These topics describe the pages that help you create VPN topologies, and the
policies that will be assigned to them:
• Site-to-Site VPN Manager Window, page B-2
• Create VPN Wizard, page B-8
• Site to Site VPN Policies, page B-37
• VPN Topologies Device View Page, page B-85
User Guide for Cisco Security Manager 3.0.1
B-1
Appendix B Site-to-Site VPN User Interface Reference
Site-to-Site VPN Manager Window
Site-to-Site VPN Manager Window
Use the Site-to-Site VPN Manager window to:
• View all available VPN topologies.
• Create, edit, and delete VPN topologies.
• View detailed information about each VPN topology.
• View the endpoints defined for a VPN topology.
• View and edit the policies assigned to a VPN topology.
The VPNs selector, in the upper left pane of the window, lists all available VPN
topologies, and enables you to select topologies for viewing or editing. The lower
left pane of the page lists the policies that are assigned to the VPN topology
selected in the upper pane.
Navigation Path
Click the Site-To-Site VPN Manager button on the toolbar or select
Tools > Site-To-Site VPN Manager.
Related Topics
• Create VPN Wizard, page B-8
• Understanding VPN Topologies, page 9-2
• Working with VPN Topologies, page 9-10
Field Reference
Table B-1Site-to-Site VPN Manager Window
ElementDescription
VPNs selectorLists each VPN topology, represented by its name and an icon
indicating its VPN type (hub and spoke, point to point, or full
mesh).
Create VPN Topology buttonClick to create a VPN topology,thenselect the type of topology you
want to create from the options that are displayed. The Create VPN
wizard opens.
User Guide for Cisco Security Manager 3.0.1
B-2
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
Edit VPN Topology buttonOpens the Edit VPN dialog box for editing a selected VPN
topology.
NoteYou can also edit a VPN topology by right-clicking it in the
VPNs selector, and selecting the Edit option.
Delete VPN Topology buttonDeletes a selected VPN topology.
NoteYou can also delete a selected VPN topology by
right-clicking it and selecting the Delete option.
A confirmation dialog box opens asking you to confirmthedeletion.
Policies selectorLists each individually named policy that is already assigned to, or
can be configured on, devices in the selected VPN topology.
NoteVPN Summary and Peers, are not policies. For a
description of these pages, see VPN Summary Page,
page B-3 and Peers Page, page B-7.
Select a policy to open a page on which you can view or edit the
parameters for the selected policy. See Site to Site VPN Policies,
page B-37.
Close buttonCloses the window.
Help buttonOpens help for this window.
VPN Summary Page
Use the VPN Summary page to view information about a selected VPN topology.
This includes information about the type of VPN topology, its devices, the
assigned technology, and specific policies that are configured in it.
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
B-3
Site-to-Site VPN Manager Window
Navigation Path
Open the Site-to-Site VPN Manager Window, page B-2, select a topology in the
VPNs selector, then select VPN Summary in the Policies selector.
Note• The VPN Summary page opens when you finish creating or editing a VPN
topology.
• The VPN Summary page alsoopens from Device view, when editing the VPN
policies defined for a VPN topology. For more information, see Managing
VPN Devices in Device View, page 9-53.
• You can also open the VPN Summary page from Policy view. For more
information, see Working with Site-to-Site VPN Policies in Policy View,
page 9-56.
Related Topics
• Site-to-Site VPN Manager Window, page B-2
• Configuring High Availability in Your VPN Topology, page 9-51
• Configuring VRF-Aware IPSec Settings, page 9-45
• Configuring an IKE Proposal, page 9-62
• Configuring IPSec Proposals, page 9-67
• Configuring Preshared Key Policies, page 9-76
• Configuring Public Key Infrastructure Policies, page 9-84
• Configuring GRE or GRE Dynamic IP Policies, page 9-91
• Configuring DMVPN Policies, page 9-96
Appendix B Site-to-Site VPN User Interface Reference
Field Reference
Table B-2VPN Summary Page
ElementDescription
TypeThe VPN topology type—Hub-and-Spoke, Point-to-Point, or Full
Mesh.
DescriptionA description of the VPN topology.
User Guide for Cisco Security Manager 3.0.1
B-4
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
Site-to-Site VPN Manager Window
Table B-2VPN Summary Page (continued)
ElementDescription
Primary HubAvailable if the VPN topology type is hub-and-spoke.
The name of the primary hub in the hub-and-spoke topology.
Failover HubsAvailable if the VPN topology type is hub-and-spoke.
The name of any secondary backup hubs that are configured in the
hub-and-spoke topology.
Number of SpokesAvailable if the VPN topology type is hub-and-spoke.
The number of spokes that are included in the hub-and-spoke
topology.
Peer 1Available if the VPN topology type is point-to-point.
The name of the device that is defined as Peer One in the
point-to-point VPN topology.
Peer 2Available if the VPN topology type is point-to-point.
The name of the device that is defined as Peer Two in the
point-to-point VPN topology.
Number of PeersAvailable if the VPN topology type is full mesh.
The number of devices included in the full mesh VPN topology.
IPSec TechnologyThe IPSec technology assigned to the VPN topology. See
Understanding IPSec Technologies and Policies, page 9-8.
IKE ProposalThe security parameters of the IKE proposal configured in the VPN
topology. See IKE Proposal Page, page B-37.
Transform SetsThe transform sets that specify the authentication and encryption
algorithms that will be used to secure the traffic in the VPN tunnel.
See IPSec Proposal Page, page B-39.
Preshared KeyUnavailable if the selected technology is Easy VPN.
Specifies whether the shared key to use in the preshared key policy
is user defined or auto-generated. See Preshared Key Page,
page B-53.
Public Key InfrastructureIf a Public Key Infrastructure policy is configured in the VPN
topology, specifies the CA server. See Public Key Infrastructure
Page, page B-57.
OL-8214-02
User Guide for Cisco Security Manager 3.0.1
B-5
Appendix B Site-to-Site VPN User Interface Reference
Site-to-Site VPN Manager Window
Table B-2VPN Summary Page (continued)
ElementDescription
Routing ProtocolAvailable only if the selected technology is GRE, GRE Dynamic IP,
or DMVPN.
The routing protocol and autonomous system (or process ID)
number used in the secured IGP for configuring a GRE, GRE
Dynamic IP, or DMVPN routing policy.
NoteSecurity Manager adds a routing protocol to all the devices
in the secured IGP on deployment. If you want to maintain
this secured IGP, you must create a router platform policy
using this routing protocol and autonomous system (or
process ID) number.
See GRE Modes Page, page B-59.
Tunnel Subnet IPAvailable only if the selected technology is GRE, GRE Dynamic IP,
or DMVPN.
If a tunnel subnet is defined, displays the inside tunnel interface IP
address, including the unique subnet mask.
See GRE Modes Page, page B-59.
High AvailabilityAvailable if the VPN topology type is hub-and-spoke.
If a High Availability policy is configured on a device in your
hub-and-spoke VPN topology,displaysthe details of the policy.See
High Availability Page, page B-34.
VRF-Aware IPSecAvailable if the VPN topology type is hub-and-spoke.
If a VRF-Aware IPSec policy is configured on a hub in your
hub-and-spoke VPN topology, displays the type of VRF solution
(1-Box or 2-Box) and the name of the VRF policy.See VRF Aware
IPSec Tab, page B-28.
Close buttonCloses the page.
Help buttonOpens help for this page.
B-6
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
Peers Page
Use the Peers page to view the endpoints defined for a VPN topology, including
the internal and external VPN interfaces and protected networks assigned to the
devicesinthetopology. The interface roles, or interfaces that match each interface
role, may also be displayed for the VPN interfaces and protected networks.
The Peers page contains a scrollable table displaying the device roles, VPN
interfaces and protected networks for all selected devices. By clicking the arrow
displayed alongside any table heading, you can switch the order of the list to
display from ascending to descending order, and vice versa. You can also filter the
table contents using the filter controls above it to display only rows that match the
criteria that you specify (see Filtering Tables, page 3-19).
Navigation Path
Open the Site-to-Site VPN Manager Window, page B-2, select a topology in the
VPNs selector, then select Peers in the Policies selector.
NoteYou can also open the Peers page from Device view. For more information, see
Managing VPN Devices in Device View, page 9-53.
Site-to-Site VPN Manager Window
Related Topics
• Site-to-Site VPN Manager Window, page B-2
• VPN Topologies Device View Page, page B-85
Field Reference
Table B-3Peers Page
ElementDescription
RoleThe role of the device—hub (primary or failover), spoke, or peer.
DeviceThe name of the device.
VPN InterfaceThe VPN interface (external and internal) that is defined for the
selected device.
Protected NetworksThe protected networks that are defined for the selected device.
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
B-7
Appendix B Site-to-Site VPN User Interface Reference
Create VPN Wizard
Table B-3Peers Page (continued)
ElementDescription
ShowSelect to display either the interface roles or matching interfaces,
for the VPN interfaces and protected networks in the table, as
follows:
• Interface Roles Only (default)—To display only the interface
roles assigned to the VPN interfaces and protected networks.
• Matching Interfaces—Todisplaythe interfaces that match the
pattern of each interface role. If there are no matching
interfaces “No Match” will be displayed.
Create buttonOpens the Device Selection tab of the Edit VPN dialog box on
which you can change the selection of devices in your VPN
topology. See Device Selection Page, page B-10.
Edit buttonOpens the Endpoints tab of the Edit VPN dialog box on which you
can edit the VPN interfaces and protected networks for a selected
device in the table. See Endpoints Page, page B-13.
Create VPN Wizard
Security Manager supports three basic types of topologies with which you can
create a site-to-site VPN. Use the Create VPN wizard to create a hub-and-spoke,
point-to-point, or full mesh VPN topology across multiple devicetypes. For more
information, see Understanding VPN Topologies, page 9-2.
NoteYou can deploy to your devices immediately after creating a VPN topology, using
the default policy configurations provided by Security Manager. All you need to
do is complete the steps of the Create VPN wizard.
Editing a VPN topology is done using the Edit VPN dialog box, which comprises
tabs whose elements are identical (except for the buttons) to the pages of the
Create VPN wizard. You can click a tab to go directly to the page that contains
the fields you want to edit, without having to go through each step of the wizard.
Clicking OK on any tab in the dialog box saves your definitions on all the tabs.
For more information, see Editing a VPN Topology, page 9-24.
User Guide for Cisco Security Manager 3.0.1
B-8
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
The following pages describe the steps in the Create VPN wizard:
• Name and Technology Page, page B-9
• Device Selection Page, page B-10
• Endpoints Page, page B-13
• High Availability Page, page B-34
Navigation Path
1. In the Site-to-Site VPN Manager Window, page B-2, click the Create VPN
Topology button above the VPNs selector.
2. Select the type of VPN topology you want to create from the options that are
displayed—Hub and Spoke, Point to Point, or Full Mesh.
Related Topics
• Understanding VPN Topologies, page 9-2
• Understanding IPSec Technologies and Policies, page 9-8
• Creating a VPN Topology, page 9-11
Create VPN Wizard
Name and Technology Page
Use the Name and Technology page of the Create VPN wizard to provide a name
and description for the VPN topology, and select the IPSec technology that will
be assigned to it.
NoteWhen editing a VPN topology, the Name and Technology tab is used. The
elements of the tab (except for the buttons) are identical to those that appear on
the Name and Technology page. For more information, see Editing a VPN
Topology, page 9-24.
Navigation Path
• When creating a VPN topology, open the Create VPN Wizard, page B-8.
• When editing a VPN topology, open the Site-to-Site VPN Manager Window,
page B-2, then right-click a VPN topology in the VPNs selector, or click the
Name and Technology tab in the Edit VPN dialog box.
OL-8214-02
User Guide for Cisco Security Manager 3.0.1
B-9
Appendix B Site-to-Site VPN User Interface Reference
Create VPN Wizard
Related Topics
• Create VPN Wizard, page B-8
• Editing a VPN Topology, page 9-24
• Understanding IPSec Technologies and Policies, page 9-8
• Defining a Name and IPSec Technology, page 9-12
Field Reference
Table B-4Create VPN wizard > Name and Technology Page
ElementDescription
NameA unique name you want to specify for the VPN topology, for
identification purposes.
DescriptionAny descriptive text or comments that you want to add about the
VPN topology.
IPSec TechnologySelect the IPSec technology that you want to assign to the VPN
topology from the drop-down list.
NoteIf you are editing an existing VPN, the assigned IPSec
technology is displayed, but unavailablefor editing. To edit
the technology, you must delete the VPN topology and
create a new one.
Next buttonAdvances to the next wizard page. See Device Selection Page,
page B-10.
Cancel buttonCloses the wizard without saving your changes.
Help buttonOpens help for this page.
Device Selection Page
Use the Device Selection page of the Create VPN wizard to select the devices that
will be included in the VPN topology.
User Guide for Cisco Security Manager 3.0.1
B-10
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
NoteWhen editing the device selection for a VPN topology, the Device Selection tab
is used. The elements of the tab (except for the buttons) are identical to those that
appear on the Device Selection page. For more information, see Editing a VPN
Topology, page 9-24.
The contents of this page differ depending on the VPN topology type. For
example, if you are creating or editing a hub-and-spoke topology, you also need
to specify the devices as hubs or spokes.
NoteThe devices that are available for selection include only those that can be used for
the selected VPN topology type, that support the IPSec technology type, and
which you are authorized to view. For more information, see About Selecting
Devices in a VPN Topology, page 9-14.
You can include devices in your VPN topology that are not managed by Security
Manager.You cannot upload or download any configurationsto these devices nor
deploy to them. For more information, see Adding Unmanaged Devices to Your
VPN Topology, page 9-14.
Create VPN Wizard
OL-8214-02
Navigation Path
• When creating a VPN topology,openthe Create VPN Wizard,page B-8, then
click Next on the Name and Technology page.
• When editing a VPN topology, click the Device Selection tab in the Edit VPN
dialog box.
• In the VPN Topologies Device View Page, page B-85, click the Edit VPN
Topology button.
Related Topics
• Create VPN Wizard, page B-8
• Editing a VPN Topology, page 9-24
• About Selecting Devices in a VPN Topology, page 9-14
• Selecting Devices for Your VPN Topology, page 9-15
• Removing Devices from a VPN Topology, page 9-23
User Guide for Cisco Security Manager 3.0.1
B-11
Appendix B Site-to-Site VPN User Interface Reference
Available DevicesLists all devices that can be included in your selected VPN
topology,thatsupporttheIPSectechnology type, and which you are
authorized to view.
NoteClicking a device group selects all its devices.
HubsThe devices you selected to be hubs in your hub-and-spoke
topology. In an Easy VPN topology, the selected devices are
servers.
NoteIf multiple devices are selected, you must make sure that the
required primary hub device appears first in the list. Youcan
use the Up and Down buttons to change the order of the
Hubs in the list.
To remove devices from the list, select them and click <<.
SpokesThe devices you selected to be spokes in your hub-and-spoke
topology.In an Easy VPN topology, the selected devices are clients.
To remove devices from the list, select them and click <<.
Peer One/Peer TwoThe devices you selected to be peers in your point-to-point
topology.
To remove the selected device from the Peer One/Peer Two field,
click <<.
Selected DevicesThe devices you selected to be included in your full mesh topology.
To remove selected devices from the Selected Devices list, click <<.
Back buttonReturns to the previous wizard page. See Name and Technology
Page, page B-9.
Next buttonAdvances to the next wizard page. See Endpoints Page, page B-13.
Cancel buttonCloses the wizard without saving your changes.
HelpOpens help for this page.
B-12
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
Endpoints Page
Use the Endpoints page of the Create VPN wizard to view the devices in your
VPN topology,anddefine or edit their external or internal interfaces and protected
networks.
NoteWhen editing a VPN topology, the Endpoints tab is used. The elements of the tab
(except for the buttons) are identical to those that appear on the Endpoints page.
For more information, see Editing a VPN Topology, page 9-24.
The Endpoints page displays a scrollable table listing the VPN interfaces and
protected networks for all selected devices. By clicking on the arrow displayed
alongside any table heading, you can switch the order of the list to display from
ascending to descending order, and vice versa. You can also filter the table contents
using the filter controls above it to display only rows that match the criteria that
you specify (see Filtering Tables, page 3-19).
Navigation Path
• When creating a VPN topology,openthe Create VPN Wizard,page B-8, then
click Next on the Device Selection page.
• When editing a VPN topology, click the Endpoints tab in the Edit VPN
dialog box.
Create VPN Wizard
OL-8214-02
Related Topics
• Create VPN Wizard, page B-8
• Editing a VPN Topology, page 9-24
• Edit Endpoints Dialog Box, page B-16
• About Defining and Editing the Endpoints and Protected Networks,
page 9-16
• Defining the Endpoints and Protected Networks, page 9-18
User Guide for Cisco Security Manager 3.0.1
B-13
Appendix B Site-to-Site VPN User Interface Reference
Create VPN Wizard
Field Reference
Table B-6Create VPN wizard > Endpoints Page
ElementDescription
RoleThe role of the device—hub, spoke, or peer.
DeviceThe name of the device.
VPN InterfaceThe primary or backup VPN interface that is currently defined for
the selected device.
Depending on the selection in the Show list, the interface roles, or
the interfaces that match each interface role, for the VPN interface
may also be displayed.
Select a row and click Edit to change the device’s VPN interfaces.
The Edit Endpoints dialog box opens, from which you can select the
required VPN interface. See VPN Interface Tab, page B-17.
NoteYou can select more than one device at a time for editing.
The changes you make in the VPN Interface tab will be
applied to all the selected devices.
B-14
NoteWhen selecting multiple devices for editing the VPN
interfaces, you cannot include Catalyst 6500/7600 devices
in your selection. If you want to editthese devices,you must
select them separately.
NoteTo edit the VPN interface for a Catalyst 6500/7600 device,
see VPN Interface Tab, page B-17.
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
Finish buttonSaves your wizard definitions and closes the wizard.
The neworeditedVPN topology appears in the VPNs selector in the
Site-to-Site VPN window, with the VPN Summary page displayed.
See VPN Summary Page, page B-3.
Cancel buttonCloses the wizard without saving your changes.
HelpOpens help for this page.
Edit Endpoints Dialog Box
Use the Edit Endpoints dialog box to:
• Edit the VPN interfaces and protected networks defined for devices.
• Configurea dial backup interface to use as a fallback link for a primary VPN
interface.
• Define VPN Services Module (VPNSM) settings for a Catalyst 6500/7600
device.
• Define VPN SPA settings for a Catalyst 6500/7600 device.
• Configure FWSM on a Catalyst 6500/7600 device.
• Configure a VRF-Aware-IPSec policy on a hub device.
The following tabs may be available on the Edit Endpoints dialog box:
• VPN Interface Tab, page B-17
• Protected Networks Tab, page B-24
• FWSM Tab, page B-26
• VRF Aware IPSec Tab, page B-28
B-16
Note• You can select more than one device at a time for editing. The changes you
make on any tabs in the dialog box will be applied to all selected devices.
• When selecting multiple devices for editing the VPN interfaces, you cannot
include Catalyst 6500/7600 devices in your selection. If you want to edit
these devices, you must select them separately.
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
• Clicking OK on any tab in the dialog box saves your definitions on all the
tabs.
Navigation Path
You canaccessthe Edit Endpoints dialog box from the Endpoints Page, page B-13
(or tab). Then select a device in the Endpoints table, and click Edit.
Related Topics
• Endpoints Page, page B-13
• Defining the Endpoints and Protected Networks, page 9-18
• Configuring Dial Backup, page 9-28
• Configuring a Catalyst VPN Services Module (VPNSM) VPN Interface,
page 9-30
• Configuring a Catalyst VPN Shared Port Adapter (VPN SPA) Blade,
page 9-32
• Configuring a Firewall Services Module (FWSM) Interface with VPNSM or
VPN SPA, page 9-38
• Configuring VRF-Aware IPSec Settings, page 9-45
Create VPN Wizard
VPN Interface Tab
NoteIf you selected a Catalyst 6500/7600 device in the Endpoints table for editing, the
OL-8214-02
VPN Interface tab provides settings that enable you to configure a VPN Services
Module (VPNSM) or a VPN SPA blade on the device. For more information, see
a description of the elements that appear on the VPN Interface tab for a Catalyst
6500/7600 device, see Table B-8 on page B-22.
Use the VPN Interface tab in the Edit Endpoints dialog box to edit the VPN
interfaces defined for devices in the Endpoints table. When defining a primary
VPN interface for a router device, you can also configure a backup interface to
use as a fallback link for the primary route VPN interface, if its connection link
User Guide for Cisco Security Manager 3.0.1
B-17
Create VPN Wizard
Appendix B Site-to-Site VPN User Interface Reference
becomes unavailable. You can only configure a backup interface on a Cisco IOS
security router, which is a spoke in the VPN topology. For more information, see
Understanding Dial Backup, page 9-27.
Navigation Path
The VPN Interface tab is displayed when you open the Edit Endpoints Dialog
Box, page B-16. You can also open it by clicking the VPN Interface tab from any
other tab in the Edit Endpoints dialog box.
Related Topics
• Edit Endpoints Dialog Box, page B-16
• Defining the Endpoints and Protected Networks, page 9-18
• Configuring Dial Backup, page 9-28
• Procedure for Configuring a VPNSM or VPN SPA Blade, page 9-34
Field Reference
Table B-7 describes the elements on the VPN Interface tab when a device other
Connection TypeNoteThis element is only available in a hub-and-spoke VPN
topology, if the hub is an ASA or PIX 7.0 device and the
selected technology is regular IPSec.
To configure the ASA hub during an SA negotiation, select one of
the following connection types:
• Answer Only—To configure the hub to only respond to an SA
negotiation, but not initiate it.
• Originate Only—To configure the hub to only initiate an SA
negotiation, but not respond to one.
• Bidirectional—To configure the hub to both initiate and
respond to an SA negotiation.
Peer IP AddressTo define the IP address of the VPN interface of the peer device,
click one of the following radio buttons:
• VPN Interface IP Address—To use the configured IP address
on the selected VPN interface. Only one VPN interface can
match the interface role.
• IP Address for IPSec Termination—Toenter manually the IP
address of the peer device. Enter the IP address in the field
provided. Only one VPN interface can match the interface role.
• IP Address of Another Existing Interface to be Used as
Local Address (unavailable if IPSec technology is
DMVPN)—To use the configuredIPaddressonanyinterfaceas
a local address, not necessarily a VPN interface. Enter the
interface in the field provided.
You can choose the required interface by clicking Select. A
dialog box opens that lists all available predefined interface
roles, and in which you can create an interface role object. For
more information, see Interface Roles Page, page C-126.
OL-8214-02
User Guide for Cisco Security Manager 3.0.1
B-19
Appendix B Site-to-Site VPN User Interface Reference
Tunnel SourceAvailable for a hub when the selected technology is GRE or
DMVPN.
To define the tunnel source address to be used by the GRE or
DMVPN tunnel on the spoke side, click one of the following radio
buttons:
• VPN Interface—To use the selected VPN interface as the
tunnel source address.
• Another Existing Interface—To use any interface as the
tunnel source address, not necessarily a VPN interface. Enter
the interface in the field provided.
You can choose the required interface by clicking Select. A
dialog box opens that lists all available predefined interface
roles, and in which you can create an interface role object. For
more information, see Interface Roles Page, page C-126.
Dial Backup Settings
EnableAvailable only if the selected device is a Cisco IOS router which is
a spoke in the VPN topology.
When selected, enables you to configure a backup interface to use
as a fallback link for the primary route VPN interface, if its
connection link becomes unavailable.
NoteBefore configuring a backup interface, you must first
configure the dialer interface settings on the device. For
more information, see Configuring Dialer Interfaces on
Cisco IOS Routers, page 12-29.
Dialer InterfaceSelect the logical interface through which the secondary route
traffic will be directed when the dialer interface is activated. This
can be a Serial, Async, or BRI interface. The list displays all the
interfaces of these types on the devices.
B-20
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
Tracking IP AddressThe IP address of the destination device to which connectivity must
be maintained from the primary VPN interface connection. This is
the device that is pinged by the Service Assurance agent through the
primary route to track connectivity. The backup connection will be
triggered if connectivity to this device is lost.
NoteIf you do not specify an IP address, the primary hub VPN
interface will be used in a hub-and-spoke VPN topology. In
a point-to-point or full mesh VPN topology, the peer VPN
interface will be used.
Primary Next Hop IP AddressAvailable only if the selected technology is IPSec, GRE, or GRE
Dynamic IP.
Enter the IP address to which the primary interface will connect
when it is active. This is known as the next hop IP address.
If you do not enter the next hop IP address, Security Manager will
configure a static route using the interface name.
Advanced buttonAvailable only if the selected technology is IPSec, GRE, or GRE
Dynamic IP.
Opens the Dial Backup Settings dialog box for configuring
additional (optional) settings. See Dial Backup Settings Dialog
Box, page B-32.
OK buttonSaves your changes locally on the client and closes the dialog box.
The changes appear in the Endpoints table for the selected
device(s).
Cancel buttonCloses the dialog box without saving your changes.
Help buttonOpens help for this tab.
OL-8214-02
Defining VPN Services Module (VPNSM) or VPN SPA Settings
When you select a Catalyst 6500/7600 device in the Endpoints table for editing,
the VPN Interface tab of the Edit Endpoints dialog box provides settings for
configuring a VPN Services Module (VPNSM) or VPN SPA on the device. You
can select more than one Catalyst 6500/7600 device at the same time. Your
changes are applied to all the selected devices.
User Guide for Cisco Security Manager 3.0.1
B-21
Appendix B Site-to-Site VPN User Interface Reference
Create VPN Wizard
Note• Before you define the VPNSM or VPN SPA settings, you must import your
Catalyst 6500/7600 device to the Security Managerinventoryanddiscoverits
interfaces. For more information, see Procedure for ConfiguringaVPNSMor
VPN SPA Blade, page 9-34.
• If you are configuring a VPNSM or VPN SPA with VRF-Aware IPSec on a
device, verify that the device does not belong to a different VPN topology in
which VRF-Aware IPSec is not configured. Similarly, if you are configuring
a VPNSM or VPN SPAwithout VRF-Aware IPSec, make sure that the device
belongs to a different VPN topology in which VRF-Aware IPSec is
configured.
Field Reference
Table B-8 describes the elements that appear on the VPN Interface tab of the Edit
Endpoints dialog box, after you select a Catalyst 6500/7600 device.
Peer IP AddressTo define the IP address of the VPN interface of the peer device,
click one of the following radio buttons:
• VPN Interface IP Address—To use the configured IP address
on the selected VPN interface.
• IP Address for IPSec Termination—Toenter manually the IP
address of the peer device. Enter the IP address in the field
provided.
OK buttonSaves your changes locally on the client and closes the dialog box.
The changes appear in the Endpoints table for the selected
device(s).
Cancel buttonCloses the dialog box without saving your changes.
Help buttonOpens help for this tab.
Protected Networks Tab
B-24
Use the Protected Networks tab on the Edit Endpoints dialog box to edit the
protected networks that are defined on a selected device in the Endpoints table.
You can specify the protected networks as interface roles whose naming patterns
match the internal VPN interface type of the device, as network objects containing
one or more network or host IP addresses, interfaces, or other network objects, or
as access control lists (if IPSec is the assigned technology).
For more information, see:
• Working with Interface Role Objects, page 8-120
• Working with Network/Host Objects, page 8-142
• Working with Access Control List Objects, page 8-32
Navigation Path
You can access the Protected Networks tab from the Edit Endpoints dialog box.
Open the Edit Endpoints Dialog Box, page B-16, then click the ProtectedNetworks tab.
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
Create VPN Wizard
Related Topics
• Edit Endpoints Dialog Box, page B-16
• Defining the Endpoints and Protected Networks, page 9-18
Enable the Protected Networks
Changes on All Selected Peers
Available if you selected more than one device for editing in the
Endpoints page.
When selected, applies any changes you make in the Protected
Networks tab to all the selected devices.
Available Protected NetworksA hierarchy of all available protected networks, including the
interface roles whose naming pattern may match the internal VPN
interface type of the device. If IPSec is the assigned technology,
access control lists (ACLs) are also included in the list of available
protected networks.
NoteIn a hub-and-spoke VPN topology in which IPSec is the
assigned technology, when an ACL object is used to define
the protected network on a spoke, Security Manager mirrors
the spoke’s ACL object on the hub to the matching crypto
map entry.
Select the interface role(s), protected networks, and/or access
control lists that you want to define for the selected device, then
click >>.
Selected Protected NetworksThe protected networks and interface roles you selected for the
device.
NoteYou can reorder the selected protected networks/interface
roles in the list by selecting them (one at a time), then
clicking the Move Up or Move Down button, as required.
>> buttonMoves protected networks from the available networks list to the
selected networks list.
<< buttonRemoves protected networks from the selected list.
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
B-25
Appendix B Site-to-Site VPN User Interface Reference
Create buttonIf the required interface roles, protected networks, or access control
lists do not appear in the Available Protected Networks list, click
Create and select the required option to create an interface role,
protected network, or access control list.
NoteThe Access Control List option is only available if the
assigned technology is IPSec.
If you select the Interface Role option, the Interface Role Editor
page opens in which you can create an interface role object. For
more information, see Editing Interface Role Objects, page 8-124.
If you select the Protected Network option, theNetworkEditor page
opens in which you can create a network object. For more
information, see Editing Network/Host Objects, page 8-146.
If you select the Access Control List option, the Access Lists Editor
page opens in which you can create an access control list object. For
more information, see Editing Access Control List Objects,
page 8-40.
OK buttonSaves your changes locally on the client and closes the dialog box.
The changes appear in the Endpoints table for the selected
device(s).
Cancel buttonCloses the dialog box without saving your changes.
Help buttonOpens help for this tab.
FWSM Tab
B-26
NoteThe FWSM tab is only available in a hub-and-spoke VPN topology, when the
selected hub is a Catalyst 6500/7600 device.
Use the FWSM tab on the Edit Endpoints dialog box to define the settings that
enable you to connect between a Firewall Services Module (FWSM) and an IPSec
VPN Services Module (VPNSM) or VPN SPA, that is already configured on a
Catalyst 6500/7600 device.
User Guide for Cisco Security Manager 3.0.1
OL-8214-02
Appendix B Site-to-Site VPN User Interface Reference
NoteBefore defining the FWSM settings, you must import your Catalyst 6500/7600
device to the Security Manager inventory. Then open Cisco Catalyst Device
Manager (Cisco CDM), and discover the FWSM configurations on the device, and
assign a VLAN that will serve as the inside interface to the FWSM.
For more information, see:
• Configuring a Firewall Services Module (FWSM) Interface with VPNSM or
VPN SPA, page 9-38
• Discovering Policies, page 6-5
• Creating a Single Layer 3 Ethernet VLAN, page 14-102
Navigation Path
You can access the FWSM tab from the Edit Endpoints dialog box. Open the Edit
Endpoints Dialog Box, page B-16, then click the FWSM tab.
Create VPN Wizard
NoteMake sure you selected a Catalyst 6500/7600 device in the table on the Endpoints
Page, page B-13 (or tab), before opening the Edit Endpoints dialog box.
Related Topics
• Configuring a Firewall Services Module (FWSM) Interface with VPNSM or