© 1999, Cisco Systems, Inc. 14-1 Chapter 14 Cisco Secure VPN Client.

Презентация:



Advertisements
Похожие презентации
© 1999, Cisco Systems, Inc. 1-1 Chapter 1 Introduction.
Advertisements

© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 17 Configure the Cisco Virtual Private Network 3000 Series Concentrator for LAN-to-LAN.
© 1999, Cisco Systems, Inc Scaling Cisco IOS IPSec Networks Chapter 13.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 7 Configure the Cisco VPN Firewall Feature for IPSec Software Client.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 11 Configure the Cisco Virtual Private Network 3002 Hardware Client for Unit and.
© 2000, Cisco Systems, Inc. CSPFF Chapter 8 Configuration of Multiple Interfaces.
© 1999, Cisco Systems, Inc. 8-1 Configuring Advanced PIX Firewall Features Chapter 8.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Configuring IPsec Site-to-Site VPN Using SDM.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 15 Configure the Cisco Virtual Private Network 3000 Series Concentrator for LAN-to-LAN.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Implementing the Cisco VPN Client.
© 2001, Cisco Systems, Inc. CSIDS Chapter 4 Cisco Secure Policy Manager Installation.
© 1999, Cisco Systems, Inc Configuring Cisco Secure Integrated Software Chapter 10.
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 3 Cisco PIX Firewall Technology and Features.
© 1999, Cisco Systems, Inc Chapter 11 Understanding Cisco IOS IPSec Support.
© 2000, Cisco Systems, Inc. 7-1 Chapter 7 Access Configuration Through the Cisco Secure PIX Firewall.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 14 Configuring the Cisco Virtual Private Network 3000 Series Concentrator for IPSec.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA Lesson 8 Object Grouping.
© 2003, Cisco Systems, Inc. All rights reserved. CSPFA Chapter 8 Object Grouping.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 10 Configure the Cisco VPN 3002 Hardware Client for Remote Access Using Pre-Shared.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Cisco Secure Virtual Private Networks 4.0.
Транксрипт:

© 1999, Cisco Systems, Inc Chapter 14 Cisco Secure VPN Client

© 1999, Cisco Systems, Inc. MCNS Objectives Install the Cisco Secure VPN Client. Configure the Cisco Secure VPN Client. Operate the Cisco Secure VPN Client in a VPN Session. Request & Import CA certificates. After completing this course you will be able to complete the following tasks.

© 1999, Cisco Systems, Inc. MCNS © 1999, Cisco Systems, Inc Overview of the Client

© 1999, Cisco Systems, Inc. MCNS CA Server PIX Firewall Web Surfer Remote Branch Internet Web Server Protected DMZ Dirty DMZ NetRanger Sensor Dialup NAS ClientServer Campus Router Bastion Host SMTP Server DNS Server IS NetRanger Director NetSonar Windows NT PC Sales XYZ Companys VPN Plan Bastion Host Perimeter Router Internet NT Server: CiscoSecure, Web, FTP, TFTP, Syslog Server TACACS+ or RADIUS protocol

© 1999, Cisco Systems, Inc. MCNS Provides Virtual Private Networking (VPN) capability on a desktop or laptop computer. Based on the latest industry- standard IPSec recommendations. Enables secure client-to-gateway communications over TCP/IP networks. What is the Cisco Secure VPN Client?

© 1999, Cisco Systems, Inc. MCNS Pentium Processor Windows MB RAM Windows MB RAM Windows NT 4.0 (SP 3 or 5) - 32 MB RAM 9 MB of available disk space CD - ROM Drive Non-encrypting modem Microsoft TCP/IP stack and Microsoft Dialer (only) System Requirements

© 1999, Cisco Systems, Inc. MCNS Full compliance with IPSec and related standards Support for Tunnel Mode or Transport Mode security Supports DES, 3DES, MD-5, and SHA-1 algorithms Internet Key Exchange (IKE) using ISAKMP/Oakley Handshake and Key Agreement Interoperates with virtually all PC Windows communications devices Intuitive GUI Easy to install and transparent to the user Security policy can be exported and protected Features

© 1999, Cisco Systems, Inc. MCNS Cisco Systems IPSec enabled routers and PIX Firewalls Cisco Secure Access Control Server for AAA services Compatible with X.509 CAs including Verisign Onsite and Netscape Certificate Management System (CMS) using the Cisco Certificate Enrollment Protocol (CEP) and the Entrust CA Server - with limitations Interoperability

© 1999, Cisco Systems, Inc. MCNS © 1999, Cisco Systems, Inc Network Design Issues

© 1999, Cisco Systems, Inc. MCNS Network Design Issues Before you can configure the client you need to know which of the following configurations is in use. Digital CA Certificates vs. Pre-Shared Keys Import or Configure Security Policies Method for Updating Certificate Revocation Lists (CRL)

© 1999, Cisco Systems, Inc. MCNS © 1999, Cisco Systems, Inc Installing and Configuring the Client

© 1999, Cisco Systems, Inc. MCNS The VPN Client is a standard MS Windows, wizard-based installation. Installation

© 1999, Cisco Systems, Inc. MCNS Four Elements to Configure Four major areas that must be configured: Global Policy Setting Securing Connections Identity Individual Security Policies

© 1999, Cisco Systems, Inc. MCNS Configuring the Connection You must configure the following options to secure each connection: Connection Security Remote Party Identity and Addressing Port and Protocol Secure Gateway Tunnel Option

© 1999, Cisco Systems, Inc. MCNS Configuring Connection Security This window allows you to select the connection security. Secure Non-secure Block

© 1999, Cisco Systems, Inc. MCNS © 1999, Cisco Systems, Inc Configuring Your Identity

© 1999, Cisco Systems, Inc. MCNS Configuring Your Identity Configuring your identity consists of specifying three parameters: Certificate Port Name

© 1999, Cisco Systems, Inc. MCNS © 1999, Cisco Systems, Inc Configuring Security Policies PHASE 1

© 1999, Cisco Systems, Inc. MCNS Overview During phase 1, individuals reveal their identities and negotiate how they will secure phase 2 communications. Phase 1 can be either Main Mode or Aggressive Mode.

© 1999, Cisco Systems, Inc. MCNS Configuring authentication Once you have started configuring a security policy for all or individual connections, you must then configure the authentication and key exchange proposals for that policy.

© 1999, Cisco Systems, Inc. MCNS © 1999, Cisco Systems, Inc Configuring Key Exchange PHASE 2

© 1999, Cisco Systems, Inc. MCNS Configuring Key Exchange Similar to authentication, several proposals can be created for each connection. The client compares each proposal in descending order until it finds a match with the remote system.

© 1999, Cisco Systems, Inc. MCNS © 1999, Cisco Systems, Inc Working with Certificates

© 1999, Cisco Systems, Inc. MCNS Working with Certificates Certificates identify you to people and hosts that you communicate with.

© 1999, Cisco Systems, Inc. MCNS Certificate Authorities Netscape Communications Baltimore Technologies PKI/Certificate Authority Partners Entrust Technologies VeriSign

© 1999, Cisco Systems, Inc. MCNS © 1999, Cisco Systems, Inc Lab Exercise

© 1999, Cisco Systems, Inc. MCNS Lab Objectives Upon completion of this lab, you will be able to perform the following task: Configure the Cisco Secure VPN client

© 1999, Cisco Systems, Inc. MCNS PIXX Firewall Protected DMZ Dirty DMZ X.0 /24.2 Outside X.0/24.1 DMZ Inside.3 NASX IS.1 10.X.2.1 /24 10.X.2.2 to 10.X.2.10 /24 Windows NT PC NTX NT Server: CiscoSecure NT, IIS FTP and Web Server Cisco Security Manager, Syslog Server, TFTP Server.4 Instructor NT Server: FTP, HTTP, CA / X.1 /30 PerimeterX Router 10.X.1.0 /24 Bastion Host: Web Server FTP Server.3 Sales Dialup Frame Relay (Internet) Telco Simulator 100X MCNS Lab Environment Generic.1.2 X = POD #

© 1999, Cisco Systems, Inc. MCNS © 1999, Cisco Systems, Inc Lesson Summary and Review Questions

© 1999, Cisco Systems, Inc. MCNS Summary The Cisco Secure VPN client is compatible with the following CA vendors: –Verisign –Netscape –Baltimore –Entrust (with limitations for V-1.0) Fully IPSec-compliant Supports Tunnel Mode or Transport Mode security Security policy can be exported and protected

© 1999, Cisco Systems, Inc. MCNS Review Questions 1. What are the encryption algorithms supported by the client? DES, 3DES, MD-5, and SHA-1 2. What are the major areas to configure when installing the client? Global Policy Setting Securing Connections Identity Individual Security Policies

© 1999, Cisco Systems, Inc. MCNS Review Questions (cont.) 3. What parameters must be configured for the connection? Connection Security Remote Party Identity and Addressing Port and Protocol Secure Gateway and Tunnel Option 4. What parameters are needed to configure your identity? Certificate Port Name

© 1999, Cisco Systems, Inc. MCNS Review Questions (cont.) 5. Can Phase 1 negotiations be either Aggressive or Main modes? Yes 6. What are some of the reasons to use certificates? Verify identity Provide non-repudiation for transactions Security

© 1999, Cisco Systems, Inc. MCNS Blank for pagination