|
|
The Tunnel Partner section configures VPN tunnel parameters and defines a virtual port for LAN-to-LAN tunnel traffic. Tunneling of IP, IPX, AppleTalk or bridging protocols can then be configured using the appropriate protocol-specific section for the configured VPN port. All tunnel traffic sent between Tunnel Partners is processed according to the rules specified in this section. These parameters must be set for both ends of the tunnel.
configure Tunnel Partner VPN [slot:]Number
VPN [slot:]Number |
You can reuse the number for each slot. For example, 0:1 and 1:1 are allowed. |
Products shipped to certain nations or organizations which are subject to restrictions by U.S. encryption export laws may not support the 3DES encryption algorithm. You may contact your Cisco Systems retailer for more information if your product does not support 3DES.
After entering the configure command for the section, enter one or more of the following keywords.
Partner = IP_Address | The Partner keyword specifies the IP address of the interface at the remote end of the tunnel. All tunnel traffic is sent to the Partner address for processing. | ||||||
BindTo = {Ethernet | WAN} slot:port[.subinterface] | The BindTo keyword specifies which interface on this device will act as the end point for the tunnels defined by this configuration. Packets sent from this device to the partner will use the selected interface's IP address as a source address.
| ||||||
KeyManage = {Auto | Manual | Initiate | Respond} | The KeyManage keyword specifies how the tunnel will be set up.
| ||||||
Transform = {ESP (SHA,DES) | ESP (SHA,3DES) | ESP (MD5,DES) | ESP (MD5,3DES) | ESP (MD5) | ESP (SHA) | AH (MD5) | AH (SHA) | AH (MD5) + ESP (DES) | AH (MD5 ) + ESP (3DES) | AH (SHA) + ESP (DES) | AH (SHA) + ESP (3DES)} | Specifies the protection types and algorithms used for IKE sessions. You can enter this command multiple times within this section, in which case the concentrator proposes all of the specified protection suites. In most cases, only one Transform keyword is needed. The client or tunnel peer accepts one of the options for the negotiation. This keyword controls IKE Phase 2 negotiation. IKE Phase 1 negotiation security settings are set in the IKE Policy section. The mode setting for the Phase 1negotioation is automatic unless the remote tunnel partner is another vendor's device, in which case the Mode keyword should be set (see the "Interoperability Keywords" section for more information). The header type:
The authentication algorithm used for the negotiation:
The encryption algorithm:
ESP(MD5,DES) is the default setting and is recommended for most setups. AH(xxx)+ESP(xxx) uses the Authentication Header to authenticate packets and the ESP header to encrypt packets. The Mac OS VPN 5000 Client does not support AH, so specify at least one ESP option. | ||||||
SharedKey = Pass_Phrase | The SharedKey keyword is used to generate session keys which are then used to authenticate and/or encrypt each packet received or sent through the tunnel. The same key must be entered into the remote Tunnel Partner for the tunnel session to be successfully established. The Pass_Phrase may be between 1-255 characters long. | ||||||
PFS = {G1 | G2 | On | Off} | The PFS keyword specifies whether "perfect forward secrecy" will be used during client sessions. PFS means that every time encryption and /or authentication keys are computed, a new Diffie-Hellman Key Exchange is included. This greatly increases the difficulty of finding the session keys used to encrypt a VPN session. It also means that even if the keys are somehow cracked, only a portion of the traffic is recoverable.
| ||||||
MaxKeyKBytes = KB | Sets the maximum number of kilobytes of traffic, between 2560 and 536870912, that can pass over the tunnel before the tunnel initiator rekeys the tunnel. The default is 1048576. When the concentrator first establishes the tunnel, it encrypts and authenticates packets using keys determined by IKE. Rekeying provides added security by limiting the amount of time available to break a particular key. If you also set KeyLifeSecs, the concentrator uses whichever value occurs first. Only the tunnel initiator's MaxKeyKBytes value is used. | ||||||
KeyLifeSecs = seconds | Sets the maximum number of seconds, between 600 and 86400, before the tunnel initiator rekeys the tunnel. The default is 86400. When the concentrator first establishes the tunnel, it encrypts and authenticates packets using keys determined by IKE. Rekeying provides added security by limiting the amount of time available to break a particular key. If you also set MaxKeyKBytes, the concentrator uses whichever value occurs first. Only the tunnel initiator's KeyLifeSecs value is used. | ||||||
Authentication = {On | Off} | The Authentication keyword allows authentication of all tunnel traffic. This keyword is used when the KeyManage keyword is set to Manual. Each packet is digitally signed before sending. The receiving end of the tunnel checks the signature before allowing the traffic onto its local network. | ||||||
Encryption = {On | Off} | The Encryption keyword specifies whether encryption of all tunnel traffic will be enabled. This keyword is used when the KeyManage keyword is set to Manual. | ||||||
EncryptMethod = {Fixed | None | PLE | DES | 3DES} | The EncryptMethod keyword selects the encryption algorithm for this tunnel. This keyword is used when the KeyManage keyword is set to Manual. The default value is either Fixed (for export releases) or PLE (for North American releases).
| ||||||
AuthSecret = Authentication_Secret | The AuthSecret keyword is used to generate session keys which are used to authenticate each packet received from or sent through the tunnel. This keyword is used when the KeyManage keyword is set to Manual. If AuthSecret is omitted, then packets sent through this tunnel are not authenticated. The authentication secret may be between 1-255 characters long. | ||||||
EncryptSecret = Encryption_Secret | The EncryptSecret keyword is used to generate session keys which are used to encrypt each packet received from or sent through the tunnel. This keyword is used when the KeyManage keyword is set to Manual. If EncryptSecret is omitted, then packets sent through this tunnel are not encrypted. The encryption secret may be between 1-255 characters long. | ||||||
SLAEnablePartner = {On | Off} | The SLAEnablePartner keyword specifies that Service Level Agreement (SLA) information will be gathered for tunnel sessions. SLA measures the speed of traffic across the tunnel and can be used to ensure that service guarantees are met. SNMP is used to display the gathered information. This requires that SNMP be enabled using the SNMP section and that Cisco's private Enterprise MIB be used. The default is Off. |
The following keywords allow the VPN 5000 concentrator to interoperate with other vendors' devices. If the remote Tunnel Partner is a Cisco Systems device, it is not necessary to configure these keywords.
As part of their interoperability function, the following keywords specify access from one area behind a VPN device to another area behind a VPN device. The local settings specify what local subnets, hosts, ports and/or protocols will be reachable via the tunnel. The peer settings specify what remote subnets, hosts, ports and/or protocols will be reachable via the tunnel. The remote tunnel partner (i.e., peer) must have a matching policy in order for traffic to be successfully tunneled.
Mode = {Main | Aggressive} | The Mode keyword sets the IKE Phase 1 negotiation mode between the devices. Phase 1 controls how the two devices identify and authenticate each other so that tunnel sessions can be established. Security settings for the IKE Phase 1 negotiation are set in the IKE Policy section. Main and Aggressive are the two IPSec standard methods for performing the Phase 1 negotiation. This setting must match the Phase 1 negotiation mode of the remote peer. Other vendors may support only the Main mode. It is only necessary to set this keyword if the KeyManage keyword is set to Auto or Initiate. | ||
The LocalAccess keyword is used to specify a local host or subnet which will be reachable by the tunnel. The LocalAccess keyword is entered as an IP address followed by a slash followed by the number of significant bits in the entered IP address. The bits can be between 8 and 32. To allow access to only a single host, specify 32 in the bits portion.
| |||
Peer = IP_Address/bits | The Peer keyword is used to specify a host or subnet behind the remote tunnel partner which will be reachable via the tunnel. The Peer keyword is entered as an IP address followed by a slash followed by the number of significant bits in the entered IP address. The bits can be between 8 and 32. To tunnel to only a single host, specify 32 in the bits portion. Any communications with an address which is part of one of the networks defined by a Peer keyword will be tunneled.
|
This example shows a VPN tunnel configuration which uses Manual key management. The VPN Tunnel Server at 192.168.169.170 would also need a Tunnel Partner section where the Partner keyword has the IP address of this device's Ethernet 0. Because it uses manual key management, all of the authentication and encryption parameters have to be entered. The KeyManagement, Authentication, Encryption, EncryptMethod, AuthSecret, and EncryptSecret keywords for the remote Tunnel Partner would have to match the ones listed below. There would also have to be [ IP VPN 0 ], [ IPX VPN 0 ], [ AppleTalk VPN 0 ], and/or, [ Bridging VPN 0 ] sections for those protocols to be tunneled.
[ Tunnel Partner VPN 0 ] Partner = 192.168.169.170 BindTo = Ethernet0 KeyManagement = Manual Authentication = On Encryption = On AuthSecret = "No Fakes" EncryptSecret = "No Peeking"
This example shows a VPN Tunnel configuration which uses IKE. The VPN Tunnel Server at 192.168.117.18 would also need a Tunnel Partner section where the Partner keyword has the IP address of this device's Ethernet 1. The Transform and SharedKey keywords would have to match the ones listed below. There would also have to be [ IP VPN 1 ], [ IPX VPN 1 ], [ AppleTalk VPN 1 ], and/or, [ Bridging VPN 1 ] sections for those protocols to be tunneled.
[ Tunnel Partner VPN 1 ] Partner = 192.168.117.18 BindTo = Ethernet1 KeyManagement = Auto Transform = ESP(DES,SHA) SharedKey = Pebbles02
| Command | Description |
|---|---|
configure AppleTalk | Configures AppleTalk parameters for an interface |
configure Bridging | Configures bridging parameters for an interface |
configure IP | Configures IP parameters for an interface |
configure IPX | Configures IPX parameters for an interface |
configure SNMP | Configures SNMP parameters |
edit config IP Filter | Creates IP packet filters |
show vpn | Shows VPN configuration and statistics |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Wed Sep 27 10:53:19 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.