Scenario: Site-to-Site VPN Configuration
Scenario: Site-to-Site VPN Configuration
Example Site-to-Site VPN Network Topology, page 4-1 Implementing the Site-to-Site Scenario, page 4-2 Configuring the Other Side of the VPN Connection, page 4-13 What to Do Next, page 4-13
4-1
Figure 4-1
Site A Security Appliance 1 Inside 10.10.10.0 Outside 209.165.200.226 Internet Security Appliance 2 Outside 209.165.200.236 Inside 10.20.20.0
Site B
Creating a VPN site-to-site deployment such as the one in Figure 4-1 requires you to configure two security appliances, one on each side of the connection.
Information to Have Available, page 4-2 Configuring the Site-to-Site VPN, page 4-3
IP address of the remote security appliance peer IP addresses of local hosts and networks permitted to use the tunnel to communicate with resources on the remote site IP addresses of remote hosts and networks permitted to use the tunnel to communicate with local resources
4-2
78-17645-01
132066
Chapter 4
Starting ASDM, page 4-3 Configuring the Security Appliance at the Local Site, page 4-4 Providing Information About the Remote VPN Peer, page 4-6 Configuring the IKE Policy, page 4-7 Configuring IPsec Encryption and Authentication Parameters, page 4-9 Specifying Hosts and Networks, page 4-10 Viewing VPN Attributes and Completing the Wizard, page 4-11
The following sections provide detailed instructions for how to perform each configuration step.
Starting ASDM
To run ASDM in a web browser, enter the factory default IP address in the address field: https://192.168.1.1/admin/.
Note
Remember to add the s in https or the connection fails. HTTPS (HTTP over SSL) provides a secure connection between your browser and the security appliance.
4-3
The security appliance at the first site is referred to as Security Appliance 1 from this point forward. To configure the Security Appliance 1, perform the following steps:
Step 1
In the main ASDM window, choose the VPN Wizard option from the Wizards drop-down menu. ASDM opens the first VPN Wizard screen.
4-4
78-17645-01
Chapter 4
Note
The Site-to-Site VPN option connects two IPsec security gateways, which can include security appliances, VPN concentrators, or other devices that support site-to-site IPsec connectivity.
b.
From the drop-down list, choose Outside as the enabled interface for the current VPN tunnel.
c.
4-5
Note
In this scenario, the remote VPN peer is referred to as Security Appliance 2 from this point forward. In Step 2 of the VPN Wizard, perform the following steps:
Step 1 Step 2
Enter the Peer IP Address (the IP address of Security Appliance 2, in this scenario 209.165.200.236) and a Tunnel Group Name (for example Cisco). Specify the type of authentication that you want to use by performing one of the following steps:
To use a static preshared key for authentication, click the Pre-Shared Key radio button and enter a preshared key (for example, Cisco). This key is used for IPsec negotiations between the security appliances.
Note
When you configure Security Appliance 2 at the remote site, the VPN peer is Security Appliance 1. Be sure to enter the same preshared key (Cisco) that you use here.
Click the Challenge/Response Authentication radio button to use that method of authentication. To use digital certificates for authentication, click the Certificate radio button, choose the Certificate Signing Algorithm from the drop-down list, and then choose a preconfigured trustpoint name from the drop-down list. If you want to use digital certificates for authentication but have not yet configured a trustpoint name, you can continue with the Wizard by using one of the other two options. You can revise the authentication configuration later using the standard ASDM screens.
4-6
78-17645-01
Chapter 4
Step 3
Click the Encryption (DES/3DES/AES), authentication algorithms (MD5/SHA), and the Diffie-Hellman group (1/2/5) used by the security appliance during an IKE security association.
PIX 515E Security Appliance Getting Started Guide
78-17645-01
4-7
Note
When configuring Security Appliance 2, enter the exact values for each of the options that you chose for Security Appliance 1. Encryption mismatches are a common cause of VPN tunnel failures and can slow down the process.
Step 2
4-8
78-17645-01
Chapter 4
Choose the Encryption algorithm (DES/3DES/AES) and authentication algorithm (MD5/SHA) from the drop-down lists.
Step 2
4-9
In the Source area, choose IP Address from the Type drop-down list. Enter the local IP address and netmask in the IP Address and Netmask fields. In the Destination area, choose IP Address from the Type drop-down list. Enter the IP address and Netmask for the remote host or network.
4-10
78-17645-01
Chapter 4
Step 5
4-11
Step 6
If you want the configuration changes to be saved to the startup configuration so that they are applied the next time the device starts, from the File menu, click Save. Alternatively, ASDM prompts you to save the configuration changes permanently when you exit ASDM. If you do not save the configuration changes, the old configuration takes effect the next time the device starts.
4-12
78-17645-01
Chapter 4
Scenario: Site-to-Site VPN Configuration Configuring the Other Side of the VPN Connection
Note
When configuring Security Appliance 2, enter the exact same values for each of the options that you selected for Security Appliance 1. Mismatches are a common cause of VPN configuration failures.
What to Do Next
If you are deploying the security appliance solely in a site-to-site VPN environment, you have completed the initial configuration. In addition, you may want to consider performing some of the following steps: To Do This ... Refine configuration and configure optional and advanced features Learn about daily operations See ... Cisco Security Appliance Command Line Configuration Guide Cisco Security Appliance Command Reference Cisco Security Appliance Logging Configuration and System Log Messages
4-13
You can configure the security appliance for more than one application. The following sections provide configuration procedures for other common applications of the security appliance. To Do This ... Configure the security appliance to protect a web server in a DMZ Configure a remote-access VPN See ... Chapter 2, Scenario: DMZ Configuration Chapter 3, Scenario: IPsec Remote-Access VPN Configuration
4-14
78-17645-01