Configuration | system | tunneling protocols – Cisco VPN 3002 User Manual

Page 62

Advertising
background image

6-2

VPN 3002 Hardware Client Reference

OL-1893-01

Chapter 6 Tunneling

Configuration | System | Tunneling Protocols

Configuration | System | Tunneling Protocols

This section lets you configure the IPSec tunneling protocol.

Click IPSec on the Tunneling Protocols screen.

Figure 6-1

Configuration | System | Tunneling Protocols Screen

Configuration | System | Tunneling Protocols | IPSec

The VPN 3002 complies with the IPSec protocol and is specifically designed to work with the VPN
Concentrator. IPSec provides the most complete architecture for VPN tunnels, and it is perceived as the
most secure protocol.

In IPSec terminology, a “peer” is a remote-access client or another secure gateway. During tunnel
establishment under IPSec, the two peers negotiate Security Associations (SAs) that govern
authentication, encryption, encapsulation, key management, etc. These negotiations involve two phases:
the first phase establishes the tunnel (the IKE SA); the second phase governs traffic within the tunnel
(the IPSec SA).

The VPN 3002 initiates all tunnels with the VPN Concentrator; the VPN Concentrator functions only as
responder. The VPN 3002 as initiator proposes SAs; the responder accepts, rejects, or makes
counter-proposals—all in accordance with configured SA parameters. To establish a connection, both
entities must agree on the SAs.

The Cisco VPN 3002 supports these IPSec attributes, but they are configurable on the central-site VPN
Concentrator, not on the VPN 3002:

Main mode for negotiating phase one of establishing ISAKMP Secure Associations (SAs)
(automatic if you are using certificates)

Aggressive mode for negotiating phase one of establishing ISAKMP SAs

Authentication Algorithms:

ESP-MD5-HMAC-128

ESP-SHA1-HMAC-160

Authentication Modes:

Preshared Keys

X.509 Digital Certificates

Diffie-Hellman Groups 1 and 2

Encryption Algorithms:

Advertising