- About This Guide
- Feature Differences
- Introducing the ASA System
- Getting Started
- Building Basic IPSec VPN Tunnels
- Performing Selected User Management Tasks
- Configuring Traffic Management
- Mapping Topics from VPN 3000 Series Concentrators to ASDM
- Mapping Debug/Event Levels from VPN 3000 Series Concentrators to the ASA
- Index
Getting Started
This chapter provides an overview of the VPN 3000 Concentrator's Quick Configuration program and describes where to go in the ASDM to configure the counterpart features. Following the outline of configuration tasks, this chapter lists the information needed to run the VPN wizard to configure site-to-site and remote access tunnels.
Quick Configuration Tasks and Counterparts in ASDM
Table 3-1 describes the following configuration tasks and where to perform these tasks in ASDM.
•Configuring IP interfaces
•Configuring system information
•Configuring tunneling protocols and options
•Configuring an address management method
•Configuring authentication
•Configuring an internal server user database
•Configuring IPSec groups
•Configuring an administrator password
Configuring a VPN Tunnel Using the VPN Wizard
The VPN wizard lets you configure a site-to-site or remote access VPN tunnel from the ASA to either another VPN device or a remote client user. You can use the wizard to define new VPN configurations only. Once you have configured a VPN tunnel using the wizard, you can edit it by using the ASDM features, especially in the Configuration > Features > VPN section.
Gathering Information
Before you launch the VPN wizard, gather the information needed to configure the VPN tunnel. To do so, use the section that names the tunnel type you want to configure.
•Remote Access Using Locally Stored User Accounts
•Remote Access Using AAA Server Group for Client Authentication
Site-to-Site VPN Tunnels
When you configure a site-to-site VPN tunnel using the VPN wizard, you need to have the following information before you begin.
Note When recording these values, take note of the associated number. These numbers mirror the step numbers that appear in the VPN Wizard that you run after assembling this data.
1. VPN Tunnel Type
Interface for the site-to-site VPN tunnel (for example, "inside" or "outside")—Before you can configure a VPN tunnel, you configure interfaces for the security appliance. When you configure the tunnel, you select an interface to associate with the VPN tunnel you are configuring.
2. Remote Site Peer
IP address of peer device at the other end of the tunnel
Optional name for the tunnel group (which defaults to the peer's IP address)
Authentication type (preshared key or digital certificate). You also need one of the following:
–If preshared, the name of the key.
–If digital certificate, the certificate signing algorithm (RSA or DSA), and the name of the trustpoint.
See "Key Pairs" for the differences between the RSA and DSA algorithm.
A trustpoint is a representation of a CA or identity pair. A trustpoint contains the identity of the CA, CA-specific configuration parameters, and an association with one enrolled identity certificate.
Note If you choose the digital certificate authentication type, configure the trustpoints (see the "Creating the Trustpoint" section) before running the VPN wizard.
3. IPSec Phase 1 Internet Key Exchange Security Association policy to be used to negotiate the tunnel, which consists of the following:
–Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.
–Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.
Diffie Hellman Group, which must be the same for both devices—group 1, group 2, group 5, or group 7. The default is group 2.
4. IPSec Phase 2 Encryption and Authentication policy to be applied to the VPN tunnel. The parameters and options consist of the following:
–Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.
–Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.
5. Local Hosts and Networks—Hosts and networks at the local site of the IP connection. You have the following options for specifying the hosts and networks at the local site of the IP connection:
–IP address. You need the following information if you choose this option:
Interface name—The interface, such as "inside" or "outside," to which the host is connected.
IP address—Any, the address of a specific local host, or a subnet. If you choose any, the IP address and subnet mask become 0.0.0.0.
Subnet mask—Values range from 255.255.255.255 to 0.0.0.0.
–Name of the host already present in the ASA configuration.
–Group containing lists of networks or hosts to protect. You need the following information if you choose this option:
Name of the host already present in the ASA configuration.
Name of the group already present in the ASA configuration.
Note To configure host/networks group names, go to Configuration > Global Objects > Hosts/Networks.
6. Remote hosts and networks—Hosts and networks at the remote site of the IP connection.
The options are the same as those for the local hosts and networks.
After preparing the information described in this section, go to "Running the VPN Wizard."
Remote Access Using Locally Stored User Accounts
Prepare the following information for a remote access VPN tunnel requiring login accounts to be stored in the ASA configuration:
Note When recording these values, take note of the associated number. These numbers mirror the step numbers that appear in the VPN Wizard.
1. VPN Tunnel Type
Interface for the site-to-site VPN tunnel (for example, "inside" or "outside")—Before you can configure a VPN tunnel, you configure interfaces for the security appliance. When you configure the tunnel, you select an interface to associate with the VPN tunnel you are configuring.
2. Remote Access Client
Use the default setting (Cisco VPN Client, Release 3.x or higher, or other Easy VPN Remote product) to specify the type of VPN client supported for tunnels to this ASA. This release does not support other options.
3. VPN Tunnel Group Name and Authentication Method
Name for the tunnel group to be used for both the remote clients and the ASA. The group name specifies common connection and client settings to be specified in the next steps.
Authentication type (preshared key or digital certificate). You also need one of the following:
–If preshared, the name of the key.
–If digital certificate, the certificate signing algorithm (RSA or DSA), and the name of the trustpoint.
See "Key Pairs" for the differences between the RSA and DSA algorithm.
A trustpoint is a representation of a CA or identity pair. A trustpoint contains the identity of the CA, CA-specific configuration parameters, and an association with one enrolled identity certificate.
Note If you choose the digital certificate authentication type, configure the trustpoints (Configuration > Properties > Certificate > Trustpoint) before running the VPN wizard.
4. Client Authentication, which provides a choice of one of the following options:
–Authenticate using the local (internal) user database
This option lets you populate the ASA configuration with user accounts.
–Authenticate using an AAA server group
This option let you select an AAA server group to handle client authentication. Go to this same step in the next section if you choose this option.
5. User Accounts
If you chose "Authenticate using the local (internal) user database," list the login name and respective password for each user to be inserted into the local database.
6. Address Pool
You can select the name of an IP address pool already present in the ASA configuration or specify a new one. If you specify a new one, you need a new pool name, the associated IP address range, and optionally a subnet mask.
7. (Optional) Attributes Pushed to Client
You can choose to push the following attributes to the VPN client when it connects:
–IP addresses of primary and secondary DNS servers
–IP addresses of primary and secondary WINS servers
–Default domain name
8. IPSec Phase 1 Internet Key Exchange Security Association policy to be used to negotiate the tunnel, which consists of the following:
–Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.
–Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.
Diffie Hellman Group, which must be the same for both devices—group 1, group 2, group 5, or group 7. The default is group 2.
9. IPSec Phase 2 Encryption and Authentication policy to be applied to the VPN tunnel. The parameters and options consist of the following:
–Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.
–Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.
10. (Optional) Address Translation Exemption and Split Tunneling
Hosts and networks in the internal network to expose to authenticated remote users of the VPN. Specify none to expose the entire internal network to authenticated remote users in the tunnel, or specify the internal addresses to expose to them and leave Network Address Translation to hide the remainder. You have the following options for specifying the internal addresses of the hosts and networks at the local site of the IP connection:
–IP address. You need the following information if you choose this option:
Interface name—The interface, such as "inside" or "outside," to which the host is connected.
IP address—Any, the address of a specific local host, or a subnet. If you choose any, the IP address and subnet mask become 0.0.0.0.
Subnet mask—Values range from 255.255.255.255 to 0.0.0.0.
–Name of the host already present in the ASA configuration.
–Group containing lists of networks or hosts to protect. You need the following information if you choose this option:
Name of the host already present in the ASA configuration.
Name of the group already present in the ASA configuration.
Note To configure host/networks group names, go to Configuration > Global Objects > Hosts/Networks.
Split Tunneling—enable to provide VPN users with unencrypted access to the Internet, or leave disabled.
Note If you enable split tunneling, the hosts identified above also serve as the split tunnel access list.
After preparing the information described in this section, go to "Running the VPN Wizard."
Remote Access Using AAA Server Group for Client Authentication
Prepare the following information for a remote access VPN tunnel requiring client authentication using a AAA server group:
Note When recording these values, take note of the associated number. These numbers mirror the step numbers that appear in the VPN Wizard.
1. VPN Tunnel Type
Interface for the site-to-site VPN tunnel (for example, "inside" or "outside")—Before you can configure a VPN tunnel, you configure interfaces for the security appliance. When you configure the tunnel, you select an interface to associate with the VPN tunnel you are configuring.
2. Remote Access Client
Use the default setting (Cisco VPN Client, Release 3.x or higher, or other Easy VPN Remote product) to specify the type of VPN client supported for tunnels to this ASA. This release does not support other options.
3. VPN Tunnel Group Name and Authentication Method
Name for the tunnel group to be used for both the remote clients and the ASA. The group name specifies common connection and client settings to be specified in the next steps.
Authentication type (preshared key or digital certificate). You also need one of the following:
–If preshared, the name of the key.
–If digital certificate, the certificate signing algorithm (RSA or DSA), and the name of the trustpoint.
See "Key Pairs" for the differences between the RSA and DSA algorithm.
A trustpoint is a representation of a CA or identity pair. A trustpoint contains the identity of the CA, CA-specific configuration parameters, and an association with one enrolled identity certificate.
Note If you choose the digital certificate authentication type, configure the trustpoints (Configuration > Properties > Certificate > Trustpoint) before running the VPN wizard.
4. Client Authentication, which provides a choice of one of the following options:
–Authenticate using the local (internal) user database
This option lets you populate the ASA configuration with user accounts. Continue with Step 5 in the previous section if you choose this option.
–Authenticate using an AAA server group
If you choose this option, select the name of an AAA server group you already added to the configuration or create a new one. The Configuration > Properties > AAA Setup path lets you examine and manage the AAA server configuration. The Client Authentication panel in the VPN Wizard that provides these authentication options also provides a New button that lets you create a AAA server group. If you choose this option, be ready to give the group a name, choose an authentication protocol (RADIUS, TACACS+, SDI, NT, or Kerberos), specify the IP address of the server, choose the interface (such as "inside" or "outside," and specify the server secret key.
5. Address Pool
You can select the name of an IP address pool already present in the ASA configuration or specify a new one. If you specify a new one, you need a new pool name, the associated IP address range, and optionally a subnet mask.
6. (Optional) Attributes Pushed to Client
You can choose to push the following attributes to the VPN client when it connects:
–IP addresses of primary and secondary DNS servers
–IP addresses of primary and secondary WINS servers
–Default domain name
7. IPSec Phase 1 Internet Key Exchange Security Association policy to be used to negotiate the tunnel, which consists of the following:
–Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.
–Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.
Diffie Hellman Group, which must be the same for both devices—group 1, group 2, group 5, or group 7. The default is group 2.
8. IPSec Phase 2 Encryption and Authentication policy to be applied to the VPN tunnel. The parameters and options consist of the following:
–Encryption algorithm for IPSec VPN tunnel, which must be the same for both devices—DES, 3DES, AES-128, AES-192, or AES-256. The default is 3DES.
–Authentication algorithm for the IPSec VPN tunnel, which must be the same for both devices—MD5 or SHA. The default is SHA.
9. (Optional) Address Translation Exemption and Split Tunneling
Hosts and networks in the internal network to expose to authenticated remote users of the VPN. Specify none to expose the entire internal network to authenticated remote users in the tunnel, or specify the internal addresses to expose to them and leave Network Address Translation to hide the remainder. You have the following options for specifying the internal addresses of the hosts and networks at the local site of the IP connection:
–IP address. You need the following information if you choose this option:
Interface name—The interface, such as "inside" or "outside," to which the host is connected.
IP address—Any, the address of a specific local host, or a subnet. If you choose any, the IP address and subnet mask become 0.0.0.0.
Subnet mask—Values range from 255.255.255.255 to 0.0.0.0.
–Name of the host already present in the ASA configuration.
–Group containing lists of networks or hosts to protect. You need the following information if you choose this option:
Name of the host already present in the ASA configuration.
Name of the group already present in the ASA configuration.
Note To configure host/networks group names, go to Configuration > Global Objects > Hosts/Networks.
Split Tunneling—enable to provide VPN users with unencrypted access to the Internet, or leave disabled.
Note If you enable split tunneling, the hosts identified above also serve as the split tunnel access list.
After preparing the information described in this section, go to "Running the VPN Wizard."
Running the VPN Wizard
To run the VPN wizard, follow these steps:
Step 1 Go to Wizards > VPN Wizard.
Step 2 Select the type of tunnel to set up: Site to Site or Remote Access.
Step 3 Select Inside or Outside next to the VPN Tunnel Interface.
Step 4 Click Next and follow the instructions in the VPN wizard. For more information, click Help.
Saving the Configuration
As you work, remember to save the changes to Flash memory to retain them, as follows:
•ASDM—Select File > Save Running Configuration to Flash.
•CLI—Enter the write memory command.
Displaying the Configuration
You can enter either of the following commands to display the current configuration settings:
•hostname# show config
Enter this command to show the startup configuration saved to flash memory.
•hostname# show running-config
Enter this command to show the operating configuration.
•hostname# show running config all
Enter this command to show the operating configuration including attributes that have default values.
Note The first two commands are equivalent if you have saved the configuration changes you made.
You can also type show run ? to display a detailed list of the show configuration commands you can enter to retrieve a more refined list.
Using ASDM to Learn the CLI
The ASDM Options > Preferences window provides a "Preview commands before sending to the device" option. If you enable this option, ASDM displays the equivalent CLI commands in the Preview CLI Commands window whenever you click Apply.
View the commands, click OK, and then click Proceed in the confirmation window to save the changes to the running configuration.