Cisco 7604 Configuration Guide - Page 527

Configuring Basic Settings for All Tunnels, isakmp, rsa-sig

Page 527 highlights

Chapter 23 Configuring Management Access Allowing a VPN Management Connection The FWSM can support five concurrent IPSec connections, with a maximum of ten concurrent connections divided among all contexts. You can control the number of IPSec sessions allowed per context using resource classes. (See the "Configuring a Class" section on page 4-24.) This section describes the following topics: • Configuring Basic Settings for All Tunnels, page 23-5 • Configuring VPN Client Access, page 23-6 • Configuring a Site-to-Site Tunnel, page 23-8 Configuring Basic Settings for All Tunnels The following steps are required for both VPN client access and for site-to-site tunnels, and include setting the IKE policy (IKE is part of the ISAKMP) and the IPSec transforms. To configure basic settings for all tunnels, perform the following steps: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 To set the IKE encryption algorithm, enter the following command: hostname(config)# isakmp policy priority encryption {des | 3des} The 3des keyword is more secure than des. You can have multiple IKE policies. The FWSM tries each policy in order of the priority until the policy matches the peer policy. The priority can be an integer from 1 to 65,534, with 1 being the highest priority and 65,534 the lowest. Use this same priority number for the following isakmp commands. To set the Diffie-Hellman group used for key exchange, enter the following command: hostname(config)# isakmp policy priority group {1 | 2} Group 1 is 768 bits, and Group 2 is 1024 bits (and therefore more secure). To set the authentication algorithm, enter the following command: hostname(config)# isakmp policy priority hash {md5 | sha} The sha keyword is more secure than md5. To set the IKE authentication method as a shared key, enter the following command: hostname(config)# isakmp policy priority authentication pre-share You can alternatively use certificates instead of a shared key by specifying the rsa-sig option. See the Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command Reference for more information about this method. To enable IKE on the tunnel interface, enter the following command: hostname(config)# isakmp enable interface_name To set the authentication and encryption methods used for IPSec tunnels in a transform set, enter the following command: hostname(config)# crypto ipsec transform-set transform_name [esp-md5-hmac | esp-sha-hmac] {esp-aes-256 | esp-aes-192 | esp-aes | esp-des | esp-3des} Although you can specify authentication alone, or encryption alone, these methods are not secure. You refer to this transform set when you configure the VPN client group or a site-to-site tunnel. OL-20748-01 Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM 23-5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530
  • 531
  • 532
  • 533
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • 547
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • 559
  • 560
  • 561
  • 562
  • 563
  • 564
  • 565
  • 566
  • 567
  • 568
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • 576
  • 577
  • 578
  • 579
  • 580
  • 581
  • 582
  • 583
  • 584
  • 585
  • 586
  • 587
  • 588
  • 589
  • 590
  • 591
  • 592
  • 593
  • 594
  • 595
  • 596
  • 597
  • 598
  • 599
  • 600
  • 601
  • 602
  • 603
  • 604
  • 605
  • 606
  • 607
  • 608
  • 609
  • 610
  • 611
  • 612
  • 613
  • 614
  • 615
  • 616
  • 617
  • 618
  • 619
  • 620
  • 621
  • 622
  • 623
  • 624
  • 625
  • 626
  • 627
  • 628
  • 629
  • 630
  • 631
  • 632
  • 633
  • 634
  • 635
  • 636
  • 637
  • 638
  • 639
  • 640
  • 641
  • 642
  • 643
  • 644
  • 645
  • 646
  • 647
  • 648
  • 649
  • 650
  • 651
  • 652
  • 653
  • 654
  • 655
  • 656
  • 657
  • 658
  • 659
  • 660
  • 661
  • 662
  • 663
  • 664
  • 665
  • 666
  • 667
  • 668
  • 669
  • 670
  • 671
  • 672
  • 673
  • 674
  • 675
  • 676
  • 677
  • 678
  • 679
  • 680
  • 681
  • 682
  • 683
  • 684
  • 685
  • 686
  • 687
  • 688
  • 689
  • 690
  • 691
  • 692
  • 693
  • 694
  • 695
  • 696
  • 697
  • 698
  • 699
  • 700
  • 701
  • 702
  • 703
  • 704
  • 705
  • 706
  • 707
  • 708
  • 709
  • 710
  • 711
  • 712
  • 713
  • 714
  • 715
  • 716
  • 717
  • 718
  • 719
  • 720
  • 721
  • 722
  • 723
  • 724
  • 725
  • 726
  • 727
  • 728
  • 729
  • 730
  • 731
  • 732
  • 733
  • 734
  • 735
  • 736
  • 737
  • 738
  • 739
  • 740
  • 741
  • 742

23-5
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Configuration Guide using ASDM
OL-20748-01
Chapter 23
Configuring Management Access
Allowing a VPN Management Connection
The FWSM can support five concurrent IPSec connections, with a maximum of ten concurrent
connections divided among all contexts. You can control the number of IPSec sessions allowed per
context using resource classes. (See the
“Configuring a Class” section on page 4-24
.)
This section describes the following topics:
Configuring Basic Settings for All Tunnels, page 23-5
Configuring VPN Client Access, page 23-6
Configuring a Site-to-Site Tunnel, page 23-8
Configuring Basic Settings for All Tunnels
The following steps are required for both VPN client access and for site-to-site tunnels, and include
setting the IKE policy (IKE is part of the ISAKMP) and the IPSec transforms.
To configure basic settings for all tunnels, perform the following steps:
Step 1
To set the IKE encryption algorithm, enter the following command:
hostname(config)#
isakmp policy
priority
encryption
{
des
|
3des
}
The
3des
keyword is more secure than
des
.
You can have multiple IKE policies. The FWSM tries each policy in order of the
priority
until the policy
matches the peer policy. The
priority
can be an integer from 1 to 65,534, with 1 being the highest priority
and 65,534 the lowest. Use this same priority number for the following
isakmp
commands.
Step 2
To set the Diffie-Hellman group used for key exchange, enter the following command:
hostname(config)#
isakmp policy
priority
group
{
1
|
2
}
Group 1 is 768 bits, and Group 2 is 1024 bits (and therefore more secure).
Step 3
To set the authentication algorithm, enter the following command:
hostname(config)#
isakmp policy
priority
hash
{
md5
|
sha
}
The
sha
keyword is more secure than
md5
.
Step 4
To set the IKE authentication method as a shared key, enter the following command:
hostname(config)#
isakmp policy
priority
authentication
pre-share
You can alternatively use certificates instead of a shared key by specifying the
rsa-sig
option.
See the
Catalyst 6500 Series Switch and Cisco 7600 Series Router Firewall Services Module Command
Reference
for more information about this method.
Step 5
To enable IKE on the tunnel interface, enter the following command:
hostname(config)#
isakmp enable
interface_name
Step 6
To set the authentication and encryption methods used for IPSec tunnels in a transform set, enter the
following command:
hostname(config)#
crypto ipsec transform-set
transform_name
[
esp-md5-hmac
|
esp-sha-hmac
]
{
esp-aes-256
|
esp-aes-192
|
esp-aes
|
esp-des
|
esp-3des
}
Although you can specify authentication alone, or encryption alone, these methods are not secure.
You refer to this transform set when you configure the VPN client group or a site-to-site tunnel.