Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel:
408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
Customer Order Number: DOC-7811137=
Text Part Number: 78-11137-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT
NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE
PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR
APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED
“AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Access Registrar, AccessPath, Any to Any, Are You Ready, AtmDirector, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA, CCNP, CCSI, CD-PAC,
the Cisco logo, Cisco Certified Internetwork Expert logo, CiscoLink, the Cisco Management Connection logo, the Cisco NetWorks logo, the Cisco Powered
Network logo, Cisco Systems Capital, the Cisco Systems Capital logo, Cisco Systems Networking Academy, the Cisco Systems Networking Academy
logo, the Cisco Technologies logo, Fast Step, FireRunner, Follow Me Browsing, FormShare, GigaStack, IGX, Intelligence in the Optical Core, Internet
Quotient, IP/VC, IQ Breakthrough, IQ Expertise, IQ FastTrack, IQ Readiness Scorecard, The IQ Logo, Kernel Proxy, MGX, Natural Network Viewer,
NetSonar, Network Registrar, the Networkers logo, Packet, PIX, Point and Click Internetworking, Policy Builder, Precept, RateMUX, ReyMaster,
ReyView, ScriptShare, Secure Script, Shop with Me, SlideCast, SMARTnet, SVX, The C ell, TrafficDirector, TransPath, VlanDirector, Voice LAN,
Wavelength Router, Workgroup Director, and Workgroup Stack are trademarks; Changing the Way We Work, Live, Play, and Learn, Empowering the
Internet Generation, The Internet Economy, and The New Internet Economy are service marks; and Aironet, ASIST, BPX, Catalyst, Cisco, Cisco IOS, the
Cisco IOS logo, Cisco Systems, the Cisco Systems logo, the Cisco Systems Cisco Press logo, CollisionFree, Enterprise/Solver, EtherChannel, EtherSwitch,
FastHub, FastLink, FastPAD, FastSwitch, GeoTel, IOS, IP/TV, IPX, LightStream, LightSwitch, MICA, NetRanger, Post-Routing, Pre-Routing, Registrar,
StrataView Plus, Stratm, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. or its affiliates in the U.S. and certain other countries. All
other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (0005R)
The VPN 3000 Concentrator Series User Guide provides guidelines for configuring the Cisco VPN 3000
Concentrator, details on all the functions available in the VPN 3000 Concentrator Series Manager, and
instructions for using the VPN 3000 Concentrator Series Command Line Interface.
Prerequisites
We assume you have read the VPN 3000 Concentrator Series Getting Started manual and have followed
the minimal configuration steps in Quick Configuration. That section of the VPN Concentrator Manager
is not described here.
We also assume you are an experienced system administrator or network administrator with appropriate
education and training, who knows how to install, configure, and manage internetworking systems.
However, virtual private networks and VPN devices may be new to you. You should be familiar with
Windows® 95/98 or Windows NT® system configuration and management, and you should be familiar
with Microsoft Internet Explorer or Netscape® Navigator® or Communicator browsers.
Organization
This manual is organized by the order in which sections appear in the VPN Concentrator Manager table
of contents (the left frame of the Manager browser window; see Figure 1-30 in Chapter 1.
Chapter 1, Using the VPN 3000 Concentrator Series Manager explains how to log in, navigate, and use
the VPN Concentrator Manager with a browser. It explains both HTTP and HTTPS browser connections,
and how to install the SSL certificate for a secure (HTTPS) connection.
Chapter 2, Configuration describes the main VPN Concentrator Manager configuration screen.
Chapter 3, Interfaces explains how to configure the VPN Concentrator Ethernet and WAN interfaces,
and how to configure the system power supply and voltage sensor alarms.
Chapter 4, System Configuration describes the system configuration screen of the VPN Concentrator
Manager.
Chapter 5, Servers explains how to configure the VPN Concentrator to communicate with and access
servers for user authentication, user accounting, converting hostnames to IP addresses (DNS), assigning
client IP addresses (DHCP), and network time synchronization (NTP).
VPN 3000 Concentrator Series User Guide
xxxvii
Preface
Chapter 6, Address Management explains how to configure client IP addresses available in your private
network addressing scheme, that let the client function as a VPN tunnel endpoint.
Chapter 7, Tunneling Protocols explains how to configure system-wide parameters for PPTP and L2TP,
how to configure IPSec LAN-to-LAN connections, and how to configure IKE proposals for IPSec. These
are the three most popular VPN tunneling protocols.
Chapter 8, IP Routing explains how to configure static routes, default gateways, and OSPF in the VPN
Concentrator IP routing subsystem; how to configure DHCP global parameters; and how to configure
redundant systems using VRRP.
Chapter 9, Management Protocols explains how to configure built-in VPN Concentrator servers that
provide management functions: FTP, HTTP and HTTPS, TFTP, Telnet, SNMP, and SSL.
Chapter 10, Events explains how to configure system events such as alarms, traps, error conditions,
network problems, task completion, or status changes. You can specify several ways to record and send
event messages.
Chapter 11, General explains how to configure the system identification, date, and time.
Chapter 12, User Management explains how to configure groups and users with attributes that determine
their access to and use of the VPN. Configuring groups and users correctly is essential for managing the
security of your VPN.
Chapter 13, Policy Management explains how to configure network lists, filters, rules, and Security
Associations, which are policies that govern what data traffic can flow through the VPN. You should
develop and configure policies first, since you apply them to groups, users, and interfaces. This chapter
also describes NAT configuration.
Chapter 14, Administration explains how to configure and use high-level VPN Concentrator
administrator activities such as who is allowed to configure the system, what software runs on it,
rebooting and shutting down the system, managing its files, and managing X.509 digital certificates.
Chapter 15, Monitoring explains the many status, statistics, sessions, and event log screens that you can
use to monitor the VPN Concentrator.
Chapter 16, Using the Command Line Interface explains how to use the built-in menu- and
command-line-based administrative management system via the system console or a Telnet session.
With the CLI, you can access and configure all the same parameters as the HTML-based VPN
Concentrator Manager.
Appendix A, Errors and troubleshooting describes common errors that may occur while configuring the
system, and how to correct them. It also describes all system and module LED indicators.
Appendix B, Copyrights, licenses, and notices provides all copyright and license information for Cisco
software on the VPN Concentrator, and for software that the system uses under license from other firms.
Additional Documentation
The VPN 3000 Concentrator Series Getting Started manual provides information to take you from
unpacking and installing the VPN Concentrator, through configuring the minimal parameters to make it
operational (called Quick Configuration).
The VPN Concentrator Manager also includes extensive context-sensitive online help that you can
access by clicking the
Help icon on the toolbar in the Manager window.
xxxviii
The VPN 3000 Client User Guide explains how to install, configure, and use the Cisco VPN 3000 Client,
which lets a remote client use the IPSec tunneling protocol for secure connection to a private network
through the VPN Concentrator.
VPN 3000 Concentrator Series User Guide
The VPN 3000 Monitor User Guide explains how to install, set up, and use the VPN 3000 Monitor, which
is a separate Java™ application that polls VPN 3000 Concentrators in a network for information and
displays that information on your workstation.
The VPN 3000 Concentrator Series Getting Started manual, this VPN 3000 Concentrator Series User Guide, and the VPN 3000 Client User Guide are provided on the system software distribution CD-ROM
in PDF format. To view the latest versions on the Cisco Technical Documentation Web site, click the
Support tab on the toolbar at the top of the VPN Concentrator Manager window, and click the
Documentation link.
Other references
Other useful books and articles include:
Frequently Asked Questions about Microsoft VPN Security. Microsoft Corporation: 1998.
(Available from Microsoft web site,
Kosiur, Dave. Building and Managing Virtual Private Networks. Wiley: 1998.
Sheldon, Tom. Encyclopedia of Networking. Osborne/McGraw-Hill: 1998.
Stallings, William. Data and Computer Communications, 5th ed. Prentice-Hall: 1997.
Understanding Point-to-Point Tunneling Protocol (PPTP). Microsoft Corporation: 1997. (Available
from Microsoft web site.)
Documentation Conventions
www.microsoft.com.)
Virtual Private Networking: An Overview. Microsoft Corporation: 1999. (Available from Microsoft
web site.)
www.ietf.org for Internet Engineering Task Force (IETF) Working Group drafts on IP Security
Protocol (IPSec).
www.whatis.com, a Web reference site with definitions for computer, networking, and data
communication terms.
Documentation Conventions
We use these typographic conventions in this manual:
FontMeaning
This fontDocument, chapter, and section titles. Emphasized text.
This font
This font
<This font>
This font
Command-line prompts and entries, data-entry-field entries, system displays,
filenames, etc.
Literal entries you should make exactly as shown.
Variables that the system supplies. Ignore the angle brackets.
Menus, menu items, keyboard keys, icons, screen names, data-entry field
names, etc.
VPN 3000 Concentrator Series User Guide
xxxix
Preface
Data Formats
As you configure and manage the system, enter data in these formats unless the instructions indicate
otherwise.
IP addresses
IP addresses use 4-byte dotted decimal notation; for example, 192.168.12.34. You can omit leading
zeros in a byte position.
Subnet masks and wildcard masks
Subnet masks use 4-byte dotted decimal notation; for example, 255.255.255.0. Wildcard masks are
the reverse of subnet masks and use the same notation; for example,
zeros in a byte position.
MAC addresses
0.0.0.255. You can omit leading
Hostnames
Text strings
Filenames
Port numbers
MAC addresses use 6-byte hexadecimal notation; for example, 00.10.5A.1F.4F.07.
Hostnames use legitimate network host or end-system name notation; for example, VPN01. Spaces are
not allowed. A hostname must uniquely identify a specific system on a network.
Text strings use alphanumeric characters, upper- and lower-case. Most text strings are case-sensitive; for
example,
generally 48 characters.
Filenames on the VPN Concentrator follow the DOS 8.3 naming convention: a maximum of eight
characters for the name, plus a maximum of three characters for an extension. For example,
LOG00007.TXT is a legitimate filename. The VPN Concentrator always stores filenames as uppercase.
simon and Simon represent different usernames. The maximum length of text strings is
xl
Port numbers use decimal numbers from 0 to 65535 with no commas or spaces.
VPN 3000 Concentrator Series User Guide
Contacting Cisco with questions
Cisco provides extensive technical support through its own staff and through authorized agents. If you
have questions, we suggest you first try the Cisco Web site at
Support
section. From there you can go to additional support areas such as the Technical Assistance
Center (TAC), software updates, technical documentation, and service and support solutions.
To phone the North America Technical Assistance Center, call 800 553-2447 or +1 408 526-7209.
Contacting Cisco with questions
www.cisco.com, and go to the Service &
End of Preface
VPN 3000 Concentrator Series User Guide
xli
CHAPTER
1
Using the VPN 3000 Concentrator Series
Manager
The VPN 3000 Concentrator Series Manager is an HTML-based interface that lets you configure,
administer, monitor, and manage the VPN 3000 Concentrator with a standard Web browser. To use it,
you need only to connect to the VPN Concentrator using a PC and browser on the same private network
with the VPN Concentrator.
The Manager uses the standard Web client / server protocol, HTTP (Hypertext Transfer Protocol), which
is a cleartext protocol. However, you can also use the Manager in a secure, encrypted HTTP connection
over SSL (Secure Sockets Layer) protocol, which is known as HTTPS.
• To use a cleartext HTTP connection, see Connecting to the VPN Concentrator using HTTP.
• To use HTTP over SSL (HTTPS) with the Manager:
1 The first time, connect to the Manager using HTTP, and
2 Install an SSL certificate in the browser; see Installing the SSL certificate in your browser on page
1-3.
Once the SSL certificate is installed, you can connect directly using HTTPS; see Connecting to the VPN Concentrator using HTTPS on page 1-17.
Browser requirements
The VPN Concentrator Manager requires either Microsoft Internet Explorer version 4.0 or higher, or
Netscape Navigator / Communicator version 4.0 or higher. For best results, we recommend Internet
Explorer. Whatever browser and version you use, install the latest patches and service packs for it.
JavaScript
Be sure JavaScript is enabled in the browser. Check these settings:
• Internet Explorer 4.0:
– On the
– On the Security tab, click Custom (for expert users) then click Settings.
– In the Security Settings window, scroll down to Scripting.
– Click Enable under Scripting of Java applets.
– Click Enable under Active scripting.
View menu, select Internet Options.
VPN 3000 Concentrator Series User Guide
1-1
1 Using the VPN 3000 Concentrator Series Manager
• Internet Explorer 5.0:
– On the Too ls menu, select Internet Options.
– On the Security tab, click Custom Level.
– In the Security Settings window, scroll down to Scripting.
– Click Enable under Active scripting.
– Click
• Navigator / Communicator 4.5:
– On the Edit menu, select Preferences.
– On the Advanced screen, check the box for Enable JavaScript.
Enable under Scripting of Java applets.
Cookies
Be sure cookies are enabled in the browser. Check these settings:
• Internet Explorer 4.0:
– On the
– On the Advanced tab, scroll down to Security then Cookies.
– Click Always accept cookies.
• Internet Explorer 5.0:
– On the Too ls menu, select Internet Options.
– On the Security tab, click Custom Level.
– In the Security Settings window, scroll down to Cookies.
– Click Enable under Allow cookies that are stored on your computer.
– Click Enable under Allow per-session cookies (not stored).
• Navigator / Communicator 4.5:
– On the
– On the Advanced screen, click one of the Accept ... cookies choices, and do not check Warn me before
accepting a cookie
View menu, select Internet Options.
Edit menu, select Preferences.
.
Navigation toolbar
Do not use the browser navigation toolbar buttons Back, Forward, or Refresh / Reload with the VPN
Concentrator Manager unless instructed to do so. To protect access security, clicking
automatically logs out the Manager session. Clicking
with incorrect data or settings.
We recommend that you hide the browser navigation toolbar to prevent mistakes while using the VPN
Concentrator Manager.
Back or Forward may display stale Manager screens
Recommended PC monitor / display settings
For best ease of use, we recommend setting your monitor or display:
• Desktop area = 1024 x 768 pixels or greater. Minimum = 800 x 600 pixels.
• Color palette = 256 colors or higher.
1-2
Refresh / Reload
VPN 3000 Concentrator Series User Guide
Connecting to the VPN Concentrator using HTTP
Connecting to the VPN Concentrator using HTTP
When your system administration tasks and network permit a cleartext connection between the VPN
Concentrator and your browser, you can use the standard HTTP protocol to connect to the system.
Even if you plan to use HTTPS, you use HTTP at first to install an SSL certificate in your browser.
1 Bring up the browser.
2 In the browser
interface IP address; e.g.,
http:// prefix.
The browser displays the VPN Concentrator Manager login screen.
Figure 1-1: VPN Concentrator Manager login screen
Address or Location field, you can just enter the VPN Concentrator Ethernet 1 (Private)
10.10.147.2. The browser automatically assumes and supplies an
To continue using HTTP for the whole session, skip to Logging in the VPN Concentrator Manager on
page 1-18.
Installing the SSL certificate in your browser
The VPN Concentrator Manager provides the option of using HTTP over SSL with the browser. SSL
creates a secure session between your browser (client) and the VPN Concentrator (server). This protocol
is known as HTTPS, and uses the
authenticates the server, then they encrypt all data passed during the session.
HTTPS is often confused with a similar protocol, S-HTTP (Secure HTTP), which encrypts only HTTP
application-level data. SSL encrypts all data between client and server at the IP socket level, and is thus
more secure.
SSL uses digital certificates for authentication. The VPN Concentrator creates a self-signed SSL server
certificate when it boots, and this certificate must be installed in the browser. Once the certificate is
VPN 3000 Concentrator Series User Guide
https:// prefix to connect to the server. The browser first
1-3
1 Using the VPN 3000 Concentrator Series Manager
installed, you can connect using HTTPS. You need to install the certificate from a given VPN
Concentrator only once.
Managing the VPN Concentrator is the same with or without SSL. Manager screens may take slightly
longer to load with SSL because of encryption / decryption processing. When connected via SSL, the
browser shows a locked-padlock icon on its status bar. Both Microsoft Internet Explorer and Netscape
Navigator support SSL.
Follow these steps to install and use the SSL certificate for the first time. We provide separate
instructions for Internet Explorer and Netscape Navigator when they diverge.
1 Connect to the VPN Concentrator using HTTP as above.
2 On the login screen, click the
The Manager displays the
its SSL certificate in your browser.
Figure 1-2: Install SSL Certificate screen
Install SSL Certificate link.
Install SSL Certificate screen and automatically begins to download and install
The installation sequence now differs depending on the browser. Continue below for Internet Explorer,
or skip to Installing the SSL certificate with Netscape on page 1-10.
Installing the SSL certificate with Internet Explorer
This section describes SSL certificate installation using Microsoft Internet Explorer 5.0. (With Internet
Explorer 4.0, some dialog boxes may differ but the process is similar.)
You need to install the SSL certificate from a given VPN Concentrator only once. If you do reinstall it,
the browser repeats all these steps each time.
A few seconds after the VPN Concentrator Manager SSL screen appears, Internet Explorer displays a
File Download dialog box that identifies the certificate filename and source, and asks whether to Open or
Save the certificate. To immediately install the certificate in the browser, select Open. If you Save the file,
the browser prompts for a location; you must then double-click on the file to install it.
1-4
VPN 3000 Concentrator Series User Guide
Installing the SSL certificate in your browser
Figure 1-3: Internet Explorer File Download dialog box
3 Click the Open this file from its current location radio button, then click OK.
The browser displays the
Certificate dialog box with information about the certificate. You must now
install the certificate.
Figure 1-4: Internet Explorer Certificate dialog box
4 Click Install Certificate.
The browser starts a wizard to install the certificate. The certificate store is where such certificates are
stored in Internet Explorer.
VPN 3000 Concentrator Series User Guide
1-5
1 Using the VPN 3000 Concentrator Series Manager
Figure 1-5: Internet Explorer Certificate Manager Import Wizard dialog box
5 Click Next to continue.
The wizard opens the next dialog box asking you to select a certificate store.
Figure 1-6: Internet Explorer Certificate Manager Import Wizard dialog box
6 Let the wizard Automatically select the certificate store, and click Next.
The wizard opens a dialog box to complete the installation.
1-6
VPN 3000 Concentrator Series User Guide
Installing the SSL certificate in your browser
Figure 1-7: Internet Explorer Certificate Manager Import Wizard dialog box
7 Click Finish.
The wizard opens the
Root Certificate Store dialog box asking you to confirm the installation.
Figure 1-8: Internet Explorer Root Certificate Store dialog box
8 To install the certificate, click Yes . This dialog box closes, and a final wizard confirmation dialog box
opens.
Figure 1-9: Internet Explorer Certificate Manager Import Wizard final dialog box
9 Click OK to close this dialog box, and click OK on the Certificate dialog box (Figure 1-4) to close it.
You can now connect to the VPN Concentrator using HTTP over SSL (HTTPS).
10 On the Manager SSL screen (Figure 1-2), click the link that says,
click here to connect to the VPN 3000 Concentrator Series using SSL
After installing the SSL certificate,
.
Depending on how your browser is configured, you may see a
VPN 3000 Concentrator Series User Guide
Security Alert dialog box.
1-7
1 Using the VPN 3000 Concentrator Series Manager
Figure 1-10: Internet Explorer Security Alert dialog box
11 Click OK.
The VPN Concentrator displays the HTTPS version of the Manager login screen.
The browser maintains the HTTPS state until you close it or access an unsecure site; in the latter case
you may see a
Proceed to Logging in the VPN Concentrator Manager on page 1-18 to log in as usual.
Security Alert screen.
VPN 3000 Concentrator Series User Guide
Viewing certificates with Internet Explorer
There are (at least) two ways to examine certificates stored in Internet Explorer.
First, note the padlock icon on the browser status bar in Figure 1-11. If you double-click on the icon, the
browser opens a
Figure 1-12: Internet Explorer 4.0 Certificate Properties screen
Click any of the Field items to see Details. Click Close when finished.
Second, you can view all the certificates that are stored in Internet Explorer 4.0. Click the browser
menu and select
Certificate Properties screen showing details of the specific certificate in use.
Internet Options. Click the Content tab, then click Authorities in the Certificates section.
Installing the SSL certificate in your browser
View
In Internet Explorer 5.0, click the browser
then click
Certification Authorities
Certificates in the Certificates section. On the Certificate Manager, click the Trusted Root
tab.
To ol s menu and select Internet Options. Click the Content tab,
The VPN Concentrator SSL certificate name is its Ethernet 1 (Private) IP address.
Figure 1-13: Internet Explorer 4.0 Certificate Authorities list
Select a certificate, then click View Certificate. The browser displays the Certificate Properties screen, as
in Figure 1-12 above.
VPN 3000 Concentrator Series User Guide
1-9
1 Using the VPN 3000 Concentrator Series Manager
Installing the SSL certificate with Netscape
This section describes SSL certificate installation using Netscape Navigator / Communicator 4.5.
Reinstallation
You need to install the SSL certificate from a given VPN Concentrator only once. If you try to reinstall
it, Netscape displays the note in Figure 1-14. Click
SSL (see Step 7 on page 1-13).
Figure 1-14: Netscape reinstallation note
First-time installation
The instructions below follow from Step 2 on page 1-4 and describe first-time certificate installation.
OK and just connect to the VPN Concentrator using
A few seconds after the VPN Concentrator Manager SSL screen appears, Netscape displays a
Certificate Authority
Figure 1-15: Netscape New Certificate Authority screen 1
1 Click Next> to proceed.
Netscape displays the next
screen.
New Certificate Authority screen, which further explains the process.
New
1-10
VPN 3000 Concentrator Series User Guide
Figure 1-16: Netscape New Certificate Authority screen 2
2 Click Next> to proceed.
Netscape displays the next
New Certificate Authority screen, which lets you examine details of the VPN
Concentrator SSL certificate.
Installing the SSL certificate in your browser
Figure 1-17: Netscape New Certificate Authority screen 3
3 Click Next> to proceed.
Netscape displays the next
New Certificate Authority screen, with choices for using the certificate. No
choices are checked by default.
VPN 3000 Concentrator Series User Guide
1-11
1 Using the VPN 3000 Concentrator Series Manager
Figure 1-18: Netscape New Certificate Authority screen 4
4 You must check at least the first box, Accept this Certificate Authority for Certifying network sites. Click
Next> to proceed.
Netscape displays the next
warn you about sending data to the VPN Concentrator.
New Certificate Authority screen, which lets you choose to have the browser
Figure 1-19: Netscape New Certificate Authority screen 5
5 Checking the box is optional. Doing so means that you get a warning whenever you apply settings
on a Manager screen, so it’s probably less intrusive to manage the VPN Concentrator without those
warnings. Click
Netscape displays the final
Next> to proceed.
New Certificate Authority screen, which asks you to name the certificate.
1-12
VPN 3000 Concentrator Series User Guide
Installing the SSL certificate in your browser
Figure 1-20: Netscape New Certificate Authority screen 6
6 In the Nickname field, enter a descriptive name for this certificate. “Nickname” is something of a
misnomer. We suggest you use a clearly descriptive name such as
10.10.147.2
. This name appears in the list of installed certificates; see Viewing certificates with
Cisco VPN Concentrator
Netscape below.
Finish.
Click
You can now connect to the VPN Concentrator using HTTP over SSL (HTTPS).
7 On the Manager SSL screen (Figure 1-2), click the link that says,
click here to connect to the VPN Concentrator using SSL
.
Depending on how your browser is configured, you may see a
Figure 1-21: Netscape Security Information Alert dialog box
After installing the SSL certificate,
Security Information Alert dialog box.
8 Click Continue.
The VPN Concentrator displays the HTTPS version of the Manager login screen.
VPN 3000 Concentrator Series User Guide
1-13
1 Using the VPN 3000 Concentrator Series Manager
Figure 1-22: VPN Concentrator Manager login screen using HTTPS (Netscape)
The browser maintains the HTTPS state until you close it or access an unsecure site; in the latter case,
you may see a
Proceed to Logging in the VPN Concentrator Manager on page 1-18 to log in as usual.
Security Information Alert dialog box.
1-14
VPN 3000 Concentrator Series User Guide
Viewing certificates with Netscape
There are (at least) two ways to examine certificates stored in Netscape Navigator / Communicator 4.5.
First, note the locked-padlock icon on the bottom status bar in Figure 1-22. If you click on the icon,
Netscape opens a
Navigator Toolbar at the top of the Netscape window.)
Figure 1-23: Netscape Security Info window
Security Info window. (You can also open this window by clicking Security on the
Installing the SSL certificate in your browser
Click View Certificate to see details of the specific certificate in use.
Figure 1-24: Netscape View Certificate screen
Click OK when finished.
Second, you can view all the certificates that are stored in Netscape. On the
Certificates then Signers. The “nickname” you entered in Step 6 identifies the VPN Concentrator SSL
Security Info window, select
certificate.
VPN 3000 Concentrator Series User Guide
1-15
1 Using the VPN 3000 Concentrator Series Manager
Figure 1-25: Netscape Certificates Signers list
Select a certificate, then click Edit, Verify, or Delete. Click OK when finished.
1-16
VPN 3000 Concentrator Series User Guide
Connecting to the VPN Concentrator using HTTPS
Connecting to the VPN Concentrator using HTTPS
Once you have installed the VPN Concentrator SSL certificate in the browser, you can connect directly
using HTTPS.
1 Bring up the browser.
2 In the browser
IP address; for example,
The browser displays the VPN Concentrator Manager HTTPS login screen.
A locked-padlock icon on the browser status bar indicates an HTTPS session. Also, this login screen
does not include the
Address or Location field, enter https:// plus the VPN Concentrator private interface
https://10.10.147.2.
Install SSL Certificate link.
VPN 3000 Concentrator Series User Guide
1-17
1 Using the VPN 3000 Concentrator Series Manager
Logging in the VPN Concentrator Manager
Logging in the VPN Concentrator Manager is the same for both types of connections: cleartext HTTP
or secure HTTPS.
Entries are case-sensitive, so type them carefully. With Microsoft Internet Explorer, you can press the
Ta b key to move from field to field; other browsers may work differently. If you make a mistake, click
Clear button and start over.
the
The entries that follow are the factory-supplied default entries. If you have changed them, use your
entries.
1 Click in the
2 Click in the
3 Click the
The Manager displays the main welcome screen.
Figure 1-27: Manager Main Welcome screen
Login field and type admin. (Do not pressEnter.)
Password field and type admin. (The field shows *****.)
Login button.
1-18
From here you can navigate the Manager using either the table of contents in the left frame, or the
Manager toolbar in the top frame.
VPN 3000 Concentrator Series User Guide
Configuring HTTP, HTTPS, and SSL parameters
Configuring HTTP, HTTPS, and SSL parameters
HTTP, HTTPS, and SSL are enabled by default on the VPN Concentrator, and they are configured with
recommended parameters that should suit most administration tasks and security requirements.
To configure HTTP and HTTPS parameters, see the
HTTPS
screen.
Configuration | System | Management Protocols | HTTP/
To configure SSL parameters, see the
Configuration | System | Management Protocols | SSL screen.
Understanding the VPN Concentrator Manager window
The VPN Concentrator Manager window on your browser consists of three frames — top, left, and main
— and it provides helpful messages and tips as you move the mouse pointer over window items. The title
bar and status bar also provide useful information.
Figure 1-28: VPN Concentrator Manager window.
Title bar
Top frame
(Manager toolbar)
Left frame
(Table of contents)
Title bar
Status bar
Main frame
(Manager screen)
Status bar
The title bar at the top of the browser window includes the VPN Concentrator device name or IP address
in brackets; e.g.,
The status bar at the bottom of the browser window displays explanatory messages for selected items
and Manager activity.
[10.10.104.7].
VPN 3000 Concentrator Series User Guide
1-19
1 Using the VPN 3000 Concentrator Series Manager
Mouse pointer and tips
As you move the mouse pointer over an active area, the pointer changes shape and icons change color.
A description also appears in the status bar area. If you momentarily rest the pointer on an icon, a
descriptive tip appears for that icon.
Top frame (Manager toolbar)
The Manager toolbar in the top frame provides quick access to Manager features.
Main tab
Click to go to the main Manager screen, and to close all subordinate sections and titles in the left frame.
Help tab
Click to open context-sensitive online help. Help opens in a separate browser window that you can move
or resize as you wish. Close the help window when you are finished.
Support tab
Click to open a Manager screen with links to Cisco support and documentation resources.
Figure 1-29: Support screen
Documentation
Click this link to open a browser window on the Cisco Technical Documentation Web page for Virtual
Private Networks. That page has links to VPN 3000 Concentrator Series documentation in PDF format.
(To view the PDF files, you need Adobe
the VPN 3000 Concentrator Series software CD-ROM.) When you finish, close the documentation
browser window and return to the Manager.
CCO at www.cisco.com
®
Acrobat® Reader 3.0 or later, and version 4.0 is included on
1-20
Click this link to open a browser window on the main Cisco Web page, Cisco Connection Online (CCO).
From that page, you can browse to all Cisco resources, including the Technical Assistance Center (TAC).
When you finish, close the CCO browser window and return to the Manager.
VPN 3000 Concentrator Series User Guide
tac@cisco.com
Click this link to open your configured email application and compose an email message to Cisco’s
Technical Assistance Center (TAC). When you finish, the application closes and returns to this
screen.
Logout tab
Click to log out of the Manager and return to the login screen.
Logged in: [username]
The administrator username you used to log in to this Manager session.
Configuration tab
Click to go to the main Configuration screen, to open the first level of subordinate Configuration pages
in the left frame if they are not already open, and to close Administration or Monitoring pages in the left
frame.
Understanding the VPN Concentrator Manager window
Support
Administration tab
Click to go to the main Administration screen, to open the first level of subordinate Administration pages
in the left frame if they are not already open, and to close Configuration or Monitoring pages in the left
frame.
Monitoring tab
Click to go to the main Monitoring screen, to open the first level of subordinate Monitoring pages in the
left frame if they are not already open, and to close Configuration or Administration pages in the left
frame.
Save
Click to save the active configuration and make it the boot configuration. In this state, the reminder
indicates that the active configuration is the same as the boot configuration, but you can save it anyway.
When you change the configuration, the reminder changes to
Save Needed
This reminder indicates that you have changed the active configuration. Click to save the active
configuration and make it the boot configuration. As you make configuration entries, they take effect
immediately and are included in the active, or running, configuration. However, if you reboot the VPN Concentrator without saving the active configuration, any configuration changes are lost. Clicking this
reminder saves the active configuration as the boot configuration and restores the
Save Needed.
Save reminder.
VPN 3000 Concentrator Series User Guide
1-21
1 Using the VPN 3000 Concentrator Series Manager
Refresh
Click to refresh (update) the screen contents on screens where it appears (mostly in the Monitoring
section). The date and time above this reminder indicate when the screen was last updated.
Cisco Systems logo
Click the Cisco Systems logo to open a browser and go to the Cisco web site, www.cisco.com.
Left frame (Table of contents)
The left frame provides a table of contents to Manager screens. The table of contents uses the familiar
Windows Explorer metaphor of collapsed and expanded entries.
Main section titles (Configuration, Administration, Monitoring)
Click a title to open subordinate sections and titles, and to go to that Manager screen in the main frame.
Closed or collapsed
Click the closed / collapsed icon to open subordinate sections and titles. Clicking this icon does not
change the screen in the main frame.
Open or expanded
Click the open / expanded icon to close subordinate sections and titles. Clicking this icon does not
change the screen in the main frame.
Main frame (Manager screen)
The main frame displays the current VPN Concentrator Manager screen.
Many screens include a bullet list of links and descriptions of subordinate sections and titles. You can
click a link to go to that Manager screen and open subordinate sections and titles in the table of contents.
1-22
VPN 3000 Concentrator Series User Guide
Organization of the VPN Concentrator Manager
Organization of the VPN Concentrator Manager
The VPN Concentrator Manager consists of three major sections and many subsections:
Configuration: setting all the parameters for the VPN Concentrator that govern its use and functionality
•
as a VPN device:
Interfaces: Ethernet, WAN, and power supply interface parameters.
–
– System: parameters for system-wide functions such as server access, address management,
tunneling protocols, IP routing, built-in management servers, event handling, and system
identification.
User Management: attributes for groups and users that determine their access to and use of the VPN.
–
– Policy Management: policies that control access times and data traffic through the VPN via filters,
rules, and IPSec Security Associations.
•
Administration: managing higher level functions that keep the VPN Concentrator operational and
secure, such as who is allowed to configure the system, what software runs on it, and managing its
digital certificates.
Monitoring: viewing routing tables, event logs, system LEDs and status, data on user sessions, and
•
statistics for protocols and system functions.
This manual covers all these topics. For Quick Configuration, see the VPN 3000 Concentrator Series Getting Started manual.
VPN 3000 Concentrator Series User Guide
1-23
1 Using the VPN 3000 Concentrator Series Manager
Navigating the VPN Concentrator Manager
Your primary tool for navigating the VPN Concentrator Manager is the table of contents in the left frame.
Figure 1-30 shows all its entries, completely expanded. (The figure shows the frame in multiple columns,
but the actual frame is a single column. Use the scroll controls to move up and down the frame.)
Figure 1-30: Complete Manager Table of Contents
1-24
End of Chapter
VPN 3000 Concentrator Series User Guide
Configuration
Configuring the VPN Concentrator means setting all the parameters that govern its use and functionality
as a VPN device.
Cisco supplies default parameters that cover typical installations and uses; and once you supply minimal
parameters in Quick Configuration, the system is operational. But to tailor the system to your needs, and
to provide an appropriate level of system security, you should configure the system in detail.
Configuration
This section of the Manager lets you configure all VPN Concentrator features and functions.
•
Interfaces: parameters specific to the Ethernet interfaces: public, private, and external; WAN
interfaces: ports A and B; plus power supply and voltage sensor alarms.
System: parameters for system-wide functions: server access, address assignment, tunneling protocols,
•
IP routing, built-in management servers, system events, and system identification.
User Management: attributes for groups and users that determine their access to and use of the VPN.
•
• Policy Management: policies that control data traffic through the VPN via filters, rules, and IPSec
Security Associations; network lists; access times; and NAT.
CHAPTER
2
Figure 2-1: Configuration screen
See the appropriate chapter in this manual for each section of the Manager. Online help is available for
all sections.
VPN 3000 Concentrator Series User Guide
End of Chapter
2-1
CHAPTER
3
Interfaces
This section of the VPN 3000 Concentrator Series Manager applies primarily to Ethernet and WAN
network interfaces. Here you configure functions that are interface-specific, rather than system-wide.
There is also a screen to configure power supply and voltage sensor alarms.
Typically, you configure at least two network interfaces for the VPN Concentrator to operate as a VPN
device: usually the Ethernet 1 (Private) interface and either the Ethernet 2 (Public) interface or a WAN
interface port. If you used Quick Configuration as described in the VPN 3000 Concentrator Series Getting Started manual, the system supplied many default parameters for the interfaces. Here you can
configure them explicitly.
The VPN Concentrator uses filters to control data traffic through the system; see
Management | Traffic Management
user filters govern tunneled group and user data traffic; interface filters govern all data traffic.
Network interfaces usually connect to a router that routes data traffic to other networks. The VPN
Concentrator includes IP routing functions: static routes, RIP (Routing Information Protocol), and OSPF
(Open Shortest Path First). You configure RIP and interface-specific OSPF here. You configure static
routes, the default gateway, and system-wide OSPF in the IP Router section; see the
| IP Routing
RIP and OSPF are routing protocols that routers use for messages to other routers, to determine network
connectivity, status, and optimum paths for sending data traffic. The VPN Concentrator supports RIP
versions 1 and 2, and OSPF version 2. You can enable both RIP and OSPF on an interface.
Filter settings override RIP and OSPF settings on an interface; therefore, be sure settings in filter rules
are consistent with RIP and OSPF use. For example, if you intend to use RIP, be sure you apply a filter
rule that forwards TCP/UDP packets with the RIP port configured.
screens.
. You apply filters both to interfaces and to groups and users. Group and
Configuration | Policy
Configuration | System
VPN 3000 Concentrator Series User Guide
3-1
3 Interfaces
Configuration | Interfaces
This section lets you configure the three VPN Concentrator Ethernet interface modules and, if present,
two WAN module interface ports. You can also configure alarm thresholds for the power supply
modules.
Model 3005 comes with two Ethernet interfaces. Models 3015–3080 come with three Ethernet
interfaces. Optionally, all models can have a WAN interface module installed, with two T1/E1 WAN
interface ports.
• Ethernet 1 (Private) is the interface to your private network (internal LAN).
• Ethernet 2 (Public) is the interface to the public network.
• Ethernet 3 (External) is the interface to an additional LAN (Models 3015–3080 only).
• WAN interface Port A is a T1/E1 interface, usually to the public network.
• WAN interface Port B is a T1/E1 interface, usually to the public network.
Configuring an Ethernet interface includes supplying an IP address, applying a traffic-management
filter, setting speed and transmission mode, and configuring RIP and OSPF routing protocols.
Configuring a WAN interface includes selecting the interface type (T1 or E1), supplying an IP address,
applying a traffic-management filter, configuring RIP and OSPF routing protocols, and configuring T1or E1-specific parameters. You can also enable PPP Multilink.
If you connect to a WAN via an ISP, configure that connection on Port A. You can use Port B to provide
PPP Multilink for increased bandwidth. You cannot connect Port B to a WAN from a different ISP. If
you connect to private WANs, you can configure independent WAN connections on Port A and Port B.
Note: Interface settings take effect as soon as you apply them. If the system is in active use, changes may affect
tunnel traffic.
The table shows all installed interfaces and their status.
3-2
VPN 3000 Concentrator Series User Guide
Figure 3-1: Configuration | Interfaces screen
Model 3005
Configuration | Interfaces
Interface
Model
3015–3080
To configure a module, either click the appropriate link in the status table; or use the mouse pointer to
select the module on the back-panel image, and click anywhere in the highlighted area.
The VPN Concentrator interface installed in the system. To configure an interface, click the appropriate
link.
To configure Ethernet interface parameters, click the appropriate highlighted link in the table or click in
a highlighted module on the back-panel image. See
Configuration | Interfaces | Ethernet 1 2 3.
WAN Interface in slot N, Port A B
To configure parameters for a specific WAN interface port, click the appropriate highlighted link in the
table. If you are configuring the WAN interface for the first time, see the
Card in Slot N | Port A B | Select T1/E1
N | Port A B as T1 or E1
screen.
screen. Otherwise, see the Configuration | Interfaces | WAN Card in Slot
Status
The operational status of this interface. If configured, the WAN interface status includes a prefix if PPP
Multilink is enabled, and the interface type (T1 or E1).
Up = (Green) Configured, enabled, and operational; ready to pass data traffic.
Down = (Red) Configured but disabled or disconnected.
Testing = In test mode; no regular data traffic can pass.
Dormant = (Red) Configured and enabled but waiting for an external action, such as an incoming
connection.
Configuration | Interfaces | WAN
IP Address
Not Present = (Red) Missing hardware components.
Lower Layer Down = (Red) Not operational because a lower-layer interface is down.
Unknown = (Red) Not configured or not able to determine status.
Not Configured = Present but not configured.
Red = (Red) (WAN only.) Red alarm: Line has lost synchronization or signal. This alarm indicates
out of frame errors or a mismatched framing format, or a disconnected line.
Blue = (Blue) (WAN only.) Blue alarm: A problem on the receive path is causing the line to lose the
remote signal. This alarm indicates a problem in the data bit stream.
Yellow = (Yellow) (WAN only.) Yellow alarm: A problem on the transmit side (the remote side of
the connection has detected a problem with this line).
Loopback = (WAN only.) Line is in loopback state.
IP Address Not Configured = (WAN only) Interface port that was previously configured for
PPP Multilink and no longer has an IP address. To connect this port to a WAN, you must supply an
IP address.
The IP address configured on this interface.
Subnet Mask
3-4
The subnet mask configured on this interface.
VPN 3000 Concentrator Series User Guide
Configuration | Interfaces | Power
Power Supplies
To configure alarm thresholds on system power supplies, click the appropriate highlighted link or click
in a highlighted power supply module in the back-panel image and see
To configure Ethernet interface parameters, click the appropriate highlighted Ethernet module in the
back-panel image and see
Configuration | Interfaces | Ethernet 1 2 3.
WAN Card Slot N module in back-panel image
To configure the WAN interface card, click the highlighted WAN card module in the back-panel image,
and see
Configuration | Interfaces | WAN Card in Slot N.
Configuration | Interfaces | Power
This screen lets you configure alarm thresholds for voltages in the system power supplies, CPU, and
main circuit board.
On this screen, you set high and low thresholds for the voltages. When the system detects a voltage
outside a threshold value, it generates a
System | Events
Caution:If a voltage generates an alarm, shut down the system in an orderly way and contact Cisco support.
Operating the system with out-of-range voltages, especially if they exceed the high threshold, may cause
permanent damage.
You can view system voltages and status on the
). If a power supply is faulty, the appropriate Power Supply LED on the front panel is amber.
HARDWAREMON (hardware monitoring) event (see Configuration |
Monitor | System Status | Power screen.
VPN 3000 Concentrator Series User Guide
3-5
3 Interfaces
Figure 3-2: Configuration | Interfaces | Power screen
Model 3005
Model
3015–3080
Alarm Thresholds
The fields show default values for alarm thresholds in centivolts; e.g., 361 = 3.61 volts. Enter or edit
these values as desired.
The hardware sets voltage thresholds in increments that may not match an entered value. The fields show
the actual thresholds, and the values may differ from your entries.
CPU
High and low thresholds for the voltage sensors on the CPU chip. The value is system dependent, either
2.5 or 1.9 volts.
Power Supply A, B
High and low thresholds for the 3.3- and 5-volt outputs from the power supplies. You can enter values
for the second power supply on Models 3015–3080 even if it is not installed.
Board
High and low thresholds for the 3.3- and 5-volt sensors on the main circuit board.
3-6
VPN 3000 Concentrator Series User Guide
Configuration | Interfaces | Ethernet 1 2 3
Apply / Cancel
To apply your settings to the system and include them in the active configuration, click Apply. The
Manager returns to the
Reminder:To save the active configuration and make it the boot configuration, click the
top of the Manager window.
Configuration | Interfaces screen.
Save Needed icon at the
To discard your settings, click
Cancel. The Manager returns to the Configuration | Interfaces screen.
Configuration | Interfaces | Ethernet 1 2 3
This screen lets you configure parameters for the Ethernet interface you selected. It displays the current
parameters, if any.
Configuring an Ethernet interface includes supplying an IP address, identifying it as a public interface,
applying a traffic-management filter, setting speed and transmission mode, and configuring RIP and
OSPF routing protocols.
To apply a custom filter, you must configure the filter first; see
Management
Caution:If you modify any parameters of the interface that you are currently using to connect to the VPN
Concentrator, you will break the connection, and you will have to restart the Manager from the login
screen.
Using the tabs
.
Configuration | Policy Management | Traffic
This screen includes three tabbed sections. Click each tab to display its parameters. As you move from
tab to tab, the Manager retains your settings. When you have finished setting parameters on all tabbed
sections, click
This tab lets you configure general interface parameters: IP address, subnet mask, public interface status,
filter, speed, and transmission mode.
Enabled
To make the interface functional and online, check Enabled. If not enabled, the interface is offline; this
state lets you retain or change its configuration parameters while it is offline.
If the interface is configured but disabled (offline), the appropriate
on the VPN Concentrator front panel.
IP Address
Enter the IP address for this interface, using dotted decimal notation (e.g., 192.168.12.34). Note that
0.0.0.0 is not allowed. Be sure no other device is using this address on the network.
Subnet Mask
Enter the subnet mask for this interface, using dotted decimal notation (e.g., 255.255.255.0). The
Manager automatically supplies a standard subnet mask appropriate for the IP address you just entered.
For example, the IP address
255.255.255.0. You can accept this entry or change it. Note that 0.0.0.0 is not allowed.
Ethernet Link Status LED blinks green
192.168.12.34 is a Class C address, and the standard subnet mask is
Public Interface
3-8
To make this interface a public interface, check the box. A public interface is an interface to a public
network, such as the Internet. You must configure a public interface before you can configure NAT and
VPN 3000 Concentrator Series User Guide
MAC Address
Filter
Configuration | Interfaces | Ethernet 1 2 3
IPSec LAN-to-LAN, for example. You should designate only one VPN Concentrator interface as a
public interface.
This is the unique hardware MAC (Medium Access Control) address for this interface, displayed in
6-byte hexadecimal notation. You cannot change this address.
The filter governs the handling of data packets through this interface: whether to forward or drop,
according to configured criteria. Cisco supplies three default filters that you can modify and use with the
VPN Concentrator. You can configure filters on the
screens.
Click the drop-down menu button and select the filter to apply to this interface:
1. Private (Default) = Allow all packets except source-routed IP packets. Cisco supplies this default
filter for Ethernet 1, but it is not selected by default.
2. Public (Default) = Allow inbound and outbound tunneling protocols plus ICMP and VRRP. Allow
fragmented IP packets. Drop everything else, including source-routed packets. Cisco supplies this
default filter for Ethernet 2, and it is selected by default for Ethernet 2.
3. External (Default) = No rules applied to this filter. Drop all packets. Cisco supplies this default filter
for Ethernet 3, but it is not selected by default.
–None– = No filter applied to the interface, which means there are no restrictions on data packets.
This is the default selection for Ethernet 1 and 3.
Other filters that you have configured also appear in this menu.
Click the drop-down menu button and select the interface speed:
10 Mbps = Fix the speed at 10 megabits per second (10Base-T networks)
100 Mbps = Fix the speed at 100 megabits per second (100Base-T networks)
10/100 auto = Let the VPN Concentrator automatically detect and set the appropriate speed, either 10
or 100 Mbps (default). Be sure that the port on the active network device (hub, switch, router, etc.)
to which you connect this interface is also set to automatically negotiate the speed. Otherwise,
select the appropriate fixed speed.
Click the drop-down menu button and select the interface transmission mode:
Auto = Let the VPN Concentrator automatically detect and set the appropriate transmission mode,
either full or half duplex (default). Be sure that the port on the active network device (hub, switch,
router, etc.) to which you connect this interface is also set to automatically negotiate the
transmission mode. Otherwise, select the appropriate fixed mode.
Full-Duplex = Fix the transmission mode as full duplex: transmission in both directions at the same
time.
Half-Duplex = Fix the transmission mode as half duplex: transmission in only one direction at a time.
RIP is a routing protocol that routers use for messages to other routers, to determine network
connectivity, status, and optimum paths for sending data traffic. RIP uses distance-vector routing
algorithms, and it is an older protocol that generates more network traffic than OSPF. The VPN
Concentrator includes IP routing functions that support RIP versions 1 and 2. Many private networks
with simple topologies still use RIPv1, although it lacks security features. RIPv2 is generally considered
the preferred version; it includes functions for authenticating other routers, for example.
Inbound RIP
Outbound RIP
To use the
list generation feature in Network Lists, you must enable
by default.)
This parameter applies to RIP messages coming into the VPN Concentrator. It configures the system to
listen for RIP messages on this interface.
Click the drop-down menu button and select the inbound RIP function:
Disabled = No inbound RIP functions; i.e., the system does not listen for any RIP messages on this
interface (default for Ethernet 2 and 3).
RIPv1 Only = Listen for and interpret only RIPv1 messages on this interface.
RIPv2 Only = Listen for and interpret only RIPv2 messages on this interface.
RIPv2/v1 = Listen for and interpret either RIPv1 or RIPv2 messages on this interface (default for
Ethernet 1).
This parameter applies to RIP messages going out of the VPN Concentrator; that is, it configures the
system to send RIP messages on this interface.
Click the drop-down menu button and select the outbound RIP function:
Network Autodiscovery feature in IPSec LAN-to-LAN configuration, or to use the automatic
Inbound RIPv2/v1 on Ethernet 1. (It is enabled
3-10
Disabled = No outbound RIP functions; i.e., the system does not send any RIP messages on this
interface (default).
RIPv1 Only = Send only RIPv1 messages on this interface.
VPN 3000 Concentrator Series User Guide
Configuration | Interfaces | Ethernet 1 2 3
RIPv2 Only = Send only RIPv2 messages on this interface.
RIPv2/v1 compatible = Send RIPv2 messages that are compatible with RIPv1 on this interface.
OSPF is a routing protocol that routers use for messages to other routers, to determine network
connectivity, status, and optimum paths for sending data traffic. OSPF uses link-state routing algorithms,
and it is a newer protocol than RIP. It generates less network traffic and generally provides faster routing
updates, but it requires more processing power than RIP. The VPN Concentrator includes IP routing
functions that support OSPF version 2 (RFC 2328).
OSPF involves interface-specific parameters that you configure here, and system-wide parameters that
you configure on the
OSPF Enabled
To enable OSPF routing on this interface, check the box. (By default it is not checked.)
To activate the OSPF system, you must also configure and enable OSPF on the
Routing | OSPF
OSPF Area ID
The area ID identifies the subnet area within the OSPF Autonomous System or domain. Routers within
an area have identical link-state databases. While its format is that of a dotted decimal IP address, the
ID is only an identifier and not an address.
Configuration | System | IP Routing screens.
Configuration | System | IP
screen.
VPN 3000 Concentrator Series User Guide
3-11
3 Interfaces
The 0.0.0.0 area ID identifies a special area—the backbone—that contains all area border routers,
which are the routers connected to multiple areas.
Enter the area ID in the field, using IP address format in dotted decimal notation (e.g.,
default entry is
| System | IP Routing | OSPF Areas
OSPF Priority
This entry assigns a priority to the OSPF router on this interface. OSPF routers on a network elect one
to be the Designated Router, which has the master routing database and performs other administrative
functions. In case of a tie, the router with the highest priority number wins. A
is ineligible to become the Designated Router.
Enter the priority as a number from
OSPF Metric
This entry is the metric, or cost, of the OSPF router on this interface. The cost determines preferred
routing through the network, with the lowest cost being the most desirable.
Enter the metric as a number from
OSPF Retransmit Interval
This entry is the number of seconds between OSPF Link State Advertisements (LSAs) from this
interface, which are messages that the router sends to describe its current state.
10.10.0.0). The
0.0.0.0, the backbone. Your entry also appears in the OSPF Area list on the Configuration
screen.
0 entry means this router
0 to 255. The default is 1.
1 to 65535. The default is 1.
Enter the interval as a number from
for LANs.
OSPF Hello Interval
This entry is the number of seconds between Hello packets that the router sends to announce its presence,
join the OSPF routing area, and maintain neighbor relationships. This interval must be the same for all
routers on a common network.
Enter the interval as a number from
value for LANs.
OSPF Dead Interval
This entry is the number of seconds for the OSPF router to wait before it declares that a neighboring
router is out of service, after the router no longer sees the neighbor’s Hello packets. This interval should
be some multiple of the Hello Interval, and it must be the same for all routers on a common network.
Enter the interval as a number from
value for LANs.
OSPF Transit Delay
This entry is the estimated number of seconds it takes to transmit a link state update packet over this
interface, and it should include both the transmission and propagation delays of the interface. This delay
must be the same for all routers on a common network.
0 to 3600 seconds. The default is 5 seconds, which is a typical value
1 to 65535 seconds. The default is 10 seconds, which is a typical
0 to 65535 seconds. The default is 40 seconds, which is a typical
3-12
VPN 3000 Concentrator Series User Guide
Enter the delay as a number from 0 to 3600 seconds. The default is 1 second, which is a typical value
for LANs.
OSPF Authentication
This parameter sets the authentication method for OSPF protocol messages. OSPF messages can be
authenticated so that only trusted routers can route messages within the domain. This authentication
method must be the same for all routers on a common network.
Click the drop-down menu button and select the authentication method:
OSPF Password
Configuration | Interfaces | Ethernet 1 2 3
None = No authentication. OSPF messages are not authenticated (default).
Simple Password = Use a clear-text password for authentication. This password must be the same for
all routers on a common network. If you select this method, enter the password in the
field below.
MD5 = Use the MD5 hashing algorithm with a shared key to generate an encrypted message digest
for authentication. This key must be the same for all routers on a common network. If you select this
method, enter the key in the
OSPF Password field below.
OSPF Password
If you selected Simple Password or MD5 for OSPF Authentication above, enter the appropriate password or
key in this field. Otherwise, leave the field blank.
Simple Password authentication, enter the common password. Maximum 8 characters. The
For
Manager displays your entry in clear text.
MD5 authentication, enter the shared key. Maximum 8 characters. The Manager displays your
For
entry in clear text.
Apply / Cancel
To apply your settings to this interface and include your settings in the active configuration, click Apply.
The Manager returns to the
Reminder:To save the active configuration and make it the boot configuration, click the
top of the Manager window.
To discard your settings, click
Configuration | Interfaces screen.
Cancel. The Manager returns to the Configuration | Interfaces screen.
Save Needed icon at the
VPN 3000 Concentrator Series User Guide
3-13
3 Interfaces
Configuration | Interfaces | WAN Card in Slot N
The Manager displays this screen when you click the WAN module in the back-panel image on the
Configuration | Interfaces screen. The table shows the status of the WAN module interface ports, and from
there you can choose a port to configure.
Note that the LEDs on this screen do not show actual WAN card LED states.
Figure 3-6: Configuration | Interfaces | WAN Card in Slot N screen
Interface
Status
To configure an interface port, either click the link in the status table, or select and click the highlighted
port in the WAN module image. If you are configuring the WAN interface for the first time, see the
Configuration | Interfaces | WAN Card in Slot N | Port A B | Select T1/E1 screen. Otherwise, see the Configuration
| Interfaces | WAN Card in Slot N | Port A B as T1 or E1
The interface port on this WAN module.
The operational status of this interface. If the interface is configured, the status includes a prefix if PPP
Multilink is enabled, and the interface type (T1 or E1).
Up = (Green) Configured, enabled, and operational; ready to pass data traffic.
Down = (Red) Configured but disabled or disconnected.
Testing = In test mode; no regular data traffic can pass.
Dormant = (Red) Configured and enabled but waiting for an external action, such as an incoming
connection.
Not Present = (Red) Missing hardware components.
Lower Layer Down = (Red) Not operational because a lower-layer interface is down.
Unknown = (Red) Not configured or not able to determine status.
screen.
3-14
Not Configured = Present but not configured.
VPN 3000 Concentrator Series User Guide
IP Address
Subnet Mask
Configuration | Interfaces | WAN Card in Slot N | Port A B | Select T1/E1
Red = (Red) Red alarm: Line has lost synchronization or signal. This alarm indicates out of frame
errors or a mismatched framing format, or a disconnected line.
Blue = (Blue) Blue alarm: A problem on the receive path is causing the line to lose the remote
signal. This alarm indicates a problem in the data bit stream.
Yellow = (Yellow) Yellow alarm: A problem on the transmit side (the remote side of the connection
has detected a problem with this line).
Loopback = Line is in loopback state.
IP Address Not Configured = (WAN only) Interface port that was previously configured for
PPP Multilink and no longer has an IP address. To connect this port to a WAN, you must supply an
IP address.
The IP address configured on this interface port.
The subnet mask configured on this interface port.
Configuration | Interfaces | WAN Card in Slot N | Port A B |
Select T1/E1
This screen lets you choose either T1 or E1 interface type for the WAN module, and it appears only when
you configure the WAN module for the first time. Once chosen, the type is permanent and applies to both
ports (interfaces) on the module.
Figure 3-7: Configuration | Interfaces | WAN Card in Slot N | Port A B | Select T1/E1 screen
Click the link to choose the desired interface type.
T1: up to 24 64-Kbps channels
The T1 interface conforms to North American Digital Hierarchy standards, with up to 24 64-Kbps
channels for a maximum of 1536 Kbps.
When you click this link, the Manager opens the
T1
screen, which lets you configure T1 parameters.
VPN 3000 Concentrator Series User Guide
Configuration | Interfaces | WAN Card in Slot N | Port A B as
3-15
3 Interfaces
E1: up to 31 64-Kbps channels
The E1 interface conforms to European Digital Hierarchy standards, with up to 31 64-Kbps channels for
a maximum of 1984 Kbps.
When you click this link, the Manager opens the
E1
screen, which lets you configure E1 parameters.
Configuration | Interfaces | WAN Card in Slot N | Port A B as
Configuration | Interfaces | WAN Card in Slot N |
Port A B as T1 or E1
This screen lets you configure parameters for the WAN interface port you selected. The Dual T1/E1
WAN module for the VPN Concentrator includes two WAN interfaces, one on Port A and the other on
Port B. The WAN interfaces primarily serve as a public interface to the Internet.
• If you connect to a WAN via an ISP, configure that connection on Port A. You can use Port B to
provide PPP Multilink for increased bandwidth. You cannot connect Port B to a WAN from a different
ISP.
• If you connect to private WANs, you can configure independent WAN connections on Port A and Port
B.
Using the tabs
The WAN module supports complete T1/E1 interfaces and fractional T1/E1 interfaces. You can select
T1/E1 bandwidth by configuring specific DS0 (Digital Signal 0) channels. See the
WAN Parameters tab.
on the
You set the interface type (T1 or E1) on the
T1/E1
screen. Once chosen, the type is permanent and applies to both ports (interfaces) on the module.
Configuring a WAN interface includes supplying an IP address, identifying it as a public interface,
applying a traffic-management filter, configuring RIP and OSPF routing protocols, and setting T1- or
E1-specific parameters to match those of your T1/E1 carrier. You can also configure PPP Multilink.
To apply a custom filter, you must configure the filter first; see
Management
This screen includes five tabbed sections. Click each tab to display its parameters. As you move from
tab to tab, the Manager retains your settings. When you have finished setting parameters on all tabbed
sections, click
.
Apply or Cancel.
Configuration | Interfaces | WAN Card in Slot N | Port A B | Select
Configuration | Policy Management | Traffic
Tim esl ots parameter
3-16
VPN 3000 Concentrator Series User Guide
Figure 3-8: Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1 screen, IP tab
IP Parameters tab
Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1
Enabled
IP Address
Subnet Mask
Public Interface
This tab lets you configure IP address, subnet mask, public interface status, and filter.
To make the WAN interface functional and online, check Enabled. If not enabled, the interface is offline;
this state lets you retain or change its configuration parameters while it is offline.
If the WAN port is configured but disabled (offline), all four
unison.
Enter the IP address for this interface, using dotted decimal notation (e.g., 192.168.12.34). Note that
0.0.0.0 is not allowed. Be sure no other device is using this address on the network.
Enter the subnet mask for this interface, using dotted decimal notation (e.g., 255.255.255.0). The
Manager automatically supplies a standard subnet mask appropriate for the IP address you just entered.
For example, the IP address
255.255.255.0. You can accept this entry or change it. Note that 0.0.0.0 is not allowed.
192.168.12.34 is a Class C address, and the standard subnet mask is
Port LEDs on the WAN module blink in
To make this interface a public interface, check the box. (The box is checked by default.) A public
interface is an interface to a public network, such as the Internet. You must configure a public interface
before you can configure NAT and IPSec LAN-to-LAN, for example. You should designate only one
VPN Concentrator interface as a public interface.
VPN 3000 Concentrator Series User Guide
3-17
3 Interfaces
Filter
The filter governs the handling of data packets through this interface: whether to forward or drop,
according to configured criteria. Cisco supplies three default filters that you can modify and use with the
VPN Concentrator. You can configure filters on the
screens.
Click the drop-down menu button and select the filter to apply to this interface:
1. Private (Default) = Allow all packets except source-routed IP packets.
2. Public (Default) = Allow inbound and outbound tunneling protocols plus ICMP and VRRP. Allow
fragmented IP packets. Drop everything else, including source-routed packets.
3. External (Default) = No rules applied to this filter. Drop all packets.
–None– = No filter applied to the interface, which means there are no restrictions on data packets.
–Make copy of filter 2 (public)– = Make and apply a copy of the 2. Public (Default) filter. The system
names this filter
the current
(LAN-to-LAN) rules. See
Other filters that you have configured also appear in this menu.
WAN filter n, where n is the next available filter number (usually 4). It is a copy of
2. Public (Default) filter with all its parameters and rules except any Apply IPSec
Configuration | Policy Management | Traffic Management | Filters.
We recommend that you accept the default
configure this interface. You can select this option only when you initially configure this interface. If
you select a different option initially and decide later to use the public filter, you must manually make a
copy of the public filter and assign it to the interface.
Figure 3-9: Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1 screen, RIP tab
RIP Parameters tab
RIP is a routing protocol that routers use for messages to other routers, to determine network
connectivity, status, and optimum paths for sending data traffic. RIP uses distance-vector routing
algorithms, and it is an older protocol that generates more network traffic than OSPF. The VPN
Concentrator includes IP routing functions that support RIP versions 1 and 2. Many private networks
with simple topologies still use RIPv1, although it lacks security features. RIPv2 is generally considered
the preferred version; it includes functions for authenticating other routers, for example.
–Make copy of filter 2 (public)–, especially when you initially
3-18
VPN 3000 Concentrator Series User Guide
Inbound RIP
Outbound RIP
Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1
This parameter applies to RIP messages coming into the VPN Concentrator. It configures the system to
listen for RIP messages on this interface.
Click the drop-down menu button and select the inbound RIP function:
Disabled = No inbound RIP functions; i.e., the system does not listen for any RIP messages on this
interface (default).
RIPv1 Only = Listen for and interpret only RIPv1 messages on this interface.
RIPv2 Only = Listen for and interpret only RIPv2 messages on this interface.
RIPv2/v1 = Listen for and interpret either RIPv1 or RIPv2 messages on this interface.
This parameter applies to RIP messages going out of the VPN Concentrator; that is, it configures the
system to send RIP messages on this interface.
Click the drop-down menu button and select the outbound RIP function:
Disabled = No outbound RIP functions; i.e., the system does not send any RIP messages on this
interface (default).
RIPv1 Only = Send only RIPv1 messages on this interface.
RIPv2 Only = Send only RIPv2 messages on this interface.
RIPv2/v1 compatible = Send RIPv2 messages that are compatible with RIPv1 on this interface.
VPN 3000 Concentrator Series User Guide
3-19
3 Interfaces
Figure 3-10: Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1 screen, OSPF tab
OSPF Parameters tab
OSPF is a routing protocol that routers use for messages to other routers, to determine network
connectivity, status, and optimum paths for sending data traffic. OSPF uses link-state routing algorithms,
and it is a newer protocol than RIP. It generates less network traffic and generally provides faster routing
updates, but it requires more processing power than RIP. The VPN Concentrator includes IP routing
functions that support OSPF version 2 (RFC 2328).
OSPF involves interface-specific parameters that you configure here, and system-wide parameters that
you configure on the
OSPF Enabled
To enable OSPF routing on this interface, check the box. (By default it is not checked.)
To activate the OSPF system, you must also configure and enable OSPF on the
Routing | OSPF
OSPF Area ID
The area ID identifies the subnet area within the OSPF Autonomous System or domain. Routers within
an area have identical link-state databases. While its format is that of a dotted decimal IP address, the
ID is only an identifier and not an address.
0.0.0.0 area ID identifies a special area—the backbone—that contains all area border routers,
The
which are the routers connected to multiple areas.
Configuration | System | IP Routing screens.
Configuration | System | IP
screen.
3-20
VPN 3000 Concentrator Series User Guide
Enter the area ID in the field, using IP address format in dotted decimal notation (e.g., 10.10.0.0). The
default entry is
| System | IP Routing | OSPF Areas
OSPF Priority
This entry assigns a priority to the OSPF router on this interface. OSPF routers on a network elect one
to be the Designated Router, which has the master routing database and performs other administrative
functions. In case of a tie, the router with the highest priority number wins. A
is ineligible to become the Designated Router.
Enter the priority as a number from
OSPF Metric
This entry is the metric, or cost, of the OSPF router on this interface. The cost determines preferred
routing through the network, with the lowest cost being the most desirable.
Enter the metric as a number from
OSPF Retransmit Interval
Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1
0.0.0.0, the backbone. Your entry also appears in the OSPF Area list on the Configuration
screen.
0 entry means this router
0 to 255. The default is 1.
1 to 65535. The default is 1.
This entry is the number of seconds between OSPF Link State Advertisements (LSAs) from this
interface, which are messages that the router sends to describe its current state.
Enter the interval as a number from
OSPF Hello Interval
This entry is the number of seconds between Hello packets that the router sends to announce its presence,
join the OSPF routing area, and maintain neighbor relationships. This interval must be the same for all
routers on a common network.
Enter the interval as a number from
value.
OSPF Dead Interval
This entry is the number of seconds for the OSPF router to wait before it declares that a neighboring
router is out of service, after the router no longer sees the neighbor’s Hello packets. This interval should
be some multiple of the Hello Interval, and it must be the same for all routers on a common network.
Enter the interval as a number from
value.
OSPF Transit Delay
0 to 3600 seconds. The default is 5 seconds, which is a typical value.
1 to 65535 seconds. The default is 10 seconds, which is a typical
0 to 65535 seconds. The default is 40 seconds, which is a typical
This entry is the estimated number of seconds it takes to transmit a link state update packet over this
interface, and it should include both the transmission and propagation delays of the interface. This delay
must be the same for all routers on a common network.
Enter the delay as a number from
VPN 3000 Concentrator Series User Guide
0 to 3600 seconds. The default is 1 second, which is a typical value.
3-21
3 Interfaces
OSPF Authentication
This parameter sets the authentication method for OSPF protocol messages. OSPF messages can be
authenticated so that only trusted routers can route messages within the domain. This authentication
method must be the same for all routers on a common network.
Click the drop-down menu button and select the authentication method:
OSPF Password
If you selected Simple Password or MD5 for OSPF Authentication above, enter the appropriate password or
key in this field. Otherwise, leave the field blank.
None = No authentication. OSPF messages are not authenticated (default).
Simple Password = Use a clear-text password for authentication. This password must be the same for
all routers on a common network. If you select this method, enter the password in the
field below.
MD5 = Use the MD5 hashing algorithm with a shared key to generate an encrypted message digest
for authentication. This key must be the same for all routers on a common network. If you select this
method, enter the key in the
Simple Password authentication, enter the common password. Maximum 8 characters. The
For
Manager displays your entry in clear text.
OSPF Password field below.
OSPF Password
For
MD5 authentication, enter the shared key. Maximum 8 characters. The Manager displays your
entry in clear text.
Figure 3-11: Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1 screen, WAN tab
3-22
VPN 3000 Concentrator Series User Guide
WAN Parameters tab
This tab lets you configure T1/E1 parameters: line coding, line framing, line buildout, clock source, data
inversion, loopback mode, and timeslots.
Line Coding
A T1/E1 line uses a bipolar format for generating signals, with alternating plus and minus pulses. The
line codes maintain synchronization on the line. To set the correct line code, consult your T1/E1 carrier.
Click the drop-down menu button and select the line coding type:
B8ZS = Bipolar with 8-Zero Substitution. B8ZS is a bipolar line code that maintains an AC signal. If
a long string of zeros occurs on a line, the signal approaches DC and loses synchronization. To
synchronize the line, B8ZS replaces a string of 8 consecutive zeros with an 8-bit B8ZS code
(actually called a bipolar violation) when transmitting a message. On the receiving end, the B8ZS
code is removed. This is the default selection for T1, and it is not available for E1.
HDB3 = High Density Bipolar 3-Zero. HDB3 is a bipolar line code that also maintains an AC signal
and line synchronization. It substitutes one of four bit patterns for every string of four consecutive
zeros. The bit patterns depend on the polarity and number of the preceding ones. CCITT
Recommendation G.703 governs HDB3 coding. This is the default selection for E1, and it is not
available for T1.
Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1
Line Framing
AMI = Alternative Mark Inversion. AMI is a bipolar line code that transmits binary zero as zero volts
and binary one as either positive or negative depending on the previous pulse (each pulse
transmitted is opposite the one before it). If you choose this type, you must also enable
below.
This parameter sets the format of data frames. The framing format of the T1/E1 line must match that of
your T1/E1 carrier, otherwise you receive line framing errors. Click the drop-down menu button and
select the frame format that the T1/E1 carrier specifies for the line.
Data Inversion
T1 selections:
ESF = Extended Super Frame. Each ESF comprises 24 frames of 192 bits each, plus a 193rd bit for
timing, etc. This option provides enhanced signaling, error checking, and synchronization and
allows testing on the line when the line is in use. This is the default selection for T1.
SF/D4 = Super Frame or D4. Each SF comprises 12 frames of 192 bits each, plus a 193rd bit for
timing, error checking, etc.
E1 selections:
E1/CRC4 = E1 16-Frame Multiframe with CRC-4 error detection. The frame structure is as below,
plus timeslot 0 of each frame in the multiframe carries 4-bit CRC signatures for error detection.
This is the default selection for E1.
E1 = E1 16-Frame Multiframe. The frame structure (a multiframe) consists of 16 frames. Each frame
is 256 bits, or 32 8-bit timeslots.
VPN 3000 Concentrator Series User Guide
3-23
3 Interfaces
Buildout
Clock Source
Line buildout is a conditioning factor that limits loss of signal strength on the line. Your T1/E1 carrier
provides information on how to set this option. The length of the line and the transmit power across it
determine the buildout value, which is measured in decibels (dB). Click the drop-down menu button and
select the buildout value for the line:
-0.0 dB = This is the default selection.
-7.5 dB
-15.0 dB
This parameter defines the type of transmit timing source to be used. Click the drop-down menu button
and select the clock source for this line:
Line = Source of transmit timing is the device on the other end of the T1/E1 connection. This is the
default selection.
Internal = Source of transmit timing is internal.
Data Inversion
Loopback
Timeslots
Check the box to apply data inversion, which inverts all signals coming into and out of the interface (i.e.,
it turns ones to zeroes and vice versa). The box is not checked by default. You must enable data inversion
if you use
T1/E1 line, especially when using
side of the WAN connection is also using data inversion.
Loopback testing is used to diagnose problems in the network: a device transmits a signal that passes
through the network and returns to the device that sent it. This selection sets the WAN port to respond
appropriately to the transmitted signal. Click the drop-down menu button and select the loopback mode
and configuration for this WAN port:
Check the numbers for the DS0 (Digital Signal 0) timeslots to use for this WAN interface. All are
checked by default. These timeslots can be in any order—contiguous or noncontiguous. Your T1/E1
carrier provides information on how to configure this parameter. For T1, there are 24 timeslots of 64
Kbps each, for a total of 1536 Kbps. For E1, there are 31 timeslots of 64 Kbps each, for a total of 1984
Kbps. The
Click
AMI line coding. You may need to enable data inversion if you are experiencing errors on the
SF/D4 line framing. If you enable data inversion here, be sure the other
None = This port is not in loopback mode (the default selection).
Line = Set line loopback mode, which means that the entire packet is used for loopback testing.
Payload = Set payload loopback mode, which means that only the data and not the framing bits are
used for loopback testing. This selection applies only to ESF line framing.
Currently: field shows the total for checked timeslots.
Clear All to clear all timeslots, or Set All to set all timeslots.
3-24
VPN 3000 Concentrator Series User Guide
Figure 3-12: Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1 screen, PPP tab
PPP Multilink Parameters tab
This tab lets you configure a PPP Multilink connection on this WAN interface. PPP (Point-to-Point
Protocol) provides communication between two points over a serial interface, in this case a synchronous
line. PPP Multilink (MP) bundles both WAN ports together into one point-to-point connection to
enhance bandwidth. MP fragments the datagram and assigns data packets to both ports, usually
alternating them between the two; i.e., packet 1 to Port A, packet 2 to Port B, and so on, to balance the
load between them. At the destination, MP reassembles the packets in the correct order. RFC 1990
describes PPP Multilink.
Configuration | Interfaces | WAN Card in Slot N | Port A B as T1 or E1
Enable PPP Multilink
To enable PPP Multilink (MP) on this interface, check this box. The box is not checked by default.
If you enable MP, the system automatically assigns the IP address on this port to the other port. Verify
that the correct (same) IP address is on both ports. If you disable MP, verify that each port has the correct
(different) IP address. To verify the IP address, see the
IP Parameters tab.
Apply / Cancel
To apply your settings to this interface and include your settings in the active configuration, click Apply.
The Manager returns to the
Reminder:To save the active configuration and make it the boot configuration, click the
top of the Manager window.
To discard your settings, click
Configuration | Interfaces screen.
Cancel. The Manager returns to the Configuration | Interfaces screen.
End of Chapter
Save Needed icon at the
VPN 3000 Concentrator Series User Guide
3-25
System Configuration
System configuration means configuring parameters for system-wide functions in the VPN
Concentrator.
Configuration | System
This section of the Manager lets you configure parameters for VPN Concentrator system-wide functions.
•
Servers: identifying servers for authentication, accounting, DNS, DHCP, and NTP.
• Address Management: assigning addresses to clients as a tunnel is established.
• Tunneling Protocols: configuring PPTP, L2TP, IPSec LAN-to-LAN connections, and IKE proposals.
• IP Routing: configuring static routes, default gateways, OSPF, global DHCP, and redundancy (VRRP).
•
Management Protocols: configuring and enabling built-in servers for FTP, HTTP/HTTPS, TFTP,
Telnet, SNMP, and SSL.
Events: handling system events via logs, FTP backup, SNMP traps, syslog, SMTP, and email.
•
• General: identifying the system, and setting the time and date.
CHAPTER
4
See the appropriate chapter in this manual or the online help for each section.
Figure 4-1: Configuration | System screen
VPN 3000 Concentrator Series User Guide
End of Chapter
4-1
Servers
Configuring servers means identifying them to the VPN 3000 Concentrator so it can communicate with
them correctly. These servers provide user authentication and accounting functions, convert hostnames
to IP addresses, assign client IP addresses, and synchronize the system with network time. The VPN
Concentrator functions as a client of these servers.
Configuration | System | Servers
This section of the Manager lets you configure the VPN Concentrator to communicate with servers for
various functions.
You can also configure the VPN Concentrator internal authentication server here if you have not already
done so during Quick Configuration.
Figure 5-1: Configuration | System | Servers screen
VPN 3000 Concentrator Series User Guide
5-1
5 Servers
Configuration | System | Servers | Authentication
This section lets you configure the VPN Concentrator internal server and external RADIUS, NT Domain,
and SDI servers for authenticating users. To create and use a VPN, you must configure at least one
authentication server type; i.e., at least one method of authenticating users.
If you check
Assignment
Use Address from Authentication Server on the Configuration | System | Address Management |
screen, you must configure an authentication server here.
You must also configure servers here that correspond to the settings for
IPSec Parameters tab on the Configuration | User Management | Base Group and Group screens. For example,
if you specify RADIUS authentication under IPSec for the base group, you must configure at least one
RADIUS authentication server here. And in this example, the first RADIUS server is considered the
primary server, the second RADIUS server is backup, etc.; any other server types are ignored.
Before you configure an external server here, be sure that the external server you reference is itself
properly configured and that you know how to access it (IP address or hostname, TCP/UDP port, secret/
password, etc.). The VPN Concentrator functions as the client of these servers.
The Cisco software CD-ROM includes a 30-day evaluation copy of Funk Software’s Steel-Belted
RADIUS authentication server and instructions for using it with the VPN Concentrator.
After you have configured an external authentication server, you can also test it. Testing sends a
username and password to the server to determine that the VPN Concentrator is communicating properly
with it, and that the server properly authenticates valid users and rejects invalid users.
If you configure the internal authentication server, you can add users to the internal database by clicking
the highlighted link, which takes you to the
the internal server, you just add at least one user or group to the internal database.
If you configure
configures the internal authentication server. The internal server is also the default selection on the
Configuration | Authentication
You can configure and prioritize up to 10 authentication servers here. The first server of a given type is
the primary server for that type, and the rest are backup servers in case the primary is inoperative.
Figure 5-2: Configuration | System | Servers | Authentication screen
IPSec on the Quick Configuration | Protocols screen, the VPN Concentrator automatically
screen.
Configuration | User Management | Users screen. To configure
Authentication method on the
Quick
5-2
VPN 3000 Concentrator Series User Guide
Authentication Servers
The Authentication Servers list shows the configured servers, in priority order. Each entry shows the server
identifier and type; e.g.,
--Empty--. The first server of each type is the primary, the rest are backup.
192.168.12.34 (Radius). If no servers have been configured, the list shows
Add / Modify / Delete / Move / Test
To configure a new user authentication server, click Add. The Manager opens the Configuration | System |
Servers | Authentication | Add
screen.
Configuration | System | Servers | Authentication | Add or Modify
To modify a configured user authentication server, select the server from the list and click
Manager opens the
no configurable parameters, therefore there is no
Modify, the Manager displays an error message.
To remove a configured user authentication server, select the server from the list and click
is no confirmation or undo, except for the Internal Server (see the
Note: If you delete a server, users authenticated by that server will no longer be able to access the VPN unless
another configured server can authenticate them.
To change the priority order for configured servers, select the entry from the list and click
Move ↓. The Manager refreshes the screen and shows the reordered Authentication Servers list.
To test a configured external user authentication server, select the server from the list and click
Manager opens the
internal server, and trying to do so returns an error message.
Reminder:The Manager immediately includes your changes in the active configuration. To save the active
configuration and make it the boot configuration, click the
window.
Configuration | System | Servers | Authentication | Modify screen. The internal server has
Modify screen. If you select the internal server and click
Configuration | System | Servers |
screen). The Manager refreshes the screen and shows the remaining entries in the
Configuration | System | Servers | Authentication | Test screen. There is no need to test the
Save Needed icon at the top of the Manager
Modify. The
Delete. There
Move ↑ or
Tes t. The
Configuration | System | Servers | Authentication | Add or Modify
These screens let you:
Add: Configure and add a new user authentication server.
Modify: Modify parameters for a configured user authentication server.
Click the drop-down menu button and select the
change depending on the
RADIUS = An external Remote Authentication Dial-In User Service server (default).
NT Domain = An external Windows NT Domain server.
SDI = An external RSA Security Inc. SecurID server.
Internal Server = The internal VPN Concentrator authentication server. With this server, you can
configure a maximum of 100 groups and users (combined) in the internal database. See
| User Management
VPN 3000 Concentrator Series User Guide
Server Type. Choices are:
for details.
Server Type. The screen and its configurable fields
Configuration
5-3
5 Servers
Find your selected Server Type below.
Server Type = RADIUS
Configure these parameters for a RADIUS (Remote Authentication Dial-In User Service) authentication
server.
Figure 5-3: Configuration | System | Servers | Authentication | Add or Modify RADIUS screen
Authentication Server
Enter the IP address or hostname of the RADIUS authentication server; e.g., 192.168.12.34.
Maximum 32 characters. (If you have configured a DNS server, you can enter a hostname in this field;
otherwise, enter an IP address.)
Server Port
Enter the UDP port number by which you access the server. Enter 0 (the default) to have the system
supply the default port number,
Timeout
Enter the time in seconds to wait after sending a query to the server and receiving no response, before
trying again. Minimum is
Retries
Enter the number of times to retry sending a query to the server after the timeout period. If there is still
no response after this number of retries, the VPN Concentrator declares this server inoperative and uses
the next RADIUS authentication server in the list. Minimum is
1645.
1 second, default is 4 seconds, maximum is 30 seconds.
0, default is 2, maximum is 10 retries.
5-4
VPN 3000 Concentrator Series User Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.