You are previewing CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN), Second Edition.
O'Reilly logo
CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN), Second Edition

Book Description

Cisco authorized self-study book for CCSP 642-511 foundation learning

  • Understand the underlying principles of VPNs

  • Learn about and identify proper implementation of remote access and site-to-site VPNs

  • Identify the features, functions, and benefits of the Cisco VPN 3000 Concentrator Series

  • Configure and test a remote access VPN using preshared keys on the Cisco VPN 3000 Concentrator

  • Work with the RIP and OSPF dynamic routing protocols

  • Gain proficiency with the VPN Client Firewall

  • Apply digital certificates on the Cisco VPN 3000 Concentrator

  • Use the Cisco 3002 Hardware Client to configure and test a remote access VPN

  • Implement advanced VPN client features such as load balancing, reverse route injection, and the appropriate use of backup servers

  • Configure LAN-to-LAN VPNs on the Cisco 3000 Concentrator

  • Offer granular user-level security with user and unit authentication

  • Learn how to use VPN through NAT and resolve real-world implementation challenges

  • Provide a sound level of support and administration skills for day-to-day management of a VPN 3000 Concentrator-based VPN by utilizing the tools resident in the Concentrator

  • CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN), Second Edition, is a complete reference for professionals who intend to work with virtual private networks (VPNs) using IPSec. It includes detailed coverage of the VPN 3000 Concentrator, a scalable remote access platform that offers encryption, high availability, and superior performance. In addition to acting as a valuable study aid for the CCSP CSVPN 642-511 exam, this book is an invaluable theory and configuration guide for the VPN 3000 series of products, with its thorough coverage of concentrators, hardware clients, and software clients.

    CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN), Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over all techniques and technologies related to Cisco Systems VPN products. Chapter overviews bring you quickly up to speed and prepare you to get to work on securing your network. Detailed configuration examples allow you to take advantage of Cisco VPN products in no time. Unique chapter-ending review questions reinforce key concepts and test your knowledge.

    Whether you are seeking a reference guide to plan, administer, and maintain a VPN based upon the Cisco VPN 3000 Concentrator or are looking for a study guide for the 642-511 exam, CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN), Second Edition, is the reference you are looking for.

    CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN), Second Edition, is part of a recommended learning path from Cisco Systems that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

    This volume is in the Certification Self-Study Series offered by Cisco Press. Books in this series provide officially developed training solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations.

    Table of Contents

    1. Copyright
      1. Dedications
    2. About the Author
    3. About the Technical Reviewers
    4. Acknowledgments
    5. Icons Used in This Book
    6. Command Syntax Conventions
    7. Foreword
    8. Introduction
      1. Goals and Methods
      2. Who Should Read This Book?
      3. How This Book Is Organized
    9. 1. Network Security and Virtual Private Network Technologies
      1. Network Security Overview
        1. Unstructured Threats
        2. Structured Threats
        3. External Threats
        4. Internal Threats
          1. Reconnaissance Attacks
          2. Access Attacks
          3. DoS Attacks
      2. Network Security as a Continuous Process
      3. Cisco AVVID
        1. Clients
        2. Network Platforms
        3. Intelligent Network Services
        4. Internet Middleware Layer
        5. Internet Business Integrators
        6. Internet Business Solutions
      4. Cisco SAFE Blueprint
      5. Overview of VPNs and IPSec Technologies
        1. Remote-Access VPNs
        2. Site-to-Site VPNs
        3. Firewall-Based VPNs
      6. The Need for VPNs
      7. IPSec
        1. Confidentiality
          1. Encryption Algorithms
          2. Key Exchange
          3. DH Key Exchange
        2. Data Integrity
        3. Origin Authentication
          1. Preshared Keys
          2. RSA Signatures
          3. RSA Encrypted Nonces
        4. Anti-Replay Protection
      8. IPSec Protocol Framework
        1. AH
        2. ESP
        3. Modes of Operation
          1. Transport Mode
          2. Tunnel Mode
      9. How IPSec Works
        1. Step 1: Define Interesting Traffic
        2. Step 2: IKE Phase 1
        3. Step 3: IKE Phase 2
        4. Step 4: Data Transfer
        5. Step 5: IPSec Tunnel Termination
      10. Summary
      11. Review Questions
    10. 2. Cisco VPN 3000 Concentrator Series Hardware Overview
      1. Cisco VPN 3000 Concentrator Series Models
        1. VPN 3005 Concentrator
        2. VPN 3015 Concentrator
        3. VPN 3020 Concentrator
        4. VPN 3030 Concentrator
        5. VPN 3060 Concentrator
        6. VPN 3080 Concentrator
      2. VPN Clients
        1. Software Clients
          1. Windows Client
          2. Linux and Solaris Clients
          3. Mac OS Client
        2. Hardware Clients
        3. Software Clients Versus Hardware Clients
      3. VPN Concentrator Configuration
      4. VPN Concentrator Placement
        1. In Front of or Without a Firewall
        2. Behind a Firewall
        3. In Parallel with a Firewall
        4. On a DMZ
      5. Network Management Solutions
      6. Summary
      7. Review Questions
    11. 3. Routing on the VPN 3000
      1. Routing Capabilities of the VPN Concentrator
      2. Static Routing
        1. Configuring a Static Route
        2. Configuring a Default Route
      3. Dynamic Routing
        1. RIP
          1. Configuring RIP on the VPN Concentrator
        2. OSPF
          1. Configuring OSPF on the VPN Concentrator
          2. System-Wide OSPF Configuration
          3. Interface OSPF Configuration
      4. Summary
      5. Review Questions
    12. 4. Configuring the Cisco VPN 3000 for Remote Access Using Preshared Keys
      1. Overview of Remote Access Using Preshared Keys
      2. Initial Configuration of the VPN 3000 for Remote Access
      3. Browser Configuration of the Cisco VPN 3000 Concentrator Series
        1. Step 1: IP Interfaces
        2. Step 2: System Information
        3. Step 3: Protocols
        4. Step 4: Address Assignment
        5. Step 5: Authentication
        6. Step 6: IPSec Group
        7. Step 7: Admin Password
      4. More In-Depth Group Configuration Information
        1. IKE Proposals
        2. Group Configuration
          1. Identity Tab
          2. General Tab
          3. IPSec Tab
          4. Client Config Tab
            1. Cisco Client Parameters
            2. Common Client Parameters
              1. Split Tunneling
              2. Split DNS
          5. Client FW Tab
          6. HW Client Tab
          7. PPTP/L2TP Tab
      5. Configuring the Windows VPN Software Client
        1. Preconfiguring the Client for Remote Users
        2. Software Client Programs Menu
          1. SetMTU Application
      6. Summary
      7. Review Questions
    13. 5. Configuring the Cisco VPN 3000 for Remote Access Using Digital Certificates
      1. CA Overview
        1. Digital Signature
        2. Certificate-Based Authentication
        3. CAs
        4. PKI
      2. Certificate Generation
        1. Generating a Certificate Request
        2. Digital Certificates
        3. Installing the Certificate
      3. Validating Certificates
        1. Signature Validation
        2. Certification Chain
        3. Validity Period
        4. CRL
      4. Configuring the Cisco VPN 3000 Concentrator for CA Support
        1. File-Based Enrollment (Manual)
          1. Group Matching
          2. Group Matching Rules
          3. Uploading the PKCS#10
          4. Installing the Root Certificate
          5. Installing the Identity Certificate
          6. Certificate Renewal
      5. CRLs
        1. Configuring the CA
      6. Configuring the Concentrator for a Remote-Access VPN with a Digital Certificate
        1. Step 1: Check the Active IKE Proposal List
        2. Step 2: Check the IKE Proposal
        3. Step 3: Modify or Add an SA
      7. Cisco Software VPN Client Certificate Support
        1. Software Client Certificate Enrollment
          1. File Enrollment
          2. Network (Online) Enrollment
        2. Connecting a Remote-Access VPN Using a Certificate
      8. Summary
      9. Review Questions
    14. 6. The Cisco VPN Client Firewall Feature
      1. Firewall Feature Overview
      2. Are You There Feature
        1. Configuring the Are You There Feature
          1. Step 1: Select a Firewall Setting
          2. Step 2: Identify a Firewall
          3. Step 3: Configure a Custom Firewall (Optional)
          4. Step 4: Select the Firewall Policy
        2. How the Are You There Feature Works
      3. Stateful Firewall Feature
      4. Central Policy Protection Feature
        1. Configuring CPP
      5. Software Client Firewall Statistics
      6. Creating a Customized Firewall Policy
        1. Step 1: Define Rules to Restrict Traffic
        2. Step 2: Add a New Policy
        3. Step 3: Associate the New Rules with the New Policy
        4. Step 4: Assign the New Policy to the CPP
      7. Summary
      8. Review Questions
    15. 7. Configuring the Cisco 3002 Hardware Client for Remote Access
      1. Cisco VPN 3002 Hardware Client Overview
      2. Hardware Client Modes of Operation
        1. Client Mode
        2. Network Extension Mode
      3. Configuring the Cisco VPN 3002 with Preshared Keys
        1. Initial Configuration of the 3002 Hardware Client
        2. Step 1: Configure the Identity and System Information of the VPN 3002
        3. Step 2: Configure Network Information on the 3002
        4. Step 3: Configure the VPN 3002 Group and User Information
        5. Step 4: Configure the VPN Operation Mode
      4. Overview of the Auto-Update Feature
        1. Step 1: Enable Hardware Client Update Functionality
        2. Step 2: Set the Group Update Parameters
        3. Step 3: Send an Update Notice to Active Clients
      5. Monitoring the Cisco VPN 3002 Hardware Client Software Auto-Update Feature
      6. Summary
      7. Review Questions
    16. 8. Configuring the Cisco 3002 Hardware Client for User and Unit Authentication
      1. User and Unit Authentication Overview
      2. Configuring the Hardware Client Interactive Unit Authentication Feature
        1. Connection Methods
          1. Connecting Via the Hardware Client Manager
          2. Connecting Via the System Status Window
          3. Connecting Via the Redirect Message
      3. Configuring the Hardware Client User Authentication Feature
        1. Connection Methods
          1. Connecting Via the Hardware Client Manager
          2. Connecting Via the System Status Window
          3. Connecting Via the Redirect Message
      4. Monitoring the Hardware Client User Statistics
      5. Summary
      6. Review Questions
    17. 9. Configuring Cisco VPN Clients for Backup Server, Load Balancing, and Reverse Route Injection
      1. Cisco VPN Client Backup Server Feature
        1. Backup Server: Concentrator Configuration
        2. Backup Server: Hardware Client Configuration
        3. Backup Server: Software Client Configuration
      2. Configuring the Cisco VPN Client Load-Balancing Feature
        1. Load Balancing Connection Process
        2. Virtual Cluster Agent
        3. Configuring Load Balancing
          1. Step 1: Add VCA Capability to the Concentrator
          2. Step 2: Configure the Cluster
          3. Step 3: Configure the Client
            1. Hardware Client
            2. Software Client
      3. Overview of the Cisco VPN Client Reverse Route Injection Feature
        1. Client RRI
        2. Network Extension RRI
      4. Summary
      5. Review Questions
    18. 10. Configuring the Cisco 3000 Concentrator for IPSec over TCP and UDP
      1. The IPSec and NAT Problem
        1. NAT
        2. PAT
        3. The IKE and UDP Issue
          1. IPSec over UDP: Cisco-Proprietary
          2. NAT-Traversal: Standards-Based IPSec over UDP
          3. IPSec over TCP: Cisco-Proprietary
          4. IPSec Through PAT Mode
      2. Configuring IPSec over UDP
        1. Concentrator Configuration
        2. VPN Software Client Configuration
      3. Configuring NAT-T
        1. Concentrator Configuration
        2. VPN Software Client Configuration
      4. Configuring IPSec over TCP
        1. Concentrator Configuration
        2. VPN Software Client Configuration
      5. Monitoring Session Statistics
      6. Summary
      7. Review Questions
    19. 11. Configuring LAN-to-LAN VPNs on the Cisco 3000
      1. Overview of LAN-to-LAN VPNs
      2. Configuring the VPN 3000 for a LAN-to-LAN VPN with Preshared Keys
        1. Configuring the Central Site LAN-to-LAN Connection
          1. LAN-to-LAN Groups
          2. LAN-to-LAN Security Associations
          3. LAN-to-LAN Filter Rules
        2. Configuring the Remote Site LAN-to-LAN Connection
      3. Administration of LAN-to-LAN VPN Tunnels
      4. Dealing with Multiple Subnets
        1. Network Lists
        2. NAD
      5. Configuring the VPN 3000 for a LAN-to-LAN VPN with Digital Certificates
      6. Summary
      7. Review Questions
    20. 12. Network Monitoring and Administration
      1. Monitoring on the VPN 3000
        1. Routing Table
        2. Dynamic Filters
        3. Filterable Event Log
          1. Live Event Log
        4. System Status
          1. LED Status
          2. Memory Status
        5. Sessions
          1. Protocols
          2. SEPs
          3. Encryption
          4. Top Ten Lists
        6. General Statistics
      2. Administration of the VPN 3000
        1. Administer Sessions
        2. Software Update
          1. Concentrator Update
          2. Client Update
        3. System Reboot
        4. Reboot Status
        5. Ping
        6. Monitoring Refresh
        7. Access Rights
          1. Administrators
          2. Access Control List
          3. Access Settings
          4. AAA Servers
        8. File Management
          1. Swap Config File
          2. TFTP Transfer
          3. File Upload
          4. XML Export
        9. Certificate Management
      3. Bandwidth Management
        1. Bandwidth Policing
          1. Configuring Bandwidth Policing
        2. Bandwidth Reservation
          1. Configuring Bandwidth Reservation
        3. Public Interface Configuration
        4. Group Configuration
        5. Bandwidth Aggregation
        6. Monitoring the Bandwidth Statistics
      4. Summary
      5. Review Questions
    21. 13. Troubleshooting
      1. Troubleshooting VPNs
        1. Initial Failures
        2. Ongoing Failures
      2. Troubleshooting Remote-Access VPNs
        1. Initial Remote-Access VPN Failures
          1. Routing Issues
          2. Traffic Flow Between the VPN Client and Headend Concentrator
          3. Configuration Error on the Concentrator
          4. Software Client Configuration Error
        2. Ongoing Remote-Access VPN Failures
      3. Troubleshooting Preshared Key LAN-to-LAN VPNs
        1. Initial LAN-to-LAN VPN Failures with Preshared Keys
          1. Routing Issues
          2. Traffic Flow Between the VPN Concentrators
          3. Incompatible IKE Policies
          4. Differing Preshared Keys Between IPSec Peers
          5. Incorrect IPSec Access Lists
        2. Ongoing LAN-to-LAN VPN Failures with Preshared Keys
      4. Troubleshooting LAN-to-LAN CA-Based VPNs
        1. Initial LAN-to-LAN VPN Failures Using CA Services
        2. Ongoing LAN-to-LAN VPN Failures Using CA Services
      5. Summary
      6. Review Questions
    22. 14. Case Study
      1. Overview of Acme Limited
        1. Design Considerations for the Acme Limited Remote-Access Solution
        2. Central Site Infrastructure
        3. Remote Agent Infrastructure
      2. VPN Concentrator Configuration
        1. Step 1: Initial System Setup
          1. Task 1: Change the Admin Password
          2. Task 2: Set the Identification Information
          3. Task 3: Configure IP Addresses
          4. Task 4: Configure Routing
        2. Step 2: Enable Global VPN Settings
          1. Task 1: Set the Concentrator to Use Global Address Pools
          2. Task 2: Set the Concentrator to Use NAT-T
        3. Step 3: Create the Groups
          1. Task 1: Create the Agents and Admin Groups
          2. Task 2: Set the Groups to Authenticate Against a RADIUS Server
          3. Task 3: Set the Address Pools for the Groups
        4. Step 4: Configure the PIX Firewall
        5. Step 5: Configure the VPN Client
      3. Summary
    23. A. Answers to the Review Questions
      1. Chapter 1
      2. Chapter 2
      3. Chapter 3
      4. Chapter 4
      5. Chapter 5
      6. Chapter 6
      7. Chapter 7
      8. Chapter 8
      9. Chapter 9
      10. Chapter 10
      11. Chapter 11
      12. Chapter 12
      13. Chapter 13
    24. B. Configuring movianVPN
      1. What Is movianVPN?
        1. ECC and movianVPN
        2. Gateway Access
        3. movianVPN at Work
          1. Supported Platforms
          2. Supported Devices and Gateways
          3. Supported Connections
      2. Configuring movianVPN and the Gateway
        1. Creating a movianVPN Policy for Your Gateway
          1. Before You Begin
          2. Opening the movianVPN Application on WinCE
          3. Opening the movianVPN Application on Palm OS
          4. Creating a Basic Policy for WinCE or Palm OS
        2. Testing the Policy
          1. Troubleshooting a Failed Connection
        3. Configuring IPSec on movianVPN
          1. Enabling/Disabling IPSec on WinCE
          2. Enabling/Disabling IPSec on Palm OS
        4. Enhancing Your movianVPN Policy
          1. Split Tunneling
          2. Creating a Network List on the Gateway
          3. Enabling Split Tunneling on the Gateway
          4. Enabling Split Tunneling on the movianVPN Client
        5. Perfect Forward Secrecy
          1. Enabling Perfect Forward Secrecy on the Gateway
          2. Enabling Perfect Forward Secrecy on the movianVPN Client
        6. DNS Support
          1. Enabling DNS Support
          2. Enabling DNS on the movianVPN Client
        7. Authentication Using Certificates
          1. Installing Certificates
          2. Using Certificates
        8. External Authentication
          1. Setting Up an External RADIUS Authentication Server
          2. Enabling External Authentication on the movianVPN Client
        9. NAT Traversal
          1. Enabling NAT Traversal
        10. Banner Support and the Password Save Feature
      3. movianVPN Diagnostic Tools
        1. Accessing Diagnostic Tools
      4. Client Configuration Worksheet
      5. movian Security Applications
        1. movianVPN
        2. movianMail
        3. movianCrypt
        4. movianDM
      6. About Certicom