
Verification of EzVPN Client Mode Configuration
CISCO IPSEC VPN CLIENT AGGESSIVE MODE CONFIGURATION HOW TO
Example 4-4 shows how to monitor an EzVPN client configuration. Notice that in the EzVPN client configuration, none of the IPSec policies, encryption algorithms, and so forth are configured. The configuration of the EzVPN hardware client is shown in Example 4-3. The client keeps track of the mappings so that it can be forwarded to the correct host on the private network. In Figure 4-2, all traffic from the hosts on the FastEthernet interface on the EzVPN client is translated by NAT to a source IP address of 10.0.68.5, which is assigned by the EzVPN server as an attribute using MODECFG. In this mode, all traffic from the client side uses a single IP address for all hosts on the private network. EzVPN Client Modeįigure 4-2 shows an IPSec Unity client configured for Client Mode in order to establish an IPSec VPN tunnel to the gateway.ĮzVPN Client Mode is also known as Network/Port Address Translation (NAT/PAT) Mode. You will examine each of these modes in detail in the following sections. The Cisco Easy VPN feature supports two modes of operation: Automatic configuration- Performed by pushing attributes such as IP address, DNS, WINs, and so on, using MODECFG.User authentication- This entails validating user credentials by way of XAUTH.Negotiating tunnel parameters- This is done with encryption algorithms, SA lifetimes, and so on.EzVPN provides the following general functions in order to simplify the configuration process: Minimal configuration is required at the EzVPN client. The tunnel on the EzVPN client can be initiated automatically or manually, or it could be traffic triggered, depending on the configuration or type of EzVPN client used. When an EzVPN client initiates an IPSec tunnel connection, the EzVPN server pushes the IPSec policies and other attributes required to form the IPSec tunnel to the EzVPN client and creates the corresponding IPSec tunnel connection. Related Articles.ĮzVPN uses the Unity client protocol, which allows most IPSec VPN parameters to be defined at an IPSec gateway, which is also the EzVPN server. The following message was received from the remote VPN device: Port Preempted. Close all sensitive networked applications. The remote peer has terminated the VPN connection. The following message was received from the secure gateway: Port Preempted Mac/OSX. Close all sensitive networked applications.The default port for this traffic is 10000/udp. This is the default method for UDP tunneling with the Cisco VPN client IPSec over UDP – This method still uses 500/udp for IKE negotiation, but then tunnels IPSec data traffic within a pre-defined UDP port.The Cisco Easy VPN feature, also known as EzVPN, eases IPSec configuration by allowing an almost no-touch configuration of the IPSec client. In a large corporate environment with hundreds of sites, managing the IPSec configuration can get quite tedious. This includes IPSec policies, Diffie-Hellman parameters, encryption algorithms, and so on. Easy VPN (EzVPN)Īs you saw in Chapter 2, 'IPSec Overview,' for an IPSec tunnel to be established between two peers, there is a significant amount of configuration required on both peers. This protocol allows most VPN parameters, such as internal IP addresses, internal subnet masks, DHCP server addresses, WINS server addresses, and split-tunneling flags, to be defined at a VPN server, such as a. crypto map map-name isakmp authorization list list-nameĤ.The Cisco Easy VPN client feature eliminates much of the tedious configuration work by implementing the Cisco Unity Client protocol. To configure the Tunnel-Client-Endpoint and Tunnel-PasswordĪttributes within the ISAKMP peer configuration, perform the following steps.ģ. The hub router retrieves the preshared key from the AAA server and the spokes (the users) initiate aggressive mode to the hub by using the preshared key that is specified in the Internet Security Association Key Management Policy (ISAKMP) peer policy as a RADIUS tunnel attribute. The preshared keys are stored in the AAA server as Internet Engineering Task Force (IETF) RADIUS tunnel attributes and are retrieved when a user tries to âspeakâ to the hub router. Instead of keeping your preshared keys on the hub router, this feature allows you to scale your preshared keys by storing and retrieving them from an authentication, authorization, and accounting (AAA) server. Thus, you can scale your IKE preshared keys in a hub-and-spoke topology.Īlthough IKE preshared keys are simple to understand and easy to deploy, they do not scale well with an increasing number of users and are therefore prone to security threats. The IKE: Initiate Aggressive Mode feature allows you to configure IKE preshared keys as RADIUS tunnel attributes for IPsec peers.
