smb5553 Configure Anyconnect Virtual Private Network VPN Connectivit
smb5553 Configure Anyconnect Virtual Private Network VPN Connectivit
smb5553 Configure Anyconnect Virtual Private Network VPN Connectivit
Introduction
A Virtual Private Network (VPN) connection allows users to access, send, and receive data to and
from a private network by means of going through a public or shared network such as the Internet
but still ensuring secure connections to an underlying network infrastructure to protect the private
network and its resources.
A VPN client is software that is installed and ran on a computer that wishes to connect to the
remote network. This client software must be set up with the same configuration as that of the
VPN server such as the IP address and authentication information. This authentication information
includes the username and the pre-shared key that will be used to encrypt the data. Depending on
the physical location of the networks to be connected, a VPN client can also be a hardware
device. This usually happens if the VPN connection is used to connect two networks that are in
separate locations.
The Cisco AnyConnect Secure Mobility Client is a software application for connecting to a VPN
that works on various operating systems and hardware configurations. This software application
makes it possible for remote resources of another network become accessible as if the user is
directly connected to his network, but in a secure way. Cisco AnyConnect Secure Mobility Client
provides an innovative new way to protect mobile users on computer-based or smart-phone
platforms, providing a more seamless, always-protected experience for end users and
comprehensive policy enforcement for IT administrator.
On the RV34x router, starting with firmware version 1.0.3.15 and moving forward, AnyConnect
licensing is not necessary. There will be a charge for client licenses only.
For additional information on AnyConnect licensing on the RV340 series routers, please see the
article on: AnyConnect Licensing for the RV340 Series Routers.
Applicable Devices | Firmware Version
Step 1. Access the router web-based utility and choose VPN > SSL VPN.
Step 2. Click the On radio button to enable Cisco SSL VPN Server.
Step 3. Choose the Gateway Interface from the drop-down list. This will be the port that will be
used for passing traffic through the SSL VPN Tunnels. The options are:
● WAN1
● WAN2
● USB1
● USB2
Step 4. Enter the port number that is used for the SSL VPN gateway in the Gateway Port field
ranging from 1 to 65535.
Step 5. Choose the Certificate File from the drop-down list. This certificate authenticates users
who attempt to access the network resource through the SSL VPN tunnels. The drop-down list
contains a default certificate and the certificates that are imported.
Step 6. Enter the IP address of the client address pool in the Client Address Pool field. This pool
will be the range of IP addresses that will be allocated to remote VPN clients.
Note: Make sure that the IP address range does not overlap with any of the IP addresses on the
local network.
Note: In this example, 192.168.0.0 is used.
Step 8. Enter the client domain name in the Client Domain field. This will be the domain name that
should be pushed to SSL VPN clients.
Step 9. Enter the text that would appear as login banner in the Login Banner field. This will be the
banner that will be displayed each time a client logs in.
Note: In this example, Welcome to Widedomain! is used as the Login Banner.
Step 1. Enter a value in seconds for the Idle Timeout ranging from 60 to 86400. This will be the
time duration that the SSL VPN session can remain idle.
Step 2. Enter a value in seconds in the Session Timeout field. This is the time it takes for the
Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) session to time out after
the specified idle time. The range is from 60 to 1209600.
Step 3. Enter a value in seconds in the ClientDPD Timeout field ranging from 0 to 3600. This value
specifies the periodic sending of HELLO/ACK messages to check the status of the VPN tunnel.
Note: This feature must be enabled on both ends of the VPN tunnel.
Step 4. Enter a value in seconds in the GatewayDPD Timeout field ranging from 0 to 3600. This
value specifies the periodic sending of HELLO/ACK messages to check the status of the VPN
tunnel.
Note: This feature must be enabled on both ends of the VPN tunnel.
Step 5. Enter a value in seconds in the Keep Alive field ranging from 0 to 600. This feature
ensures that your router is always connected to the Internet. It will attempt to re-establish the VPN
connection if it is dropped.
Step 6. Enter a value in seconds for the duration of the tunnel to be connected in the Lease
Duration field. The range is from 600 to 1209600.
Step 7. Enter the packet size in bytes that can be sent over the network. The range is from 576 to
1406.
Note: In this example, 1406 is used.
Step 8. Enter the relay interval time in the Rekey Interval field. The Rekey feature allows the SSL
keys to renegotiate after the session has been established. The range is from 0 to 43200.
Step 2. Click the Add button under the SSL VPN Group Table to add a group policy.
Note: The SSL VPN Group table will show the list of group policies on the device. You can also
edit the first group policy on the list, which is named SSLVPNDefaultPolicy. This is the default
policy supplied by the device.
Step 3. Enter your preferred policy name in the Policy Name field.
Step 4. Enter the IP address of the Primary DNS in the field provided. By default, this IP address is
already supplied.
Note: In this example, 192.168.1.1 is used.
Step 5. (Optional) Enter the IP address of the Secondary DNS in the field provided. This will serve
as a backup in case the primary DNS failed.
Step 6. (Optional) Enter the IP address of the primary WINS in the field provided.
Step 7. (Optional) Enter the IP address of the secondary WINS in the field provided.
Note: In this example, 192.168.1.2 is used.
Step 9. (Optional) Click on a radio button to choose the IE Proxy Policy to enable Microsoft
Internet Explorer (MSIE) proxy settings to establish VPN tunnel. The options are:
Step 10. (Optional) In the Split Tunneling Settings area, check the Enable Split Tunneling check
box to allow Internet destined traffic to be sent unencrypted directly to the Internet. Full Tunneling
sends all traffic to the end device where it is then routed to destination resources, eliminating the
corporate network from the path for web access.
Step 11. (Optional) Click on a radio button to choose whether to include or exclude traffic when
applying the split tunneling.
Step 12. In the Split Network Table, click the Add button to add split Network exception.
Step 13. Enter the IP address of the network in the field provided.
Step 14. In the Split DNS Table, click the Add button to add split DNS exception.
Step 15. Enter the Domain name in the field provided and then click Apply.
Verify AnyConnect VPN Connectivity
Step 2. In the AnyConnect Secure Mobility Client window, enter the gateway IP address and the
gateway port number separated by a colon (:), and then click Connect.
Note: In this example, 10.10.10.1:8443 is used. The software will now show that it is contacting
the remote network.
Step 3. Enter your server username and password in the respective fields and then click OK.
Note: In this example, Group1 user is used as the Username.
Step 4. As soon as the connection is established, the Login Banner will appear. Click Accept.
The AnyConnect window should now indicate the successful VPN connection to the network.
You should now have successfully configured AnyConnect VPN connectivity using an RV34x
Series Router.