Home > Articles > Cisco Certification > CCNP Security / CCSP > CCSP Cisco Secure VPN Exam: Remote Access Configuration

CCSP Cisco Secure VPN Exam: Remote Access Configuration

Chapter Description

This chapter discusses the process of implementing Internet Protocol Security (IPSec) using preshared keys on the Cisco VPN 3000 Series Concentrators. You'll read an overview of remote access using preshared keys, learn how to configure the Cisco VPN 3000 Concentrator Series and browsers for remote access, and discover configuration methods for users and groups. You'll also learn how to set up IPSec Windows clients.

Scenarios

The following scenarios and questions are designed to draw together the content of the chapter and exercise your understanding of the concepts. There might be more than one correct answer. The thought process and practice in manipulating each concept in the scenario are the goals of this section.

Scenario 4-1

Users at one of your small branch facilities dial in to your corporate access server for access to the Internet, e-mail, and other network services. This four-user group is one of your research and development teams, and each of the four users dials in to the access server using 56-kbps modems for network services. Their work is considered top secret by upper management. Because of the sensitive nature of their communications, you want to establish a VPN for them using IPSec.

At the same time, other users at other branch sites—your sales staff and other key personnel—frequently use laptops and home computers to connect to the corporate network through the Internet or through the access server. These users discuss sales figures and development projects and also require IPSec protection on their MS Exchange messaging and MS SQL database traffic.

You had considered using your router as a VPN server, but decided to use a Cisco VPN Concentrator because of its ability to authenticate users internally. You don't anticipate ever having more than 50 VPN clients active in your user community at any given time, and your employee base is stable.

As the senior security architect for your organization, how would you answer these questions?

  1. Which VPN 3000 Concentrator would you purchase and install?

  2. Would you use preshared keys or digital certificates for device authentication?

  3. Would you depend on the internal authentication services of the VPN device, or would you use some other user authentication method?

  4. How would you assign VPN addresses?

  5. Would you permit split tunneling?

  6. Would you use multiple IPSec groups? If so, why?

  7. Which IPSec protocol would you use?

  8. Which encryption protocol would you use?

  9. Would you allow unrestricted access hours?

  10. What would you set for idle timeout and maximum connect time?

Scenario 4-2

Your company sells donuts and has 60 shops located in a three-state area. These shops are each connected to the Internet using DSL circuits. You want to establish IPSec VPN connections from each shop through the Internet to the corporate network for sending/receiving e-mail, reporting sales, and ordering supplies.

You will be using a Cisco VPN 3030 Concentrator with no SEP modules. Device authentication is accomplished using preshared keys. User authentication is done through the NT Domain. The IP addresses of the DNS servers are 192.168.44.20 and 192.168.63.20. The IP addresses of the WINS servers are 192.168.44.25 and 12.168.63.25. No changes have been made to the default Base Group.

Create a group for the shops called DonutShops.

  1. Indicate the settings that you would make on the group's General tab for each of the following attributes, and specify whether you would uncheck the Inherit? box.

    • Access Hours
    • Simultaneous Logins
    • Minimum Password Length
    • Allow Alphabetic-Only Passwords
    • Idle Timeout
    • Maximum Connect Time
    • Filter
    • Primary DNS
    • Secondary DNS
    • Primary WINS
    • Secondary WINS
    • SEP Card Assignment
    • Tunneling Protocols
    • Strip Realm
  2. Indicate the settings that you would make on the group's IPSec tab for each of the following attributes, and specify whether you would uncheck the Inherit? box.

    • IPSec SA
    • IKE Peer Identity Validation
    • IKE Keepalives
    • Reauthentication on Rekey
    • Tunnel Type
    • Group Lock
    • Authentication
    • IPComp
    • Mode Configuration
6. Scenario Answers | Next Section Previous Section