VPN Scenarios, Configuration and Analysis: Rodoya Takele Degefa
VPN Scenarios, Configuration and Analysis: Rodoya Takele Degefa
VPN Scenarios, Configuration and Analysis: Rodoya Takele Degefa
Bachelor’s Thesis
October 22, 2015
Abstract
Instructor(s)
Erik Pätynen
The goal of this thesis was to create a secure VPN tunnel and a VPN policy for a small
LAN and suggest a secure, resilient and robust network setup insight in the vulnerabilities
of security, In particular of VPN and provide recommendations to remove or mitigate these
vulnerabilities. The thesis aimed not only to provide Site-to-site Connectivity but also to
make LAN and its shared resources and services available to a remote worker or workers,
offering an integrated, reliable, secured service.
To attain this goal, a network topology was built using a packet tracer and implemented in
the school laboratory. During the laboratory work site to site, IPSec remote access and
SSL VPN configuration were made to get the results. Cisco configuration professional
software and command line interface were both used as a tool. The network connection
was successful and secured from end to end for the remote office employees.
No company will be unaffected without the right security protocols. Lack of security policy,
configuration and the weakness in technology were found to be the reasons behind system
vulnerability. Companies that want to set a local area network with the benefits mentioned
in this thesis and implement them in to their security policy will have a strong secured net-
work. This security system is monitored, measured and found to be effective in protecting
a company’s network system from internal and external attacks and to protect it from loss
of resources.
4.1 Methodology 21
4.2 Network Based VPN Testing 22
4.3 Implementation of VPN Models 24
4.3.1 Application of Site-to-Site VPN 24
4.3.2 Application of Remote Access IPSec VPN 34
4.3.3 Application of SSL VPN 36
4.4 Testing 37
4.4.1 Testing Result of Site-to-Site VPN 38
4.4.2 Testing Result of Remote Access IPSec VPN 42
4.4.3 Testing Result of SSL VPN 46
5 Conclusions 49
References 50
Appendices
Appendix 1.Basic Router Configuration
Appendix 2.Mirror Configuration Generated for R3
Appendix 3.Site-to-site Configuration for R1
Appendix 4.Site-to-site Configuration for R3
Appendix 5.Remote Access Configuration for R1
Appendix 6.Remote Access Configuration
Appendix 7.Secure Sockets Layer Configuration on R1
Appendix 8.Secure Sockets Layer Configuration using VPN Wizard on R1
Abbreviations
1 Introduction
Today's businesses provide employees with the opportunity to work from home or on
the road. When a company allows their staff to gain access to the internal network, it is
important that this is done safely. Many company employees who are often travelling,
or who simply do not need to sit at a fixed place in an office to do their job need to have
a secure access to the company network. When one works from outside the environ-
ment and needs information to work, it is important that he or she gets access from his
or her location. Today, a broadband connection makes possible a quick way to send
and retrieve information over the Internet. Just as there are thieves in the community,
there are people on the Internet attempting to get access to other people's computers
to steal information, or just to destroy it.
A common solution to enable users’ get access to the internal resources of the compa-
ny is to build a well-organized security system and protect its users. This allows users
to access the internal resources in a secured manner. Companies spend large sums of
money to have as fast, secure and reliable a connection as possible. Employees
should be able to safely connect to their company network from outside the office. This
includes where they want to work from home, on a business trip, sitting at a customer
waiting place or other possible situations where they want to access available infor-
mation on the internal network. To make this possible, it is necessary to use a medium
to communicate.
The goal of this project was to create a secure VPN tunnel and policy for a small LAN.
VPN is a virtual private network. The word virtual implies that there is no physical net-
work infrastructure dedicated to the private network. The thesis aims not only provide
Site-to-site connectivity, but also make the LAN and its shared resources and services
available to a remote worker or workers, offering an integrated, reliable, secured ser-
vice. It also suggests a secure, resilient and robust network setup insight in the vulner-
abilities of security, in particular of VPN and provide recommendations to remove or
mitigate these vulnerabilities
2
Most businesses in today's society believe that the Internet is an important part of their
business and to compete with other companies, they must be connected to it. But there
are big risks to connect a corporate network to the Internet. When a company connects
its network to the Internet it allows not only employees to have access to it, but also
makes it possible for outsider`s to access the company's private network. The need for
verification of accessibility to computer traffic has thus driven the development of the
control of computer communications. [11; 1]
A Common solution to most security threats is virtual Private Network (VPN). VPN al-
lows a user to access the internal resources of the company from an external network
such as the Internet. This allows users to access the internal resources in a secure
manner. The VPN technology is then preferable to have as fast, secure and reliable a
connection as possible. This thesis addresses various VPN technologies. I will de-
scribe the common VPN protocols such as MPLS, IPSec and PPTP, and how users
authenticate in a safe and smooth manner. I will also explain methods that can be
used to make users VPN connection secure. [12; 1]
When a company allows work outside the secured environment office there, arise
some security risks, for example:
When an employee is using a private computer in a network that more users
has access.
The computer can be stolen.
An insecure home network where the computer is used usually with no or poor
WLAN encryption
Connecting computers may be unsecured with poor anti-virus and firewall rules.
There are several ways to give the user access to information on a corporate network.
A prerequisite is that the user has an Internet connection. After this requirement is sat-
isfied, then there are a number of methods to use depending on what you have for
safety and what kind of internal resources, the user might access.
3
• Establishing a File Transfer Protocol (FTP) server with the necessary information
•Connecting with a remote desktop and work directly to a computer within the company
network.
• Adhere to the corporate network through a VPN tunnel.
FTP is used to transfer files between a client and a server. This might be a sufficient
solution in some cases, depending on what the users will access in the local network
and how high securities the user seeks. If users need to access shared folders, FTP
can be a possible option. FTP cannot be in use in a case where the user needs to work
directly in applications or other resources on the corporate network. [14]
The disadvantage of FTP over SSL is that it is expensive and that the safety is in many
cases inadequate. It uses encryption of control and data connections either all at once
or one by one. The negotiation of the connection is time-consuming and since it is done
two times both for the data Connection and for the control connection, this makes it
expensive if a user is to transfer a large number of small files. [14]
A password is used to send and receive files and transfer without encrypting it in FTP.
What happens when a user, for example, wants to open a file on the terminal server
and the graphics is sent to another user who thus is able to read and work with it? This
is unlike other telecommuting solutions where the files are sent from a server to a cli-
ent, often over the Internet. The file might become corrupted or stolen. Nowadays re-
placing FTP by SCP or secure copy can be optional since SCP is considered as easier
than SFTP or FTP. [14]
A third way to allow users to work from home is to establish a VPN tunnel. In this case
we can work from outside environment in the same way as we would in an office and it
can be connected directly to the branch network. Implementing a VPN solution requires
a VPN gateway, which is a device that helps authenticate users, encrypt outgoing traf-
fic and decrypt incoming traffic. A VPN gateway can be used as a corporate firewall, a
user-friendly; easy to administer and secure solution. This can be created with re-
sources that we have in the school testing laboratory. [6]
4
CIA is a model which takes into account different controlling methods; it can be physi-
cal control, technically controlling or human action. The name CIA is formed by taking
the first letter of Confidentiality, integrity and availability. Confidentiality, integrity and
availability are used as a benchmark in security model. Confidentiality is a method of
protecting data from those who do not have access it, whereas; integrity securely
keeps the originality of the data. Sometimes unauthorized viewers do not have access
for data because of security attacks, while availability makes sure that the data will be
available for authorized viewers. [1]
The CIA method can be applied in different ways, which solely revolve around the three
policies. Cryptography is one form of transferring data which controls access by en-
crypting and decrypting the information. [2] Data integrity can be protected with mech-
anisms such as digital signatures and hash algorithms. Redundant network architec-
tures and systems hardware design help us insure the availability of data. The security
of a company should be well coordinated taking all the three models into consideration.
Taking one of the three models seriously and forgetting the other might cost companies
a lot of loss [5].
The peer-to-peer model means that the routing is controlled by the provider. These
models allow separate private networks to merge, so that a single VPN network can
belong to the same network alone. The VPN technology is a very important part of the
modern network infrastructure, as companies, communities and networks are com-
bined in such a way that the separate networks appear to be in the same internal net-
work. [8]
The basic motivation for using VPN is the need for secured communication. The first
action when using VPN is to launch a VPN client on a computer and log in with the
right credentials and exchange authentic keys with a server. Once both parties have
verified each other’s authenticity, all the data exchange will become encrypted and
secured. [3]
7
Tunnelling means transferring data which uses a network framework to transfer data
for a specific network over another network. Tunnelling encapsulates packets to be
transmitted with an additional header and delivers it through a tunnel. Tunnelling mainly
includes three steps: transferring data, encapsulation and decapsulation. Figure 3
shows the tunnelling process. Packets or payload will be encapsulated with an extra
header in the beginning and they will be transferred through a tunnel and then decap-
sulated at the end of the tunnel. [10]
Figure 3.Tunneling
There are a number of different protocols to create safe tunnels between two network
connections. One should carefully examine various options before implementing a VPN
solution. Protocols are used to encapsulate and decapsulate the packets. The most
widely used VPN protocols are such as L2TP, IPSec or PPTP. PPTP is a protocol used
by VPN to encapsulate packets over a public switch network. [14, 9]
VPN Protocols
The following are very important VPN protocols that can be used to make a tunnel:
PPTP, L2TP, GRE, IPSec, SSL and SSTP [14.10]
8
PPTP is a protocol that works in the second layer of the Open Systems Interconnection
OSI model, called the data link layer. PPTP is an extension of the Point-to-Point Proto-
col (PPP). The protocol encapsulates PPP packets in the Internet Protocol (IP) pack-
ets. The reason for this to be done is that IP can be routed on the Internet. To explain
this a little more closely, we should know how the PPP protocol operates. [14, 10]
PPP is a network protocol used to manage remote connections from clients to servers
via a dialup or a serial point-to-point connection. A common use of PPP is when a user
as a client establishes a connection to the Internet or Internet Service Provider (ISP)
via a modem. The PPP protocol encapsulates an IP packet into PPP frames resem-
bling the encapsulation of IP in Ethernet frames. Figure 4 shows how a PPTP packet
looks like after encapsulation. These packages can then be used to create a point-to-
point connection between the sending and the receiving computer. [10]
When a client connects to a PPTP server, the following occurs. The client has an IP
packet that wants to send through a private network. This IP packet is encapsulated in
a PPP framework to provide a point-to-point connection to the PPTP server. The PPP
frame will be routed to the correct address on the internet as capsules of IP packets.
Thus the packet leaving the client will look like Generic Routing Protocol (GRE) be-
cause of the tunneling protocol that packs the PPP packet in an IP packet. The PPP
protocol is also responsible for the user authentication. [10]
Authentication methods that can be used are the Password Authentication Protocol
(PAP), Challenge Handshake Authentication Protocol (CHAP) and or EAP Transport
Layer Security, which EAP stands for Extensible Authentication Protocol (EAP-TLS).
9
PPP is the protocol used to encapsulate network layer protocols and send these over
layer 2 point-to-point links. The user with a layer 2 connection to L2TP Access will have
concentrator through one of the many technologies (such as modem connection via the
telephone, ISDN or ADSL) and uses the PPP protocol over these media. In these
cases, layer 2 connection and PPP protocol endpoint are the same, that is, in the LAC
one. LAC is L2TP access concentrator. It is the initiator of the tunnel. [14, 10]
What L2TP does is to allow different endpoints for PPP and layer 2 connections. L2TP
creates a layer 2 connection to an ISP connection point (LAC). This device uses PPP
protocol. Figure 5 shows the structure of an L2TP packet. The access point then sends
PPP packets to L2TP Network Server which lies on the other side of a packet-switched
network such as the Internet or Frame Relay. The output of the solution is going to be
to dial a local layer 2 connection. Then it sends these packets over a cheaper medium
(e.g. the Internet) to the recipient's LNS device. This makes it considerably cheaper.
LNS are L2TP Network Server that waits for new tunnel. [10]
L2TP uses two different types of packets control or data packets. This is the easiest
way to understand how these are used to describe in what way an L2TP connection is
established and used once it is up. It starts with LAC unit it can be LAC client software
or a LAC unit of an ISP. Then it sends a Start-Control-Connection-Request (SCCRQ)
packages to LNS. This message contains host name, protocol version, tunnel ID, op-
portunities and Message Type Attribute Value Pair (AVP, a form of ID value). In addi-
10
tion to these information fields, there are additional fields that are optional. In this mes-
sage the LNS responses with a Start-Control-Connection-Reply (SCCRP) message
indicating the LNS has approved the parameters that were sent with the message
SCCRQ [10]
When these two messages are sent LAC responses with a Start-Control-Connection
Connected (SCCCN) message. When this is received, the L2TP tunnel will reside. A
session can thus be drawn from both the LAC and LNS. The difference between these
is that the LNS makes the call package to include more parameters than if the connec-
tion was established from the LAC. The second step in the establishment of a session
is when the Incoming-Call-Reply (ICRP) and the corresponding Outgoing-Call-Reply
(OCRP) package are sent in response to the requests. Both of these contain the same
data, message type and the allocated session ID. After these messages, follow the
Incoming-Call-Connected (ICCN) or equivalent Outgoing-Call-Connected (OCCN)
packet that tells all parameters have been approved and that the session connection is
now established. In these messages there are only three required fields message type,
connection speed and inramnings type. [10]
The messages are all sent over a separate channel in the tunnel and used to set up
and maintain the tunnel with the various sessions. For each L2TP tunnel there is a con-
trol channel and one or more sessions. Between the LAC and LNS more L2TP tunnels
can be setup. Both the LAC and LNS must have a sequence number table where they
keep track of which packets they receive and thus can see if any packages not arrive
and then request a retransmission of the lost packet. [10]
As we can see from figure 6, when the router receives a packet for tunnelling, a routing
decision will be made. It transfers it to the tunnel interface. The packet then will have a
new IP and GRE header in the tunnel interface. Then the tunnelling interface encapsu-
lates the packet. The second routing decision is to decide the departing interface based
on the headers. Then finally the packet will be delivered to the relevant interface. [15]
11
IP Security is a standard protocol that works with the IP protocol. It is built with different
capabilities and protocols. A mass of RFCs defines how it should look like, how it
needs to be implemented and how to use it. RFCs are a collection of documents dis-
covered by different Internet engineering task forces or IETF and the internet communi-
ty. RFCs clearly and in detail describe each protocol an IPSec uses and gives IPSec
specifications. For example, IPSec, specified in RFC 4301, creates a boundary be-
tween protected and unprotected parts of the network. Packets passing through this
border are treated differently. The packages, depending on the IPSec are configured,
can pass unhindered, discarded or be treated with various services. A big advantage of
IPSec is that it works at the network layer and works with both IPv4 and IPv6, which
means that all existing applications can take advantage of IPSec without modification.
[10]
Ipsec differs from traditional applications such as SSH, which operates at the applica-
tion layer. IPSec has been developed to increase the security of IP communications.
IPSec can be used in a point to point connection between two computers to make
communications secure. IPSec can also provide secure communications between a
connecting client and VPN server. IPSec is not a protocol but rather a protocol suite
12
that works with several protocols to perform their goals confidentiality, with integrity and
authentication. [10.10]
The point I need to make clear is that, IPSec tunnels help only to secure unicast traffic
but cannot be used to secure multicast or broadcast packets.
Secure Sockets Layer protocol uses public and private keys to encrypt data and pro-
vide security. The HTTP protocol encrypts data and no software will be needed on the
client side with since users will have a restricted access. It has a wide use in e-
commerce and helps to securely make transactions online. [6; 7]
There are two phases in this protocol the first phase is exchanging key and the second
phase is data transfer.
A VPN protocol used to provide security for transmission of PPP and L2TP traffic. It
allows traffic to pass through SSL 3.0 channels that allows transmission and data en-
cryption. A TCP connection will be set up between the SSTP client and TCP port 443
on the SSTP server. Then the SSL session will be created and the client will receive a
certificate from the server. The SSTP client generates the SSL session key and uses it
to encrypt with the received certificate. The server after receiving the data decrypts
SSL session key by using a private key of its own certificate. [10, 10]
13
Before we go deeper into this security protocol IPSec, we should first understand the
two different modes that IPSec can run in namely tunnel mode and transport mode. To
understand the differences between these, we should first know what an IP packet
looks like. Figure 7 demonstrates an IP packets structure. [10, 17]
When the transport mode is changed only the IP header is intact. This works when the
receiver and transmitter are endpoints of the data exchange. To mention some exam-
ples, when two computers directly talk to each other, only one of these knows the
other's address. Figure 8 shows what an IPSec packet looks like in the transport mode.
[10, 17]
In the tunnel mode the entire original packet will be encapsulated to form a new pack-
age and a new IP head. The tunnel mode is used in site-to-site solutions where two
VPN gateways are talking directly to each other. These usually have static IP address-
es. Below in Figure 9 we can see how IPSec packets will look like in a tunnel fashion.
[10.17]
The main purpose of IPSec is to provide security to ordinary IP packets. Services such
as IPSec use provide in order to make communication more secure include data integ-
rity, authentication, and protection against replay attacks and data encryption. In order
to offer these services IPSec uses two different protocols, namely the Authentication
Header (AH) which is specified in RFC 4302 and Encapsulating Security Payload
(ESP), specified in RFC 4303rd .AH provides integrity, authentication, and replay pro-
tection. ESP provides integrity, authentication, replay protection and reliability. [10, 17]
A major difference between AH and ESP is that AH can authenticate parts of the IP
header while ESP can only authenticate the data. AH and ESP implements a variety of
cryptographic algorithms to provide the various services. To ensure interoperability
between different implementations of IPSec, RFC 4305 specifies a set of algorithms
which are mandatory to implement. These algorithms are specified in the IPSec to
leave room for future changes. [4]
This IPSec protocol allows a digital signing of the IP header of each packet included in
the IPSec transfer. The receiving computer verifies the signature of each packet
through the use of a session key shared between the parties. If any piece of package
has changed over shipment it will force the host computer to toss the package. By do-
ing this, one can be sure that the IP packet is not changed during transport. It can also
be sure that the sender is a legitimate user because only such a user can sign an IP
packet with a valid session key. [10, 18]
The AH does not encrypt the data payload. By calculating a hash value of the entire IP
packet and sending it to the receiver, integrity will be achieved and this calculation is
called the Integrity Check Value (ICV). The transmitter calculates a hash value of
package using a hash function or Message Authentication Code (MAC). To create in-
tegrity as the transmitter one uses the value in the hash function known only between
the communicating parties. If the ICV field line with receiver estimates the packet it will
be considered to be valid and received. [10, 18]
The hash functions used as IPSec for this purpose are usually the Message-Digest
Algorithm 5 (MD5) and Secure Hash Algorithm 1 (SHA1). It should be mentioned that
recently successful attacks against these protocols have been made and a new stand-
15
ard is being developed. The safer of them is SHA-1. AH also provides protection
against the playback of traffic via a simple counter in the AH header. This calculator
gives each packet a sequence number and throws packets coming into the wrong or-
der. [10, 18]
ESP has the same features as the AH but also makes sure to encrypt the data load.
ESP encrypts and authenticates the entire packet contents through the use of a shared
session key. The receiving computer uses the same session key to decrypt the packet.
The difference between AH and ESP is that ESP can encrypt the payload data. En-
cryption differs somewhat depending on whether one uses the tunnel or transport
mode. During tunneling process it encrypts the original IP address while the new IP
header is left untouched. But while the packet is in transport position it leaves the origi-
nal IP address untouched and the rest of the packet will be encrypted. [10, 18]
The authentication process differs somewhat from the AH. The difference is that ESP is
the hash sum not calculated on the whole package, but only on the part that has to do
with ESP. ESP does not take the outermost IP header in to the calculation of the hash
sum. In ESP, the same hash functions in the AH. The encryption algorithms used are
typically Data Encryption Standard (DES) and Triple DES (TDES). [10.18]
IKE is not really a protocol but a collection of protocol options, including the Internet
Security Association and Key Management (ISAKMP). These protocols are used to
create a secure channel between two communicating parties and to be able to com-
municate securely between two parties using IPSec, among other things, encryption
and authentication. To be able to use encryption and authentication applies when the
parties agree on the methods to be used. Before communication starts safely, they
must exchange a secret session key to authenticate each other make sure the tunnel is
safe. [10, 16]
All the parameters are negotiated between the two parties. IKE is saved in a Security
Association (SA), which in turn are stored on each computer in SA Database (SAD).
16
Each package that is sent between the two devices communicating with the IPSec will
have a value called the Security Parameter Index (SPI). [10, 16]
The Pre-shared key is the same key manually set to both parties involved in the
communication. A hash value is calculated using information from the key and sent to
the counterparty in communication. The other party performs the same calculation with
his key and compares that value with the value given to it by the other party. After the
comparison if the value is true, they share key and communication will continue. The
disadvantage of this method is that since all users who connect using the same pre-
shared key, someone, either of malice or accidentally, reveals the key. [10, 16]
The best way to avoid malicious attack during security negotiation is to encrypt the in-
formation before transmission by using a session key. If someone cracks the key of all
computers in the company and VPN gateway reconfiguring can be a big job in a large
organization. Therefore apply the solution best suited for smaller businesses. In order
to make the password difficult to crack or guess the key should be complex. It is rec-
ommended to make the key at least 8 characters long and varied with lowercase let-
ters, uppercase letters, numbers and special characters. [10, 16]
2.4.2 Certificate
The certificate is the most secure and scalable solution to manage the authentication of
the IPSec. Certificate avoids password management contained in the pre-shared key
variant. Instead, the user services are assigned a certificate by a so-called Certificate
Authority (CA) that acts as a trusted third party. A certificate contains a name, a public
key and a time when the certificate expires. A CA creates the certificate and signs it
with its private key. The private key helps verify the signing access to the CA's public
key, which only legitimate users have the access. [13]
17
The suitable VPN solutions for a company can be selected through the following fac-
tors; the first can be based on the operating systems deployed on the server or client,
the network resources allowed to access, the strength of security needed, performance
issues and administrative overhead. Before we install any security solution we need to
choose the right one .The main criteria to compare different VPN solutions should be
based on; availability, Network security, scalability, quality of service (QOS) and man-
agement. [17]
In this section I am going to compare and contrast and show the main advantages and
disadvantages of some of the main VPN protocols like PPTP, IPSec, SSL, L2TP and
SSTP.
Advantages:
Provides encryption strength of 128-bit.
Promotes nearly all VPN supported operating systems.
It is friendly with all platforms.
The setting is easy and simple.
It is faster because there is no encryption.
There is no terminal authentication.
It is relatively cheap mainly because, it has an easy installation and
does not cost much to use certificates.
It does not require public key infrastructure.
It uses routing and remote access. [17]
Disadvantages:
There is no encryption in this protocol.
The encryption in this protocol begins when the machines have gone
through the authentication step and establish the point-to-point link.
It needs to perform authentication on user level.
18
Advantages:
Provides encryption strength of 256-bit and uses tunnel and transport for
the sake of encrypting.
Relative to PPTP it produces much better encryption. It is believed that it
is a well secured and authentic VPN protocol.
The setup is easy and steady.
Provides a higher level of security.
Uses encryption as well as authentication of machine and user.
Provides data confidentiality and integrity.
Provides high security, requires public key infrastructures.
Uses Routing and Remote access.
Being easy to keep up and better security makes it standard at interna-
tional level.
It came up with out of sight technology and its process never has to be
learned by its users.
In this protocol there is no compatibility question, the main reason is all
the implementations are network layer.
Provides integrity.
Terminal authentication with Md-5, IKE with pre-shared key or digital
certificates.
For a user authentication it uses Digital certificates and mutual authenti-
cation secret passwords.
There is no need for installation of client software. [17]
19
Disadvantages:
More difficult to install and utilize the security certificate.
Greater processing speed is required. [17]
Advantage:
Provides confidentiality and integrity.
Variable and strong encryption.
Good security.
Digital certificates HTTP authentication.
Uses digital certificates for user authentications.
On the client site installing soft ware is not needed.
This protocol protects our online information and since we need no soft-
ware one the client side it reduces the cost. [17]
Disadvantages:
The performance of this protocol is slow since the encrypted files use
most of the resources of the server.
If a user sends his credit card to other user over SSL and if the receiv-
ers’ server is not secured, the personal information of the sender might
get hacked. Hackers might easily break and gate the sender's infor-
mation and such a kind of data crack happens frequently. [17]
Advantage:
Since it provides the most decent encryption, it gives reliable security for
sensitive information and applications.
L2TP uses two layers of encapsulation.
It gives cost effective, efficient and better connection.
20
Disadvantages:
Since it encapsulates the data twice it makes the speed slow.
It uses pre shared keys and miss match between the keys occur some-
times.
This protocol provides a very good security with slow speed .The slow
speed is because of the usage of CPU in the encryption process .[17]
Advantage:
It is meant for remote customer accesses.
It uses SSL with the addition of data encryptions and data transmis-
sions.
It is considered as the most reliable protocol because it makes use of
SSL plus authentication certificates and 2048-bit for encryptions.
It makes sure that the data is always secured. [17]
Disadvantages:
It is only compatible with window 7 or recent version.
The data transmition speed is very slow relative to other VPN protocols.
[17]
21
Table 4 summarizes the advantages of some of the selected VPN solutions. It covers
the assessments based on speed, integrity, confidentially, encryption and stability.
4.1 Methodology
For testing I used two methods. The first is Cisco configuration professional and the
second is command line interface. I prepared a topology and configured the VPNs
based on it.
CCP (Cisco configuration professional) is a tool that helps to secure a network. It uses
protocols like Secure Shell and HTTP which makes it more secure. Cisco configuration
professional is used only on Cisco products. The first thing to do before using CCP is
creating a community and adding the routers. The community is a group of selected
devices with a maximum capability of 10 devices. We are required to enter the IP ad-
dress, host name and every credential of the router to add it to the community.
I chose to use both Cisco configuration professional and command line. Cisco configu-
ration professional is easy to manipulate and we can use it for almost all VPNs. It also
helps during configuration.
22
In this network-based testing, I used the topology in figure 10. I took an imaginary
company which used to have only one main office and after a couple of years they
planned to expand their primary market. The company decided to open a remote
branch office a few kilometers away from their main office. The branch office will be
considerably smaller than the main office in this network topology. As shown below in
figure 10 I used packet tracer to make the topology .The main objective was to connect
the workers from R3 safely to the main office. The R3 needs to get an access to the
main office services. In order to implement this I used Site-to-site, IPSec and SSL
VPN on the main office.
Based on the above topology I configured the basic router configuration, as shown in
Appendix 1.
23
From R3 I stared the CCP on Employee 2 and entered our Remote branch office cre-
dentials. The next step was discovering the server and connecting R3. Figure 11
shows the remote office branch and illustrates now that the router is in the community
and it is discovered.
24
The site-to-site is also known as router-to-router VPN connection which is used to set a
network connection in different offices of a company by using a common medium to
securely transfer data. It is the exchange of packets between two routers in a different
network through VPN connections. It is used to connect parts of two private networks.
The first task was building a site-to-site VPN tunnel between the main office and a re-
mote access router which passes through R2. To set up the IPSec VPN I needed to
configure R1 and R3 using Cisco IOS and CCP. [9]
To set IPSec between these two routers, there are two main areas to configure;
Configuring the Internet Key Exchange (IKE)
Configuring IPSec parameters
An IPSec VPN negotiation steps below shows how a negotiation takes place to ex-
change information;
1. Employee 1 sends interesting traffic to employee 2
2. Then R1 and R3 will negotiate in an IKE phase 1
3. R1 and R3 will negotiate in an IKE phase 2
25
The main steps used to configure a site-to-site VPN and the pictures are shown and
explained below.
The first step is in order to start configuration is opening the VPN wizard and selecting
the step-by-step wizard. The step-by-step wizard is quick to set up and provides default
configuration. Figure 12 shows that I choose the step-by-step to continue the configura-
tion.
In the second step as shown in figure 13 I was required to enter the credentials in the
required spaces. It is also required to select the right interface for the VPN connection.
Here, serial 0/0/0 was selected. In the next section I selected the peer with static IP
address and provided the remote office IP. Then in the authentication section it is re-
quired to enter the pre shared keys.
26
As shown in figure 14 in the IKE proposal page I added the proposal that defined the
algorithms and the methods for key exchange. The algorithms are encryption, authenti-
cation and key exchange methods. The values need to be the same with the values in
the remote office router (R3).
The Transform set is an IPSec policy which we can use for encryption, hash, and au-
thentication data. In this section and in figure 15 the details about the transform set are
given. They are integrity and encryption algorithms. Here the algorithms can be manip-
ulated to secure the information passing through the VPN tunnel. We can add any in-
formation and the number of required transform set.
The next step is summarizing what I did as shown in figure 16. We do not need to
check VPN connectivity before we create a mirror image on our R3 to finish and move
to the next page.
28
After reviewing the configuration the next window is delivering the configuration. In fig-
ure 17 I checked in the save running button and pressed the deliver button to complete
the work.
After I completed the delivering the screen comes with command delivery status. Fig-
ure 18 shows the summary and delivery status.
29
As shown below in figure 19 the tunnel was still dawn. To make the tunnel up I was
required to create a mirror configuration on R3.
To test the connectivity of the VPN I started troubleshooting. As shown in figure 21, the
router starts debugging which generates traffic in the tunnel. Then it requests to enter
the destination IP which is 192.168.3.1 to begin the debug.
31
The above debugging continues and it was a success that means the required tunnel is
up. As shown in figure 22 the tunnel was successful and up.
The following commands were configured on the main office router or R1 and remote
office R3; [3]
Crypto isakmp enable
32
For IPSec to function we need to enable IKE. Listing 4 makes IKE enable. Though it is
enabled automatically, sometimes it might be disabled for some reason.
R1 (config) #crypto isakmp enable
R3 (config) #crypto isakmp enable
Configuration of pre-shared keys is the next step shown in listing 6 and they are very
important as they are used to authenticate in the IKE policy; [3]
The other basic configuration shown in listing 7 is IPsec transform set which is used by
the routers to negotiate and form a secured tunnel. It also specifies the cryptographic
algorithms and functions which help routers. [3]
33
The next important step shows listing 8 which is encryption of traffic going from main
office to R3.I extended the access list to be encrypted so that they are not going to be
dropped if they are included in the access list. If there is no access list IP sec will not
be able to form interaction with the two routers. [3]
A crypto map is used to match an access list to the areas and most IKE and IPSec
settings and listing 9 shows the configuration for crypto map.
R1 (config) #crypto map CMAP 10 IPsec-isakmpf
R1 (config-crypto-map) #match address 101
R1 (config-crypto-map) #set peer 10.2.2.1
R1 (config-crypto-map) #set pfs group5
R1 (config-crypto-map) #set transform-set 50
R1 (config-crypto-map) #set security-association lifetime se-
conds 900
R1 (config-crypto-map) #exit
34
Ipsec VPN secures a network by encrypting data. It can be either between a mobile
user and a company or a remote user to a company through an internet provider. [9] I
used SDM for this remote access IPSec VPN and the main steps were to configure a
zoned-based firewall and the VPN client on a host. Configuring the VPN client on the
host helps to set an end-to-end connection plus encrypted (IPSEC) VPN tunnels for
users. Router R3 is the remote site, and R1 is the main office. Employee 2 represents
an employee who wants to access the resources of the company; it could be from
home or another location. Router R2 has no knowledge of the VPN connection passing
through it and it also represents an Internet ISP router. R1 (main office) is configured
as a VPN server and Employee 2 is configured as a Cisco VPN Client. [16]
The main steps used to configure Remote Access IPSec VPN are shown below and in
figure 23. The detail of each step of the configuration is shown in Appendix 6;
The configuration in figure 23 below shows enabling of http server on the main office
router R1.
Hyper text transfer protocol (HTTP) is used to enable the HTTP server on the system.
Some of the basic steps are listed below:
Easy VPN Server: used to set IPSec Client VPN and we configure AAA ser-
vices first. Then defining local interface and authentication. Setting IKE pro-
posals and Configuring transform set is very important part of the configuration
since it specifies the policies and algorithms used in the tunnel.
I selected a server for group policy lookup and enabled user authentication be-
cause whoever wants to access the server needs to authenticate and added
user accounts.
It is required to add at least one pool which will have the authorization and user
group policies.
36
This VPN is used with a standard web browser. It needs to have a client software on
users computer.SSL VPN is very important for tasks like file sharing, remote backup
and remote system management. I was required to configure SSL on router R1 only
.The major steps used are illustrated and every step of Cisco configuration professional
is shown on Appendix 8. After selecting the SSL VPN manager, shown in figure 24 the
first step was configuring the IP address and choosing the digital certificate. The IP
address required helps to access the VPN and the certificates will help the authentica-
tion process.
The very important step in this configuration is checking the summarization. It covers
all the work we have done so far and figure 26 shows that the tunnel is up.
The result was very satisfactory and this is the important step in this configuration. It
summarized all the work we have done so far and now the tunnel is up.
4.4 Testing
In the testing section the above result is going to be assessed. The results obtained
during the configurations above are also included here.
38
The result below in figure 27 shows the application of crypto map to the R3 S0/0/1 in-
terface and the output of the command show crypto isakmp policy. The show crypto
isakmp policy command displays the policies configured on the router. It is needed to
give crypto map set to the interface serial 0/0/1 since the traffic passes through it. The
assigning of crypto map set to the serial 0/0/1 helps to manage all the traffic and identi-
fy the traffic against the crypto map set.
“Assigning a crypto map to an interface also initializes run-time data structures, such as
the SA database and the security policy database. Reassigning a modified crypto map
to the interface resynchronizes the run-time data structures with the crypto map config-
uration. Also, adding new peers through the use of new sequence numbers and reas-
signing the crypto map does not tear down existing connections.”[18]
The output below in figure 28 verifies the configuration made on both routers and the
commands I used to display the results are; show crypto isakmp policy, show crypto
ipsec transform-set and show crypto map. Show crypto ipsec transform-set shows the
configured transform sets. Figure 28 below it displays the algorithms used on the data
passing through the tunnel. Show crypto map shows the crypto map configurations.
39
The show crypto isakmp policy shows two polices as shown. Figure 28 shows the re-
sult in which the first one is the one I configured and the other is a default configuration.
Figure 28.Result from the commands Crypto map and show crypto isakmp policy and
transform set.
The result displayed above is from the commands show crypto map, show isakmp poli-
cy and show crypto ipsec transform set.
The SA is set up and as we can see in the figure 29 below packets are passing through
the tunnel encrypted. The tunnel originates from the source 10.1.1.1 and ends at
10.2.2.1
Figure 29.The result from the command Show run int s0/0/1
40
I continued pinging from R1 and run the command sh crypto ipsec SA as shown in fig-
ure 30 and the result was 29 packets transformed between the two routers.
The following result in figure 31 shows testing of VPN using CCP. If the debugging is
successful it means the tunnel is up. The screen shot below shows the result. The out-
put shows the debug was successful and the tunnel is up.
41
The output in figure 32 demonstrates the debug was successful as shown below and
proves that the tunnel was up.
In order to check the connectivity we need to have VPN client software on the client
side R3. Figure 34 shows how the client software window looks to begin checking a
new connection.
43
Figure 35 below shows the newly connected R1 and it is required to use a user name
and password to have the access. We used the right credentials to get in to the server
in this step. The user names and passwords are the one used in the above steps.
Figure 36 shows that the client was connected with main server. The connection was
successful and the tunnel was up.
44
The window in figure 37 below analysis data related to the created tunnel above. It
shows that our servers IP address is 10.1.1.1 .We can get information like encryption
and authentication algorithm used, the number of packets encrypted, decrypted, dis-
carded and bypassed.
The following figure 38 shows the telnet from the clients’ cmd. The user admin defined
on the configuration was with the higher level that means privilege 15. This makes the
prompt as shown on the figure privilege mode R1#.
45
Since the VPN connection from the client R3 to the main office is working, the ping
both ways should work. The result on figure 39 below shows a ping from cmd line of R3
to 192.168.1.1 and it was successful.
To test our configuration of SSL I used a web and browsed from the user computer .I
launched a web and put the IP address with http://10.1.1.1/ .The windows in the com-
ing windows display the other coming steps. Figure 41 shows successful ping to the
main office.
47
Figure 42 displays the connection made through the web using http://10.1.1.1/ above.
The window displays SSL VPN service requesting the user name and password. The
user name I used was adminrodi and password adminrodi123.
Figure 43 shows the login page and the credentials used for authentication using a
user name adminrodi and password adminrodi123.
48
The window in figure 44 displays the login was successful. The employee from the re-
mote office can now access resources of the main office.
5 Conclusions
Currently, companies and network administrators make it a priority to secure their re-
sources and assets by implementing security measures before they offer network-
based services. To satisfy this security need, companies have to find the right security
solution. When I started the thesis the aim was to create as safe, easily administered
and user-friendly a VPN solution as possible. Regarding this, I achieved this objective
and learned a great deal about different VPN solutions. Above all, it has been a valua-
ble experience to implement what I have learned practically in the laboratory. The re-
sults of the tests were successful and secured to protect the simulated company.
The biggest problems of the current solution are network address translation (NAT)
problem and the use of a pre-shared key. Any person with the key can use it as a VPN
gateway and other users will have to know the pre-shared key which makes it less se-
cured. NAT is responsible for changing the IP of the internal device to that of NAT de-
vice or IKE packet. IKE changes the senders IP address in the packet, and when this
new address does not match the original address of the IKE packet, then it will be
dropped.
A network security attack is unpredictable. It might occur at any given time and in any
location. Therefore, building a reliable security layer on a network system is vital to
protect the company from avoidable losses. However, this requires money and time but
the benefits outweigh its costs significantly. I conclude that protection of a company’s
network assets needs a clear security policy that anticipates the types of risks that exit
and defend the network. This plan should also describe the measures that need to be
taken to stop these losses. The security system should also be monitored constantly to
identify inside or outside threats and attacks targeting the company’s resources.
I hope and believe that there is a basis for future improvement of this system and with
the solutions for authentication and security. The protection of data in terms of confi-
dentiality, availability and integrity needs to be the focal point for future studies and
projects.
50
References
1 Yusuf Bhaiji .Chapter 1: Overview of Network Security. USA: Cisco Press; Jul 25,
2008.
URL: http://www.networkworld.com/article/2274081/lan-wan/chapter-1--overview-
of-network security.html
Accessed December 10, 2014.
3 Cisco. CCNA security, CCNA Security 640-553 Official course .USA: Cisco
press; 2010.
4 Cisco .CCNA security v1.0, Chapter 8.1 Implementing Virtual Private Networks
.USA: Ciscopress; April 9, 2009.
7 Jazib Frahim, Qiang Huan. SSL Remote Access VPN. USA: Cisco Press; June
2008, ISBN: 978-1-58705-242-2, 1-58705-242-3.
10 Adnan Ahmed Khan, Hassan Zahur. Secure VPN solution in a converged net-
work For Phoniro Systems, AB., an emerging SME. Sweden: September 12,
2012.
URL: http://www.diva-portal.org/smash/get/diva2:559332/FULLTEXT02.pdf.
Accessed January 18, 2015.
11 Simon Baron-Cohen. How is the internet changing the way you think? ;2015
51
URL: https://edge.org/responses/how-is-the-internet-changing-the-way-you-think.
Accessed February 20, 2015.
R1#sh running-config
Building configuration...
exec-timeout 0 0
login
logging synchronous
!
line aux 0
!
line vty 0 4
password ciscovtypass
exec-timeout 0 0
login
!
End
R2#sh running-config
Building configuration...
Current configuration: 901 bytes
!
Version 12.4
no service timestamps log datetime msec
no service timestamps debug datetime msec
no service password-encryption
!
hostname R2
!
no ip cef
no ipv6 cef
!
no ip domain-lookup
!
spanning-tree mode pvst
!
interface FastEthernet0/0
no ip address
duplex auto
speed auto
shutdown
!
interface FastEthernet0/1
no ip address
duplex auto
speed auto
shutdown
!
interface Serial0/0/0
ip address 10.1.1.2 255.255.255.252
clock rate 2000000
!
interface Serial0/0/1
ip address 10.2.2.2 255.255.255.252
clock rate 64000
!
interface Vlan1
no ip address
shutdown
!
security passwords min-length 10
!
router eigrp 101
network 10.1.1.0 0.0.0.3
network 10.2.2.0 0.0.0.3
no auto-summary
!
Appendix 1
3 (4)
ip classless
ip route 192.168.1.0 255.255.255.0 10.1.1.1
ip route 192.168.3.0 255.255.255.0 10.2.2.1
!
ip flow-export version 9
!
service password-encryption
!
no cdp run
!
line con 0
password ciscoconpass
exec-timeout 0 0
login
logging synchronous
!
line aux 0
!
line vty 0 4
password ciscovtypass
exec-timeout 0 0
login
!
end
copy running-config startup-config
R3#sh running-config
Building configuration...
interface Vlan1
no ip address
shutdown
!
router eigrp 101
network 192.168.3.0
network 10.2.2.0 0.0.0.3
no auto-summary
!
ip classless
ip route 0.0.0.0 0.0.0.0 10.2.2.2
!
ip flow-export version 9
!
security passwords min-length 10
!
no cdp run
!
service password-encryption
!
line con 0
password ciscoconpass
exec-timeout 0 0
login
logging synchronous
line aux 0
!
line vty 0 4
password ciscovtypass
exec-timeout 0 0
login
end
copy running-config startup-config
Appendix 2
1 (1)
hostname R1
!
boot-start-marker
boot-end-marker
!
security passwords min-length 10
no logging buffered
!
no aaa new-model
!
memory-size iomem 5
!
dot11 syslog
ip source-route
!
no ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
voice-card 0
!
crypto pki token default removal timeout 0
!
crypto pki trustpoint TP-self-signed-493412598
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-493412598
revocation-check none
rsakeypair TP-self-signed-493412598
!
crypto pki certificate chain TP-self-signed-493412598
certificate self-signed 01
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 34393334 31323539 38301E17 0D313530 33323330 38333435
375A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3439 33343132
35393830 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
B19C1DA5 BFC4EB47 8D76F52F A7894E66 75EF0268 C4196A59 68B3638D 359929A7
1CF52618 B5ECA88D 8B39C1DF BAABBD55 5B76FB34 CC2B7188 8FA9B4CE 2C90BCAF
1E89E913 212A7AEF AEE3E93F 67E6AE80 EC006319 E26F68F6 360BA1F1 035D605C
8609FA39 9E6F0E89 FC98DE3C A3277C29 A5903632 82311E28 9E722629 9C9E057B
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 168014EC 49E56CFC F45FF7C7 7CDC70CB 5FD45831 C34C9230 1D060355
1D0E0416 0414EC49 E56CFCF4 5FF7C77C DC70CB5F D45831C3 4C92300D 06092A86
4886F70D 01010505 00038181 00585A8F F4B96DC9 3C8D4062 B20F1CCF 56561A29
D5BB32EE 3ED2067E 2F3038DD 42B086E7 D11CC8DF B39D93A6 3E7594DA CE4EE799
D4F8B515 4D25724F 87945937 8E953624 36332FBB A01AFA1D 61C3BB2E FFE3255B
5F3DB1B2 6CB42351 C0C86344 0A9E1664 9D9C26A2 1AEBA7BF 95882D34 2A4AADA7
6F98162F 36975632 26A9EDE0 52
quit
!
license udi pid CISCO2811 sn FCZ133770S6
vtp domain TSHOOT
vtp mode transparent
username admin privilege 15 secret 5 $1$7ALU$KDmFkuHu86Tin7prH86141
!
redundancy
!
crypto isakmp policy 1
Appendix 3
1(3)
encr 3des
authentication pre-share
group 2
!
crypto isakmp policy 10
encr aes 256
hash md5
authentication pre-share
group 5
crypto isakmp key cisco12345 address 10.2.2.1
!
crypto ipsec transform-set RODOYAThesis esp-aes 256 esp-sha-hmac
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
description Tunnel to10.2.2.1
set peer 10.2.2.1
set transform-set RODOYAThesis
match address 100
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.1.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
ip address 10.1.1.1 255.255.255.252
no fair-queue
clock rate 2000000
crypto map SDM_CMAP_1
!
interface Serial0/0/1
no ip address
shutdown
clock rate 2000000
!
router eigrp 101
network 10.1.1.0 0.0.0.3
network 192.168.1.0
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
ip flow-export version 9
!
ip route 0.0.0.0 0.0.0.0 10.1.1.2
!
access-list 100 remark CCP_ACL Category=4
access-list 100 remark IPSec Rule
access-list 100 permit ip 192.168.1.0 0.0.0.255 192.168.3.0 0.0.0.255
no cdp run
!
control-plane
!
mgcp profile default
!
line con 0
exec-timeout 0 0
Appendix 3
1(3)
password 7 05080F1C22434D061715160118
logging synchronous
login
line aux 0
line vty 0 4
exec-timeout 0 0
password 7 00071A1507541D1216314D5D1A
login
transport input all
!
scheduler allocate 20000 1000
end
Appendix 3
1(3)
hostname R3
!
boot-start-marker
boot-end-marker
!
security passwords min-length 10
!
no aaa new-model
!
memory-size iomem 5
!
dot11 syslog
ip source-route
!
no ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
voice-card 0
!
crypto pki token default removal timeout 0
!
crypto pki trustpoint TP-self-signed-1429020141
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1429020141
revocation-check none
rsakeypair TP-self-signed-1429020141
!
crypto pki certificate chain TP-self-signed-1429020141
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31343239 30323031 3431301E 170D3135 30333233 31303037
30315A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 34323930
32303134 3130819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100A467 4D4901D7 E1AE6D4D 746EE101 BF62F577 4188F308 E5245F70 9D3E9B6A
B955DE68 BAF488B5 B4F16BC6 44122C3E EE1B7782 12F7FC52 07339688 B73BD6B7
CB5D0A0A 524035F3 73C347AC E7B9E3BD 503E6256 FBB6E585 D54C791E C5F1A89F
B08D0CA7 497DFCA5 93AF96CC 76025D24 631A242B DCDF4E1B BF20D3AC DA8626D4
B41B0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 1466B5A7 13E2D202 AE857978 55E21914 76C82581 59301D06
03551D0E 04160414 66B5A713 E2D202AE 85797855 E2191476 C8258159 300D0609
2A864886 F70D0101 05050003 8181004E F4BD70AA A6410BF1 482949B3 B1350DD3
2781908B 5E21D2A6 74F1F23A 3B21C9FD C78943BF 13F9432A C587A1FF D46208DB
ACB8B958 AC08BB24 73186F93 D26B588A 68C13753 C3F2AB93 FF9DD811 4E430BC6
EA7E1D3D 4A631968 FF70C6CF 0C90682A 7925EBBB 17E5FA06 59AA9877 51492D51
9CF3F813 FB454EEF 19053308 C70440
quit
!
license udi pid CISCO2811 sn FCZ133770RU
username admin privilege 15 secret 5 $1$hzqJ$Rk3irZD3SJwCPpRd0hPep0
!
redundancy
!
crypto isakmp policy 1
encr 3des
authentication pre-share
group 2
Appendix 3
1(3)
!
crypto isakmp policy 10
encr aes 256
hash md5
authentication pre-share
group 5
crypto isakmp key cisco12345 address 10.1.1.1
!
crypto ipsec transform-set RODOYAThesis esp-aes 256 esp-sha-hmac
!
crypto map SDM_CMAP_1 1 ipsec-isakmp
description Apply the crypto map on the peer router's interface having IP
address 10.2.2.1 that connects to this router.
set peer 10.1.1.1
set transform-set RODOYAThesis
match address SDM_1
!
interface FastEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface FastEthernet0/1
ip address 192.168.3.1 255.255.255.0
duplex auto
speed auto
!
interface Serial0/0/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/0/1
ip address 10.2.2.1 255.255.255.252
crypto map SDM_CMAP_1
!
interface Serial0/1/0
no ip address
shutdown
clock rate 2000000
!
interface Serial0/1/1
no ip address
shutdown
clock rate 2000000
!
router eigrp 101
network 10.2.2.0 0.0.0.3
network 192.168.3.0
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
ip flow-export version 9
!
ip route 0.0.0.0 0.0.0.0 10.2.2.2
!
ip access-list extended SDM_1
remark CCP_ACL Category=4
remark IPSec Rule
permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
!
Appendix 3
1(3)
no cdp run
!
control-plane
!
mgcp profile default
!
line con 0
exec-timeout 0 0
password 7 121A0C0411040F0B243B253B20
logging synchronous
login
line aux 0
line vty 0 4
exec-timeout 0 0
password 7 02050D4808091935555E080A16
login
transport input all
!
scheduler allocate 20000 1000
end
Appendix 3
1(3)
hostname R1
!
boot-start-marker
boot-end-marker
!
security passwords min-length 10
!
aaa new-model
!
aaa authentication login default local
aaa authentication login ciscocp_vpn_xauth_ml_1 local
aaa authorization exec default local
aaa authorization network ciscocp_vpn_group_ml_1 local
!
aaa session-id common
!
memory-size iomem 5
!
dot11 syslog
ip source-route
!
no ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
voice-card 0
!
crypto pki token default removal timeout 0
!
crypto pki trustpoint TP-self-signed-493412598
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-493412598
revocation-check none
rsakeypair TP-self-signed-493412598
!
crypto pki certificate chain TP-self-signed-493412598
certificate self-signed 01
30820229 30820192 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
30312E30 2C060355 04031325 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 34393334 31323539 38301E17 0D313530 33323331 31323135
335A170D 32303031 30313030 30303030 5A303031 2E302C06 03550403 1325494F
532D5365 6C662D53 69676E65 642D4365 72746966 69636174 652D3439 33343132
35393830 819F300D 06092A86 4886F70D 01010105 0003818D 00308189 02818100
A2C43988 1E85B10D 604B6F7D 7A5FCC9F 809F3E31 1D04AD0B 4C5FEAF4 6C2092A2
A6D238EF 987C0E29 53EBF66F ADA6FBE9 E87FA979 62E35533 F5A47163 FACBECDF
503BA730 90B920B3 222AF8FA B3455035 A5370B84 DE710DAE A3BD2687 B51F1A7A
328E23BE 3D2D1230 98F1D10F 3C09690C 0930E363 58F81686 A0A379EF 6DA8465F
02030100 01A35330 51300F06 03551D13 0101FF04 05300301 01FF301F 0603551D
23041830 168014FF 3DF0CDAD E1A4E18C 9234DACF 4C92CBE4 C3066930 1D060355
1D0E0416 0414FF3D F0CDADE1 A4E18C92 34DACF4C 92CBE4C3 0669300D 06092A86
4886F70D 01010505 00038181 00872FA9 5BD1F257 D4C4ACDC 90F54149 85DF0C7B
0692D1D3 C7779751 6C506805 7EF738A0 810D916F 4701DDAC 9A65656D BD3A2264
F4558DF0 64AB58EF BDF9E372 293C7365 FE1517FF DE1D23F5 E3DCB1C6 5C51A4F8
0A74F057 763CF02E EF6816F3 CAE5E726 F0C5C4B2 D9F2B38A DE73CFCC AA22ED04
0DEEC29E 90F6F138 25DCE23C C9
quit
!
license udi pid CISCO2811 sn FCZ133770S6
vtp domain TSHOOT
Appendix 3
1(3)
inspect
class type inspect ccp-sip-inspect
inspect
class type inspect ccp-h323-inspect
inspect
class type inspect ccp-h323annexe-inspect
inspect
class type inspect ccp-h225ras-inspect
inspect
class type inspect ccp-h323nxg-inspect
inspect
class type inspect ccp-skinny-inspect
inspect
class class-default
pass
policy-map type inspect ccp-inspect
class type inspect ccp-invalid-src
drop log
class type inspect ccp-protocol-http
inspect
class type inspect ccp-insp-traffic
inspect
class type inspect ccp-sip-inspect
inspect
class type inspect ccp-h323-inspect
inspect
class type inspect ccp-h323annexe-inspect
inspect
class type inspect ccp-h225ras-inspect
inspect
class type inspect ccp-h323nxg-inspect
inspect
class type inspect ccp-skinny-inspect
inspect
class class-default
drop
policy-map type inspect ccp-permit
class type inspect SDM_EASY_VPN_SERVER_PT
pass
class type inspect ccp-sip-inspect
inspect
class type inspect ccp-h323-inspect
inspect
class type inspect ccp-h323annexe-inspect
inspect
class type inspect ccp-h225ras-inspect
inspect
class type inspect ccp-h323nxg-inspect
inspect
class type inspect ccp-skinny-inspect
inspect
class class-default
drop
policy-map type inspect sdm-permit-ip
class type inspect SDM_IP
pass
class class-default
drop log
!
zone security in-zone
zone security out-zone
zone security ezvpn-zone
zone-pair security ccp-zp-self-out source self destination out-zone
service-policy type inspect ccp-permit-icmpreply
zone-pair security ccp-zp-in-out source in-zone destination out-zone
Appendix 3
1(3)
Step 1: configuring a zone based fire wall on the main office router R1
Step 2: I choose the basic fire wall wizard and went to the next step
Step 3: on the next step I choose to check the fast Ethernet 0/1 for inside and outside for the serial 0/0/0
Appendix 3
1(3)
Step 7: The following screen shows the status for the delivery to the router
Appendix 3
1(3)
Step 8:I have successfully configured fire wall on the main office router
Step 21: shows the final summarization of all the work done
Appendix 3
1(3)
hostname R1
!
boot-start-marker
boot-end-marker
!
security passwords min-length 10
enable password 7 104F0D140C190004080D7B7977
!
aaa new-model
!
aaa authentication login default local
aaa authentication login ciscocp_vpn_xauth_ml_1 local
aaa authorization exec default local
!
aaa session-id common
!
memory-size iomem 5
!
dot11 syslog
ip source-route
!
no ip cef
!
no ip domain lookup
no ipv6 cef
!
multilink bundle-name authenticated
!
voice-card 0
!
crypto pki token default removal timeout 0
!
crypto pki trustpoint test_trustpoint_config_created_for_sdm
subject-name [email protected]
revocation-check crl
!
crypto pki trustpoint R1_Certificate
enrollment selfsigned
serial-number none
ip-address none
revocation-check crl
rsakeypair R1_Certificate_RSAKey 512
!
crypto pki certificate chain test_trustpoint_config_created_for_sdm
crypto pki certificate chain R1_Certificate
certificate self-signed 01
3082016A 30820114 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
13311130 0F06092A 864886F7 0D010902 16025231 301E170D 31353034 32303130
32303435 5A170D32 30303130 31303030 3030305A 30133111 300F0609 2A864886
F70D0109 02160252 31305C30 0D06092A 864886F7 0D010101 0500034B 00304802
41009CEB 6E9321FC 34C658BF 45B7E029 7B65CB91 370D6B76 9DEE4243 B892322E
C27ACE49 8C8723AC 9B542930 1CBA590D 87ED024B 212F472C 38510718 981C3D39
0C5F0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14BDCB2B 823CE7CB F1624DF9 D7A8E43C 03CA10F1 21301D06
03551D0E 04160414 BDCB2B82 3CE7CBF1 624DF9D7 A8E43C03 CA10F121 300D0609
2A864886 F70D0101 05050003 41005C9A D9C4482F C06329E9 A720C23D 4C7E3FF3
2790460F 0F21B95A B8632F87 08B8F211 6577CE9A 82150954 AA3A0EC2 B24E2A74
6403555D 4833CB87 0D275DD2 10FE
quit
!
license udi pid CISCO2811 sn FCZ133770S6
vtp domain TSHOOT
vtp mode transparent
Appendix 3
1(3)
!
webvpn context adminrodi
secondary-color white
title-color #CCCC66
text-color black
ssl authenticate verify all
!
policy group policy_1
virtual-template 1
default-group-policy policy_1
aaa authentication list ciscocp_vpn_xauth_ml_1
gateway gateway_1
max-users 50
inservice
!
end
Appendix 3
1(3)
Step 9: Entering SSL VPN ip address and name for SSL VPN