| Problem | |||||||||||||||||
| You want a secure IPSEC VPN between two sites. | |||||||||||||||||
| Solution | |||||||||||||||||
| |||||||||||||||||
Showing posts with label VPN. Show all posts
Showing posts with label VPN. Show all posts
Monday, 14 May 2012
Cisco ASA 5500 Site to Site VPN (From CLI)
Cisco ASA IKEv1 and IKEv2 Support for IPSEC
IETF proposed an updated Internet Key Exchange (IKE) protocol, called IKEv2, which is used to simplify and improve the legacy IKE protocol (IKEv1). Cisco ASA introduced support for IPSEC IKEv2 in software version 8.4(1) and later. In this ASA version, IKEv2 was added to support IPsec IKEv2 connections for AnyConnect and LAN-to-LAN VPN implementations. Of course, legacy IKEv1 is still supported and is widely used in almost all VPN configurations up to now.
In this article I will show the differences between the commands used in ASA versions prior to 8.4(1) with commands used in versions 8.4(1) and later.
ASA version prior to 8.4(1)
Let’s start with a basic IPSEC Lan-to-Lan VPN configuration for ASA versions prior to 8.4(1). Note that the following are just a part of the commands required for successful Lan-to-Lan VPN. The following are the commands which have some differences with the commands used in version 8.4(1) and later.
crypto ipsec transform-set espSHA3DESproto esp-3des esp-sha-hmac
crypto map IPSEC 10 match address VPN-TO-REMOTE
crypto map IPSEC 10 set pfs
crypto map IPSEC 10 set peer 100.100.100.2
crypto map IPSEC 10 set transform-set espSHA3DESproto
crypto map IPSEC interface outside
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
tunnel-group 100.100.100.2 type ipsec-l2l
tunnel-group 100.100.100.2 ipsec-attributes
pre-shared-key *****
ASA version 8.4(1) and later
Now let’s see how the IPSEC Lan-to-Lan VPN commands are changed in ASA version 8.4(1) and later. In red color you see the commands which are changed:
crypto ipsec ikev1 transform-set espSHA3DESproto esp-3des esp-sha-hmac
crypto map IPSEC 10 match address VPN-TO-REMOTE
crypto map IPSEC 10 set pfs
crypto map IPSEC 10 set peer 100.100.100.2
crypto map IPSEC 10 set ikev1 transform-set espSHA3DESproto
crypto map IPSEC interface outside
crypto isakmp identity address
crypto ikev1 enable outside
crypto ikev1 policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 86400
tunnel-group 100.100.100.2 type ipsec-l2l
tunnel-group 100.100.100.2 ipsec-attributes
ikev1 pre-shared-key *****
The Table below shows a site by site comparison of commands for even older ASA versions. The leftmost column shows commands for ASA versions lower than 7.2(1). The middle column shows the commands in versions higher than 7.2(1) and lower than 8.4(1). The right column shows the commands from 8.4(1) and higher.
Table with Cisco ASA versions and command differences regarding Site-to-Site IPSEC VPN commands:
ASA version < 7.2(1)
|
7.2(1)<ASA version<8.4(1)
|
ASA version > 8.4(1)
|
| isakmp policy [policy #] | crypto isakmp policy [policy #] | crypto ikev1 policy [policy #] |
| isakmp enable [interface-name] | crypto isakmp enable [interface-name] | crypto ikev1 enable [interface-name] |
| isakmp identity address | crypto isakmp identity address | crypto isakmp identity address |
| crypto ipsec transform-set | crypto ipsec transform-set | crypto ipsec ikev1 transform-set |
| tunnel-group nameipsec-attributes pre-shared-key xxxxxxx | tunnel-group name ipsec-attributes pre-shared-key xxxxxxx | tunnel-group name ipsec-attributes ikev1 pre-shared-key xxxxxxx |
Tuesday, 8 May 2012
Allow VPN Clients Internet Access without Split Tunneling
Allow VPN Clients Internet Access without Split Tunneling
This quck question and answer comes from a recent forum thread at networking-forum.com. I especially like how texanmutt tried sending traffic to the proxy server. This very clearly illustrates the idea of same-security-traffic permit intra-interface.
Question: I have setup remote access VPN on an ASA 5505. The remote access works good, but when I try to browse web pages with the remote client, it times out. But if I map the remote client web browser to the proxy server behind the ASA, it works just fine. I am guessing this might be some kind NAT issue.
Read on for the answer.
Answer: It’s a NAT issue and an ASA behavior issue. The success with the proxy makes sense, too.
By default, the ASA does not allow traffic to enter and exit the same interface of the security appliance. Since the clients are on the outside and the Internet is on the outside, client traffic is not allowed to flow that way by default. When you send the client traffic to the proxy first, the source of the traffic is changed to the proxy and now the flow is allowed from inside to outside.
You can change this behavior with the same-security-traffic command:
same-security-traffic permit intra-interface
Once you’ve allowed traffic to flow in and out of the same interface, you still need to NAT the traffic of your VPN clients just like you do your internal clients. Don’t forget that they are coming from the outside:
global (outside) 1 interface
nat (outside) 1 192.168.10.0 255.255.255.0
nat (inside) 1 0.0.0.0 0.0.0.0
nat (outside) 1 192.168.10.0 255.255.255.0
nat (inside) 1 0.0.0.0 0.0.0.0
Subscribe to:
Comments (Atom)