• Adding AAA Server Devices to Your Repository, page 4-2
• Creating Encryption Policies, page 4-5
• Creating Remote Access VPN Policies, page 4-5
• Creating Remote Access VPN Service Requests, page 4-25
Creating Remote Access VPN Services
Remote Access VPN tunnels are initiated by a VPN Client and terminated at the secure network edge,
as illustrated in Figure 4-1. (The blue lines represent the Remote Access VPN tunnels.)
CHA PTER
4
Figure 4-1Remote Access VPNs
To begin the remote access provisioning process, the network administrator defines an encryption policy,
a remote access VPN policy, and (optionally) configures a AAA server (pronounced “Triple A server”).
The remote access policy is then applied to CPE devices in the network through deployment of a remote
access service request that uses the remote access policy.
OL-5532-02
Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2
4-1
Adding AAA Server Devices to Your Repository
NoteBefore creating an ISC security policy or service request, it is necessary to populate the ISC repository
with the target devices in your network, collect the initial device configuration files, designate customers
and customer sites, and define each device as a CPE.
CPE devices are the devices at each end of the VPN tunnel. Creating CPE devices includes assigning
each target device to a specific customer and customer site and marking the device interfaces.
Specifically for security management, you must define at least one public and one private interface on
each device.
For how-to information on populating your ISC repository and setting up CPE devices, refer to the Cisco IP Solution Center Integrated VPN Management Suite Infrastructure Guide, 3.2.
In the Remote Access VPN policy, the network administrator performs the following tasks:
• Configures the encryption policy (which contains IKE and IPsec proposal parameters) that defines
the network layer encryption and authentication control.
• Specifies the IKE XAuth parameters for user authentication.
• Sets the Mode Configuration parameters for policy push and features such as dynamically assigned
client IP addresses.
Chapter 4 Remote Access VPN Services
• Defines the remote access user group. (Because each remote access policy defines a user group, you
can use multiple remote access policies in the same service request. This enables you to configure
multiple user groups on the same CPE device.)
• Defines remote access parameters.
The group policy information is stored in a profile that can be used locally in the VPN device
configuration. When the user or group information is stored on AAA servers, you must also configure
access to the AAA servers and allow the VPN device to send requests to the AAA servers.
Once created, the remote access policies can also be applied to multiple service requests.
To define an remote access VPN service, use the following sections:
• Adding AAA Server Devices to Your Repository, page 4-2
• Creating Encryption Policies, page 4-5
• Creating Remote Access VPN Policies, page 4-5
• Creating Remote Access VPN Service Requests, page 4-25
Adding AAA Server Devices to Your Repository
A AAA server (pronounced “Triple A” server) is required when the user authentication method is
external or the group policy information is stored on an external AAA server. If user profiles or group
attributes are to be obtained from a AAA Server (as opposed to having them stored on the CPE device
itself), then a AAA Server entry must be created and added to your ISC repository.
To create a AAA server entry in ISC, perform the following steps:
4-2
Step 1Click Home > Service Inventory > Inventory and Connection Manager > AAA Servers. The AAA
Servers page appears as shown in Figure 4-2.
Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2
OL-5532-02
Chapter 4 Remote Access VPN Services
Figure 4-2The AAA Servers Page
Adding AAA Server Devices to Your Repository
Step 2Click Create. The Create AAA Server page appears as shown in Figure 4-3.
Figure 4-3The Create AAA Server Page
OL-5532-02
Step 3
Follow the instructions in Table 4-1 to enter the AAA server attributes.
Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2
4-3
Chapter 4 Remote Access VPN Services
Adding AAA Server Devices to Your Repository
Table 4-1Create AAA Server Fields
Field NameTypeInstructions
Nametext boxEnter a name for the AAA server.
OwnerSelect button Specify whether the policy is global by clicking Global, or customer owned by
clicking Customer.
If you select Customer, you are required to specify the owner. Choose the customer
with which you want to associate the AAA server. To do this, click Customer >
Select. The Customer for IPsec Policy dialog box appears. Click the button next to
the customer you want to select and click Select (to choose that customer), or click
Cancel to exit the dialog box without saving changes. Both return you to the main
page.
IP Addresstext boxEnter the IP address of the AAA server.
Server Typedrop-down
list
Server Roledrop-down
list
Porttext boxEnter the authentication port number if the AAA server acts as an authentication
Accounting Server
text boxEnter the accounting port number if the AAA server acts as an accounting server. The
Port
Timeouttext boxEnter the timeout in seconds for how long to wait after sending a query to the server
Retriestext boxEnter the number of times to retry sending a query to the server after the timeout
Secrettext boxEnter the AAA server secret (also called the shared secret). The field displays only
Verify Secrettext boxRetype the AAA server secret. It must match what you entered in the Secret field
Click the drop-down list and select the type of the AAA server. The type can be
RADIUS, NTDOMAIN, SDI, or TACACS+. The NTDOMAIN and SDI options are
supported for the VPN 3000 only.
Click the drop-down list and select the server role for this AAA server:
• AUTHENTICATION – Use as an authentication server only.
• ACCOUNTING – Use as an accounting server only.
• BOTH – Use as an authentication and accounting server.
server. The default authentication port is 1645 for a RADIUS server.
default accounting port is 1646 for a RADIUS server.
and receiving no response before trying again. The default is 4 seconds.
period. The default is 2.
asterisks.
exactly.
4-4
Step 4Click Save when done. The AAA Servers page appears with the newly created AAA server displayed in
the AAA server list, as shown in Figure 4-4.
Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2
OL-5532-02
Chapter 4 Remote Access VPN Services
Figure 4-4The AAA Servers Page After Adding A New Server
Creating Encryption Policies
Creating Encryption Policies
The encryption policy defines the security parameters for protecting data traveling through the VPN
tunnels. It consists of one or more IKE proposals, one or more IPsec proposals, and global attributes. For
example, the IKE proposal portion of the encryption policy could consist of selecting the 3DES, SHA,
certificates, and Diffie-Hellman Group 2 options, and the IPsec proposal portion of the encryption policy
could consist of selecting the ESP-AES, ESP-SHA, no authentication header (AH), no compression, and
no PFS options.
You must have an encryption policy for your remote access policy. However, the same encryption policy
defined for a site-to-site VPN policy may also be used for a remote access policy. So, if you have already
created an encryption policy in ISC that you would like to use, proceed to the “Creating Remote Access
VPN Policies” section on page 4-5. Otherwise, follow the instructions in “Creating an Encryption
Policy” section on page 3-5 and create an encryption policy before continuing.
Creating Remote Access VPN Policies
The remote access VPN policy defines the characteristics of the IPsec tunnel between the customer site
and the remote user. Its attributes include the VPN group name and password, IP address pools, and split
tunneling subnets. Additionally, the policy defines what VPN features are enabled and which are not.
For example, the policy enables (or disables) reverse route injection and NAT transparency.
OL-5532-02
Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2
4-5
Creating Remote Access VPN Policies
To create a remote access VPN policy, perform the following steps:
Step 1Click Service Design > Policies. The Policies page appears as shown in Figure 4-5, with previously
created policies displayed.
Figure 4-5The Policies Page
Chapter 4 Remote Access VPN Services
Step 2Click Create > IPsec Policy. The IPsec Policy Creation page appears as shown in Figure 4-6.
Figure 4-6The IPsec Policy Creation Page
Step 3
Click Remote Access VPN Policy.
4-6
Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2
OL-5532-02
Chapter 4 Remote Access VPN Services
Step 4The Remote Access VPN Policy – General Editor page appears as shown in Figure 4-7. Look at the list
of steps in the table of contents (TOC) on the left of the page. These are the steps for creating a remote
access VPN policy.
Figure 4-7The Remote Access VPN Policy – General Editor Page
Creating Remote Access VPN Policies
OL-5532-02
Step 5
Follow the instructions in Table 4-2 to enter values for the Remote Access VPN Policy – General Editor.
Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2
4-7
Chapter 4 Remote Access VPN Services
Creating Remote Access VPN Policies
Table 4-2Remote Access VPN Policy – General Editor Fields
Field NameTypeInstructions
Nametext boxEnter a name for the policy. However, the name cannot contain spaces because it is
used as the VPN group name.
Ownerradio button
and Select
button
Encryption PolicySelect button Choose the name of an encryption policy you created in previous steps by clicking
Group Typedrop-down
list
Click Customer > Select and choose the customer for which the remote access VPN
is intended. When you click Customer > Select, the Customer for IPsec Policy dialog
box appears. Click the button next to the customer you want to select and click Select
(to choose that customer), or click Cancel to exit the dialog box without saving
changes. Both return you to the main page.
Do not select Global. It is important to associate remote access policies with a
specific customer because many remote access VPN parameters are
customer-specific.
Select. The encryption policy specifies the IKE and IPsec proposal parameters for the
IPsec VPN and determines the level of encryption used in the IPsec VPN tunnels.
Select the policy type. An internal group is configured on the VPN device while an
external group is configured on an external AAA server.
• Internal – Group attributes are on the target device. If the user profiles and group
attributes are maintained on the CPE device itself, select Internal.
• External – Group attributes are obtained from a AAA Server. If the user profiles
and group attributes are maintained on a AAA Server, select External.
Group Passwordtext boxRequired when you select Internal for the Group Type field. Enter the password
(IKE preshared key) for the group. The policy name and password are very important
because they are the group name and password that remote users must use when
connecting through the Cisco VPN Client.
Confirm Passwordtext boxRe-enter the group password to verify it.
XAuthcheckboxCheck to enable IKE Extended Authentication (XAuth).
XAuth Timeouttext boxEnter the idle timeout value for XAuth. The range is from 5 to 90 seconds. The default
value is 5 seconds.
Use Mode
Configuration
checkboxMode Configuration is also known as the ISAKMP Configuration Method or
Configuration Transaction. Specifically, when enabled, this option exchanges
configuration parameters with the client while negotiating Security Associations
(SAs).
Check the Mode Configuration checkbox to use Mode Configuration with the IPsec
clients in this group. You must enable Mode Configuration for IPsec clients because
IPsec uses Mode Configuration to pass all configuration parameters to the client.
Otherwise, these parameters are not passed to the client. Also, you must check this
box to use split tunneling.
Uncheck the box if you are using L2TP over IPsec as your tunneling protocol.
NoteThe Cisco VPN Client supports Mode Configuration, but other IPsec clients
may not. For example, the Microsoft Windows 2000 IPsec client does not
support Mode Configuration. (The Windows 2000 client uses the PPP layer
above L2TP to receive its IP address from the VPN Concentrator.) If you are
using other client software packages, check for compatibility in the
documentation for your client software before using this option.
4-8
Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2
OL-5532-02
Chapter 4 Remote Access VPN Services
Creating Remote Access VPN Policies
Table 4-2Remote Access VPN Policy – General Editor Fields (continued)
Field NameTypeInstructions
NAT TraversalcheckboxAlso called NAT transparency. NAT traversal enables IPsec VPN tunnels to span
multiple Network Address Translation (NAT) and Port Address Translation (PAT)
domains. Without NAT traversal, IPsec VPN tunnels cannot span NAT or PAT
domains due to incompatibilities between IPsec packet header requirements and
address translation mechanisms.
When ON, this option allows IPsec traffic to travel through a NAT or PAT point in the
network. Requires Cisco IOS Software Release 12.2(13)T or above.
IKE NAT Keepalive
(in seconds)
Tunneling Protocoldrop-down
Authentication
Server
text boxAvailable only when NAT Traversal is enabled. The default value is 20 seconds and
the range is from 10 to 3600 seconds.
Select the tunneling protocol with which this group can connect. Select IPSec or
list
L2TP over IPsec. The L2TP over IPsec option is supported for the VPN 3000 only.
Consequently, if you select L2TP over IPsec, only VPN 3000 devices will be
available for use in any IPsec RA service request that uses this remote access policy.
drop-down
list
Select the authentication method for members of this user group. (The name of the
Remote Access Policy becomes the user group name.) The following options are
supported:
• None – Select this option if you selected L2TP over IPsec as the tunnelling
protocol option. If you select this option, remote users will not be authenticated
by an authentication server. This option is supported for the VPN 3000 only.
• RADIUS – Authenticate users using Remote Authentication Dial In User Service
(RADIUS). The RADIUS specification is described in RFC 2865.
• Internal – Authenticate users against a database internal to the device.
• NT Domain – Authenticate users using an external Windows NT Domain
system.
• SDI – Authenticate users using Security Dynamics International (SDI)
authentication.
• TACACS+ – Authenticate users using Terminal Access Controller Access
Control System Plus (TACACS+).
Default Domain
text boxEnter the default domain name given to users of this group.
Name
DNS Primary Server text boxEnter the IP address of the primary Domain Name System (DNS) server. This option
is for use with all authentication methods.
DNS Secondary
Server
WINS Primary
Server
WINS Secondary
Server
Step 6Click Next to continue to the Address Pools page as described in the “Defining Address Pools” section
text boxEnter the IP address of the secondary DNS server. This option is for use with all
authentication methods.
text boxEnter the IP address of the primary Windows Internet Name System (WINS) server.
This option is for use with all authentication methods.
text boxEnter the IP address of the secondary WINS server. This option is for use with all
authentication methods.
on page 4-10.
OL-5532-02
Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2
4-9
Creating Remote Access VPN Policies
NoteYou can click Finish on any of the Remote Access VPN Policy pages. When you click Finish, the
unedited policy parameters take the default settings provided by ISC, and ISC saves the policy to your
repository.
Defining Address Pools
In this section, you create the IP address pools that remote clients use to establish IPsec tunnels to the
private site. Remote clients are assigned an inside IP address from these pools.
Step 1From the Remote Access VPN Policy – General Editor page click Address Pools. The Remote Access
VPN Policy – Address Pools page appears as shown in Figure 4-8.
NoteFrom the ISC home page, you can navigate to this page by clicking Service Design > Policies > Create
> IPsec Policy > Remote Access VPN Policy, entering values in the Remote Access VPN Policy –
General Editor, and then clicking Next.