SSL & get vpn Comprehensive Lab questions

Source: Internet
Author: User
Tags hmac webvpn rekey

SSL & get vpn Integrated Experiment 1. Network Topology

 

650) this. width = 650; "border =" 0 "alt =" Network Topology "src =" http://www.bkjia.com/uploads/allimg/131227/0SJK0R-0.jpg "/>

2. network requirements

KS establishes a get vpn with Inside1, Inside2, and DMZ2, And the ASA provides an ssl vpn externally.

3. Specific Configuration

KS:

Ip domain name yeslab.net

Crypto key generate rsa modulus 1024 label getvpnkey

Crypto isakmp policy 10
Authentication pre-share
Crypto isakmp key cisco address 10.1.2.1
Crypto isakmp key cisco address 10.1.3.1
Crypto isakmp key cisco address 10.1.4.1
Crypto isakmp key cisco address 10.1.4.10

Crypto ipsec transform-set cisco esp-des esp-md5-hmac

Crypto ipsec profile ipsecprof
Set transform-set cisco

Crypto gdoi group yeslabgroup
Identity number 666888
Server local
Rekey algorithm aes 192
Rekey retransmit 20 number 5
Rekey authentication mypubkey rsa getvpnkey
Rekey transport unicast
Sa ipsec 1
Profile ipsecprof
Match address ipv4 getvpntraffic
Replay time window-size 20
Address ipv4 10.1.1.1

Router ospf 1
Area 0 authentication message-digest
Network 10.1.1.0 0.0.255 area 0

Interface FastEthernet0/0
Ip address 10.1.1.1 255.255.255.0
Ip ospf message-digest-key 1 md5 yeslab123

Ip access-list extended getvpntraffic
Deny udp 10.0.0.0 0.20.255.255 10.0.0.0 0.20.255.255 eq 848
Permit ip 10.0.0.0 0.255.255.255 10.0.0.0 0.255.255.255
 

ASA:

Interface Ethernet0/0
Nameif outside
Security-level 0
Ip address 202.100.1.10 255.255.255.0
Ospf message-digest-key 1 md5 <removed>
!
Interface Ethernet0/1
Nameif DMZ1
Security-level 60
Ip address 10.1.1.10 255.255.255.0
Ospf message-digest-key 1 md5 <removed>
!
Interface Ethernet0/2
Nameif inside
Security-level 100
Ip address 10.1.3.10 255.255.255.0
Ospf message-digest-key 1 md5 <removed>
!
Interface Ethernet0/3
Nameif DMZ2
Security-level 50
Ip address 10.1.2.10 255.255.255.0
Ospf message-digest-key 1 md5 <removed>

Object-group network dmz2
Network-object 10.1.3.0 255.255.255.0
Network-object 10.1.4.0 255.255.255.0
Network-object 10.10.4.0 255.255.255.0
Network-object 10.10.3.0 255.255.255.0
Access-list dmz2 extended permit udp host 10.1.2.1 eq 848 host 10.1.1.1 eq 848
Access-list dmz2 extended permit esp host 10.10.2.1 object-group dmz2

Access-group dmz2 in interface DMZ2

Router ospf 1
Network 10.1.1.0 255.255.255.0 area 0
Network 10.1.2.0 255.255.255.0 area 0
Network 10.1.3.0 255.255.255.0 area 0
Network 202.100.1.0 255.255.255.0 area 0
Area 0 authentication message-digest

Webvpn
Enable outside
Port-forward PF 55555 10.10.2.1 telnet
Group-policy for-localuser internal
Group-policy for-localuser attributes
Banner value welcome yeslab
Webvpn
Port-forward enable PF
Hidden-shares visible
File-entry disable
Url-entry disable
Username localuser password VPMnI7Ryh0/c7eki encrypted

 

DMZ.2:

Username chen password 0 cisco

Crypto isakmp policy 10
Authentication pre-share
Crypto isakmp key cisco address 10.1.1.1

Cmap mymap 10 gdoi
Set group yeslabgroup

Crypto gdoi group yeslabgroup
Identity number 666888
Server address ipv4 10.1.1.1

Crypto
Match address telnet

Interface Loopback0
Ip address 10.10.2.1 255.255.255.0
Ip ospf message-digest-key 1 md5 yeslab123

Interface FastEthernet0/0
Ip address 10.1.2.1 255.255.255.0
Ip ospf message-digest-key 1 md5 yeslab123
Crypto map mymap

Router ospf 1
Area 0 authentication message-digest
Network 10.1.2.0 0.0.0.255 area 0
Network 10.10.2.0 0.0.0.255 area 0

Ip access-list extended telnet
Deny tcp host 10.10.2.1 eq telnet host 10.1.2.10
Deny ospf any

Line vty 0 15
Login local

 

Inside.1:

Crypto isakmp policy 10
Authentication pre-share
Crypto isakmp key cisco address 10.1.1.1

Cmap mymap 10 gdoi
Set group yeslabgroup

Crypto gdoi group yeslabgroup
Identity number 666888
Server address ipv4 10.1.1.1

Interface Loopback0
Ip address 10.10.3.1 255.255.255.0
Ip ospf message-digest-key 1 md5 yeslab123

Interface FastEthernet0/0
Ip address 10.1.3.1 255.255.255.0
Ip ospf message-digest-key 1 md5 yeslab123
Crypto map mymap

Interface FastEthernet0/1
Ip address 10.1.4.1 255.255.255.0
Ip ospf message-digest-key 1 md5 yeslab123
Crypto map mymap

Router ospf 1
Area 0 authentication message-digest
Network 10.1.3.0 0.0.0.255 area 0
Network 10.1.4.0 0.0.0.255 area 0
Network 10.10.3.0 0.0.0.255 area 0

Inside.2:

Crypto isakmp policy 10
Authentication pre-share
Crypto isakmp key cisco address 10.1.1.1

Cmap mymap 10 gdoi
Set group yeslabgroup

Crypto gdoi group yeslabgroup
Identity number 666888
Server address ipv4 10.1.1.1

Interface Loopback0
Ip address 10.10.4.1 255.255.255.0
Ip ospf message-digest-key 1 md5 yeslab123

Interface FastEthernet0/0
Ip address 10.1.4.10 255.255.255.0
Ip ospf message-digest-key 1 md5 yeslab123
Crypto map mymap

Router ospf 1
Area 0 authentication message-digest
Network 10.1.4.0 0.0.0.255 area 0
Network 10.10.4.0 0.0.0.255 area 0

 

4. Result Verification

KS # show crypto gdoi
GROUP INFORMATION

Group Name: yeslabgroup (Unicast)
Group Identity: 666888
Group Members: 3
IPSec SA Direction: Both
Active Group Server: Local
Group Rekey Lifetime: 86400 secs
Group Rekey
Remaining Lifetime: 85691 secs
Rekey Retransmit Period: 20 secs
Rekey Retransmit Attempts: 5
Group Retransmit
Remaining Lifetime: 0 secs

IPSec SA Number: 1
IPSec SA Rekey Lifetime: 3600 secs
Profile Name: ipsecprof
Replay method: Time Based
Replay Window Size: 20
SA Rekey
Remaining Lifetime: 2892 secs
ACL Configured: access-list getvpntraffic

Group Server list: Local

 

KS # show crypto gdoi group yeslabgroup
Group Name: yeslabgroup (Unicast)
Group Identity: 666888
Group Members: 3
IPSec SA Direction: Both
Active Group Server: Local
Group Rekey Lifetime: 86400 secs
Group Rekey
Remaining Lifetime: 85319 secs
Rekey Retransmit Period: 20 secs
Rekey Retransmit Attempts: 5
Group Retransmit
Remaining Lifetime: 0 secs

IPSec SA Number: 1
IPSec SA Rekey Lifetime: 3600 secs
Profile Name: ipsecprof
Replay method: Time Based
Replay Window Size: 20
SA Rekey
Remaining Lifetime: 2520 secs
ACL Configured: access-list getvpntraffic

Group Server list: Local

DMZ.2 # sh crypto gdoi
GROUP INFORMATION

Group Name: yeslabgroup
Group Identity: 666888
Rekeys received: 1
IPSec SA Direction: Both
Active Group Server: 10.1.1.1
Group Server list: 10.1.1.1

GM Reregisters in: 2425 secs
Rekey Received (hh: mm: ss): 00:18:36


Rekeys received
Cumulative: 1
After registration: 1
Rekey Acks sent: 1

ACL Downloaded From KS 10.1.1.1:
Access-list deny udp 10.0.0.0 0.20.255.255 10.0.0.0 0.20.255.255 port = 848
Access-list permit ip 10.0.0.0 0.255.255.255 10.0.0.0 0.255.255.255

Kek policy:
Rekey Transport Type: Unicast
Lifetime (secs): 86399
Encrypt Algorithm: AES
Keys Size: 192
Sig Hash Algorithm: HMAC_AUTH_SHA
Sig Key size (bits): 1024

Tek policy:
FastEthernet0/0:
IPsec SA:
Sa direction: inbound
Spi: 0x6A08A4C6 (1778951366)
Transform: esp-des esp-md5-hmac
Sa timing: remaining key lifetime (sec): (2441)
Anti-Replay (Time Based): 20 sec interval

IPsec SA:
Sa direction: outbound
Spi: 0x6A08A4C6 (1778951366)
Transform: esp-des esp-md5-hmac
Sa timing: remaining key lifetime (sec): (2441)
Anti-Replay (Time Based): 20 sec interval

IPsec SA:
Sa direction: inbound
Spi: 0xE34224AE (3812762798)
Transform: esp-des esp-md5-hmac
Sa timing: remaining key lifetime (sec): (2481)
Anti-Replay (Time Based): 20 sec interval

IPsec SA:
Sa direction: outbound
Spi: 0xE34224AE (3812762798)
Transform: esp-des esp-md5-hmac
Sa timing: remaining key lifetime (sec): (2481)
Anti-Replay (Time Based): 20 sec interval

 

 

650) this. width = 650; "border =" 0 "alt =" "src =" http://www.bkjia.com/uploads/allimg/131227/0SJK548-1.jpg "/>

 

Note: This is probably the case, but there are many errors. Please pay attention to it when you try again. Do not trust it!

 

 

This article is from the "Dragon Chuan Ren" blog, please be sure to keep this source http://596699244.blog.51cto.com/378357/565260

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.