Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Cisco Secure VPN Exam Certification Guide - Cisco press

.pdf
Скачиваний:
65
Добавлен:
24.05.2014
Размер:
19.64 Mб
Скачать

418 Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

IPSec on the VPN 3002 Hardware Client

39Configuring IPSec over UDP

40Configuring IPSec over TCP

Internet Protocol Security (IPSec) is the standard that enables the VPN 3002 Hardware Client to connect securely to the centralized VPN concentrator. IPSec security methods include address data privacy, authentication, integrity, key management, and tunneling.

With the VPN 3002 Hardware Client, two IPSec options are available to you: IPSec over TCP/IP and IPSec over UDP. You may choose one of these, which will automatically disable the other option. The next sections describe both options in more detail.

IPSec Over TCP/IP

The Cisco VPN Client and the Cisco VPN 3002 Hardware Client both fully support IPSec over TCP, encapsulating the encrypted data within the TCP packet. In this mode, the VPN 3002 Hardware Client is able to work where standard Encapsulating Security Payload (ESP) (protocol 50) or Internet Key Exchange (IKE) (UDP 500) cannot operate because of factors such as PAT. IPSec over TCP encapsulates both the IKE and IPSec protocols within the TCP packet, enabling the new packet to pass through NAT and PAT devices. This feature, however, will not work if the VPN termination on the other end is proxy based, such as in Microsoft Proxy Server.

There are three requirements for both the VPN concentrator and the VPN 3002 Hardware Client when using IPSec over TCP:

Run version 3.5 or later software.

IPSec over TCP must be enabled.

The VPN concentrator and the VPN 3002 Hardware Client must use the same port.

To enable IPSec over TCP/IP, you must make configuration changes on both the VPN concentrator and the VPN 3002 Hardware Client. IPSec over TCP/IP is configured on the VPN 3002 Hardware Client under the Configuration | System | Tunneling Protocols | IPSec screen. On the VPN concentrator, configuration settings for IPSec over TCP/IP are made on the Configuration | System | Tunneling Protocols | IPSec | IPSec over TCP screen, as shown in Figure 9-10.

IPSec on the VPN 3002 Hardware Client 419

Figure 9-10 Configuration | System | Tunneling Protocols | IPSec | IPSec over TCP

On either hardware client or concentrator, you simply check the box to enable IPSec over TCP and then select the TCP port to use between the devices. The default port is 10,000, but you can select any port between 1 and 65,635. If you select a well-known port, such as 80 for HTTP, the system will present a warning telling you that the protocol associated with the well-known port number will no longer be available on the public interface. On the VPN concentrator, you can enter up to 10 ports, separated by commas, so that you can use a different port for each hardware client that connects to the concentrator. The configuration screen for the VPN 3002 Hardware Client only permits you to enter one TCP port number.

UDP NAT Transparent IPSec (IPSec Over UDP)

The VPN 3002 Hardware Client fully supports User Datagram Protocol Network Address Translation Transparent IPSec (UDP NAT Transparent IPSec). In this mode, the VPN 3002 Hardware Client encapsulates the data traffic within new UDP packets, bypassing the effects of NAT and PAT. This method sends keepalives on a regular basis to ensure the NAT mappings remain active. While this method does slightly increase the amount of bandwidth overhead, it is necessary because UDP is a connectionless protocol. There is a limitation on using UDP NAT Transparent IPSec; only a single VPN device may be behind the NAT device. In other words, you may have only a single VPN 3002 Hardware Client behind a PIX firewall.

Some of the workings of IPSec transparent mode are not readily visible to the administrator. For example, the VPN concentrator creates a filter rule, applying it to the public filter and passes this along to the VPN 3002 Hardware Client transparently. From the inbound side, the UDP traffic goes directly to the IPSec processing for decryption and deencapsulation before being routed. On the outbound side, the IPSec process encrypts, encapsulates, and then adds a new UDP header if required. These rules may be removed from the filter under one of three conditions:

When a group is deleted

When the last active IPSec over UDP Security Association (SA) for that group is deleted

When IPSec over UDP is disabled for the group

420 Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

UDP NAT Transparent IPSec, which disables IPSec over UDP, is the default configuration for the VPN 3002 Hardware Client, so no configuration is necessary. However, there are three requirements for running UDP NAT Transparent IPSec:

Run version 3.0.3 or later software.

The concentrator and the VPN 3002 Hardware Client must use the same port.

You must configure IPSec over UDP for the group on the VPN concentrator through the Configuration | User Management | Groups | Modify screen, as shown in Figure 9-11. Clicking the IPSec over UDP box causes the VPN concentrator to expect IPSec over UDP (UDP NAT Transparent IPSec) instead of IPSec over TCP. The administrator may optionally change the default port of 10,000. Allowable port numbers for IPSec over UDP configurations are 4001 through 49,151. Be sure that IPSec over TCP has been disabled on the VPN 3002 Hardware Client’s Configuration | System | Tunneling Protocols | IPSec screen.

Figure 9-11 Configuration | User Management | Groups | Modify

Troubleshooting a VPN 3002 Hardware Client IPSec Connection

Testing the IPSec tunnel is fairly easy. The first step is to ping the private interface of the VPN concentrator from the Administration | Ping screen. If this is successful, but you are unable to ping anything else, the issue is internal routing. In this case, make sure that the device you are attempting to ping knows how to reach your private network. In other words, if you are not able to ping the inside interface of the VPN concentrator, the issue is probably within IPSec.

IPSec on the VPN 3002 Hardware Client 421

Setting Debug Levels

The next action to be accomplished in debugging IPSec is to turn on debugging on both the VPN concentrator and the VPN 3002 Hardware Client. Set the severity log to 1-13 on both devices for the following:

IKE

IKEDBG

IPSEC

IPSECDBG

NOTE

The debugging levels may be set starting with Level 1-1 (Severe Error) through any of the levels

 

up to Level 1-13 (Debugging Information). As with any Cisco logging, higher logging numbers

 

give more detail than lower logging numbers. The reason you choose to log debugging

 

information (Level 1–13) is that this level shows the most information available.

 

 

 

Try to reestablish the VPN tunnel and then look at the logs. Here are a few of the items worth

 

noting:

IKE failures on Phase 1

Incorrect password

Incorrect work name

Incorrect username

Incorrect password on the concentrator

Unable to ping with an established tunnel

The following sections elaborate on each of these points.

Errors on Phase 1

If you are experiencing failures during Phase 1, check these issues:

XAUTH is required, but the proposal does not support XAUTH

The priorities of IKE XAUTH proposals in the IKE proposal list

The IPSec group

The group on the VPN concentrator

All SA proposals are acceptable

422 Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

Identifying an Incorrect Password at the VPN 3002 Hardware Client

On the VPN 3002 Hardware Client, you will see an error similar to the following if the password is incorrect:

Group [192.168.100.1]

Rxed Hash is incorrect:Preshared key or Digital Signature mismatch

Identifying an Incorrect Work Group Name

If the work group name is incorrect, the VPN concentrator logs will show a message similar to the following:

No Group found 3002group for Preshared key peer 192.168.100.1

Identifying an Incorrect Username

If the username given by the client is incorrect, the VPN concentrator log will show a message similar to the following:

Authentication rejected: Reason = User was not found

Incorrect Password on the Concentrator

If the password is incorrect, the VPN concentrator log will show a message similar to the following:

Authentication rejected: Reason = Invalid password

Unable to Ping with an Established Tunnel

If you have an established tunnel and you are still unable to ping the private interface on the VPN concentrator, there are two possibilities: overlapping SA or IPSec filtering. In the VPN 3002 Hardware Client, go to the Monitoring | System Status screen and note the Octets Out field. Next, go to the Monitoring | Sessions screen and note the Bytes Receiving counter. Attempt to ping the VPN concentrator’s inside interface again and recheck these counters. Based on this information, you will be able to see which of two issues is causing the problem.

The first issue may be that there is an overlapping SA configured. An overlapping SA is where two or more VPN clients have the same network on the private side. For example, you may have a VPN 3002 Hardware Client with the 192.168.100.0/24 network and a VPN Software Client with an IP address of 192.168.100.4. If both of these counters are incrementing, this is the case.

If only the Octets Out counter is incrementing on the VPN 3002 Hardware Client, but the Bytes Received is not, then IPSec is being filtered. If UDP is enabled, make sure that the UDP port chosen, a default value of 10,000, is not being blocked. If the VPN 3002 Hardware Client is behind a PAT device, make sure to enable IPSec through NAT.

Configuring Auto-Update for the VPN 3002 Hardware Client 423

Configuring Auto-Update for the VPN 3002

Hardware Client

35Overview of the VPN 3002 Auto-Update Feature

36Configuring the VPN 3002 Auto-Update Feature

Auto-update is a process by which the VPN concentrator requires that the connecting clients use a specific version of software. A client attempting to connect to the VPN concentrator with an incorrect software version will be denied access until after the software version becomes current. The VPN concentrator provides VPN Client users a link to the download server where the software can be obtained. Once the clients have the correct software version, they may once again connect in a normal fashion.

The VPN 3002 Hardware Client software can be upgraded automatically once the administrator copies the new version of the operating system to a TFTP server. The head-end VPN concentrator notifies the hardware client of the upgrade availability. Once the secure VPN tunnel has been established, the VPN 3002 Hardware Client copies the upgrade from the TFTP server and then performs a reload to activate the new version. This means that the administrator only needs to make changes at the head-end VPN concentrator instead of manually upgrading each individual VPN 3002 Hardware Client from the graphical user interface (GUI). This is especially efficient on large installations.

NOTE

The VPN 3000 Concentrator series client auto-update feature works only with the Windows-

 

based VPN Client or with the VPN 3002 Hardware Client, not with any of the other VPN

 

Clients, such as Linux or Macintosh.

 

 

The VPN 3002 Hardware Client is sent ISAKMP messages when it connects to the head-end concentrator, delivering notification that a software upgrade is pending. These ISAKMP messages contain the IP address of a TFTP server and filename to download, and they are sent in batches of 10 identical ISAKMP messages every 5 minutes. The VPN concentrator continues to send these messages until upgrade notification is disabled on the concentrator. VPN 3002 Hardware Clients that are already operating at the correct version level ignore the update messages.

VPN 3002 Hardware Clients store software images in two different locations, backup storage and active storage. During initial bootup, the hardware client copies the software image from backup storage into active storage. When the VPN 3002 Hardware Client copies the upgrade file from the TFTP server, it stores the file in backup storage. The update process then performs

424 Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

an integrity check of the copied file. If the file is damaged, the update process retries the file copy, performing this copy and check activity up to 20 times at 3-minute intervals until a good copy is received or the count of 20 is reached. Once a good file has been received, the update process issues a reload command to reboot the VPN 3002 Hardware Client and activate the new release.

VPN activities are not disturbed during the notification and download process. They are disrupted during the reboot, however, so the VPN tunnel to the head-end concentrator will need to be reestablished once the VPN 3002 Hardware Client as rebooted.

Setting up the head-end VPN 3000 Series Concentrator for automatically updating the VPN 3002 Hardware Client is accomplished through the VPN 3000 Concentrator Series Manager. The five steps follow:

Step 1 Navigate to the Configuration | User Management | Groups screen and select the group. Figure 9-12 shows that TCL Group (Internally Configured) was chosen.

Step 2 Choose Modify Client Update.

Step 3 Choose Add from the Client Update screen to add a new client package.

Step 4 On the next screen, enter vpn3002 as the client type, enter tftp://{IP address of server}/{filename} as the URL, and enter the revision number (see Figure 9-13).

Step 5 Select Add to finish the setup at the head-end concentrator.

Figure 9-12 Configuration | User Management | Groups

Configuring Auto-Update for the VPN 3002 Hardware Client 425

Figure 9-13 Modifying Client Update Information

The Client Type has specific acceptable options and is case sensitive. The following list shows the available options:

Windows—Provides update service to all Windows-based clients.

Win9X—Provides update service to all Windows 95, Windows 98, and Windows ME clients.

WinNT—Provides update service to Windows NT, Windows 2000, and Windows XP clients.

vpn3002—Provides update service to VPN 3002 Hardware Clients.

The TFTP server must be located within the private network of the head-end VPN concentrator. The VPN 3002 Hardware Client reaches the TFTP server through the secure tunnel. In other words, the TFTP server IP address cannot be on the outside network of the public interface or routed in such a way that it needs to pull the image through the outside interface of the VPN concentrator without encryption.

The version number is derived from the filename you have specified to be downloaded. In this example, you used the file name vpn3002-3.0.3.A-k9.bin. The revision (3.0.3.A) is the part between the two dashes. Be sure you have entered the correct revision number. An incorrect or missing revision number will cause the VPN 3002 Hardware Client to enter an infinite cycle of attempting and failing to upgrade.

You may enter more than one revision number into the Revisions field, separating the entries by commas to indicate that you will support more than one client software release. The entry that you include in the URL field must be represented in the list of acceptable revisions. If the attaching client already operates with one of the versions listed in the revisions list, no action will be taken.

426 Chapter 9: Configuring Scalability Features of the VPN 3002 Hardware Client

The next configuration step you need to do is to set up notification to VPN 3002 Hardware Clients (and software clients) about the upgrade. There are only three steps:

Step 1 Using the VPN 3000 Concentrator Series Manager, go to Administration | Software Update | Clients.

Step 2 Choose the group. In this example, the group is rtpvpnl.

Step 3 Select Upgrade Clients Now (see Figure 9-14).

Figure 9-14 Updating Client Software

Monitoring Auto-Update Events

37 Monitoring VPN 3002 Auto-Update Events

In case the upgrade is not successful, debugging may be enabled to help determine the cause of failure. You should check the log file first to see if it contains any information on why the upgrade was unsuccessful. In the event that the log file does not provide enough information, configure debugging by following these steps:

Step 1 Go to the Configuration | System | Events | Classes | Add screen, shown in Figure 9-15.

Step 2 Choose the class named AUTOUPDATE.

Step 3 Set the severity of the log to 1-13.

Step 4 Retrieve the log by going to the Monitoring | Live Event Log screen.

Monitoring Auto-Update Events 427

Step 5 If you are also attached to the console, the console severity may also be set to 1-13.

Step 6 Likewise, the Syslog and Trap severities may be set if you are using a Syslog Server or an SNMP server such as CiscoWorks.

Figure 9-15 Configuration | System | Events | Classes | Add

A sample output from the log is shown in Example 9-1. Table 9-2 explains the fields in the logs after this example.

Example 9-1 Sample Debugging Output

12 08/21/2002 11:19:23.225 SEV=4 AUTOUPDATE/6 RPT=1 Current version 3.0.2 does not match 3.0.3.A

13 08/21/2002 11:19:23.225 SEV=4 AUTOUPDATE/7 RPT=1 Updating firmware to 3.0.3.A from 3.0.2

14 08/21/2002 11:19:23.225 SEV=4 AUTOUPDATE/12 RPT=1 Update firmware will now begin using file

vpn3002-3.0.3.A-k9.bin on server 192.268.101.3 [0A204964] 15 08/21/2002 11:35:00.700 SEV=4 AUTOUPDATE/5 RPT=1

Current version 3.0.3.A is up to date

Table 9-2

Field Descriptions

 

 

 

 

 

Field

Definition

 

 

 

 

12

The first number in the list is the log number.

 

 

 

 

08/21/2002

The date is defined by the system date of the VPN 3002 Hardware Client.

 

 

 

 

11:19:23.225

The time of the log.

 

 

 

 

SEV=4

The severity of the log.

 

 

 

 

AUTO-UPDATE/6

The name of the event class.

 

 

 

 

RPT=1

The description of the event.