Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Cisco Secure VPN Exam Certification Guide - Cisco press

.pdf
Скачиваний:
61
Добавлен:
24.05.2014
Размер:
19.64 Mб
Скачать

408 Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

Figure 9-2 Enabling RIP

Setting Up the VPN Concentrator Using OSPF

If you choose to use OSPF instead of RIP, go to the Configuration | System | IP Routing | OSPF screen (see Figure 9-3). There, you enable OSPF, place in the router ID or IP address, and specify if this is an Autonomous System Boundary Router (ASBR). The OSPF process on the VPN concentrator must be defined as an autonomous system. Specifying an ASBR when the router is not an ASBR or vice versa will generate unexpected results.

Figure 9-3 Configuration | System | IP Routing | OSPF

VPN 3002 Hardware Client Reverse Route Injection 409

Configuring VPN 3002 Hardware Client Reverse Route Injection

RRI can be configured in one of the following four ways:

LAN-to-LAN remote network definitions are the injected routes as either a single network or a network list.

The VPN 3002 Hardware Client connects using Network Extension mode, injecting its protected network address.

VPN software clients inject their own IP address as host routes (Client RRI).

RRI provides a hold-down route for the VPN client pool.

In addition to the preceding four options, the following sections also discuss configuring LAN- to-LAN with Autodiscovery.

Configuring LAN-to-LAN Network RRI

After navigating to the Configuration | System | Tunneling Protocols | IPSec | LAN-to-LAN | Modify screen on the VPN concentrator, which is shown in Figure 9-4, configure RRI by following these steps:

Step 1 Fill in the name, interface, and peer.

Step 2 Choose the type of digital certificate.

Step 3 Enter the pre-shared key.

Step 4 Choose the authentication type, encryption, and IKE proposal.

Step 5 Choose Reverse Route Injection in the routing field. The VPN concentrator will advertise the learned routes to the interior routers.

This process is necessary to establish RRI on the VPN concentrator. Remember that RRI will only work with RIP or OSPF. When RIP is used, the remote network can only advertise routes to the VPN concentrator. Only when using OSPF can the VPN concentrator advertise routes to the VPN 3002 Hardware Client.

Configuring LAN-to-LAN with Autodiscovery

The only configuration change necessary to enable Autodiscovery is made through the Configuration | System | Tunneling Protocols | IPSec | LAN-to-LAN | Modify screen. Here, you choose Autodiscovery instead of Network Lists. Remember that RIP is the only protocol available for use with Autodiscovery.

410 Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

Figure 9-4 Configuration | System | Tunneling Protocols | IPSec | LAN-to-LAN | Modify

Configuring Network Extension Mode RRI

The Network Extension mode RRI is configured on the Configuration | System | IP Routing | Reverse Route Injection screen (see Figure 9-5). Select the Network Extension Reverse Route Injection check box to add the RRI.

Figure 9-5 Configuration | System | IP Routing | Reverse Route Injection

Configuring Client RRI

Client RRI, where the client injects its routes into the VPN concentrator, is configured through the Configuration | System | IP Routing | Reverse Route Injection screen on the VPN concentrator (see Figure 9-6). Select the Client Reverse Route Injection checkbox to enable this feature.

VPN 3002 Hardware Client Reverse Route Injection 411

Figure 9-6 Configuration | System | IP Routing | Reverse Route Injection

Configuring Hold-Down Routes

Hold-down routes are used to make remote VPN connections appear as if they were active even when there is no VPN tunnel active. This way, the stability and speed of network topology calculations by the routing protocols is enhanced. Since the networks appear to be available at all times, the routing protocols do not have to recalculate the topology every time a VPN connection is established or dropped.

Hold-down routes are entered on the Configuration | System | IP Routing | Reverse Route Injection screen in the Address Pool Hold-Down Routes box on the VPN concentrator (see Figure 9-7). Double-click on an empty line on the box and enter the IP address/Subnet mask combination. Note that a backslash (/) should be used between the IP address and the subnet mask and that the subnet mask must be entered in standard octet notation.

Figure 9-7 Address Pool Hold-Down Routes

412 Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

VPN 3002 Hardware Client Backup Servers

33 Configuring the VPN 3002 backup server feature

Backup servers allow VPN 3002 Hardware Clients to connect to an alternative site when the primary site fails. You can configure backup servers either on a group basis at the central VPN concentrator or on an individual basis on the VPN 3002 Hardware Client. Configuration done on a group basis is pushed to the individual VPN 3002 Hardware Clients defined in the relevant group.

As an example, suppose that a company has two main offices and that each one has a VPN 3030 Concentrator. The IP address of the concentrator at the primary office is 161.44.246.15 and the IP address of the remote concentrator is 192.156.10.1, as shown in the configuration of

a VPN 3002 Hardware Client’s remote and backup servers in Figure 9-8. In the event that the VPN 3002 Hardware Client is unable to connect to 161.44.246.15, it will next attempt to connect to the concentrator at 192.156.10.1.

Figure 9-8 The Configuration | System | Tunneling Protocols | IPSec screen

If the initial Internet Key Exchange (IKE) packet to 161.44.246.15 is not responded to within 8 seconds, the connection is considered to have timed out. The 8-second timeout period is a default parameter that is not configurable. The VPN 3002 Hardware Client will attempt to

VPN 3002 Hardware Client Backup Servers 413

connect to the next server defined, in this case, Boston. If there are other servers on the list, the next server will be tried after 8 seconds without a connection. Up to 10 backup servers may be listed in the backup server list, each being tried in turn. If all of the servers are tried unsuccessfully, the attempts to connect are stopped without automatically retrying the list.

There are nine items you need to remember regarding backup servers:

A backup server list can only be downloaded from a primary VPN concentrator, never from a backup.

If the primary VPN concentrator is unavailable, a backup concentrator will be contacted ONLY if a backup list is already configured.

The VPN 3002 Hardware Client will be unaware of changes made to servers unless that VPN 3002 Hardware Client is connected to the primary VPN concentrator.

On the VPN 3002 Hardware Client, the backup servers are set on the Configuration | System | Tunneling Protocols | IPSec screen, which only applies if Use Client Configured List is set. The Configuration | System | Tunneling Protocols | IPSec screen is shown in Figure 9-8.

On the VPN concentrator, the configuration of the backup servers is done through the Configuration | User Management | Base Group | Mode Configuration or the Configuration | User Management | Groups | Mode Configuration screens. An example of the Configuration | User Management | Base Group | Mode Config screen is shown in Figure 9-9.

The group name, username, and password must be identical on the primary and backup servers.

In Network Extension Mode, the VPN 3002 Hardware Client will attempt to connect to a backup server after the default of 4 seconds.

In Client mode, the VPN 3002 Hardware Client only attempts a connection when the user clicks the Connect Now button on the Monitoring | System Status screen or when data passes through the VPN 3002 Hardware Client.

VPN 3002 Hardware Clients have no knowledge of each other, only of the primary and backup servers.

414 Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

Figure 9-9 Configuration | User Management | Base Group | Mode Config

VPN 3002 Hardware Client Load Balancing

34 Configuring the VPN 3002 load balancing feature

The devices in the VPN 3000 Concentrator series have the ability to load balance connections from remote clients or VPN 3002 Hardware Clients. VPN 3002 Hardware Clients do not actually perform the load balancing function; they are merely beneficiaries of the results.

Load balancing and Virtual Router Redundancy Protocol (VRRP) cannot be used at the same time with the same concentrators. With VRRP, the backup device stays in an idle state until it is required to become active to assume the duties of the primary device. With load balancing, all of the devices in the virtual load balancing cluster are active.

Load balancing can occur between two or more VPN concentrators that are located on the same network to process remote access VPN connections. Load balancing only works with Cisco VPN Clients running version 3.0 or later, and with Cisco VPN 3002 Hardware Clients running version 3.5 or later. Other clients and LAN-to-LAN devices can still establish VPN connections to VPN concentrators participating in load balancing, but these clients and devices will not participate in load balancing by being directed away from their primary device.

VPN 3002 Hardware Client Load Balancing 415

In Cisco’s implementation of load balancing on the VPN concentrators, the concentrators form a virtual load-balancing cluster with one of the devices acting as the virtual cluster master. The cluster is assigned a virtual IP address that is the peer address configured on software and hardware clients. When these clients attempt to connect to the cluster’s address, the master concentrator intercepts the request, determines which concentrator in the cluster (including the master concentrator itself) is the least heavily loaded, and returns the physical IP address of that concentrator to the client. The client then takes the newly acquired IP address and reinitiates IKE negotiations with that concentrator. This process permits VPN activity to be distributed among the concentrators in the cluster.

The task of being the virtual cluster master is not tied to any specific concentrator. An election process based on a priority setting and time since last reboot occurs to determine which concentrator will be the master for the cluster. Each VPN concentrator model has a specific priority that can be overridden on the Configuration | System | Load Balancing screen. The device with the highest priority (the range is 0 to 10) becomes the virtual cluster master. In the case of a tie, the device that comes on line first acts as the master. The factory assigned priority settings are as follows:

VPN 3005 Concentrator—Priority 1

VPN 3015 Concentrator—Priority 3

VPN 3030 Concentrator—Priority 5

VPN 3060 Concentrator—Priority 7

VPN 3080 Concentrator—Priority 9

There is some overhead involved with being the virtual cluster master, so the most capable device should take that responsibility. If the virtual cluster master should fail for any reason, the election process will occur among the remaining cluster participants to elect a new virtual cluster master. Any clients that were connected to the failed device will renegotiate their VPN tunnel by once again contacting the virtual IP address of the cluster.

Because the VPN 3002 Hardware Client series is a beneficiary of VPN concentrator load balancing, there is really nothing to configure on those devices except for using the virtual IP address of the cluster as the address of the peer. All of the configuration steps necessary for load balancing are done on the VPN concentrator using the Configuration | System | Load Balancing screen of the VPN 3000 Concentrator Series Manager. The fields on that screen are

Cluster Configuration—This section is used to define the common elements of the loadbalancing cluster. All of the devices in the cluster must have identical settings in this section and must all be on the same public and private IP networks.

VPN Virtual Cluster IP Address—A single IP address from the public subnet that will be used to represent the load-balancing cluster to potential clients.

VPN Virtual Cluster UDP Port—The default UDP port used for load balancing is 9023, but you can choose another port for the cluster if 9023 is in use by another application.

416Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

Encryption—Virtual cluster communications are handled over LAN-to-LAN tunnels between VPN concentrators in the virtual cluster. Checking the encryption field forces that communication to be encrypted. The default setting is to have encryption enabled.

IPSec Shared Secret—When you have selected to use encryption in the previous field, you will need to enter a password in this field that will be used as the preshared key when the cluster concentrators establish IPSec communication tunnels with their cluster peers.

Verify Shared Secret—Re-enter the password in this field for verification of the entry.

Device Configuration—This section is used to define device-specific parameters for VPN concentrators participating in load-balancing virtual clusters.

Load Balancing Enable—This VPN concentrator will not participate in load balancing unless this field is checked. The default setting for this field is unchecked, disabling load balancing.

Priority—This field is used to set the priority of the device. Election of the virtual cluster master uses this field as one of the determining factors in the election process. The default setting here is specific to the VPN concentrator model and was described in an earlier list within this section. The value can be a number from 1 to 10. The higher the value, the more likely the chance that the device will be selected as the virtual cluster master. When all the concentrators in the cluster are of the same model, set the priority to 10 on all of them to shorten the election process.

NAT Assigned IP Address—The default setting for this field is 0.0.0.0, which indicates that the concentrator is not using NAT. Enter the NAT IP address here if the concentrator is protected by a firewall using NAT.

When a client attempts to connect to a load-sharing cluster, it will use the IPSec group settings to negotiate and establish the working VPN tunnel. Different clients might use different IPSec groups in order to provide different classes of service. Each VPN concentrator in the virtual load-balancing cluster must have a matching group for any potential client, and the settings for the group must be identical on every VPN concentrator in the cluster.

Overview of Port Address Translation

38 Overview of Port Address Translation

In order to understand the issues involved when using Port Address Translation (PAT), you first need to understand how Network Address Translation (NAT) works. NAT is the process of changing the source IP address on all packets sent out by a host and changing the destination

Overview of Port Address Translation 417

IP address of all incoming packets for that host. This prevents hosts outside of the LAN from knowing the true IP address of a local host. While not a true security method in itself, NAT may help security efforts through hiding the true IP address of the client. NAT may be configured in two differing ways. When NAT uses a specific global IP address for a given host, this is referred to as a static NAT. The other method of configuring NAT is to use a pool of IP addresses for all local hosts. Local hosts are assigned a global IP address on a first-come–first-served basis. The IP address of a specific local host will receive changes based on the availability of global IP addresses.

During the NAT process for a packet traveling outbound through the NAT device, the source IP within the IP packet is replaced with a global IP address. The NAT device tracks the inside IP address that is associated with the global IP address. For a packet traveling inbound through the NAT device, the destination address is replaced with the locally known IP address.

PAT is a form of NAT. When PAT is employed, not only does the source or destination address of an IP packet change, but the TCP or UDP source port is also changed. This way, the PAT device can allow multiple local devices to appear as a single global IP device with the differing source ports providing the unique identification necessary to translate the incoming packets to their respective local IP addresses. In essence, a NAT translation is a one-to-one translation of the IP address, where a PAT translation is a one-to-many translation of the IP address using the port to differentiate between the connections.

The first issue raised when using PAT is that some older programs will not work because the ports are translated. This is especially true when dealing with some Microsoft DOS programs. This can usually be overcome by upgrading the operating system and/or programs affected.

The second, and more severe issue is that traditional IPSec, discussed in the next section, relies heavily on the ports in use. As in some older DOS programs, IPSec will not work when combined with PAT. Cisco has come up with a solution when using the VPN 3002 Hardware Client that allows IPSec to run through a PAT connection. Cisco’s solution is to use either IPSec over TCP/IP or UDP NAT Transparent IPSec. Both will be discussed shortly.

You usually have fewer global IP addresses that you can use than you have local hosts. The most common way of dealing with this is to assign static global addresses to those hosts that need to be reached from the Internet at a known IP address. Next, local hosts are assigned IP addresses from the global pool on a first-come–first-served basis. After all but one of the allotted global addresses have been assigned, you use PAT with the final global address for all the remaining local hosts.