprivileged EXEC mode, summary 1-9process switching support 2-3prompts, system 1-9protocols, tunneling 3-4

Q

QoScharacteristics 3-8configuring 3-8, 4-22

R

RADIUS, implementing 2-3redundancy

crypto map sets 3-31

crypto map sets to multiple interfaces 4-21Remote Access Dial-In User Service

See RADIUSRFC 1631, IP Network Address Translator (NAT) 4-5ROM monitor mode

description 1-9summary 1-10

RSA encrypted nonces method 3-15RSA signatures, configuration requirements for

IKE 3-15

S

SAsclearing 3-31compatible crypto map entries 3-27crypto map entries and 3-26expiring 3-20IKE established

crypto map entries, creating 3-27, 4-17lifetimes

global values, configuring 3-20global values, default 3-20

transform sets in 3-22saving, configuration changes 1-11security associations

See SAsservice and support xiiiset peer command 3-28, 4-18set transform-set command 3-29, 4-19show access-lists command 3-21, 3-35, 4-13, 4-25show crypto ipsec security-association-lifetime

command 3-20show crypto ipsec transform-set command 3-25, 4-16show crypto isakmp policy command 3-13, 3-18show crypto map command 3-29, 4-19show crypto map interface command 3-32, 4-21show interface fair-queue command 4-23show interfaces fair-queue command 3-11

show interfaces ip command 3-37show interfaces serial command 3-11

Page 111: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 111/112

Index 7

show interfaces tunnel command 3-7show ip nat translations verbose command 4-8show version command 3-18source routing, disabling 2-5spoofing, protecting against 2-5startup configuration, saving 1-11static translation, IP addresses 4-5stub domain, NAT configured on 4-4subinterface configuration mode, summary 1-10syslog, special considerations 2-3

T

Tab key, command completion 1-2TACACS+, implementing 2-3technical support xiiiTelnet access considerations 2-3template configurations, special considerations 2-3Terminal Access Controller Access Control System Plus

See TACACS+traffic priority management

See WFQtransform sets

changing 3-22commands (table) 3-22crypto map entries and 3-27, 4-17defining 4-13description 3-22verifying 3-25, 4-16

transport modedescription 3-24, 4-15IPSec (figure) 3-25, 4-16

transport protocols (tunneling) 3-4troubleshooting

crypto access lists (tips) 3-21entering ROM monitor mode at startup 1-9extended access lists 3-37, 4-26

GRE tunnels 3-8IKE policy verification 3-18

syslog message logs for 2-3tunnel destination command 3-6tunnel mode

configuring 4-11description 3-24, 4-15IPSec (figure) 3-25, 4-16

tunnel mode gre ip command 3-6tunnel source command 3-6tunneling

components 3-4description 3-4

encryption in 3-5special considerations 2-3

U

user EXEC mode, summary 1-9

V

verifyingcrypto access lists 3-21, 4-13

crypto map entries 3-29, 4-19crypto map interface associations 3-32, 4-21extended access lists 3-35, 3-37, 4-25, 4-26GRE tunnel configuration 3-7IKE policies 3-18IPSec SAs global lifetimes 3-20IPSec tunnel mode 4-16static inside source address translation 4-8transform sets 3-25, 4-16WFQ configuration 3-11

Virtual Private NetworksSee VPNs

virtual terminal ports, protecting 2-5VPNs

configuration assumptions 2-7See also extranet VPN scenario

Page 112: VPN Configuration

8/3/2019 VPN Configuration

http://slidepdf.com/reader/full/vpn-configuration 112/112

See also intranet VPN scenario

W

weighted fair queuingSee WFQ

WFQconfiguring fair queuing 3-10traffic priority management 3-10verifying configuration 3-11


Recommended