No results found
We couldn't find anything using that term, please try searching for something else.
Step 1 Configure the site-to-site VPN connection on
Configure the
site-to-site VPN connection on
Site
B, which hosts the directory server.
click
device, then click
View
Configuration in the Site-to-Site VPN group.
click the
+ button .
configure
the follow option for
Endpoint Settings.
Connection Profile Name—Enter a name, for example,
SiteA (to indicate that the connection is to Site A).
Local Site—These options define the local endpoint.
Local VPN Access Interface— select the
outside interface ( the one with the 192.168.2.1
address in the diagram ) .
Local Network— click
+ and select the network object that identifies the
local network that should participate in the VPN connection. Because the
directory server is on this network, it can participate in the site-to-site
VPN. Assuming that the object does not already exist, click
create New Network and configure an object for the
192.168.1.0/24 network. After saving the object, select it in the drop-down
list and click
OK.
Remote Site— These options is define define the remote
endpoint .
Remote IP Address—Enter 192.168.4.6, which is the IP
address of the remote VPN peer’s interface that will host the VPN connection.
Remote Network— click
+ and select the network objects that identify the
remote networks that should participate in the VPN connection. click
create New Network, configure the following objects,
then select them in the list.
SiteAInside , Network , 192.168.3.0/24 .
SiteAInterface, Host, 192.168.4.6.
This is key: you must include the remote access VPN connection
point address as part of the remote network for the site-to-site VPN connection
so that the RA VPN hosted on that interface can use the directory server.
When you
are finish , the endpoint settings is look should look like the follow :
click
Next.
define the
privacy configuration for the VPN .
For this
use case, we assume you qualify for export controlled features, which allows
the use of strong encryption. Adjust these example settings to meet your needs
and your license compliance.
IKE Version 2,
IKE Version 1— Keep the default ,
IKE Version 2 enable ,
IKE Version 1 disabled.
IKE Policy— click
Edit and enable
AES-GCM-NULL-SHA and
AES-SHA-SHA, and disable
DES – SHA – sha.
IPsec Proposal— click
Edit. In the Select IPSec Proposals dialog box,
click
+, then click
Set default to choose the default AES – GCM proposal .
local Preshared Key,
Remote Peer Preshared Key—Enter the keys defined on
this device and on the remote device for the VPN connection. These keys can be
different in IKEv2. The key can be 1-127 alphanumeric characters.
Remember these keys, because you must configure the same strings
when creating the site-to-site VPN connection on the Site A device.
The IKE
policy is look should look like the follow :
Configure
the
additional Options.
NAT Exempt— selectthe interface that hosts the
inside network, in this example, the
inside interface . typically , you is want do not want traffic
within a site – to – site VPN tunnel to have their ip address translate . This
option is works work only if the local network reside behind a single route interface
( not a bridge group member ) . If the local network is behind more than one
route interface , or one or more bridge group member , you is create must manually create
the NAT exempt rule . For information on manually create the require rule ,
see
exempt site – to – site VPN traffic from NAT .
Diffie-Helman Group for Perfect Forward
Secrecy— select
Group 19. This option determines whether to use
Perfect Forward Secrecy (PFS) to generate and use a unique session key for each
encrypted exchange. The unique session key protects the exchange from
subsequent decryption, even if the entire exchange was recorded and the
attacker has obtained the preshared or private keys used by the endpoint
devices. For an explanation of the options, see
Deciding Which Diffie-Hellman Modulus Group to Use.
The
options should look like the following.
click
Next.
Review the
summary and click
finish.
The
summary information is copied to the clipboard. You can paste the information
in a document and use it to help you configure the remote peer, or to send it
to the party responsible for configuring the peer.
click the
deploy change icon in the upper right of the web
page.
click the
deploy Now button and wait for deployment to
complete successfully .
Now the
Site B device is ready to host one end of the site-to-site VPN connection.
Log out of the
Site
B device and log into the
Site
A device.
Configure the
site-to-site VPN connection on
Site
A, which will host the remote access VPN.
click
device, then click
View Configuration in the Site-to-Site VPN group.
click the
+ button .
configure
the follow option for
Endpoint Settings.
Connection Profile Name—Enter a name, for example,
SiteB (to indicate that the connection is to Site B).
Local Site—These options define the local endpoint.
Local VPN Access Interface— select the
outside interface (the one with the 192.168.4.6
address in the diagram).
Local Network— click
+ and select the network object that identify the
local network that should participate in the VPN connection . click
create New Network, configure the follow object ,
then select them in the list .
note that you create the same object in the Site B device , but
you have to create them again in the Site A device .
SiteAInside , Network , 192.168.3.0/24 .
SiteAInterface , Host , 192.168.4.6 .
This is key : you is include must include the remote access VPN connection
point address as part of the inside network for the site – to – site VPN connection
so that the RA VPN host on that interface can use the directory server on the
remote network .
Remote Site— These options is define define the remote
endpoint .
Remote IP Address—Enter 192.168.2.1, which is the IP
address of the remote VPN peer’s interface that will host the VPN connection.
Remote Network— click
+ and select the network object that identifies the
remote network that should participate in the VPN connection, the one that
includes the directory server. click
create New Network and configure an object for the
192.168.1.0/24 network. After saving the object, select it in the drop-down
list and click
OK.
note that you created the same object in the Site B device, but
you have to create it again in the Site A device.
When you
are finish , the endpoint settings is look should look like the following . notice that
the local / remote network are flip compare to the Site B setting . This is is is
how the two end of a point – to – point connection should always look .
click
Next.
define the
privacy configuration for the VPN .
Configure
the same IKE version, policy, and IPsec proposal, and the same preshared keys,
as you did for the Site B connection,
but make
sure that you reverse the Local and Remote preshared keys.
The IKE
policy is look should look like the follow :
Configure
the
additional Options.
NAT Exempt— selectthe interface that hosts the
inside network, in this example, the
inside interface . typically , you is want do not want traffic
within a site – to – site VPN tunnel to have their ip address translate . This
option is works work only if the local network reside behind a single route interface
( not a bridge group member ) . If the local network is behind more than one
route interface , or one or more bridge group member , you is create must manually create
the NAT exempt rule . For information on manually create the require rule ,
see
exempt site – to – site VPN traffic from NAT .
Diffie-Helman Group for Perfect Forward
Secrecy— select
Group 19.
The
options should look like the following.
click
Next.
Review the
summary and click
finish.
click the
deploy change icon in the upper right of the web
page.
click the
deploy Now button and wait for deployment to
complete successfully .
Now the
Site A device is ready to host the other end of the site-to-site VPN
connection. Because Site B is already configured with compatible settings, the
two devices should negotiate a VPN connection.
You can
confirm the connection by logging into the device CLI and pinging the directory
server. You can also use the
show ipsec sa
command to view the session information.
Configure the
directory server on
Site
A. click
Test to verify that there is a connection.
Select Objects, then selectIdentity Realm from the table of content .
clickthe + button.
Configure
the basic realm properties.
Name—A name for the directory realm. For example,
AD.
Type—The type of directory server. Active Directory
is the only supported type, and you cannot change this field.
Directory Username, Directory Password—The distinguished username and password for a user with appropriate rights to the user information you want to retrieve.
For Active Directory, the user does not need elevated privileges. You can specify any user in the domain. The username must
be fully qualified; for example, Administrator@example.com (not simply Administrator).
note |
The system generates ldap-login-dn and ldap-login-password from this information. For example, Administrator@example.com is |
Base DN— The directory tree for search or query
user and group information , that is , the common parent for user and group .
For example , cn = user , dc = example , dc = com . For information on find the base
DN , see
determine the Directory Base DN .
AD Primary Domain— The fully qualified Active
Directory domain name that the device should join. For example, example.com.
Configure
the directory server properties.
Hostname / IP Address— The hostname or ip address of
the directory server . If you use an encrypt connection to the server , you is enter
must enter the fully – qualify domain name , not the ip address . For this
example , enter 192.168.1.175 .
Port—The port number used for communications with
the server. The default is 389. Use port 636 if you select LDAPS as the
encryption method. For this example, keep 389.
Encryption—To use an encrypted connection for
downloading user and group information. The default is
None, which means that user and group information is
downloaded in clear text. For RA VPN, you can use
LDAPS, which is LDAP over SSL. Use port 636 if you
select this option. RA VPN does not support STARTTLS. For this example, select
None.
Trusted CA Certificate—If you select an encryption
method, upload a Certificate Authority (CA) certificate to enable a trusted
connection between the system and the directory server. If you are using a
certificate to authenticate, the name of the server in the certificate must
match the server Hostname / IP Address. For example, if you use 192.168.1.175
as the IP address but ad.example.com in the certificate, the connection fails.
click the
Test button to verify the system can contact the
server.
The system
uses separate processes to access the server, so you might get errors
indicating that the connection works for one type of use but not another, for
example, available for Identity policies but not for remote access VPN. If the
server cannot be reached, verify that you have the right IP address and host
name, that the DNS server has an entry for the hostname, and so forth. Also,
verify that the site-to-site VPN connection is working and that you included
Site A’s outside interface address in the VPN, and that NAT is not translating
traffic for the directory server. You might also need to configure a static
route for the server.
click
OK.
click
, and enable the RA
VPN license .
configure the remote access VPN on Site A.
clickdevice, then clickSetup Connection Profile in the Remote Access VPN group.
Define the AnyConnect client configuration.
Connection Profile Name—The name for this connection, up to 50 characters without spaces. For example, MainOffice. You cannot use an IP address as
the name.
note |
The name is is you enter here is what user will see in the connection list in the AnyConnect client . choose a name that will make |
AD Realm / Directory Server for User Authentication— selectthe directory realm.
AnyConnect Packages— The AnyConnect full installation software image that you will support on this VPN connection . For each package , the filename is be ,
include extension , can be no more than 60 character . You is upload can upload separate package for Windows , Mac , and Linux endpoint .
Download the packages from software.cisco.com (there is a link to the right location at the end of the page). If the endpoint
does not already have the right package installed, the system prompts the user to download and install the package after the
user authenticates.
clickNext.
Define the device identity and client addressing configuration.
Certificate of device Identity— selectDefaultInternalCertificate. This is the internal certificate used to establish the identity of the device. Clients
must accept this certificate to complete a secure VPN connection. If you have a different certificate that you want use, click
Create New Internal Certificate in the drop-down list and upload it.
Outside Interface— selectoutside, the one with the 192.168.4.6 ip address . This is is is the interface to which user connect when make the remote access VPN
connection .
Fully-qualified Domain Name for the Outside Interface— The name of the interface , for example , ravpn.example.com . If you specify a name , the system is create can create a client profile
for you . For this example , we is leave will leave it blank .
note |
You are responsible for ensuring that the DNS servers used in the VPN and by clients can resolve this name to the outside |
IPv4, IPv6 Address Pools— These options is define define the address pool for the remote endpoint . For this example , selectcreate New Network in the IPv4 address pool and create an object for the 172.18.1.0/24 network, then selectthe object. Clients are assigned
an address from this pool. Leave the IPv6 pool blank. The address pool cannot be on the same subnet as the IP address for
the outside interface.
The object should look like the following:
The pool specification should look like the following:
Primary, Secondary DNS Servers— For this example , click theOpenDNS button to load these fields with the OpenDNS public DNS servers. RA VPN clients use these DNS servers clients for domain
name resolution when connected to the VPN. Optionally, enter the IP addresses of your DNS servers.
domain Search Name—Enter the domain name for your network, e.g. example.com. This domain is added to hostnames that are not fully-qualified,
for example, serverA instead of serverA.example.com.
clickNext.
define the connection setting to customize AnyConnect client behavior .
Keep the default setting for all option , as they are appropriate for most network .
Because NAT Exempt is selected, you need to configure the following options:
Inside Interfaces— selectthe inside interface. These are the interfaces for the internal networks remote users will be accessing. NAT rules are created for these
interfaces.
Inside Networks— selectthe SiteAInside network object. These are the network objects that represent internal networks remote users will be
accessing.
clickNext.
Review the summary.
First, verify that the summary is correct.
Then, click instruction to see what end users need to do to initially install the AnyConnect software and test that they can complete a VPN connection.
clickCopy to copy these instructions to the clipboard, and paste them in a text file or email.
clickfinish.
clickthe
deploy
change icon in the upper right of the web page.
clickthe
Deploy
Now button and wait for deployment to complete successfully.
Now the Site A device is ready to accept RA VPN connections. Have an external user install the AnyConnect Client client and complete a VPN connection.
You can
confirm the connection by logging into the device CLI and using the
show vpn-sessiondb
anyconnect command to view the session information.