Cisco Systems C7200 User Manual

C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
Corporate Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
Fax: 408 526-4100
Text Part Number: OL-9129-02
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The following inform ation is for FCC compliance of Class A devices: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
The following information is for FCC compliance of Class B devices: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not installed in accordance with Cisco’s installation instructions, it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in part 15 of the FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation.
Modifying the equipment without Cisco’s written authorization may result in the equipment no longer complying with FCC requirements for Class A or Class B digital devices. In that event, your right to use the equipment may be limited by FCC regulations, and you may be required to correct any interference to radio or television communications at your own expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco equipment or one of its peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures:
• Turn the television or radio antenna until the interference stops.
• Move the equipment to one side or the other of the television or radio.
• Move the equipment farther away from the television or radio.
• Plug the equipment into an outlet that is on a different circuit from the television or radio. (That is, make certain the equipment and the television or radio are on circuits controlled by different circuit breakers or fuses.)
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
CCVP, the Cisco Logo, and the Cisco Square Bridge logo are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networking Academy, Network Registrar, Pac k et , PIX, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0609R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
© 2006 Cisco Systems, Inc. All rights reserved.
Preface vii
Audience vii
Warnings vii
Objectives viii
Organization viii
Related Documentation ix
Obtaining Documentation ix
Cisco.com ix Product Documentation DVD x Ordering Documentation x
Documentation Feedback x

CONTENTS

Cisco Product Security Overview x
Reporting Security Problems in Cisco Products xi
Product Alerts and Field Notices xi
Obtaining Technical Assistance xii
Cisco Technical Support & Documentation Website xii Submitting a Service Request xiii Definitions of Service Request Severity xiii
Obtaining Additional Publications and Information xiii
Overview 1 - 1
Data Encryption Overview 1 - 1
VSA Overview 1 - 2
Hardware Required 1 - 4
Features 1 - 4
Performance 1 - 5
Supported Standards, MIBs, and RFCs 1 - 5
Standards 1 - 5 MIBs 1 - 5 RFCs 1 - 5
OL-9129-02
Enabling/Disabling the VSA 1 - 6
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
iii
Contents
Disabling the VSA during Operation 1 - 6 Enabling/Disabling Scheme 1 - 6
LEDs 1 - 7
Connectors 1 - 8
Slot Locations 1 - 8
Cisco 7204VXR Router 1 - 8 Cisco 7206VXR Router 1 - 10
Preparing for Installation 2 - 1
Required Tools and Equipment 2 - 1
Hardware and Software Requirements 2 - 1
Software Requirements 2 - 2 Hardware Requirements 2 - 2 Restrictions 2 - 2
Online Insertion and Removal (OIR) 2 - 3
Safety Guidelines 2 - 3
Safety Warnings 2 - 3 Electrical Equipment Guidelines 2 - 4 Preventing Electrostatic Discharge Damage 2 - 4
Compliance with U.S. Export Laws and Regulations Regarding Encryption 2 - 5
Removing and Installing the VSA 3 - 1
Handling the VSA 3 - 1
Online Insertion and Removal (OIR) 3 - 2
Warnings and Cautions 3 - 2
VSA Removal and Installation 3 - 2
Configuring the VSA 4 - 1
Overview 4 - 1
Configuration Tasks 4 - 1
Using the EXEC Command Interpreter 4 - 2 Configuring an IKE Policy 4 - 2 Disabling VSA (Optional) 4 - 4 Configuring a Transform Set 4 - 4
Defining a Transform Set 4 - 5 IPSec Protocols: AH and ESP 4 - 7 Selecting Appropriate Transforms 4 - 7 The Crypto Transform Configuration Mode 4 - 7
iv
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
Changing Existing Transforms 4 - 8 Transform Example 4 - 8
Configuring IPSec 4 - 8
Ensuring That Access Lists Are Compatible with IPSec 4 - 8 Setting Global Lifetimes for IPSec Security Associations 4 - 8 Creating Crypto Access Lists 4 - 10 Creating Crypto Map Entries 4 - 10 Creating Dynamic Crypto Maps 4 - 12
Applying Crypto Map Sets to Interfaces 4 - 14 Monitoring and Maintaining IPSec 4 - 14 Verifying IKE and IPSec Configurations 4 - 15
Verifying the Configuration 4 - 16
Configuration Examples 4 - 18
Configuring IKE Policies Example 4 - 18 Configuring IPSec Configuration Example 4 - 18
Contents
I
NDEX
Basic IPSec Configuration Illustration 4 - 19
Router A Configuration 4 - 19 Router B Configuration 4 - 20
Troubleshooting Tips 4 - 21
Monitoring and Maintaining the VSA 4 - 23
Using Deny Policies in Access Lists 4 - 23
Configuration Guidelines and Restrictions 4 - 24 Monitor and Maintenance Commands 4 - 24
OL-9129-02
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
v
Contents
vi
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02

Preface

This preface describes the objectives and organization of this document and explains how to find additional information on related products and services. This preface contains the following sections:
Audience, page vii
Warnings, page vii
Objectives, page viii
Organization, page viii
Related Documentation, page ix

Audience

Warnings

Warning
Obtaining Documentation, page ix
Documentation Feedback, page x
Cisco Product Security Overview, page x
Product Alerts and Field Notices, page xi
Obtaining Technical Assistance, page xii
Obtaining Additional Publications and Information, page xiii
The audience for this publication should be familiar with Cisco router hardware and cabling along with electronic circuitry and wiring practices. Experience as an electronic or electromechanical technician is recommended.
To prevent the system from overheating, do not operate it in an area that exceeds the maximum recommended ambient temperature of: 24°C (75°F).
OL-9129-02
Only trained and qualified personnel should be allowed to install, replace, or service this equipment.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
vii

Objectives

Preface
Warning
Objectives
Note To ensure compliance with U.S. export laws and regulations, and to prevent future problems, see the
IMPORTANT SAFETY INSTRUCTIONS
This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. To see translations of the warnings that appear in this publication, refer to the translated safety warnings that accompanied this device.
Note: SAVE THESE INSTRUCTIONS
Note: This documentation is to be used in conjunction with the specific product installation guide that shipped with the product. Please refer to the Installation Guide, Configuration Guide, or other enclosed additional documentation for further details.
This document contains instructions and procedures for installing and configuring the C7200 VSA (VPN Services Adapter), a double-width acceleration module supported on the Cisco 7204VXR and Cisco 7206VXR routers with the NPE-G2 processor.
The part number for the VSA is C7200-VSA(=).
“Compliance with U.S. Export Laws and Regulations Regarding Encryption” section on page 2-5 for
specific, important information.

Organization

This document contains the following chapters:
Chapter Title Description
1
2
3
4
Overview Describes the VSA and VSA LED displays.
Preparing for Installation Describes safety considerations, tools required, and
procedures you should perform before the actual installation.
Removing and Installing the VSA Describes the procedures for installing and removing
the VSA from the supported platform.
Configuring the VSA Describes procedures needed to configure the VSA in
the Cisco 7200VXR series routers.
viii
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
Preface

Related Documentation

This section lists documentation related to your router and its functionality. Because we no longer ship the entire router documentation set automatically with each system, this documentation is available online, or on the Documentation CD-ROM.
Note Select translated documentation is available at http://www.cisco.com/ by selecting the topic ‘Select a
Location / Language’ at the top of the page.
Some online documentation requires that you are a registered Cisco user. Complete the application at
http://tools.cisco.com/RPF/register/register.do to become a registered Cisco user.
For hardware installation and maintenance information for the Cisco 7200VXR series routers:
http://www.cisco.com/en/US/products/hw/routers/ps341/tsd_products_support_series_home.html
For port adapters and interface modules:
Port adapter installation and configuration guides, available online at:
http://www.cisco.com/en/US/products/hw/modules/ps2033/tsd_products_support_series_hom e.html
Interfaces and services modules installation and configuration guides, available online at:
http://www.cisco.com/en/US/products/hw/modules/tsd_products_support_category_home.htm l
Related Documentation
For Cisco IOS software configuration and support documentation, available online at:
http://www.cisco.com/en/US/products/sw/iosswrel/tsd_products_support_category_home.html
To find the right Cisco IOS software and the amount of memory you need to run the Cisco IOS features you want to run on your Cisco platform, use the Cisco IOS Software Selection Tool. Registered Cisco Direct users can access the Cisco IOS Software Selection Tool at:
http://tools.cisco.com/ITDIT/ISTMAIN/servlet/index
To find the minimum Cisco IOS software requirements for your router, use the Software Advisor tool. Registered Cisco Direct users can access the Software Advisor at:
http://www.cisco.com/cgi-bin/Support/CompNav/Index.pl
For security and VPN documentation, available online at:
http://www.cisco.com/en/US/tech/tk583/tsd_technology_support_category_home.html
If you are a registered Cisco Direct Customer, you can access Technical Assistance Center tools and
support at: http://www.cisco.com/kobayashi/support/tac/tools.shtml

Obtaining Documentation

Cisco documentation and additional literature are available on Cisco.com. This section explains the product documentation resources that Cisco offers.

Cisco.com

OL-9129-02
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/techsupport
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
ix

Documentation Feedback

You can access the Cisco website at this URL:
http://www.cisco.com
You can access international Cisco websites at this URL:
http://www.cisco.com/public/countries_languages.shtml

Product Documentation DVD

The Product Documentation DVD is a library of technical product documentation on a portable medium. The DVD enables you to access installation, configuration, and command guides for Cisco hardware and software products. With the DVD, you have access to the HTML documentation and some of the PDF files found on the Cisco website at this URL:
http://www.cisco.com/univercd/home/home.htm
The Product Documentation DVD is created and released regularly. DVDs are available singly or by subscription. Registered Cisco.com users can order a Product Documentation DVD (product number DOC-DOCDVD= or DOC-DOCDVD=SUB) from Cisco Marketplace at the Product Documentation Store at this URL:
Preface
http://www.cisco.com/go/marketplace/docstore

Ordering Documentation

You must be a registered Cisco.com user to access Cisco Marketplace. Registered users may order Cisco documentation at the Product Documentation Store at this URL:
http://www.cisco.com/go/marketplace/docstore
If you do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Documentation Feedback
You can provide feedback about Cisco technical documentation on the Cisco Technical Support & Documentation site area by entering your comments in the feedback form available in every online document.
Cisco Product Security Overview
Cisco provides a free online Security Vulnerability Policy portal at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
From this site, you will find information about how to do the following:
Report security vulnerabilities in Cisco products
Obtain assistance with security incidents that involve Cisco products
Register to receive security information from Cisco
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
x
OL-9129-02
Preface
A current list of security advisories, security notices, and security responses for Cisco products is available at this URL:
http://www.cisco.com/go/psirt
To see security advisories, security notices, and security responses as they are updated in real time, you can subscribe to the Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed. Information about how to subscribe to the PSIRT RSS feed is found at this URL:
http://www.cisco.com/en/US/products/products_psirt_rss_feed.html
Reporting Security Problems in Cisco Products
Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you have identified a vulnerability in a Cisco product, contact PSIRT:
For emergencies only— security-alert@cisco.com
An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.

Product Alerts and Field Notices

For nonemergencies —psirt@cisco.com
In an emergency, you can also reach PSIRT by telephone:
1 877 228-7302
1 408 525-6532
Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product (for example, GnuPG) to
encrypt any sensitive information that you send to Cisco. PSIRT can work with information that has been encrypted with PGP versions 2.x through 9.x.
Never use a revoked encryption key or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
The link on this page has the current PGP key ID in use.
If you do not have or use PGP, contact PSIRT to find other means of encrypting the data before sending any sensitive material.
Product Alerts and Field Notices
Modifications to or updates about Cisco products are announced in Cisco Product Alerts and Cisco Field Notices. You can receive Cisco Product Alerts and Cisco Field Notices by using the Product Alert Tool on Cisco.com. This tool enables you to create a profile and choose those products for which you want to receive information.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
xi

Obtaining Technical Assistance

To access the Product Alert Tool, you must be a registered Cisco.com user. (To register as a Cisco.com user, go to this URL: http://tools.cisco.com/RPF/register/register.do) Registered users can access the tool at this URL: http://tools.cisco.com/Support/PAT/do/ViewMyProfiles.do?local=en
Obtaining Technical Assistance
Cisco Technical Support provides 24-hour-a-day award-winning technical assistance. The Cisco Technical Support & Documentation website on Cisco.com features extensive online support resources. In addition, if you have a valid Cisco service contract, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not have a valid Cisco service contract, contact your reseller.
Cisco Technical Support & Documentation Website
The Cisco Technical Support & Documentation website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day at this URL:
Preface
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:
http://tools.cisco.com/RPF/register/register.do
Note Use the Cisco Product Identification Tool to locate your product serial number before submitting a
request for service online or by phone. You can access this tool from the Cisco Technical Support & Documentation website by clicking the Tools & Resources link, clicking the All Tools (A-Z) tab, and then choosing Cisco Product Identification Tool from the alphabetical list. This tool offers three search options: by product ID or model name; by tree view; or, for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.
Tip Displaying and Searching on Cisco.com
If you suspect that the browser is not refreshing a web page, force the browser to update the web page by holding down the Ctrl key while pressing F5.
To find technical information, narrow your search to look in technical documentation, not the entire Cisco.com website. On the Cisco.com home page, click the Advanced Search link under the Search box and then click the Technical Support & Documentation radio button.
xii
To provide feedback about the Cisco.com website or a particular technical document, click Contacts & Feedback at the top of any Cisco.com web page.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
Preface

Submitting a Service Request

Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests, or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.
To open a service request by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411 Australia: 1 800 805 227 EMEA: +32 2 704 55 55 USA: 1 800 553 2447

Obtaining Additional Publications and Information

For a complete list of Cisco TAC contacts, go to this URL:
http://www.cisco.com/techsupport/contacts

Definitions of Service Request Severity

To ensure that all service requests are reported in a standard format, Cisco has established severity definitions.
Severity 1 (S1)—An existing network is “down” or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operations are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)—Operational performance of the network is impaired while most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.
Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.
Obtaining Additional Publications and Information
OL-9129-02
Information about Cisco products, technologies, and network solutions is available from various online and printed sources.
The Cisco Online Subscription Center is the website where you can sign up for a variety of
Cisco e-mail newsletters and other communications. Create a profile and then select the subscriptions that you would like to receive. To visit the Cisco Online Subscription Center, go to this URL:
http://www.cisco.com/offer/subscribe
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
xiii
Obtaining Additional Publications and Information
The Cisco Product Quick Reference Guide is a handy, compact reference tool that includes brief
product overviews, key features, sample part numbers, and abbreviated technical specifications for many Cisco products that are sold through channel partners. It is updated twice a year and includes the latest Cisco channel product offerings. To order and find out more about the Cisco Product Quick Reference Guide, go to this URL:
http://www.cisco.com/go/guide
Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo
merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/
Cisco Press publishes a wide range of general networking, training, and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:
http://www.ciscopress.com
Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj
Preface
Networking products offered by Cisco Systems, as well as customer support services, can be
obtained at this URL:
http://www.cisco.com/en/US/products/index.html
Networking Professionals Connection is an interactive website where networking professionals
share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL:
http://www.cisco.com/discuss/networking
“What’s New in Cisco Documentation” is an online publication that provides information about the
latest documentation releases for Cisco products. Updated monthly, this online publication is organized by product category to direct you quickly to the documentation for your products. You can view the latest release of “What’s New in Cisco Documentation” at this URL:
http://www.cisco.com/univercd/cc/td/doc/abtunicd/136957.htm
World-class networking training is available from Cisco. You can view current offerings at
this URL:
http://www.cisco.com/en/US/learning/index.html
xiv
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
CHAPTER
1

Overview

This chapter describes the C7200 VSA (VPN Services Adapter) and contains the following sections:
Data Encryption Overview, page 1-1
VSA Overview, page 1-2
Hardware Required, page 1-4
Features, page 1-4
Supported Standards, MIBs, and RFCs, page 1-5
Enabling/Disabling the VSA, page 1-6
LEDs, page 1-7
Connectors, page 1-8
Slot Locations, page 1-8

Data Encryption Overview

This section describes data encryption, including the IPSec, IKE, and certification authority (CA) interoperability features.
Note For additional information on these features, refer to the “IP Security and Encryption” chapter in the
Security Configuration Guide and Security Command Reference publications.
IPSec is a network level open standards framework, developed by the Internet Engineering Task Force (IETF) that provides secure transmission of sensitive information over unprotected networks such as the Internet. IPSec includes data authentication, antireplay services and data confidentiality services.
Cisco follows these data encryption standards:
IPSec—IPSec is an IP layer open standards framework that provides data confidentiality, data
integrity, and data authentication between participating peers. IKE handles negotiation of protocols and algorithms based on local policy, and generates the encryption and authentication keys to be used by IPSec. IPSec protects one or more data flows between a pair of hosts, between a pair of security routers, or between a security router and a host.
OL-9129-02
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
1-1

VSA Overview

Chapter 1 Overview
IKE—Internet Key Exchange (IKE) is a hybrid security protocol that implements Oakley and Skeme
key exchanges inside the Internet Security Association and Key Management Protocol (ISAKMP) framework. IKE can be used with IPSec and other protocols. IKE authenticates the IPSec peers, negotiates IPSec security associations, and establishes IPSec keys. IPSec can be configured with or without IKE.
CA—certification authority (CA) interoperability supports the IPSec standard, using Simple
Certificate Enrollment Protocol (SCEP) and Certificate Enrollment Protocol (CEP). CEP permits Cisco IOS devices and CAs to communicate to permit your Cisco IOS device to obtain and use digital certificates from the CA. IPSec can be configured with or without CA. The CA must be properly configured to issue certificates. For more information, see the “Configuring Certification Authority Interoperability” chapter of the Security Configuration Guide at
http://www.cisco.com/en/US/products/sw/iosswrel/products_ios_cisco_ios_software_releases.htm l
The component technologies implemented for IPSec include:
DES and Triple DES—The Data Encryption Standard (DES) and Triple DES (3DES) encryption
packet data. Cisco IOS implements the 3-key Triple DES and DES-CBC with Explicit IV. Cipher Block Chaining (CBC) requires an initialization vector (IV) to start encryption. The IV is explicitly given in the IPSec packet.
AES—The Advanced Encryption Standard, a next-generation symmetric encryption algorithm, used
by the U.S. Government and organizations outside the U.S.
MD5 (HMAC variant)—MD5 is a hash algorithm. HMAC is a keyed hash variant used to
authenticate data.
SHA (HMAC variant)—SHA is a hash algorithm. HMAC is a keyed hash variant used to
authenticate data.
RSA signatures and RSA encrypted nonces—RSA is the public key cryptographic system developed
by Ron Rivest, Adi Shamir, and Leonard Adleman. RSA signatures provides non-repudiation while RSA encrypted nonces provide repudiation.
IPSec with the Cisco IOS software supports the following additional standards:
AH—Authentication Header is a security protocol that provides data authentication and optional
antireplay services.
The AH protocol uses various authentication algorithms; Cisco IOS software has implemented the mandatory MD5 and SHA (HMAC variants) authentication algorithms. The AH protocol provides antireplay services.
ESP—Encapsulating Security Payload, a security protocol, provides data privacy services, optional
data authentication, and antireplay services. ESP encapsulates the data to be protected. The ESP protocol uses various cipher algorithms and (optionally) various authentication algorithms. Cisco IOS software implements the mandatory 56-bit DES-CBC with Explicit IV or Triple DES as the encryption algorithm, and MD5 or SHA (HMAC variants) as the authentication algorithms. The updated ESP protocol provides antireplay services.
VSA Overview
The C7200 VSA (VPN Services Adapter) is a full-width service adapter (see Figure 1-1) supported in the I/O slot of the Cisco 7204VXR and Cisco 7206VXR routers with the NPE-G2 processor.
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
1-2
OL-9129-02
Chapter 1 Overview
Note The C7200 VSA is only supported on the Cisco 7200VXR with the NPE-G2 processor.
VSA Overview
The VSA features hardware acceleration for Advanced Encryption Standard (AES), Data Encryption Standard (DES), and Triple DES (3DES), providing increased performance for site-to-site and remote-access IPSec VPN services. The Cisco C7200 VSA solution provides quality of service (QoS), multicast and multiprotocol traffic, and broad support of integrated LAN/WAN media.
Figure 1-1 VSA Module - Front View
1 2
3
1 Screws 3 Handle
2 Status LED light
Figure 1-2 VSA Module - Rear Connectors
1 2
C7200-VSA
148487
1
OL-9129-02
C7200-VSA
148488
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
1-3

Hardware Required

1 Host IO Bus and PCI-X Bus 2 Power supply
The VSA provides hardware-accelerated support for multiple encryption functions:
128/192/256-bit Advanced Encryption Standard (AES) in hardware
Data Encryption Standard (DES) standard mode with 56-bit key: Cipher Block Chaining (CBC)
Performance to 900 Mbps encrypted throughput with 300 byte packets and 1000 tunnels
5000 tunnels for DES/3DES/AES
Secure Hash Algorithm1 (SHA-1) and Message Digest 5 (MD5) hash algorithms
Rivest, Shamir, Adelman (RSA) public-key algorithm
Diffie-Hellman Groups 1, 2 and 5
Hardware Required
Chapter 1 Overview

Features

The hardware required to ensure proper operation of the C7200 VSA is as follows:
The C7200 VSA is compatible with the Cisco NPE-G2 processor on the Cisco 7204VXR or Cisco
7206VXR routers.
ROMmon requirement—12.4(4r)XD5
I/O FPGA requirement—0x25 (decimal 0.37)
VSA FPGA requirement—0x13 (decimal 0.19)
This section describes the VSA features, as listed in Table 1 - 1 .
Table 1-1 VSA Features
Feature Description/Benefit
Throughput
1
Performance to 900 Mbps encrypted throughput using 3DES or AES on the Cisco 7204VXR and Cisco 7206VXR routers
Number of IPSec protected tunnels
2
Up to 5000 tunnels
3
Number of tunnels per second Note: will update after further testing
Hardware-based encryption Data protection: IPSec DES, 3DES, and AES
Authentication: RSA and Diffie-Hellman Data integrity: SHA-1 and Message Digest 5 (MD5)
VPN tunneling IPsec tunnel mode; Generic Routing Encapsulation (GRE) and
Layer 2 Tunneling Protocol (L2TP) protected by IPSec
Minimum Cisco IOS software release supported
12.4(4)XD3 fc2 or later release of 12.4XD
12.4(11)T or later release of 12.4T
Standards supported IPSec/IKE: RFCs 2401-2411, 2451
1. As measured with IPSec 3DES HMAC-SHA1 on 1400 byte packets.
1-4
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
OL-9129-02
Chapter 1 Overview

Performance

Supported Standards, MIBs, and RFCs

2. Number of tunnels supported varies based on the total system memory installed.
3. On the NPE-G2, the minimum memory requirement is 1 GB of memory.
Table 1- 2 lists the performance information for the VSA.
Table 1-2 Performance for VSA
Cisco Router Throughput1
Cisco 7200VXR series routers with the NPE-G2 processor
1. As measured with IPSec 3DES or AES Hashed Message Authentication Code (HMAC)-SHA-1 on 1400-byte packets. Performance varies depending on the number of modules, bandwidth, traffic volume, Cisco IOS software release, and so forth.
2. Using Cisco 12.4(4)XD3 fc2 image. Performance varies by Cisco IOS software release.
Performance to 900 Mbps encrypted throughput
2
Description
Cisco IOS release: 12.4(4)XD3 fc2
7200VXR/NPE-G2/VSA, 1GB system memory
3DES/HMAC-SHA or AES/HMAC-SHA, preshared with no IKE-keepalive configured
Supported Standards, MIBs, and RFCs
This section describes the standards, Management Information Bases (MIBs), and Request for Comments (RFCs) supported on the VSA. Requests for Comments (RFCs) contain information about the supported Internet suite of protocols.

Standards

IPSec/IKE: RFCs 2401-2411, 2451

MIBs

RFCs

OL-9129-02
CISCO-IPSEC-FLOW-MONITOR-MIB
CISCO-IPSEC-MIB
CISCO-IPSEC-POLICY-MAP-MIB
To obtain lists of supported MIBs by platform and Cisco IOS release, and to download MIB modules, go to the Cisco MIB website on Cisco.com at the following URL:
http://www.cisco.com/public/sw-center/netmgmt/cmtk/mibs.shtml
IPSec/IKE: RFCs 2401-2411, 2451
C7200 VSA (VPN Services Adapter) Installation and Configuration Guide
1-5
Loading...
+ 43 hidden pages