Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Cisco Secure VPN Exam Certification Guide - Cisco press

.pdf
Скачиваний:
61
Добавлен:
24.05.2014
Размер:
19.64 Mб
Скачать

318 Chapter 7: Monitoring and Administering the VPN 3000 Series Concentrator

Figure 7-14 Administration | Access Rights | Administrators | Modify Properties

The pull-down menus for all of these options are the same. Shown in Figure 7-15, each of the pull-down menus has four options:

None—The concentrator will not allow the user to access the section in any manner, including viewing and changing.

Stats Only—This option restricts the user to those screens where statistics are displayed.

View Config —This options allows the user to view, but not change, the current configuration.

Modify Config—This option allows the user to change items within the section.

This system gives a great deal of flexibility with very little complexity. For example, imagine a user who has Modify Config access on Authentication, but None access on files. This user could change the configuration but would not be able to save that configuration. This would allow another administrator to review the changes made before committing those changes to the file system.

Access Control List

The Administration | Access Rights | Access Control List screen allows for adding, modifying, and prioritizing access lists. These access lists are used to determine those IP addresses that may access the concentrator for management functions. It is important to note that this access is not limited to HTTP and Telnet access. The access lists are also used to define those IP addresses that may be used for SNMP, FTP, and TFTP purposes. If the list is empty, as shown in Figure 7-16, then all stations will be allowed all access.

Administering the Cisco VPN 3000 Series Concentrator 319

Figure 7-15 Access Rights Choices

Figure 7-16 Administration | Access Rights | Access Control List

The access lists are very similar to the access lists used on the Cisco PIX firewall. That is, they rely on subnet masks, not on wildcard masks. Using 255.255.255.255 for the subnet mask specifies a single host, while using 0.0.0.0 for the subnet mask specifies all hosts. Choosing Add or Modify will bring up a screen where the IP address and subnet mask are entered. Additionally, the group that this access list is applied to is entered.

320 Chapter 7: Monitoring and Administering the VPN 3000 Series Concentrator

Moving an entry up or down will modify the order of the lists. This way, you may create lists in any order and then move them to their proper position.

Access Settings

The Administration | Access Rights | Access Settings screen, shown in Figure 7-17, sets the session idle timeout, sets the session limit, and enables configuration file encryption.

Figure 7-17 Administration | Access Rights | Access Settings

The Session Idle Timeout is entered in seconds. This specifies the amount of time that a connection is maintained without any activity on that session. After the timeout period without any activity, the session will be disconnected. The maximum allowable time is 1800 seconds, which calculates to 30 minutes. The default is 600 seconds (10 minutes).

The Session Limit is entered next. This option limits the number of concurrent management sessions. The default is 10 sessions.

The configuration file may also be encrypted using the RC4 encryption algorithm. This option is especially useful when storing configuration files on a remote server.

AAA Servers

The Administration | Access Rights | AAA Servers screen, shown in Figure 7-18, is an entry screen used to navigate to the authentication screen. Click the Authentication link to continue.

Administering the Cisco VPN 3000 Series Concentrator 321

Figure 7-18 Administration | Access Rights | AAA Servers

Authentication

The Administration | AAA Servers | Authentication screen is used to add, modify, and test TACACS+ servers. A sample screen is shown in Figure 7-19.

Figure 7-19 Administration | AAA Servers | Authentication

322 Chapter 7: Monitoring and Administering the VPN 3000 Series Concentrator

 

As with other screens of this type, choosing Add will allow you to add a new item, while Modify

 

will allow changes to a chosen item. You may also move the order of the server entries and

 

delete server entries, as well as test a connection to a TACACS+ server.

 

 

NOTE

Remember that the Cisco VPN 3000 Series Concentrators only use TACACS+ for administrator

 

authentication. There are no provisions for these concentrators to use RADIUS or TACACS for

 

the authentication.

 

 

Adding a new TACACS+ server is accomplished by clicking the Add button. You are taken to the Administration | Access Rights | AAA Servers | Authentication | Add screen, as shown in Figure 7-20. On this screen, you first enter the IP address or host name of the TACACS+ server. This is followed by the port, timeout (in seconds), and number of retries. Leaving the port number set to zero will use the default port. Finally, enter and verify the server secret.

Figure 7-20 Administration | Access Rights | AAA Servers | Authentication | Add

File Management

The Administration | File Management screen is shown in Figure 7-21. This screen enables the submenu used to access the screens used for swapping the configuration file, TFTP transfers, file uploads using HTTP, and exporting the configuration to an XML file. You may also view, delete, or copy the configuration or log files.

Administering the Cisco VPN 3000 Series Concentrator 323

Figure 7-21 Administration | File Management

The VPN 3000 Series Concentrators merely need an IP address entered in order to transfer the files. Because multiple copies of the configuration file are available, you are able to move quickly between different configurations for testing purposes.

Certificate Manager

The Administration | Certificate Management screen allows you to see all of your current certificates and enroll or install new certificates. Under this screen, you have an Enrollment and Installation screen. These comprise the final screens under the Administration section. As shown in Figure 7-22, the Certificate Manager screen will list all of your certificates. Chapter 5, “Configuring Cisco VPN 3000 for Remote Access Using Digital Certificates,” provides a full explanation of working with certificates.

324 Chapter 7: Monitoring and Administering the VPN 3000 Series Concentrator

Figure 7-22 Administration | Certificate Management

Monitoring the Cisco VPN 3000 Series Concentrator

Assuming that you have logged into the concentrator, you will be presented with the main screen. For purposes of this section, you will be focusing on the Monitoring options. Click the Monitoring link to start monitoring the concentrator.

You should now be on the main monitoring screen, as shown in Figure 7-23. This screen will be used to navigate between all the monitoring options.

You are initially presented with six options, each of which brings you to an associated screen as described in Table 7-3. Any of these screens may have subscreens associated with them. Take a moment to study Table 7-3, which lists all of the menu and submenu options. Knowing how to navigate through the system will make administration easier. Knowing what options are controlled on individual screens will help you pass the exam. After studying the table, the next sections explore each individual item.

Next, you begin to explore some of the options available through the Monitoring menu system.

Monitoring the Cisco VPN 3000 Series Concentrator 325

Figure 7-23 Monitoring Screen

Table 7-3

Monitoring Menu System

 

 

 

 

 

 

Menu Option

Level

Usage

 

 

 

 

 

Monitoring

1

Main screen for monitoring the VPN 3000 Concentrator. Enables all of

 

 

 

the Monitoring submenus.

 

 

 

 

 

Routing Table

2

Shows the currently configured routes.

 

 

 

 

 

Filterable Event Log

2

Allows you to show events as defined by the debugging options set

 

 

 

within the configuration. These events may be filtered. This screen is

 

 

 

updated periodically based on the setting in the Administration |

 

 

 

Monitoring Refresh screen.

 

 

 

 

 

Live Event Log

3

Shows all events for which logging is enabled. These events are not

 

 

 

filterable and show up in real time.

 

 

 

 

 

System Status

2

Shows the status and the serial number of the concentrator.

 

 

 

 

 

Sessions

2

Allows you to see the statistics for all the current sessions on the

 

 

 

concentrator. This screen also enables the submenus for monitoring the

 

 

 

sessions by protocol or encryption as well as the “top ten” list.

 

 

 

 

 

Statistics

3

Is similar to the Monitoring | Protocols screen, but allows you to

 

 

 

choose the protocol on which to filter the statistics.

 

 

 

 

 

Encryption

3

Is similar to the Monitoring | Protocols screen, but allows you to

 

 

 

choose the encryption on which to filter the statistics.

 

 

 

 

continues

326 Chapter 7: Monitoring and Administering the VPN 3000 Series Concentrator

Table 7-3

Monitoring Menu System (Continued)

 

 

 

 

 

Menu Option

Level

Usage

 

 

 

 

 

Top Ten Lists

3

Enables the submenu that allows you to see the statistics for the 10

 

 

 

most active sessions sorted by total bytes transmitted, total time

 

 

 

connected, or average throughput.

 

 

 

 

 

Statistics

2

Enables the submenu for statistics. These statistics are divided into

 

 

 

several submenus.

 

 

 

 

 

MIB-II Stats

3

Enables the submenu for those statistics that are reported through

 

 

 

the MIB system.

 

 

 

 

Routing Table

The Monitoring | Routing Table screen, shown in Figure 7-24, shows your current routes and allows you to clear routing entries. Note that, after clearing the routes, those routes that are learned by routing protocols will eventually be learned again by those protocols. Static routes are not affected by clearing routes. Be aware that clearing routes may disrupt user connectivity.

Figure 7-24 Monitoring | Routing Table

Event Log Screen

The Filterable Event Log screen is used to see any events that have previously been defined as an event that should be logged. This screen, shown in Figure 7-25, allows you to filter these events by class and severity. You may also filter based upon the client’s IP address. The output is shown in the bottom half of the screen. This screen is refreshed based on the values specified in the Administration | Monitoring Refresh screen.

Monitoring the Cisco VPN 3000 Series Concentrator 327

Figure 7-25 Monitoring | Filterable Event Log

The Live Event Screen log, which is accessed by the link on the left side of the screen, does not allow for filtering but does have an advantage and a disadvantage when compared to the Filterable Event Log. The advantage is that events are shown immediately. The disadvantage is that monitoring these events, as in any debugging, may cause excessive CPU cycle utilization.

System Status

The Monitoring | System Status screen is shown in Figure 7-26. This screen is the closest equivalent available on the concentrator to the show version command on a router. This screen shows the concentrator type, the serial number, and the software revisions being run. The time that the system has been active, the boot time, and the RAM size is also shown.

Similar to the graphical user interface (GUI) available for the Cisco switches, you may click on a module to find the details of the status for that module. The fan speeds, as well as the temperature for the interior of the concentrator, are shown. There are three graphs on the bottom of the screen, indicating the CPU utilization, the concentrator’s throughput, and the number of active sessions.