Скачать презентацию
Идет загрузка презентации. Пожалуйста, подождите
Презентация была опубликована 10 лет назад пользователемНаталья Чурина
1 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Configuring IPsec Site-to-Site VPN Using SDM
2 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Introducing the SDM VPN Wizard Interface
3 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Cisco Router and SDM
4 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v SDM is an embedded web-based management tool. Provides intelligent wizards to enable quicker and easier deployments, and does not require knowledge of Cisco IOS CLI or security expertise. Contains tools for more advanced users: –ACL editor –VPN crypto map editor –Cisco IOS CLI preview What Is Cisco SDM?
5 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Cisco SDM Features Smart wizards for these frequent router and security configuration issues: –Avoid misconfigurations with integrated routing and security –Secure the existing network infrastructure easily and cost- effectively –Uses Cisco TAC- and ICSA-recommended security configurations Startup wizard, one-step router lockdown, policy-based firewall and ACL management (firewall policy), one-step VPN (site-to-site), and inline IPS Guides untrained users through workflow
6 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Introducing the SDM VPN Wizard Interface Wizards for IPsec solutions Individual IPsec components
7 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Site-to-Site VPN Components
8 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Site-to-Site VPN Components VPN wizards use two sources to create a VPN connection: –User input during the step-by-step wizard process –Preconfigured VPN components SDM provides some default VPN components: –Two IKE policies –IPsec transform set for Quick Setup wizard Other components are created by the VPN wizards. Some components (e.g., PKI) must be configured before the wizards can be used.
9 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Site-to-Site VPN Components (Cont.) Two main components: –IPsec –IKE Two optional components: –Group Policies for Easy VPN server functionality –Public Key Infrastructure for IKE authentication using digital certificates Individual IPsec components used to build VPNs
10 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Launching the Site-to-Site VPN Wizard
11 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Launching the Site-to-Site VPN Wizard 1.
12 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Launching the Site-to-Site VPN Wizard (Cont.) 2a. 2b. 3.
13 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Quick Setup
14 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Quick Setup (Cont.)
15 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Step-by-Step Setup Multiple steps are used to configure the VPN connection: Defining connection settings: Outside interface, peer address, authentication credentials Defining IKE proposals: Priority, encryption algorithm, HMAC, authentication type, Diffie-Hellman group, lifetime Defining IPsec transform sets: Encryption algorithm, HMAC, mode of operation, compression Defining traffic to protect: Single source and destination subnets, ACL Reviewing and completing the configuration
16 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Connection Settings
17 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Connection Settings
18 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v IKE Proposals
19 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v IKE Proposals
20 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Transform Set
21 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Transform Set
22 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Defining What Traffic to Protect
23 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Option 1: Single Source and Destination Subnet
24 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Option 2: Using an ACL
25 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Option 2: Using an ACL (Cont.) 1. 2.
26 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Option 2: Using an ACL (Cont.)
27 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Completing the Configuration
28 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Review the Generated Configuration
29 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Review the Generated Configuration (Cont.)
30 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Test Tunnel Configuration and Operation ~ ~ ~ ~
31 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Monitor Tunnel Operation
32 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Advanced Monitoring Advanced monitoring can be performed using the default Cisco IOS HTTP server interface. Requires knowledge of Cisco IOS CLI commands. show crypto isakmp sa Lists active IKE sessions show crypto ipsec sa Lists active IPsec security associations router#
33 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Troubleshooting debug crypto isakmp router# Debugs IKE communication Advanced troubleshooting can be performed using the Cisco IOS CLI Requires knowledge of Cisco IOS CLI commands
34 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v Summary SDM is a GUI and one of its features is to provide simplified management of security mechanisms on Cisco IOS routers. SDM can manage various types of site-to-site VPNs. SDM can be used to implement a simple site-to-site VPN in three ways: –Using the quick setup wizard –Using the step-by-step wizard –Configuring individual VPN components Upon completing the configuration, the SDM converts the configuration into the Cisco IOS CLI format.
35 © 2006 Cisco Systems, Inc. All rights reserved.ISCW v
Еще похожие презентации в нашем архиве:
© 2024 MyShared Inc.
All rights reserved.