72

CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official
Page 2: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Cisco Press800 East 96th Street

Indianapolis, IN 46240

CCNP Security VPN 642-647Official Cert Guide

Howard Hooper, CCIE No. 23470

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page i

Page 3: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

CCNP Security VPN 642-647 Official Cert GuideHoward Hooper, CCIE No. 23470

Copyright © 2012 Pearson Education, Inc.

Published by:Cisco Press800 East 96th Street Indianapolis, IN 46240 USA

All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means,electronic or mechanical, including photocopying, recording, or by any information storage and retrievalsystem, without written permission from the publisher, except for the inclusion of brief quotations in areview.

Printed in the United States of America

First Printing July 2011

Library of Congress Cataloging-in-Publication data is on file.

ISBN-13: 978-1-58714-256-7

ISBN-10: 1-58714-256-2

Warning and DisclaimerThis book is designed to provide information for the Cisco CCNP Security VPN 642-647 exam. Everyeffort has been made to make this book as complete and as accurate as possible, but no warranty or fit-ness is implied.

The information is provided on an “as is” basis. The authors, Cisco Press, and Cisco Systems, Inc., shall haveneither liability nor responsibility to any person or entity with respect to any loss or damages arising fromthe information contained in this book or from the use of the discs or programs that may accompany it.

The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems, Inc.

Feedback InformationAt Cisco Press, our goal is to create in-depth technical books of the highest quality and value. Each bookis crafted with care and precision, undergoing rigorous development that involves the unique expertise ofmembers from the professional technical community.

Readers’ feedback is a natural continuation of this process. If you have any comments regarding how wecould improve the quality of this book, or otherwise alter it to better suit your needs, you can contact usthrough e-mail at [email protected]. Please make sure to include the book title and ISBN in yourmessage.

We greatly appreciate your assistance.

ii CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page ii

Page 4: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Corporate and Government SalesCisco Press offers excellent discounts on this book when ordered in quantity for bulk purchases or spe-cial sales. For more information, please contact: U.S. Corporate and Government Sales [email protected]

For sales outside of the U.S., please contact: International Sales 1-317-581-3793 [email protected]

We greatly appreciate your assistance.

Trademark AcknowledgmentsAll terms mentioned in this book that are known to be trademarks or service marks have been appropriate-ly capitalized. Cisco Press or Cisco Systems, Inc., cannot attest to the accuracy of this information. Use ofa term in this book should not be regarded as affecting the validity of any trademark or service mark.

Corporate and Government SalesThe publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or spe-cial sales, which may include electronic versions and/or custom covers and content particular to your busi-ness, training goals, marketing focus, and branding interests. For more information, please contact: U.S.Corporate and Government Sales 1-800-382-3419 [email protected]

For sales outside the United States, please contact: International Sales [email protected]

Publisher: Paul Boger Manager, Global Certification: Erik Ullanderson

Associate Publisher: Dave Dusthimer Business Operation Manager, Cisco Press: Anand Sundaram

Managing Editor: Sandra Schroeder Technical Editors: James Risler, Cristian Matei

Editorial Assistant: Vanessa Evans Compositor: Mark Shirar

Executive Editor: Brett Bartow Development Editor: Kimberley Debus

Book Designer: Gary Adair Proofreader: Water Crest Publishing, Inc.

Indexer: Tim Wright Senior Project Editor: Tonya Simpson

Copy Editor: Keith Cline

iii

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page iii

Page 5: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

About the AuthorHoward Hooper, CCIE No. 23470, CCNP, CCNA, CCDA, JNCIA, works as a network

consultant for his companies SYNCom Ltd. and Transcend Networks Ltd., specializing in

network design, installation, and automation for enterprise and government clients. He

has worked in the network industry for 10 years, starting his career in the service

provider field as a support engineer, before moving on to installations engineer and net-

work architect roles, working on small, medium, enterprise, and service provider networks.

About the Technical ReviewersJames Risler, CCIE No. 15412, is a systems engineer education specialist for Cisco

Systems. His focus is on security technology and training development. James has more

than 18 years of experience in IP internetworking, including the design and implementa-

tion of enterprise networks. Before joining Cisco Systems, James provided Cisco security

training and consulting for Fortune 500 companies and government agencies. He holds

two Bachelor degrees from University of South Florida and is currently working on his

MBA at the University of Tampa.

Cristian Matei, CCIE No. 23684, is a senior security consultant for Datanet Systems,

Cisco Gold Partner in Romania. He has designed, implemented, and maintained multiple

large enterprise networks covering the Cisco security, routing, switching, and wireless

portfolio of products. Cristian started this journey back in 2005 with Microsoft technol-

ogy and finished MCSE Security and MCSE Messaging tracks. He then joined Datanet

Systems, where he quickly obtained his Security CCIE among other certifications and

specializations such as CCNP, CCSP, and CCDP. Since 2007, Cristian has been a Cisco

Certified Systems Instructor (CCSI) teaching CCNA, CCNP, and CCSP curriculum cours-

es. In 2009, he was awarded by Cisco with Cisco Trusted Technical Advisor (TTA) and

got certified as Cisco IronPort Certified Security Professional on Email and Web

(CICSP). That same year, he started his collaboration with Internetwork Expert as techni-

cal editor on the CCIE Routing & Switching and Security Workbook series. In 2010,

Cristian earned his ISACA Certified Information Security Manager (CISM) certification.

He is currently preparing for Routing & Switching, Service Provider CCIE tracks and can

be found as a regular active member on Internetwork Expert and Cisco forums.

iv CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page iv

Page 6: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

DedicationsI dedicate this book to my family, without whom I would not be in the position that I am

and have the opportunities I currently enjoy.

In particular, I want to say special thanks to the following:

My grandfather, Geoffrey, for becoming my father figure and teaching me what I consider

to be one of the most important lessons I received early on in my life: that you must

work and work hard for what you want. You are forever missed and never forgotten.

My mother, Sally, for providing me with the greatest example of personal strength and

determination anyone could ever hope to possess. You scaled mountains to make sure we

always had everything we needed and were protected; we are only here because of you.

My son, Ridley, for giving me the reason I need at times to carry on and the drive to

become better at everything I do. Even though I cannot be there all the time, Daddy

loves you very much.

I hope I have and will always go on to make you proud of me. I would not be the man I

am today without you, for that I thank you.

v

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page v

Page 7: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

AcknowledgmentsWhen writing a book, a small army of people back you up and undertake a huge amount

of work behind the scenes. I want to thank everyone involved who helped with the writ-

ing, reviewing, editing, and production of this book. In particular, I want to acknowledge

Brett Bartow for giving me this fantastic opportunity and for his help with the many

deadline extensions and obstacles that presented themselves along the way. I also want to

acknowledge and thank Kimberley Debus, who transformed my words into human-read-

able form and kept me on track. I know she worked many late nights and weekends to

help complete this book, and I shall miss our “conversations through the comments.” I

will be forever grateful to both of you.

Thanks must also go out to the two technical reviewers, Cristian Matei and James Risler.

Your comments and suggestions have been brilliant throughout the entire book. Your

help and input has definitely made this book better.

Last, but by no means least, I want thank my family and co-workers for their support

during the writing of this book. Without that support, this would not have been possible,

and as soon as I have caught up on sleep again, I will be conscious enough to thank you

personally.

vi CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page vi

Page 8: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Contents at a GlanceIntroduction xxiv

Part I ASA Architecture and Technologies Overview

Chapter 1 Evaluation of the ASA Architecture 3

Chapter 2 Configuring Policies, Inheritance, and Attributes 47

Part II Cisco AnyConnect Remote-Access VPN Solutions

Chapter 3 Deploying an AnyConnect Remote-Access VPN Solution 73

Chapter 4 Advanced Authentication and Authorization of AnyConnect VPNs 119

Chapter 5 Advanced Deployment and Management of

the AnyConnect Client 165

Chapter 6 Advanced Authorization Using AAA and DAPs 197

Chapter 7 AnyConnect Integration with Cisco Secure Desktop and

Optional Modules 221

Chapter 8 AnyConnect High Availability and Performance 249

Part III Cisco Clientless Remote-Access VPN Solutions

Chapter 9 Deploying a Clientless SSL VPN Solution 279

Chapter 10 Advanced Clientless SSL VPN Settings 337

Chapter 11 Customizing the Clientless Portal 373

Chapter 12 Advanced Authorization Using Dynamic Access Policies 413

Chapter 13 Clientless SSL VPN with Cisco Secure Desktop 439

Chapter 14 Clientless SSL VPN High-Availability and Performance Options 467

Part IV Cisco IPsec Remote-Access Client Solutions

Chapter 15 Deploying and Managing the Cisco VPN Client 481

Part V Cisco Easy VPN Solutions

Chapter 16 Deploying Easy VPN Solutions 515

Chapter 17 Advanced Authentication and Authorization Using Easy VPN 551

Chapter 18 Advanced Easy VPN Authorization 579

vii

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page vii

Page 9: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 19 High Availability and Performance for Easy VPN 599

Chapter 20 Easy VPN Operation Using the ASA 5505 as a Hardware Client 621

Part VI Cisco IPsec Site-to-Site VPN Solutions

Chapter 21 Deploying IPsec Site-to-Site VPNs 639

Chapter 22 High Availability and Performance Strategies for IPsec

Site-to-Site VPNs 667

Part VII Exam Preparation

Chapter 23 Final Exam Preparation 693

Part VIII Appendixes

Appendix A Answers to the “Do I Know This Already?” Quizzes 699

Appendix B 642-647 CCNP Security VPN Exam Updates, Version 1.0 703

Appendix C Memory Tables (CD only)

Appendix D Memory Tables Answer Key (CD only)

Glossary 707

Index 712

viii CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page viii

Page 10: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

ContentsIntroduction xxiv

Part I ASA Architecture and Technologies Overview

Chapter 1 Evaluation of the ASA Architecture 3

“Do I Know This Already?” Quiz 3

Foundation Topics 6

Examining ASA Control Fundamentals 6

Interfaces, Security Levels, and EtherChannels 6

Security Levels 9

Same Security Interface and Intra-Interface Communication 10

EtherChannels 11

Access Control Lists 12

Modular Policy Framework 15

Routing the Environment 16

Address Translations and Your ASA 18

AAA for Network-Based Access 21

ASA VPN Technology Comparison 24

Managing Your ASA Device 27

Packet Processing 28

Controlling VPN Access 29

The Good, the Bad, and the Licensing 32

Time-Based Licenses 41

When Time-Based and Permanent Licenses Combine 42

Shared SSL VPN Licenses 43

Failover Licensing 43

Exam Preparation Tasks 44

Review All Key Topics 44

Complete Tables and Lists from Memory 44

Define Key Terms 44

Chapter 2 Configuring Policies, Inheritance, and Attributes 47

“Do I Know This Already?” Quiz 47

Foundation Topics 49

Policies and Their Relationships 49

Understanding Connection Profiles 50

Group URL 52

Group Alias 52

ix

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page ix

Page 11: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Certificate to Connection Profile Mapping 53

Per-User Connection Profile Lock 54

Default Connection Profiles 55

Understanding Group Policies 56

Configure User Attributes 59

Using External Servers for AAA and Policies 60

Exam Preparation Tasks 70

Review All Key Topics 70

Complete Tables and Lists from Memory 70

Define Key Terms 70

Part II Cisco AnyConnect Remote-Access VPN Solutions

Chapter 3 Deploying an AnyConnect Remote-Access VPN Solution 73

“Do I Know This Already?” Quiz 73

Foundation Topics 76

Full SSL VPN Technology Overview 76

SSL/TLS 76

DTLS 80

IKEv2 81

Configuration Procedures, Deployment Strategies,

and Information Gathering 83

AnyConnect Secure Mobility Client Installation 84

Deploying Your First Full-Tunnel AnyConnect SSL VPN Solution 85

IP Addressing 85

Hostname, Domain Name, and DNS 85

Enroll with a CA and Become a Member of a PKI 86

Add an Identity Certificate 87

Add the Signing Root CA Certificate 88

Enable the Interfaces for SSL/DTLS and AnyConnect Client Connections 88

Create a Connection Profile 89

Deploying Your First AnyConnect IKEv2 VPN Solution 92

Enable the Relevant Interfaces for IKEv2 and AnyConnect

Client Access 93

Create a Connection Profile 94

Client IP Address Allocation 97

Connection Profile Address Assignment 98

Group Policy Address Assignment 100

Direct User Address Assignment 104

Advanced Controls for Your Environment 104

x CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page x

Page 12: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

ACLs and Downloadable ACLs 105

Split Tunneling 107

Access Hours/Time Range 110

Troubleshooting the AnyConnect Secure Mobility Client 111

Exam Preparation Tasks 117

Review All Key Topics 117

Complete Tables and Lists from Memory 117

Define Key Terms 117

Chapter 4 Advanced Authentication and Authorization of AnyConnect VPNs 119

“Do I Know This Already?” Quiz 119

Foundation Topics 121

Authentication Options and Strategies 121

Provisioning Certificates as a Local CA 126

Configuring Certificate Mappings 134

Certificate-to-Connection Profile Maps 135

Mapping Criteria 136

Provisioning Certificates from a Third-Party CA 139

Configure an XML Profile for Use by the AnyConnect Client 141

Configure a Dedicated Connection Profile for Enrollment 144

Enroll the AnyConnect Client into a PKI 145

Optionally, Configure Client Certificate Selection 147

Import the Issuing CA’s Certificate into the ASA’s 149

Create a Connection Profile Using Certificate-Based Authentication 150

Advanced PKI Deployment Strategies 151

CRLs 152

OCSP 152

Doubling Up on Client Authentication 155

Troubleshooting Your Advanced Configuration 161

Exam Preparation Tasks 163

Review All Key Topics 163

Complete Tables and Lists from Memory 163

Define Key Terms 163

Chapter 5 Advanced Deployment and Management of the AnyConnect Client 165

“Do I Know This Already?” Quiz 165

Foundation Topics 167

Configuration Procedures, Deployment Strategies,

and Information Gathering 167

xi

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xi

Page 13: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

AnyConnect Installation Options 168

Manual Predeployment 168

Automatic Web Deployment 172

Managing AnyConnect Client Profiles 177

Advanced Profile Features 181

Start Before Login 182

Trusted Network Detection 182

Advanced AnyConnect Customization and Management 188

Exam Preparation Tasks 195

Review All Key Topics 195

Complete Tables and Lists from Memory 195

Define Key Terms 195

Chapter 6 Advanced Authorization Using AAA and DAPs 197

“Do I Know This Already?” Quiz 197

Foundation Topics 199

Configuration Procedures, Deployment Strategies,

and Information Gathering 199

Configuring Local and Remote Group Policies 199

Full SSL VPN Accountability 209

Authorization Through Dynamic Access Policies 213

Troubleshooting Advanced Authorization Settings 216

Exam Preparation Tasks 219

Review All Key Topics 219

Complete Tables and Lists from Memory 219

Define Key Terms 219

Chapter 7 AnyConnect Integration with Cisco Secure Desktop and Optional Modules 221

“Do I Know This Already?” Quiz 221

Foundation Topics 224

Cisco Secure Desktop Overview and Configuration 224

Host Scan 225

Prelogin Assessment 225

Secure Desktop (Vault) 226

Cache Cleaner 227

Keystroke Logger Detection 228

Integration with DAPs 228

Host Emulation Detection 228

Windows Mobile Device Management 228

xii CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xii

Page 14: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Standalone Installation Packages 228

CSD Manual Launch 228

Prelogin Policies 229

Post-Login Policies 230

VPN Session Termination 231

AnyConnect Posture Assessment and Host Scan 231

AnyConnect Posture Assessment Module 231

Host Scan 232

Configure Prelogin Policies 234

AnyConnect Network Access, Web Security, and Telemetry Modules 238

NAM Module 238

Web Security Module 241

Telemetry Module 243

Exam Preparation Tasks 246

Review All Key Topics 246

Complete Tables and Lists from Memory 246

Define Key Terms 246

Chapter 8 AnyConnect High Availability and Performance 249

“Do I Know This Already?” Quiz 249

Foundation Topics 251

Overview of High Availability and Redundancy Methods 251

Hardware-Based Failover 251

VPN Clustering (VPN Load Balancing) 252

Redundant VPN Peering 253

External Load Balancing 253

Deploying DTLS 255

Performance Assurance with QOS 256

Basic ASDM QoS Configuration 258

AnyConnect Redundant Peering and Failover 265

Hardware-Based Failover with VPNs 267

Configure LAN Failover Interfaces 269

Configure Standby Addresses on Interfaces Used for

Traffic Forwarding 270

Define Failover Criteria 270

Configure Nondefault MAC Addresses 270

Redundancy in the VPN Core 271

VPN Clustering 272

Load Balancing Using an External Load Balancer 274

xiii

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xiii

Page 15: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Exam Preparation Tasks 276

Review All Key Topics 276

Complete Tables and Lists from Memory 276

Define Key Terms 276

Part III Cisco Clientless Remote-Access VPN Solutions

Chapter 9 Deploying a Clientless SSL VPN Solution 279

“Do I Know This Already?” Quiz 279

Foundation Topics 282

Clientless SSL VPN Overview 282

SSL VPN Building Blocks 283

SSL/TLS Recap 283

SSL Tunnel Negotiation 285

Handshake 286

Deployment Procedures and Strategies 289

Physical Topology 289

Deploying Your First Clientless SSL VPN Solution 293

IP Addressing 293

Hostname, Domain Name, and DNS 293

Become a Member of a Public Key Infrastructure 294

Adding a CA Root Certificate 294

Certificate Revocation List 295

Revocation Check 296

CRL Retrieval Policy 297

CRL Retrieval Method 297

OCSP Rules 297

Advanced 301

Enable the Relevant Interfaces for SSL 311

Create Local User Accounts for Authentication 312

Create a Connection Profile (Optional) 315

Basic Access Control 319

Bookmarks 320

HTTP and HTTPS 320

CIFS 321

FTP 321

Group Policies 323

Content Transformation 327

Gateway Content Rewriting 327

Application Helper Profiles 329

xiv CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xiv

Page 16: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Java Code Signing 330

Troubleshooting a Basic Clientless SSL VPN 331

Troubleshooting Session Establishment 331

Troubleshooting Certificate Errors 333

Exam Preparation Tasks 335

Review All Key Topics 335

Complete Tables and Lists from Memory 335

Define Key Terms 335

Chapter 10 Advanced Clientless SSL VPN Settings 337

“Do I Know This Already?” Quiz 337

Foundation Topics 340

Overview of Advanced Clientless SSL VPN Settings 340

Application Access Through Port Forwarding 343

Configuring Port Forwarding Using the ASDM 345

Application Access Using Client-Server Plug-Ins 349

Configuring Client-Server Plug-In Access Using the ASDM 350

Application Access Through Smart Tunnels 357

Configuring Smart Tunnel Access Using the ASDM 359

Configuring SSL/TLS Proxies 363

Email Proxy 363

Internal HTTP and HTTPS Proxy 365

Troubleshooting Advanced Application Access 366

Troubleshooting Application Access 366

Client 366

ASA/VPN Termination Appliance 367

Application/Web Server 369

Exam Preparation Tasks 370

Review All Key Topics 370

Complete Tables and Lists from Memory 370

Define Key Terms 370

Chapter 11 Customizing the Clientless Portal 373

“Do I Know This Already?” Quiz 373

Foundation Topics 375

Basic Portal Layout Configuration 375

Logon Page Customization 377

Portal Page Customization 379

Logout Page Customization 379

Outside-the-Box Portal Configuration 381

xv

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xv

Page 17: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Portal Localization 381

Getting Portal Help 386

AnyConnect Portal Integration 387

Clientless SSL VPN Advanced Authentication 389

Using an External and Internal CA for Clientless Access 391

Clientless SSL VPN Double Authentication 399

Deploying Clientless SSL VPN Single Sign-On 403

Troubleshooting PKI and SSO Integration 406

Exam Preparation Tasks 410

Review All Key Topics 410

Complete Tables and Lists from Memory 410

Define Key Terms 410

Chapter 12 Advanced Authorization Using Dynamic Access Policies 413

“Do I Know This Already?” Quiz 413

Foundation Topics 416

Configuration Procedures, Deployment Strategies,

and Information Gathering 416

Create a DAP 419

Specify User AAA Attributes 419

Specify Endpoint Attributes 421

Configure Authorization Parameters 424

Configure Authorization Parameters for the Default DAP 426

DAP Record Aggregation 427

Troubleshooting DAP Deployment 432

ASDM Test Feature 432

ASA Logging 434

DAP Debugging 435

Exam Preparation Tasks 437

Review All Key Topics 437

Complete Tables and Lists from Memory 437

Define Key Terms 437

Chapter 13 Clientless SSL VPN with Cisco Secure Desktop 439

“Do I Know This Already?” Quiz 439

Foundation Topics 441

Cisco Secure Desktop Overview and Configuration 441

Prelogin Assessment 442

Host Scan 443

Secure Desktop (Vault) 443

xvi CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xvi

Page 18: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Cache Cleaner 443

Keystroke Logger Detection 444

Integration with DAP 444

Host Emulation Detection 444

Windows Mobile Device Management 444

Standalone Installation Packages 444

CSD Manual Launch 444

Secure Desktop (Vault) 446

Cache Cleaner 446

CSD Supported Browsers, Operating Systems, and Credentials 447

Enabling Cisco Secure Desktop on the ASA 450

Configure Prelogin Criteria 452

Keystroke Logger and Safety Checks 457

Cache Cleaner 457

Secure Desktop (Vault) General 458

Secure Desktop (Vault) Settings 459

Secure Desktop (Vault) Browser 460

Host Endpoint Assessment 460

Authorization Through DAPs 461

Troubleshooting Cisco Secure Desktop 463

Exam Preparation Tasks 465

Review All Key Topics 465

Complete Tables and Lists from Memory 465

Define Key Terms 465

Chapter 14 Clientless SSL VPN High-Availability and Performance Options 467

“Do I Know This Already?” Quiz 467

Foundation Topics 469

High-Availability Deployment Information and Common Strategies 469

Failover 469

Active/Active 469

Active/Standby 469

VPN Load Balancing (Clustering) 470

External Load Balancing 470

Redundant VPN Peering 470

Content Caching for Optimization 472

Clientless SSL VPN Load Sharing Using an External Load Balancer 473

Clustering Configuration for Clientless SSL VPN 474

Troubleshooting Load Balancing and Clustering 477

xvii

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xvii

Page 19: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Exam Preparation Tasks 479

Review All Key Topics 479

Complete Tables and Lists from Memory 479

Define Key Terms 479

Part IV Cisco IPsec Remote-Access Client Solutions

Chapter 15 Deploying and Managing the Cisco VPN Client 481

“Do I Know This Already?” Quiz 481

Foundation Topics 483

IPsec Review 483

IKEv1 483

AH and ESP 486

Cisco IPsec VPN Client Features 488

IPsec Client Software Installation and Basic Configuration 491

Connection Entries 495

Status 495

Certificates 495

Log 495

Options 495

Help 496

Create New VPN Connection Entry, Main Window 496

Authentication Tab 496

Transport Tab 497

Backup Servers Tab 497

Dial-Up Tab 497

Advanced Profile Settings 498

VPN Client Software GUI Customization 507

Troubleshooting VPN Client Connectivity 507

Exam Preparation Tasks 512

Review All Key Topics 512

Complete Tables and Lists from Memory 512

Define Key Terms 512

Part V Cisco Easy VPN Solutions

Chapter 16 Deploying Easy VPN Solutions 515

“Do I Know This Already?” Quiz 515

Foundation Topics 517

Configuration Procedures, Deployment Procedures, and Information

Gathering 517

xviii CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xviii

Page 20: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Easy VPN Basic Configuration 519

ASA IP Addresses 519

Configure Required Routing 519

Enable IPsec Connectivity 519

Configure Preferred IKEv1 and IPsec Policies 522

Client IP Address Assignment 527

VPN Client Authentication Using Pre-Shared Keys 529

Using XAUTH for VPN Client Access 532

IP Address Allocation Using the VPN Client 533

DHCP Configuration 538

Controlling Your Environment with Advanced Features 539

ACL Bypass Configuration 540

Basic Interface ACL Configuration 540

Per-Group ACL Configuration 542

Per-User ACL Configuration 543

Split-Tunneling Configuration 545

Troubleshooting a Basic Easy VPN 546

Exam Preparation Tasks 548

Review All Key Topics 548

Complete Tables and Lists from Memory 548

Define Key Terms 548

Chapter 17 Advanced Authentication and Authorization Using Easy VPN 551

“Do I Know This Already?” Quiz 551

Foundation Topics 553

Authentication Options and Strategies 553

Configuring PKI with IPsec Easy VPNs 556

Configuring Mutual/Hybrid Authentication 561

Configuring Digital Certificate Mappings 562

Provisioning Certificates from a Third-Party CA 566

Advanced PKI Deployment Strategies 570

Troubleshooting Advanced Authentication for Easy VPN 575

Exam Preparation Tasks 577

Review All Key Topics 577

Complete Tables and Lists from Memory 577

Define Key Terms 577

Chapter 18 Advanced Easy VPN Authorization 579

“Do I Know This Already?” Quiz 579

Foundation Topics 581

xix

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xix

Page 21: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Configuration Procedures, Deployment Strategies,

and Information Gathering 581

Configuring Local and Remote Group Policies 582

Assigning a Group Policy to a Local User Account 586

Assigning a Group Policy to a Connection Profile 586

Accounting Methods for Operational Information 588

NetFlow 9 591

RADIUS VPN Accounting 593

SNMP 594

Exam Preparation Tasks 597

Review All Key Topics 597

Complete Tables and Lists from Memory 597

Define Key Terms 597

Chapter 19 High Availability and Performance for Easy VPN 599

“Do I Know This Already?” Quiz 599

Foundation Topics 602

Configuration Procedures, Deployment Strategies,

and Information Gathering 602

Easy VPN Client HA and Failover 604

Hardware-Based Failover with VPNs 606

Configure Optional Active/Standby Failover Settings 610

Clustering Configuration for Easy VPN 612

Troubleshooting Device Failover and Clustering 615

Exam Preparation Tasks 619

Review All Key Topics 619

Complete Tables and Lists from Memory 619

Define Key Terms 619

Chapter 20 Easy VPN Operation Using the ASA 5505 as a Hardware Client 621

“Do I Know This Already?” Quiz 621

Foundation Topics 623

Easy VPN Remote Hardware Client Overview 623

Client Mode 623

Network Extension Mode 624

Configuring a Basic Easy VPN Remote Client Using the ASA 5505 625

Configuring Advanced Easy VPN Remote Client Settings for

the ASA 5505 627

X-Auth and Device Authentication 627

Remote Management 629

Enable Tunneled Management 630

xx CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xx

Page 22: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Clear Tunneled Management 630

NAT Traversal 631

Device Pass-Through 632

Troubleshooting the ASA 5505 Easy VPN Remote Hardware Client 633

Exam Preparation Tasks 637

Review All Key Topics 637

Complete Tables and Lists from Memory 637

Define Key Terms 637

Part VI Cisco IPsec Site-to-Site VPN Solutions

Chapter 21 Deploying IPsec Site-to-Site VPNs 639

“Do I Know This Already?” Quiz 639

Foundation Topics 642

Configuration Procedures, Deployment Strategies,

and Information Gathering 642

IKEv1 Phase 1 644

IKEv1 Phase 2 (Quick Mode) 645

Configuring a Basic IPsec Site-to-Site VPN 647

Configure Basic Peer Authentication 647

Enable IKEv1 on the Interface 648

Configure IKEv1 Policies 648

Configure Pre-Shared Keys 649

Configure Transmission Protection 650

Select Transform Set and VPN Peer 650

Define Interesting Traffic 652

Configure Advanced Authentication for IPsec Site-to-Site VPNs 656

Troubleshooting an IPsec Site-to-Site VPN Connection 661

Tunnel Not Establishing: Phase 1 662

Tunnel Not Establishing: Phase 2 662

Traffic Not Passing Through Your Tunnel 662

Exam Preparation Tasks 664

Review All Key Topics 664

Complete Tables and Lists from Memory 664

Define Key Terms 664

Chapter 22 High Availability and Performance Strategies for IPsec Site-to-SiteVPNs 667

“Do I Know This Already?” Quiz 667

Foundation Topics 669

Configuration Procedures, Deployment Strategies,

and Information Gathering 669

xxi

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxi

Page 23: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

High Assurance with QoS 670

Basic ASDM QoS Configuration 672

Deploying Redundant Peering for Site-to-Site VPNs 678

Site-to-Site VPN Redundancy Using Routing 679

Hardware-Based Failover with VPNs 683

Configure LAN Failover Interfaces 684

Configure Standby Addresses on Interfaces Used

for Traffic Forwarding 685

Define Failover Criteria 686

Configure Nondefault Mac Addresses 686

Troubleshooting HA Deployment 688

Exam Preparation Tasks 690

Review All Key Topics 690

Complete Tables and Lists from Memory 690

Define Key Terms 690

Part VII Exam Preparation

Chapter 23 Final Exam Preparation 693

Tools for Final Preparation 693

Pearson Cert Practice Test Engine and Questions on the CD 693

Install the Software from the CD 694

Activate and Download the Practice Exam 694

Activating Other Exams 695

Premium Edition 695

The Cisco Learning Network 695

Memory Tables 695

Suggested Plan for Final Review/Study 696

Using the Exam Engine 696

Summary 697

Part VIII Appendixes

Appendix A Answers to the “Do I Know This Already?” Quizzes 699

Appendix B 642-647 CCNP Security VPN Exam Updates, Version 1.0 703

Appendix C Memory Tables (CD only)

Appendix D Memory Tables Answer Key (CD only)

Glossary 707

Index 712

xxii CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxii

Page 24: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Icons Used in This Book

xxiii

WirelessRouter

Router ATM/FastGbEitherswitch

AccessPoint

Switch

SecureSwitch

Cisco IOSFirewall

CS-MARS IPS SSL VPNGateway

IP Phone AAA Server Web Server SecureEndpoint

Database

PC File/Application

Server

Laptop WirelessConnection

NetworkCloud

EthernetConnection

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxiii

Page 25: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

IntroductionThis book is designed to help you prepare for the Cisco VPN certification exam. The

VPN exam is one in a series of exams required for the Cisco Certified Network

Professional - Security (CCNP - Security) certification. This exam focuses on the applica-

tion of security principles with regard to Cisco IOS routers, switches, and virtual private

network (VPN) devices.

Who Should Read This Book

Network security is a complex business. It is important that you have extensive experi-

ence in and an in-depth understanding of computer networking before you can begin to

apply security principles. The Cisco VPN program was developed to introduce the

remote-access and site-to-site VPN products associated with or integrated into the Cisco

Adaptive Security Appliance (ASA) and available client software, explain how each prod-

uct is applied, and explain how it can increase the security of your network. The VPN

program is for network administrators, network security administrators, network archi-

tects, and experienced networking professionals who are interested in applying security

principles to their networks.

How to Use This Book

The book consists of 23 chapters. Each chapter tends to build upon the chapter that pre-

cedes it. The chapters that cover specific commands and configurations include case

studies or practice configurations.

The chapters of the book cover the following topics:

■ Chapter 1, “Evaluation of the ASA Architecture”: This chapter reviews the ASA

operation and architecture. It is this core of understanding that provides a good base

for the other chapters.

■ Chapter 2, “Configuring Policies, Inheritance, and Attributes”: This chapter

reviews the different methods used to apply policies and their contained attributes

for controlling and ultimately securing our remote users. The policy inheritance

model is also introduced to help network security personnel understand the results

of having multiple policy types configured.

■ Chapter 3, “Deploying an AnyConnect Remote-Access VPN Solution”: This chap-

ter introduces you to the Cisco AnyConnect remote-access VPN configuration and

client software. You learn how to configure a basic AnyConnect remote-access con-

nection, along with the configuration required basic remote user authentication.

■ Chapter 4, “Advanced Authentication and Authorization of AnyConnect VPNs”:

This chapter reviews the available mechanisms that can be configured to successfully

authenticate your remote users. We take a closer look at Public Key Infrastructure

(PKI) technology and its implementation as a standalone authentication mechanism,

along with the steps required for successful deployment of PKI and username/pass-

word-based authentication (doubling up on authentication).

xxiv CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxiv

Page 26: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

■ Chapter 5, “Advanced Deployment and Management of the AnyConnect Client”:

This chapter reviews the various methods of the AnyConnect client deployment and

installation available. In addition, we explore the various modules that are available

and their benefits.

■ Chapter 6, “Advanced Authorization Using AAA and DAPs”: This chapter

describes the role and implementation of advanced authorization, which enables us

to maintain complete control over the resources our remote users can or cannot

access before and during their connection to our VPN deployment. In addition, we

review the role of DAPs and how their configuration can be used to enhance the

authorization process.

■ Chapter 7, “AnyConnect Integration with Cisco Secure Desktop and Optional

Modules”: This chapter reviews the Cisco Secure Desktop (CSD) environment and

associated modules. We also introduce you to the optional AnyConnect modules

that are available for installation either as standalone components or deployed

through client profiles.

■ Chapter 8, “AnyConnect High Availability and Performance”: This chapter reviews

the different types of redundancy and high availability that can be deployed on the

ASA device through configuration of the AnyConnect client or with external hard-

ware.

■ Chapter 9, “Deploying a Clientless SSL VPN Solution”: This chapter introduces

you to the Cisco clientless Secure Sockets Layer (SSL) VPN implementation. In addi-

tion, we look at the configuration required for a basic deployment of an SSL VPN.

■ Chapter 10, “Advanced Clientless SSL VPN Settings”: This chapter reviews the

advanced settings that are available for our clientless SSL VPN deployment and the

available application-access methods and their configuration.

■ Chapter 11, “Customizing the Clientless Portal”: This chapter reviews the available

customization options we have when approaching the task of customizing our client-

less SSL VPN environment for our remote users. We also discuss the implementation

PKI and of double-authentication mechanisms.

■ Chapter 12, “Advanced Authorization Using Dynamic Access Policies”: This chap-

ter reviews the implementation and configuration of group policies and the available

attributes contained within. We also discuss the available logging and accounting

methods on the ASA.

■ Chapter 13, “Clientless SSL VPN with Cisco Secure Desktop”: This chapter

reviews the Cisco Secure Desktop environment and associated modules. In addition,

we cover how to deploy the CSD with a clientless SSL VPN solution.

■ Chapter 14, “Clientless SSL VPN High Availability and Performance Options”:

This chapter reviews the available HA and performance enhancements that can be

deployed when working with clientless SSL VPN solutions.

■ Chapter 15, “Deploying and Managing the Cisco VPN Client”: This chapter intro-

duces you to the Cisco IPSec VPN Client and its available methods of installation,

configuration, and advanced customization.

xxv

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxv

Page 27: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

■ Chapter 16, “Deploying Easy VPN Solutions”: This chapter introduces you to the

Cisco Easy VPN client and server architecture. In addition, we review the configura-

tion steps required for a basic Easy VPN deployment, XAUTH configuration, IP

address assignment, and so on

■ Chapter 17, “Advanced Authentication and Authorization Using Easy VPN”: In

this chapter, we review the configuration of PKI and its subsequent implementation

with Easy VPN deployments. We also cover certificate mappings and their role when

used for advanced authentication purposes.

■ Chapter 18, “Advanced Easy VPN Authorization”: This chapter describes the

implementation of group policies and the attributes that can be included to provide

advanced authorization of our remote users. In addition, this chapter describes log-

ging and accounting methods and their use with Easy VPN deployments.

■ Chapter 19, “High Availability and Performance for Easy VPN”: This chapter

describes the mechanisms that can be put in place to provide an HA solution that

will protect an organization from outages alongside an Easy VPN deployment.

■ Chapter 20, “Easy VPN Operation Using the ASA 5505 as a Hardware Client”:

This chapter introduces you to the Easy VPN hardware client capabilities of the

ASA 5505 device and the configuration required for successful deployment.

■ Chapter 21, “Deploying IPsec Site-to-Site VPNs”: This chapter introduces you to

the IPsec site-to-site VPN solution available on the ASA devices and the configura-

tion procedures required for a successful deployment.

■ Chapter 22, “High Availability and Performance Strategies for IPSec Site-to-Site

VPNs”: In this chapter, we discuss the available HA mechanisms for use when pro-

viding hardware- and software-level redundancy with an IPsec site-to-site VPN

deployment. We also review the available quality-of-service (QoS) mechanisms on

the ASA and their associated configuration.

■ Chapter 23, “Final Exam Preparation”: This short chapter lists the exam prepara-

tion tools useful at this point in the study process and provides a suggested study

plan now that you have completed all the earlier chapters in this book.

■ Appendix A, “Answers to the “Do I Know This Already?” Quizzes”: This appendix

provides the answers to the “Do I Know This Already?” quizzes that you will find at

the beginning of each chapter.

■ Appendix B, “642-647 CCNP Security VPN Exam Updates, Version 1.0”: This

appendix is intended to provide you with updated information if Cisco makes minor

modifications to the exam upon which this book is based. When Cisco releases an

entirely new exam, the changes are usually too extensive to provide in a simple

update appendix. In those cases, you need to consult the new edition of the book

for the updated content. This additional content about the exam will be posted as a

PDF document on this book’s companion website, at

www.ciscopress.com/title/9781587142567.

xxvi CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxvi

Page 28: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

■ Appendix C, “Memory Tables” (CD only): This appendix, which you will find in

PDF form on the CD accompanying this book, provides a series of tables that highlight

some of the key topics in each chapter. Each table provides some cues and clues that

will enable you to complete the table and test your knowledge about the table topics.

■ Appendix D, “Memory Tables Answer Key” (CD only): This appendix, which you

will find in PDF form on the CD accompanying this book, provides the completed

memory tables from Appendix C so that you can check your answers. In addition,

you can use this appendix as a standalone study tool to help you prepare for the

exam.

■ Glossary: This glossary defines the key terms that appear at the end of each chapter,

for which you should be able to provide definitions on your own in preparation for

the exam.

Each chapter follows the same format and incorporates the following tools to assist you

by assessing your current knowledge and emphasizing specific areas of interest within

the chapter:

■ “Do I Know This Already?” Quiz: Each chapter begins with a quiz to help you

assess your current knowledge about the subject. The quiz is divided into specific

areas of emphasis that enable you to best determine where to focus your efforts

when working through the chapter.

■ Foundation Topics: The foundation topics are the core sections of each chapter.

They focus on the specific protocols, concepts, or skills that you must master to suc-

cessfully prepare for the examination.

■ Exam Preparation: Near the end of each chapter, the Exam Preparation section

highlights the key topics from the chapter and the pages where you can find them for

quick review. This section also refers you to the Memory Tables appendixes, and pro-

vides a list of key terms that you should be able to define in preparation for the

exam. It is unlikely that you will be able to successfully complete the certification

exam by just studying the key topics, memory tables, and key terms, although they

are a good tool for last-minute preparation just before taking the exam.

■ Practice exam on CD-ROM: This book includes a CD-ROM containing several

interactive practice exams. It is recommended that you continue to test your knowl-

edge and test-taking skills by using these exams. You will find that your test-taking

skills will improve by continued exposure to the test format. Remember that the

potential range of exam questions is limitless. Therefore, your goal should not be to

“know” every possible answer but to have a sufficient understanding of the subject

matter so that you can figure out the correct answer with the information provided.

Certification Exam and This Preparation Guide

The questions for each certification exam are a closely guarded secret. The truth is that if

you had the questions and could only pass the exam, you would be in for quite an embar-

rassment as soon as you arrived at your first job that required these skills. The point is to

xxvii

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxvii

Page 29: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

know the material, not just to successfully pass the exam. We do know which topics you

must know to successfully complete this exam, because they are published by Cisco.

Coincidentally, these are the same topics required for you to be proficient when configur-

ing Cisco security devices. It is also important to understand that this book is a “static”

reference, whereas the exam topics are dynamic. Cisco can and does change the topics

covered on certification exams often. This exam guide should not be your only reference

when preparing for the certification exam. You can find a wealth of information available

at Cisco.com that covers each topic in painful detail. The goal of this book is to prepare

you as well as possible for the VPN exam. Some of this is completed by breaking a 600-

page (average) implementation guide into a 30-page chapter that is easier to digest. If you

think that you need more detailed information about a specific topic, feel free to surf.

Table I-1 lists each exam topic along with a reference to the chapter that covers the topic.

Table I-1 VPN Exam Topics and Chapter References

Exam Topic Chapter Where

Topic Is Covered

Preproduction Design

Choose ASA VPN technologies to implement high-level 1, 3, 8, 15, 16, 21

design (HLD) based on given requirements

Choose the correct ASA model and license to implement 1, 3, 8, 15, 16, 21

HLD based on given performance requirements

Choose the correct ASA VPN features to implement HLD 1–5, 8–10, 15–17, 20, 21

based on given corporate security policy and network

requirements

Integrate ASA VPN solutions with other security technology 1–5, 8–10, 15–21

domains (CSD, ACS, device managers, cert servers, and so on)

Complex Operations Support

Optimize ASA VPN performance, 3–5, 7–10, 15–22

functions, and configurations

Configure and verify complex ASA VPN networks using 3–10, 15–22

features such as DAP, CSD, smart tunnels, AnyConnect SSL

VPN, clientless SSL VPN, site-to-site VPN, RA VPN,

certificates, QoS, and so on to meet security policy

requirements

Create complex ASA network security rules using such 4–6, 10–12, 15, 17, 18, 20

features as ACLs, DAP, VPN profiles, certificates, MPF, and

so on to meet the corporate security policy

Advanced Troubleshooting

Perform advanced ASA VPN 4–6, 8, 10–12, 14, 15,

configuration and troubleshooting 17–19, 22

xxviii CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxviii

Page 30: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

You will notice that not all the chapters map to a specific exam topic. This is because of

the selection of evaluation topics for each version of the certification exam. Our goal is

to provide the most comprehensive coverage to ensure that you are well prepared for the

exam. To do this, we cover all the topics that have been addressed in different versions of

this exam (past and present). Network security can (and should) be extremely complex

and usually results in a series of interdependencies between systems operating in concert.

This book shows you how one system (or function) relies on another, and each chapter of

the book provides insight into topics in other chapters. Many of the chapters that do not

specifically address exam topics provide a foundation that is necessary for a clear under-

standing of network security. Your short-term goal might be to pass this exam, but your

overall goal is to become a qualified network security professional.

Note that because security vulnerabilities and preventive measures continue apace, Cisco

Systems reserves the right to change the exam topics without notice. Although you can

refer to the list of exam topics listed in Table I-1, always check the Cisco Systems website

to verify the actual list of topics to ensure that you are prepared before taking an exam.

You can view the current exam topics on any current Cisco certification exam by visiting

its website at Cisco.com, hovering over Training & Events, and selecting from the

Certifications list. Note also that, if needed, Cisco Press might post additional preparato-

ry content on the web page associated with this book at

www.ciscopress.com/title/9781587142567. It is a good idea to check the website a cou-

ple of weeks before taking your exam to be sure that you have up-to-date content.

Overview of the Cisco Certification Process

The network security market is currently in a position where the demand for qualified

engineers vastly surpasses the supply. For this reason, many engineers consider migrating

from routing/networking over to network security. Remember that “network security” is

just “security” applied to “networks.” This sounds like an obvious concept, but it is actu-

ally an important one if you are pursuing your security certification. You must be famil-

iar with networking before you can begin to apply the security concepts. For example,

the skills required to complete the CCNP Security exam will give you a solid foundation

that you can expand upon and use when working in the network security field.

The requirements for and explanation of the CCNP Security certification are outlined at

the Cisco Systems website. Go to Cisco.com, hover over Training & Events, and select

CCNP Security from the Certifications list.

Taking the VPN Certification Exam

As with any Cisco certification exam, it is best to be thoroughly prepared before taking

the exam. There is no way to determine exactly what questions are on the exam, so the

best way to prepare is to have a good working knowledge of all subjects covered on the

exam. Schedule yourself for the exam and be sure to be rested and ready to focus when

taking the exam.

The best place to find out the latest available Cisco training and certifications is under the

Training & Events section at Cisco.com.

xxix

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxix

Page 31: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Tracking CCNP Security Status

You can track your certification progress by checking www.cisco.com/go/certifications/login.

You must create an account the first time you log in to the site.

How to Prepare for an Exam

The best way to prepare for any certification exam is to use a combination of the prepa-

ration re-sources, labs, and practice tests. This guide has integrated some practice ques-

tions and labs to help you better prepare. It is encouraged that you have hands-on experi-

ence with the Cisco ASA devices. There is no substitute for experience, and it is much

easier to understand the commands and concepts when you can actually work with Cisco

ASA devices. If you do not have access to a Cisco ASA device, you can choose from

among a variety of simulation packages available for a reasonable price. Last, but certain-

ly not least, Cisco.com provides a wealth of information about the Cisco ASA device, all

the products that operate using Cisco ASA software, and the products that interact with

Cisco ASA devices. No single source can adequately prepare you for the VPN exam

unless you already have extensive experience with Cisco products and a background in

networking or network security. At a minimum, you will want to use this book combined

with the Technical Support and Documentation site resources

(www.cisco.com/cisco/web/support/index.html) to prepare for this exam.

Assessing Exam Readiness

After completing a number of certification exams, we have found that you do not actual-

ly know whether you are adequately prepared for the exam until you have completed

about 30 percent of the questions. At this point, if you are not prepared, it is too late.

The best way to determine your readiness is to work through the “Do I Know This

Already?” quizzes at the beginning of each chapter. It is best to work your way through

the entire book unless you can complete each subject without having to do any research

or look up any answers.

Cisco Security Specialist in the Real World

Cisco has one of the most recognized names on the Internet. You cannot go into a data

center or server room without seeing some Cisco equipment. Cisco-certified security spe-

cialists can bring quite a bit of knowledge to the table because of their deep understanding

of the relationship between networking and network security. This is why the Cisco certi-

fication carries such clout. Cisco certifications demonstrate to potential employers and

contract holders a certain professional-ism and the dedication required to complete a goal.

Face it, if these certifications were easy to acquire, everyone would have them.

xxx CCNP Security VPN 642-647 Official Cert Guide

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxx

Page 32: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Cisco ASA Software Commands

A firewall or router is not normally something to play with. That is to say that after you

have it properly configured, you will tend to leave it alone until there is a problem or you

need to make some other configuration change. This is the reason that the question mark

(?) is probably the most widely used Cisco IOS and Cisco ASA software command.

Unless you have constant exposure to this equipment, it can be difficult to remember the

numerous commands required to configure devices and troubleshoot problems. Most

engineers remember enough to go in the right direction but will use the ? to help them

use the correct syntax. This is life in the real world. Unfortunately, the question mark is

not always available in the testing environment.

Rules of the Road

We have always found it confusing when different addresses are used in the examples

throughout a technical publication. For this reason, we use the address space defined in

RFC 1918. We understand that these addresses are not routable across the Internet and

are not normally used on outside interfaces. Even with the millions of IP addresses avail-

able on the Internet, there is a slight chance that we could have chosen to use an address

that the owner did not want published in this book.

It is our hope that this will assist you in understanding the examples and the syntax of

the many commands required to configure and administer Cisco ASA devices.

Exam Registration

The VPN exam is a computer-based exam, with multiple-choice, fill-in-the-blank, list-in-

order, and simulation-based questions. You can take the exam at any Pearson VUE

(www.pearsonvue.com) testing center. Your testing center can tell you the exact length of

the exam. Be aware that when you register for the exam, you might be told to allow a cer-

tain amount of time to take the exam that is longer than the testing time indicated by the

testing software when you begin. This discrepancy is because the testing center will want

you to allow for some time to get settled and take the tutorial about the test engine.

Book Content Updates

Because Cisco Systems occasionally updates exam topics without notice, Cisco Press

might post additional preparatory content on the web page associated with this book at

www.ciscopress.com/title/9781587142567. It is a good idea to check the website a cou-

ple of weeks before taking your exam, to review any updated content that might be post-

ed online. We also recommend that you periodically check back to this page on the Cisco

Press website to view any errata or supporting book files that may be available.

xxxi

00_9781587142567_fm.qxd 6/15/11 2:20 PM Page xxxi

Page 33: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

This chapter covers the following subjects:

■ Policies and Their Relationships: In this section,

we review the available policies that can be applied

during a VPN connection and how they work to-

gether to form the overall policy applied to a re-

mote user.

■ Understanding Connection Profiles: In this sec-

tion, we discuss the role of connection profiles, their

configuration elements, and how they are applied to

remote users.

■ Understanding Group Policies: In this section, we

discuss the role of group policies for attribute as-

signment and control of your remote users.

■ Configure User Attributes: In this section, we re-

view the creation of a user account and take a look at

the available parameters and attributes that can be

assigned to an individual remote user.

■ Using External Servers for AAA and Policy As-signment: In this section, we discuss the role of

AAA servers and briefly cover their configuration

and how we can deploy policies through them.

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 46

Page 34: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

CHAPTER 2

Configuring Policies, Inheritance, andAttributes

An important part of the deployment of a Secure Sockets Layer (SSL) or IPsec virtual pri-

vate network (VPN) connection is the use of policies to allow access to resources through

the VPN tunnel and the ability to control the access granted to those resources, whether

this is based on the user and their internal group membership or department, the site and

specific resources they are accessing, or role in the company.

We are given a wide range of options that can be configured and specified using the avail-

able policy set in the Adaptive Security Appliance (ASA), allowing us to take a very granu-

lar approach to allow or deny access based on a user’s attributes. Furthermore, if a user is

a member of multiple groups in the business, we can assign multiple policies, resulting in

the inheritance of higher-level policies and only the more specific attributes being directly

assigned.

In this chapter, we take a look at the methods available for policy assignment both in real-

life scenarios and throughout this book. We then review how these policy methods work

together if more than one is assigned to a user through the inheritance mode.

“Do I Know This Already?” QuizThe “Do I Know This Already?” quiz helps you determine your level of knowledge on this

chapter’s topics before you begin. Table 2-1 details the major topics discussed in this chap-

ter and their corresponding quiz sections.

Table 2-1 “Do I Know This Already?” Section-to-Question Mapping

Foundation Topics Section Questions

Policies and Their Relationships 2

Understanding Connection Profiles 1, 3

Understanding Group Policies 4, 5

Using External Servers for AAA and Policy Assignment 6

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 47

Page 35: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

48 CCNP Security VPN 642-647 Official Cert Guide

1. Which of the following are available methods of assigning a connection profile?

(Choose all that apply.)

a. User connection profile lock

b. Certificate to connection profile maps

c. User choice using a menu in either clientless or full-tunnel VPN

d. All of the above

2. Which of the following policy types take precedence over all others configured

based on the ASA policy hierarchy?

a. DAPs

b. Group policy

c. Connection profile

d. User attributes

3. Which two of the following are the default connection profiles that exist on the

ASA device?

a. DefaultRAGroup

b. DefaultWebVPNGroup

c. DefaultL2LGroup

d. DefaultAnyConnectGroup

4. Which of the following objects can be used for post-login policy assignment?

(Choose all that apply.)

a. Connection profiles

b. User attributes

c. Group policies

d. DAPs

5. Which of the following are valid group policy types?

a. External

b. Internal

c. Local

d. Remote

6. When configuring external group policies, which AAA protocols or servers can you

use for authorization?

a. RADIUS

b. SDI

c. TACACS+

d. LDAP

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 48

Page 36: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 49

Foundation Topics

Policies and Their RelationshipsUser policy and connection parameter enforcement is an important part of any VPN de-

ployment. Without it, we cannot provide login parameters, authorization methods, or re-

source access for our users, which control what they can or cannot access and when.

An important part of policy assignment is the ability to provide flexibility and scalability

to both administrators configuring them and the remote users using them.

■ Flexibility is achieved through being able to assign the same security or network set-

tings to any user or group regardless of their connection type.

■ Scalability is achieved through modularity and policy inheritance, limiting the

amount of duplicate configuration items required by policy reuse among groups or

individual users.

All remote users must go through two phases before they can successfully connect and

start to access resources made available through your VPN connection:

■ The prelogin phase is achieved through the use of connection profiles (also known as

tunnel groups). In connection profiles, we can carry out the assignment of connec-

tion attributes and parameters (for example, authentication, authorization, and ac-

counting [AAA] and IP address assignment) and define the available connection

methods (for example, IKEv1 and IKEv2 SSL), allowing our users to start the login

process.

■ The post-login phase is achieved through the use of group policy objects, Dynamic

Access Policies (DAPs), and user-specific attributes. These may include such items as

IPv4 or IPv6 access lists, Domain Name System (DNS) servers, access hours, split tun-

neling, and so on. Group policies offer a great deal of flexibility when assigning at-

tributes to users, either individually in a user account or groupwide by assignment to

a connection profile. DAPs provide an advanced policy assignment method based on

user AAA attributes or client device posture assessment. We discuss DAPs, their con-

figuration, and deployment in later chapters.

Different policy types, although they include their own specific attributes, are really just

containers that can be used to hold multiple configuration items that might have been

used multiple times already in different policies. For example, we can configure an access

control list (ACL) (we’ll call it Server_Access) to only allow access between remote client

A and corporate server A. We assign it to the group policy object AnyConnect, limiting

internal resource access for our AnyConnect users. Later, we create a new group policy

for our IPsec VPN users and assign our Server_Access ACL to this group policy, as well.

In our example, we have two groups of users accessing our corporate network through

their own protocol-specific connection profiles (AnyConnect and IPsec). Each of the two

connection profiles has its own group policy objects, both using our Server_Access ACL.

Key Topic

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 49

Page 37: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

50 CCNP Security VPN 642-647 Official Cert Guide

If we want to reduce the amount of configuration we have to carry out but still allow each

connection group to have its specific attributes (for example, IP address pools and DNS

servers), we can create a single group policy object using our Server_Access ACL and ap-

ply this to each connection profile.

Furthermore, if we want to really minimize the amount of configuration we have on our

device, and the only difference between these two groups of users is their connection

type (that is, they do not require any further attribute or parameter assignments between

them), we can create a single connection profile allowing multiple connectivity types and

attach the single group policy that uses our Server_Access ACL. Later, if one of our users

requires access to corporate server B, we can create a custom ACL and apply it directly to

their user account, or create a user-specific group policy object and assign this directly to

our user.

We can be as specific as we like or as needs require for our particular environment, either

sharing multiple policies between multiple groups, reusing multiple attributes in multiple

policies, using multiple groups connecting to one connection profile, or configuring each

group to have its own specific connection profiles, policies, and attributes. The choice is,

well, yours.

As we create our connection profiles and policies, we might end up with a user who has

been assigned the same attributes multiple times by separate policies. These might have

been applied because of the user’s group or department membership, connection type, or

location. Regardless of the reason for these assignments, the result is that our user’s poli-

cies are merged and assigned in a hierarchical fashion.

The hierarchal policy model shown in Figure 2-1 works from top to bottom with any at-

tributes set within policy assignment methods toward the top of the list (DAPs), taking

precedence over any conflicting attributes assigned within methods toward the end of the

list (default group policy object).

Each connection entry has its own default group policy object. As shown in Figure 2-1,

the default group policy is at the end of the policy hierarchy. As a result, any

attributes/settings that have not been configured within policies already assigned to a

user are applied using the attribute assignment of the default group policy.

The same applies to other policy types within the policy hierarchy. However, if two pol-

icy types contain different values for the same attribute or property, the user is assigned

the attribute set within the policy type that is higher in the hierarchy. For example, if IP

pool A has been assigned to the group policy applied to the connection profile and IP

pool B has been assigned to the user account directly, the user is assigned an IP address

from IP pool B.

Understanding Connection ProfilesAs you saw earlier, connection profiles provide our users with the necessary prelogin poli-

cies that must successfully establish a connection to our ASA device. We can also use

connection profiles to separate our connecting users into the relevant groups that may re-

quire separate methods of access (for example, clientless SSL VPN, AnyConnect VPN ses-

sions, or even separate AAA methods).

Key Topic

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 50

Page 38: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 51

User Connects

Dynamic Access Policy

User Attribute Assignment

User AccountGroup Policy

Connection ProfileGroup Policy

Default GroupPolicy

Figure 2-1 ASA VPN Policy Enforcement Hierarchy

Consider the following scenario. You have two groups of users connecting into your envi-

ronment: guests and corporate employees. Guests connecting into your organization do

not require the same level of access as your employees. In fact, they only require access to

an internal intranet portal. On the other hand, your corporate employees require access to

internal file servers and email. Based on the level of access required by each group, we

could create two connection profiles, aptly named Guests and Corporate for our discus-

sion. Our Guests connection profile would only allow access for incoming clientless SSL

VPNs and authenticate connecting users with a shared guest internal username and pass-

word. A group policy (covered in greater depth during the next section) would be applied

to our connection profile containing the relevant bookmarks needed for browsing our

company’s intranet in the SSL VPN portal. However, our Corporate connection profile

would allow access for incoming AnyConnect SSL, IKEv2, and IKEv1 (IPsec VPN clients),

and an IP address would be assigned per remote user from an existing IP address pool. Au-

thentication and authorization would be carried out using a combination of a one-time

password (OTP) and internal Windows Active Directory server. A group policy would be

applied to the connection profile to provide users with split-tunnel lists and access lists, re-

stricting communication to only those internal subnets and devices that are required.

A few methods are available for allowing our users to select/connect to the appropriate

connection profile they require. Depending on the authentication scheme we have config-

ured for our users and their chosen login method (clientless SSL VPN, AnyConnect, IPsec

client), they can either select a connection profile manually from a list of those available or

have it selected for them automatically, based on one of the following methods:

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 51

Page 39: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

52 CCNP Security VPN 642-647 Official Cert Guide

■ Group URL

■ Group alias

■ Certificate to connection profile mapping

■ Per-user connection profile lock

Group URL

Group URLs allow remote users to select a connection profile by entering the direct URL

configured for the profile they require. An example of a configured group URL is either of

the following:

https://<ASA IP address>/<connection profile>

https://<ASA FQDN>/<connection profile>

Group Alias

Group aliases allow clientless SSL VPN users to select the appropriate connection profile

from a list at the portal login page and AnyConnect users to select a connection profile in

the client software. Both scenarios occur before a user has logged in and are covered in

greater detail in Chapter 3, “Deploying an AnyConnect Remote-Access VPN Solution,”

and Chapter 9, “Deploying a Clientless SSL VPN Solution.” As shown in Figure 2-2, the

configuration of both a group alias and group URL is carried out in the Group Alias/Group

URL pane of a connection profiles properties window. We navigate to Configuration > Re-

mote Access VPN > Network (Client) Access | Clientless SSL VPN Access > AnyCon-

nect Connection Profiles | Connection Profiles, select the connection profile, click Edit,

and then use the menu on the left side to select Advanced > Group Alias/Group URL.

Figure 2-2 Connection Profile Group URL and Alias Configuration

Key Topic

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 52

Page 40: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 53

As you will also see in later chapters, before our remote users can select a connection pro-

file by group alias, we must first enable this feature on the ASA in the respective connection

profiles pane of the Adaptive Security Device Manager (ASDM), as shown in Figure 2-3.

For example, we can enable our AnyConnect and clientless SSL VPN users to select a con-

nection profile in their client software or from the portal login page using the following steps:

■ AnyConnect Users: Navigate to Configuration > Remote Access VPN > Network

(Client) Access > AnyConnect Connection Profiles. In the Login Page Setting section

of the window, select Allow User to Select Connection Profile, Identified by Its Alias.

■ Clientless SSL VPN Users: Navigate to Configuration > Remote Access VPN >

Clientless SSL VPN Access > Connection Profiles. In the Login Page Setting section

of the window, select Allow User to Select Connection Profile, Identified by Its Alias.

Figure 2-3 Connection Profile Pane: Allow Group Alias Selection

Certificate to Connection Profile Mapping

If you have chosen to use digital certificate authentication for your connection profiles,

the distinguished name (DN) values in a remote user’s certificate can be used to select the

appropriate connection profile. For example, if the remote user initiating a connection is a

member of the Accounts team, his certificate DN value may equal OU=Accounts. Using

certificate-to-connection profile maps, the ASA can be configured to match any connect-

ing users with the value of OU=Accounts to a custom connection profile created for Ac-

counts department personnel. You can apply the same actions to any DN values held in

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 53

Page 41: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

54 CCNP Security VPN 642-647 Official Cert Guide

Figure 2-4 Configuring Per-User Connection Profile Lock

your user certificates (as discussed in Chapter 9 and Chapter 4, “Advanced Authentication

and Authorization of AnyConnect VPNs”).

Per-User Connection Profile Lock

We can also assign a connection profile directly to remote users on an individual basis.

For example, we might have a specific connection profile for our VPs and want to make

the process of connecting as seamless as possible for them without their having to first en-

ter or select a connection profile.

The process of assigning a connection profile directly to a user can be achieved in the

properties menu of the user’s account, as shown in Figure 2-4.

We begin by selecting the user account to edit from Configuration > Device Manage-

ment > Users/AAA > User Accounts, and then click Edit. In the Edit User Account win-

dow, select VPN Policy from the menu on the left, and in the pane on the right side,

uncheck the Connection Profile (Tunnel Group) Lock Inherit check box. Using the drop-

down list, select the appropriate connection profile to be assigned to this user.

We see a great deal more of connection profiles and their use in the chapters that follow. It

is important to note at this stage that we can only allow clientless SSL VPN and client-

based (AnyConnect) VPN remote users the option to select a connection profile. As dis-

cussed in Chapter 15, “Deploying and Managing the Cisco VPN Client,” when we work

with IPsec remote-access VPNs, the connection profile name is configured in the client

software as the group name and must match before a successful connection can occur.

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 54

Page 42: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 55

Default Connection Profiles

Besides our own custom connection profiles, default connection profiles are applied to a

user’s session if the various connection parameters in manually configured connection

profiles are not satisfied and the user is not allowed to select the connection profile be-

fore login.

Three default connection profiles are configured on the ASA, as listed here. These cannot

be removed, but they can be modified, allowing us to change the settings to match our

environment:

■ DefaultRAGroup: Used for client-based (AnyConnect) SSL VPNs and IPsec remote-

access VPNs.

■ DefaultWEBVPNGroup: Used for clientless SSL VPNs.

■ DefaultL2LGroup: Used for IPsec LAN-to-LAN connections.

The default connection profiles, as mentioned earlier, are used mainly for global property

assignment or a catchall mechanism for users that may only require a basic VPN portal

(webmail and so on) and are not able to or allowed to select a connection profile. It is rec-

ommended that your own custom connection profiles be created for your specific VPN

deployments, instead of relying on the default connection profiles for remote user connec-

tion establishment.

By default, when using plain old username and password-based authentication for remote

user authentication, users are automatically connected to the appropriate default connec-

tion profile based on their connection method (that is, clientless SSL, IPsec, and so on).

We can overcome this problem by providing our remote users with the means to select a

connection profile before authenticating (either from a drop-down list in the clientless SSL

portal or the AnyConnect client). If we have deployed username and password-based au-

thentication (no certificates) for our clientless SSL and AnyConnect VPNs, however, and

we have configured our ASA to provide our remote users with the ability to select a con-

nection profile, users must select an available connection profile from the list in order to

continue. If they do not select a connection profile, they are mapped to their default con-

nection profile.

When using certificate-based authentication the game changes, and the default connec-

tion profile is used only if predefined fields within a user’s certificate do not match the

values we configure in Certificate to Connection Profile Mapping Rules for automatic

connection profile assignment.

The process that occurs when using the Cisco IPsec VPN client is different from that just

described for both clientless and full-tunnel connections, again depending on the type of

authentication method in use. As you will see later in Chapter 15, “Deploying and Manag-

ing the Cisco VPN Client,” when deploying IPsec remote-access connections using pre-

shared key authentication, the connection profile name must be entered exactly into the

client software (in the Group Name field). If the connection process fails, the client is not

assigned to the default connection profile for the specific method of connection (Default-

RAGroup). Instead, the connection fails.

Key Topic

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 55

Page 43: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

56 CCNP Security VPN 642-647 Official Cert Guide

If we are using certificate-based authentication with the Cisco IPsec VPN client, we are

not given the option of selecting or entering a connection profile/group name. Instead, we

must either configure our own certificate to connection profile mappings, or by default,

the ASA attempts to match the OU field value of the certificate to an available connection

profile with the same name. If one or both of these methods fail, unlike with the pre-

shared key method, the remote user is mapped to the DefaultRAGroup connection profile

instead of being disconnected.

The DefaultL2LGroup acts as a catchall for any LAN-to-LAN IPsec VPN sessions that do

not match on a manually administrator-configured connection profile, regardless of its au-

thentication type, pre-shared-key, or if it is certificate based.

Note that, by default, neither DefaultWEBVPNGroup nor DefaultRAGroup allows for

AnyConnect sessions, because these connection profiles have the DfltGrpPolicy group

policy attached, which only permits clientless SSL VPN, IPsec VPN, and L2TP/IPsec ses-

sions. These settings can, of course, be modified.

As you move through the rest of the book, you will many more uses of connection pro-

files with all available types of connectivity offered by the ASA device, in addition to

many advanced features that are available within a connection profile.

Connection profiles are created by first navigating to Configuration > Remote Access

VPN or Site-to-Site VPN. Depending on the chosen method of connectivity (whether this

be clientless SSL, IKEv1, IKEv2, or so forth), select one of the following options in the Re-

mote Access VPN or Site-to-Site VPN areas to continue:

Remote Access VPN:

■ Network (Client) Access: Use for AnyConnect (full tunnel) SSL and IKEv2, Cisco

IPsec VPN client, and IKEv1 connections.

■ Clientless SSL VPN: Use for browser-based clientless SSL VPN connections.

Site-to-Site VPN:

■ Connection Profiles: Use for all site-to-site connection profiles.

After navigating to the appropriate area, create a connection profile by selecting Add on

the right side of the window. The Add Connection Profile window appears, as shown in

Figure 2-5.

In this window, the connection profile is given a name, the authentication method se-

lected, and custom attributes assigned (such as IP address pools, Dynamic Host Configu-

ration Protocol (DHCP) servers, group policies, and so on). These settings are described in

detail in later chapters.

Understanding Group PoliciesAs you saw earlier, a group policy object is a container for the various attributes and post-

login parameters that can be assigned to VPN users, and to endpoints such as IPv4 and

IPv6 ACLs, DHCP servers, address pools, and so on.

Key Topic

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 56

Page 44: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 57

Figure 2-5 Connection Profile Creation

Group policies can simplify the configuration required by allowing for their assignment to

multiple users or connection profiles. This provides a greater level of scale, flexibility, and

management when working with multiple connection methods and remote users.

Group policies may be internal (local) or external (remote). Both internal and external

group policies are configured on the ASA. However, unlike internal policies, which hold

their configured attributes and parameters locally on the ASA, external group policy at-

tributes and parameters are configured and stored on external AAA servers. During a login

attempt, the configured AAA authorization servers are contacted and send back the rele-

vant policy attributes and parameters, based on the connecting user’s policy assignment.

For more information about external group policy objects, see Chapter 4, “Advanced Au-

thentication and Authorization of AnyConnect VPNs.” For the remainder of this section,

we focus only on the deployment and configuration of local group policies.

Group policies, as previously mentioned, are applied to either a connection profile or a

user account directly. They do not provide any function while they are unassigned.

Although we can select the connection method that a group policy can apply to (for ex-

ample, IKEv1, IKEv2, or AnyConnect SSL), unlike connection profiles, group policy ob-

jects are not locally specific to a connection profile type. If we create a group policy in

the Network (Client) Access area of the ASDM for our AnyConnect or IPsec remote-ac-

cess clients, the same group policy is globally available among the other connection types,

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 57

Page 45: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

58 CCNP Security VPN 642-647 Official Cert Guide

Figure 2-6 Internal Group Policy Creation

and we can select, edit, or delete it within the Group Policies section of the Site-to-Site or

Clientless SSL VPN areas of the ASDM. This enables us to reuse our group policy objects,

not just by multiple connection profiles of the same type, but by all connection profile

types and remote users regardless of their connection method (depending on the config-

ured protocols in the group policy itself). However, not all configuration areas or items

may be available, depending on the configuration area you are using to add or edit your

group policy object. For example, when configuring a site-to-site group policy object,

there is no need for us to be able to see all the remote user-specific attributes and parame-

ters that might be assigned, because they are unavailable for use in the connection type

being configured.

Group policy objects are configured in any one of these three areas:

■ Configuration > Remote Access VPN > Network (client) Access > Group Policies

■ Configuration > Remote Access VPN > Clientless SSL VPN > Group Policies

■ Configuration > Site-to-Site VPN > Group Policies

Select Add > Internal Group Policy, and the window shown in Figure 2-6 appears.

We begin by giving our group policy object a name, a banner, and address pools. If we ex-

pand the More Options section of the window, we are presented with a greater list of pa-

rameters that may be configured to further tailor the experience our remote users have

when connecting to our VPN deployment. All these options are covered in later chapters.

For now, it is just important to at least know they exist and how to get to them.

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 58

Page 46: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 59

You might have noticed also in Figure 2-6 that all the fields in the Add Internal Group Pol-

icy window have the Inherit option in front of them. Similar to connection profiles, the

ASA also has a default group policy object DfltGrpPolicy that cannot be deleted. How-

ever, its properties can be modified and indirectly applied to our configured group poli-

cies, as they all by default inherit the settings configured in DfltGrpPolicy.

Configure User AttributesWe have several choices of which users to use. We can use local users or remote users that

have been created specifically for our deployment on RADIUS, TACACS+, or other re-

mote AAA servers. We can also use an existing database of users. For example, a com-

pany might want to use their existing Microsoft Windows Active Directory deployment

for the management of new users and allow their internal users to connect into their envi-

ronment remotely.

Many of the examples in this book use the internal user database (local users) available

on the ASA. The policies and parameters we can assign to either local or remote users are

the same by using either connection profiles or group policy objects. However, in a lo-

cally configured user, we can also assign attributes and policy objects directly to their

user account using the various properties available. (For example, in the preceding sec-

tions we discussed the assignment of group policies and connection profiles to a user ac-

count directly.)

Local user accounts are configured on the ASA device in the Device Management >

Users/AAA > User Accounts area of the ASDM. Begin by creating a new user account,

shown in Figure 2-7, by selecting Add.

We enter a username, password, and the type of management access our user will have to

the ASA device (for example, telnet, Secure Shell [SSH], ASDM). Depending on the type

of user account we are creating (VPN User, Management Only, VPN User with Manage-

ment Functions), select the appropriate level of management access to the ASA to grant

the user. By default, any new user accounts created are given the option of Full Access to

the ASA. However, if our users are only created for the purposes of connecting to our

VPNs, there is no requirement for them to have management access to the ASA, and this

option should be changed to No ASDM, SSH, Telnet, or Console Access instead.

We can further customize the user experience during their VPN connection by assigning

the various options available, either when connecting through a clientless SSL VPN ses-

sion or AnyConnect full-tunnel session (for example, bookmark lists, Smart Tunnel appli-

cations and access, manual or automatic download of the AnyConnect client). However, it

is recommended if you have multiple users in your VPN deployment that all have similar

parameters and settings attached to their account. Assignment of these attributes should

be carried out using group policy objects or connection profiles for ease of management.

As you continue through this book, you will see the creation of local user accounts in de-

tail, along with the advanced attributes that are available to them and the results that oc-

cur after their assignment.

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 59

Page 47: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

60 CCNP Security VPN 642-647 Official Cert Guide

Figure 2-7 ASDM Local User Account Creation

Using External Servers for AAA and PoliciesAs briefly discussed earlier, not only can we use remote AAA servers for the purposes of

user creation and management, we can also use them for the purposes of policy assign-

ment using external group policies.

The use of an external AAA server for the purposes of policy assignment is recom-

mended. This provides centralized policy storage and management where a VPN deploy-

ment might have more than one ASA device available (for example, when using two or

more ASA devices in a VPN cluster).

The ASA device supports the following external AAA server types and protocols for au-

thorization purposes:

■ RADIUS

■ TACACS+

■ LDAP

■ NT Domain

■ SDI

■ Kerberos

■ HTTP Form

Key Topic

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 60

Page 48: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 61

Figure 2-8 ASDM Local User Account Creation

Only two of the protocols are available for use with external group policy assignment:

RADIUS and Lightweight Directory Access Protocol (LDAP). In earlier ASA releases,

TACACS+ was also available for external policy assignment. However, because of the lack

of support offered by the protocol for the purposes of policy assignment compared to the

parameters offered by RADIUS and LDAP, TACACS+ has been removed for this purpose.

(TACACS+ support has been removed for use with external group policy assignment only;

the protocol still exists for use as an AAA server for user authentication purposes.)

To create a new external group policy object whose name will exist on the ASA device (al-

though all attributes that are stored in the group policy exist only on the configured RA-

DIUS or LDAP server), navigate to one of the following locations:

■ Configuration > Remote Access VPN > Network (client) Access > Group Policies

■ Configuration > Remote Access VPN > Clientless SSL VPN > Group Policies

■ Configuration > Site-to-Site VPN > Group Policies

Select Add > External Group Policy to begin the configuration process, shown in

Figure 2-8.

The ASA asks for very few parameters in comparison to when creating an internal group

policy, because we are only creating the container or name for the group policy on the

ASA and specifying the AAA server that will store the policy attributes along with the

password the ASA uses to authenticate against it.

Table 2-2 lists the available RADIUS attributes, attribute number, type, and values, respec-

tively, which you may configure on an external RADIUS or LDAP server for the purposes

of user policy assignment.

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 61

Page 49: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

62 CCNP Security VPN 642-647 Official Cert Guide

Table 2-2 Supported RADIUS Attributes and Values

Attribute Name AttributeNumber

Type Value

Access-Hours 1 String Name of the time range (for example, Work

Time)

Simultaneous-Logins 2 Integer A number between 0 and 2,147,483,647

Primary-DNS 5 String IP address

Secondary-DNS 6 String IP address

Primary-WINS 7 String IP address

Secondary-WINS 8 String IP address

SEP-Card-Assignment 9 Integer Not used

Tunneling-Protocols 11 Integer 1 = PPTP

2 = L2TP

4 = IPsec

8 = LT2P/IPsec

16 = WebVPN

4 and 8, mutually exclusive

0–11 and 16–27, legal values

IPsec-Sec-Association 12 String Name of SA

IPsec-Authentication 13 Integer 0 = None

1 = RADIUS

2 = LDAP (auth only)

3 = NT Domain

4 = SDI

5 = Internal

6 = RADIUS with expiry

7 = Kerberos/AD

Banner1 15 String Banner string

IPsec-Allow-Passwd-

Store

16 Boolean 0 = Disabled

1 = Enabled

Use-Client-Address 17 Boolean 0 = Disabled

1 = Enabled

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 62

Page 50: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 63

Table 2-2 Supported RADIUS Attributes and Values

Attribute Name AttributeNumber

Type Value

PPTP-Encryption 20 Integer Bitmap:

1 = Encryption required

2 = 40 bits

4 = 128 bits

8 = Stateless-Required

15 = 40/128-Encr/Stateless-Req

L2TP-Encryption 21 Integer Bitmap:

1 = Encryption required

2 = 40 bits

4 = 128 bits

8 = Stateless-required

15 = 40/128-Encr/Stateless-Req

Group-Policy

Pre 8.2 use IETF-

RADIUS-Class

25 String Use one of the following formats

<group policy name>

OU=<group policy name>

IPsec-Split-Tunnel-List 27 String Name of the ACL used for split tunneling

IPsec-Default-Domain 28 String Client default domain name. Enter 1–255

characters.

IPsec-Split-DNS-

Names

29 String Client secondary default domain name. Enter

1–255 characters.

IPsec-Tunnel-Type 30 Integer 1 = LAN-to-LAN

2 = Remote access

IPsec-Mode-Config 31 Boolean 0 = Disabled

1 = Enabled

IPsec-User-Group-

Lock

33 Boolean 0 = Disabled

1 = Enabled

IPsec-Over-UDP 34 Integer 0 = Disabled

1 = Enabled

IPsec-Over-UDP-Port 35 Integer 4001–49151

Default = 10000

Banner2 36 String If configured banner string is concatenated to

banner1

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 63

Page 51: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

64 CCNP Security VPN 642-647 Official Cert Guide

Table 2-2 Supported RADIUS Attributes and Values

Attribute Name AttributeNumber

Type Value

PPTP-MPPC-

Compression

37 Integer 0 = Disabled

1 = Enabled

L2TP-MPPC-

Compression

38 Integer 0 = Disabled

1 = Enabled

IPsec-IP-Compression 39 Integer 0 = Disabled

1 = Enabled

IPsec-IKE-Peer-ID-

Check

40 Integer 1 = Required

2 = If supported by peer certificate

3 = Do not check

IKE-Keep-Alive 41 Boolean 0 = Disabled

1 = Enabled

IPsec-Auth-On-Rekey 42 Boolean 0 = Disabled

1 = Enabled

Required-Client-

Firewall-Vendor-Code

45 Integer 1 = Cisco Systems (with Cisco integrated

client)

2 = Zone Labs

3 = NetworkICE

4 = Sygate

5 = Cisco Systems (with Cisco IPS agent)

Required-Client-

Firewall-Product-Code

46 Integer Cisco Systems Products:

1 = Cisco IPS Agent or CIC

Zone Labs Products:

1 = Zone Alarm

2 = Zone AlarmPro

3 = Zone Labs Integrity

NetworkICE Product:

1 = BlackICE Defender/Agent

Sygate Products:

1 = Personal Firewall

2 = Personal Firewall Pro

3 = Security Agent

Required-Client-

Firewall-Description

47 String Enter a description

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 64

Page 52: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 65

Table 2-2 Supported RADIUS Attributes and Values

Attribute Name AttributeNumber

Type Value

Require-HW-Client-

Auth

48 Boolean 0 = Disabled

1 = Enabled

Required-Individual-

User-Auth

49 Integer 0 = Disabled

1 = Enabled

Authenticated-User-

Idle-Timeout

50 Integer 1–35,791,394 minutes

Cisco-IP-Phone-Bypass 51 Integer 0 = Disabled

1 = Enabled

IPsec-Split-Tunneling-

Policy

55 Integer 0 = No split tunneling

1 = Split tunneling

3 = Local LAN permitted

IPsec-Required-Client-

Firewall-Capability

56 Integer 0 = None

1 = Policy defined by remote FW Are-You-

There (AYT)

2 = Policy pushed CPP

4 = Policy from server

IPsec-Client-Firewall-

Filter-Name

57 String Enter the name of the firewall policy filter

IPsec-Client-Firewall-

Filter-Optional

58 Integer 0 = Required

1 = Optional

IPsec-Backup-Servers 59 String 1 = Use client-configured list

2 = Disable and clear client list

3 = Use backup server list

IPsec-Backup-Server-

List

60 String Server addresses (space, delimited)

DHCP-Network-Scope 61 String IP address

Intercept-DHCP-

Configure-Msg

62 Boolean 0 = Disabled

1 = Enabled

MS-Client-Subnet-

Mask

63 Boolean IP address

Allow-Network-

Extension-Mode

64 Boolean 0 = Disabled

1 = Enabled

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 65

Page 53: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

66 CCNP Security VPN 642-647 Official Cert Guide

Table 2-2 Supported RADIUS Attributes and Values

Attribute Name AttributeNumber

Type Value

Authorization-Type 65 Integer 0 = None

1 = RADIUS

2 = LDAP

Authorization-

Required

66 Integer 0 = No

1 = Yes

Authorization-DN-

Field

67 String Possible values: UID, OU, O, CN, L, SP, C, EA,

T, N, SN, I, GENQ, DNQ, SER, use-entire-

name

IKE-Keepalive-

Confidence-Interval

68 Integer 10–300 seconds

WebVPN-Content-

Filter-Parameters

69 Integer 1 = JAVA ActiveX

2 = JavaScript

3 = Image

4 = Cookies in images

WebVPN-URL-List 71 String Url-list-name

WebVPN-Port-

Forward-List

72 String Port-forward list name

WebVPN-Access-List 73 String Access list name

Cisco-LEAP-Bypass 75 Integer 0 = Disabled

1 = Enabled

WebVPN-Homepage 76 String Enter the URL of the home page

Client-Type-Version-

Limiting

77 String IPsec VPN version number string

WebVPN-Port-

Forwarding-Name

79 String Example: “Company Apps” replaces the Ap-

plication Access string on the clientless SSL

VPN portal page

IE-Proxy-Server 80 String IP address

IE-Proxy-Server-Policy 81 Integer 0 = No Modify

1 = No Proxy

2 = Auto Detect

3 = Use Concentrator Setting

IE-Proxy-Exception-

List

82 String Newline (\n) separated list of DNS domains

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 66

Page 54: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 67

Table 2-2 Supported RADIUS Attributes and Values

Attribute Name AttributeNumber

Type Value

IE-Proxy-Bypass-Local 83 Integer 0 = None

1 = Local

IKE-Keepalive-Retry-

Interval

84 Integer 2–10 seconds

Tunnel-Group-Lock 85 String Name of the tunnel group or None

Access-list-inbound 86 String Access list ID

Access-list Outbound 87 String Access list ID

Perfect-Forward-

Secret-Enable

88 Boolean 0 = No

1 = Yes

NAC-Enable 89 Integer 0 = No

1 = Yes

NAC-Status-Query-

Timer

90 Integer 30–1,800 seconds

NAC-Revalidation-

Timer

91 Integer 300–86,400 seconds

NAC-Default-ACL 92 String Access-list

WebVPN-URL-Entry-

Enable

93 Integer 0 = Disabled

1 = Enabled

WebVPN-File-Access-

Enable

94 Integer 0 = Disabled

1 = Enabled

WebVPN-File-Server-

Entry-Enable

95 Integer 0 = Disabled

1 = Enabled

WebVPN-File-Server-

Browsing-Enable

96 Integer 0 = Disabled

1 = Enabled

WebVPN-Port-

Forwarding-Enable

97 Integer 0 = Disabled

1 = Enabled

WebVPN-Outlook-

Exchange-Proxy-Enable

98 Integer 0 = Disabled

1 = Enabled

WebVPN-Port-

Forwarding-HTTP-Proxy

99 Integer 0 = Disabled

1 = Enabled

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 67

Page 55: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

68 CCNP Security VPN 642-647 Official Cert Guide

Table 2-2 Supported RADIUS Attributes and Values

Attribute Name AttributeNumber

Type Value

WebVPN-Auto-

Applet-Download-Enable

100 Integer 0 = Disabled

1 = Enabled

WebVPN-Citrix-

Metaframe-Enable

101 Integer 0 = Disabled

1 = Enabled

WebVPN-Apply ACL 102 Integer 0 = Disabled

1 = Enabled

WebVPN-SSL-VPN-

Client-Enable

103 Integer 0 = Disabled

1 = Enabled

WebVPN-SSL-VPN-

Client-Required

104 Integer 0 = Disabled

1 = Enabled

WebVPN-SSL-Client-

Keep-Installation

105 Integer 0 = Disabled

1 = Enabled

SVC-Keepalive 107 Integer 0 = Off

15–600 seconds

SVC-DPD-Interval-

Client

108 Integer 0 = Off

5–3600 seconds

SVC-DPD-Interval-

Gateway

109 Integer 0 = Off

5–3600 seconds

SVC-Rekey-Time 110 Integer 0 = Disabled

1–10,080 minutes

WebVPN-Deny-

Message

116 String Valid string (up to 500 characters)

Extended-Authentica-

tion-On-Rekey

122 Integer 0 = Disabled

1 = Enabled

SVC-DTLS 123 Integer 0 = False

1 = True

SVC-MTU 125 Integer MTU value

256–1,406 in bytes

SVC-Modules 127 String String (name of module)

SVC-Profiles 128 String String (name of profile)

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 68

Page 56: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

Chapter 2: Configuring Policies, Inheritance, and Attributes 69

Table 2-2 Supported RADIUS Attributes and Values

Attribute Name AttributeNumber

Type Value

SVC-Ask 131 String 0 = Disabled

1 = Enabled

3 = Enabled default service

5 = Enable default clientless

SVC-Ask-Timeout 132 Integer 5–120 seconds

IE-Proxy-PAC-URL 133 String PAC address

Strip-Realm 135 Boolean 0 = Disabled

1 = Enabled

Smart-Tunnel 136 String Name of Smart Tunnel

WebVPN-ActiveX-

Relay

137 Integer 0 = Disabled

Otherwise = Enabled

Smart-Tunnel-Auto 138 Integer 0 = Disabled

1 = Enabled

2 = AutoStart

Smart-Tunnel-Auto-

Signon-Enable

139 String Name of Smart Tunnel auto sign-on list ap-

pended by domain name

VLAN 140 Integer 0–4094

NAC-Settings 141 String Name of NAC policy

Member-Of 145 String Comma-separated string (for example, Engi-

neering, Sales)

Address-Pool 217 String Name of IP local pool

IPv6-Address-Pool 218 String Name of IP local pool

IPV6-VPN-Filter 219 String ACL name

Privilege-level 220 Integer Enter between 0 and 15

WebVPN-Macro-

Value1

223 String Unbounded. See the SSL VPN Deployment

Guide at Cisco.com for examples.

WebVPN-Macro-

Value-2

224 String Unbounded. See the SSL VPN Deployment

Guide at Cisco.com for examples.

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 69

Page 57: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

70 CCNP Security VPN 642-647 Official Cert Guide

Exam Preparation Tasks

As mentioned in the section “How to Use This Book” in the Introduction, you have a cou-

ple of choices for exam preparation: the memory tables in Appendix C, Chapter 23, “Final

Exam Preparation,” and the exam simulation questions on the CD-ROM.

Review All Key TopicsReview the most important topics in the chapter, noted with the key topics icon in the

outer margin of the page. Table 2-3 lists a reference of these key topics and the page num-

bers on which each is found.

Complete Tables and Lists from MemoryPrint a copy of Appendix C, “Memory Tables” (found on the CD), or at least the section

for this chapter, and complete the tables and lists from memory. Appendix D, “Memory Ta-

bles Answer Key,” also on the CD, includes completed tables and lists to check your work.

Define Key TermsDefine the following key terms from this chapter and check your answers in the glossary:

connection profile, internal group policy, external group policy

Table 2-3 Key Topics

Key Topic Element Description Page

Bulleted List The benefits of the modular policy assignment of the ASA 49

List ASA policy inheritance 50

Bulleted List Available connection profile selection and assignment methods 52

Bulleted List Default connection profiles 55

Topic Understanding group policies 56

Bulleted List Available AAA server types and protocols 60

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 70

Page 58: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

02_9781587142567_ch02.qxd 6/15/11 2:19 PM Page 71

Page 59: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

A

AAA (authentication, authorization,and accounting)

ASA, configuring, 21-23

external group policies, configuring,60-69

access control, clientless SSL VPNdeployment

bookmarks, 320

CIFS, 321

FTP, 321-323

group policies, 323-327

HTTP/HTTPS, 320

accounting (ASA), logging, 588-596

ACL bypass, configuring Cisco EasyVPN solution, 540

ACLs (access control lists)

AnyConnect Secure Mobility Client,configuring, 105-107

ASA, configuring, 12-15

Cisco Easy VPN solution, configuring, 540-545

extended ACLs, configuring, 13-14

standard ACLs, configuring, 14-15

active/standby failover, 252

address translation

NAT, ASA, configuring, 18-21

NAT-T, 487

advanced profile settings, Cisco IPsec VPN client, 498-506

AH (Authentication Header), 486-488

AnyConnect Secure Mobility Client,76-114

access hours, assigning, 110-111

ACLs, configuring, 105-107

authentication

certificate mapping, configuring, 134-138

CRLs, 152

digital certificates, 124-150

multiple authentication, requiring, 155-160

OSCP, 152-155

troubleshooting, 161-162

authorization

DAPs, 213-215

troubleshooting, 216-217

client profiles, 177-181

editing, 179-180

SBL, 182

Trusted Network Detection,182-188

customizing, 188-193

DTLS, 80-81

IKEv2, 81-83

deploying, 92-97

installing, 84

automatic web deployment,172-176

manual predeployment, 168-172

Index

Page 60: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

IP address allocation, 97-104

connection profiles, 98-100

direct user address assignment,104

group policies, 100-104

NAM module, 238-241

portal integration, 387-388

Posture Assessment module, 231

redundancy, 265-267

split tunneling, configuring, 107-110

SSL VPN deployment, 85-92

SSL/TLS, 76-80

Telemetry module, 243-245

troubleshooting, 111-114

Web Security module, 241-243

application access, clientless SSL VPNdeployment

client-server plug-ins, 349-357

port forwarding, 343-349

smart tunnels, 357-361

troubleshooting, 366-369

Application Helper profiles (clientlessSSL VPN deployment), contenttransformation, 329-330

ASA (Adaptive Security Appliance)

AAA, configuring, 21-23

ACLs, configuring, 12-15

AnyConnect Secure Mobility Client,authentication, 121-126

CSD, enabling, 450-452

DAP testing feature, 432-434

EtherChannels, configuring, 11-12

group policies, configuring, 582-588

hardware-based failover, configuring,267-271

Host Scan module, 232-234

interfaces, configuring, 6-11

licensing, 32-43

failover licensing, 43

model-specific, 33-41

time-based, 41-42

logging, 588-596

managing, 27-28

MPF, 15-16

NAT, configuring, 18-21

NTP server, configuring, 125-126

packet processing, 28-29

routing, 16-18

security levels, 9-11

VPN access, controlling, 29-32

VPN technologies, comparing, 24-26

ASA 5505, Easy VPN remote hardware client

configuring, 623-633

troubleshooting, 633-635

ASDM (Adaptive Security DeviceManager)

AnyConnect Client Profile Editor,editing client profiles, 179-180

QoS, configuring, 257-263

Page 61: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

714 assigning

assigning

access hours for AnyConnect Clientusers, 110-111

connection profiles, to AnyConnectSecure Mobility Client, 98-100

group policies

to connection profiles, 586-588

to local user accounts, 586

group policy objects to users, 204-207

attributes

DAPs, 417-418

for user accounts, configuring, 59

authentication

AnyConnect Secure Mobility Client

certificates, provisioning fromthird-party CA, 139-150

CRLs, 152

digital certificates, 124-150

multiple authentication, requiring,155-160

OSCP, 152-155

troubleshooting, 161-162

Cisco Easy VPN solution, 553-555

certificate mapping, configuring,562-566

certificates, provisioning fromthird-party CA, 566-570

troubleshooting, 575-576

clientless SSL VPN deployment

advanced options, 389-391

SSO, configuring, 403-406

IPsec site-to-site VPNs, configuringadvanced authentication, 656-661

multiple authentication, requiring forclientless SSL VPN users, 399-402

mutual/hybrid authentication, 561-562

authorization, 581-596

AnyConnect Secure Mobility Client

DAPs, 213-215

group policies, configuring, 199-207

CSD, DAPs, 461-463

troubleshooting, 216-217

automatic web deployment, AnyConnectSecure Mobility Client, 172-176

B

backup servers, enabling for Cisco EasyVPN solution, 605-606

bookmarks, clientless SSL VPN deployment, 320

browsers, CSD support, 449

C

Cache Cleaner module (CSD), 227-228,446-447

CAs (certificate authorities)

adding root certificate for clientless SSLVPN deployment, 294-295

clientless SSL VPN deployment, config-uring, 391-399

CD (practice exam), installing, 694

certificate mapping

AnyConnect Secure Mobility Client,125

AnyConnect Secure Mobility Client,configuring, 134-138

Cisco Easy VPN solution, configuring,562-566

certificate to connection profile map-ping, 53-54

certificates

CAs, clientless SSL VPN deployment,configuring, 391-399

Page 62: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

clientless SSL VPN deployment 715

OSCP, 152-155

provisioning

as local CA, 126-134

from third-party CAs, 139-150,566-570

CIFS (Common Internet File System),clientless SSL VPN deployment, 321

Cisco Easy VPN solution, 517-547

ACL bypass, configuring, 540

ACLs, configuring, 540-545

ASA 5505 as hardware client

configuring, 623-633

troubleshooting, 633-635

authentication, 553-555

certificate mapping, configuring,562-566

mutual/hybrid authentication,561-562

troubleshooting, 575-576

backup servers, enabling, 605-606

certificates, provisioning from third-party CA, 566-570

clustering

configuring, 612-615

troubleshooting, 615-617

configuring, 517-539

DHCP, configuring, 538-539

failover, troubleshooting, 615-617

HA, DPD, 604-605

hardware-based failover, 606-612

IKEv1, configuring, 522-527

IP addressing, configuring, 527-528,533-538

IPsec connectivity, configuring, 519-522

PKI

advanced deployment strategies,570-575

configuring, 556-561

pre-shared keys, configuring, 529-532

split tunneling, configuring, 545-546

troubleshooting, 546-547

XAUTH, 532-533

Cisco IPsec VPN client

advanced profile settings, 498-506

configuring, 495-497

connectivity, troubleshooting, 507-511

features, 488-491

GUI, customizing, 507-509

installing, 491-497

Cisco Learning Network, 695

client profiles

AnyConnect Secure Mobility Client,177-181

editing, 179-180

SBL, 182

Trusted Network Detection, 182-188

clientless SSL VPN deployment

access control

bookmarks, 320

CIFS, 321

FTP, 321-323

group policies, 323-327

HTTP/HTTPS, 320

application access

client-server plug-ins, 349-357

port forwarding, 343-349

smart tunnels, 357-361

troubleshooting, 366-369

authentication

advanced options, 389-391

SSO, configuring, 403-406

CAs

configuring, 391-399

root certificate, adding, 294-295

connection profiles, creating, 315-318

Page 63: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

716 clientless SSL VPN deployment

content caching, 472-473

content transformation

Application Helper profiles, 329-330

gateway content rewriting, 327-329

Java code signing, 330-331

CRLs, configuring, 295-311

external load balancing, 473-474

HA, 469-471

IP addressing, 293

local user accounts, creating, 312-314

multiple authentication, requiring, 399-402

OSCP, 297-301

PKI

membership, establishing, 294

SSO integration, troubleshooting,406-409

portal

AnyConnect Secure MobilityClient integration, 387-388

help, obtaining, 386-387

layout, configuring, 375-379

redundancy

clustering VPNs, 474-477

troubleshooting, 477-478

SSL interfaces, enabling, 311-312

SSL/TLS proxies

email proxy, configuring, 363-365

HTTP/HTTPS proxy, configuring,365

troubleshooting, 331-334

client-server plug-ins, clientless SSL VPNdeployment, 349-357

clustering VPNs, 252-253, 470, 474-477

Cisco Easy VPN solution

configuring, 612-615

troubleshooting, 615-617

troubleshooting, 477-478

comparing VPN technologies on ASA,24-26

configuring

AnyConnect Secure Mobility Client

certificate mapping, 134-138

group policies, 199-207

split tunneling, 107-110

ASA

AAA, 21-23

ACLs, 12-15

EtherChannels, 11-12

group policies, 582-588

hardware-based failover, 267-271

interfaces, 6-11

NAT, 18-21

NTP server, 125-126

routing, 16-18

Cisco Easy VPN solution, 517-539

ACL bypass, 540

ACLs, 540-545

ASA 5505 as hardware client, 623-633

certificate mapping, 562-566

clustering, 612-615

DHCP, 538-539

IKEv1, 522-527

IP addressing, 527-528, 533-538

IPsec connectivity, 519-522

PKI, 556-561

pre-shared keys, 529-532

split tunneling, 545-546

Cisco IPsec VPN client, 495-497

Page 64: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

customizing 717

clientless SSL VPN deployment

application access, 343-349, 357

CAs, 391-399

CRLs, 297-301

email proxy, 363-365

portal localization, 381-385

SSO, 403-406

CSD

prelogin criteria, 452-460

prelogin policies, 234-237

DAPs, 213-215, 418-426

DPD, 265-267

DTLS, 255-256

external load balancing, 274-275

group policies, 56-59

external group policies, 60-69

HA, VPN clustering, 272-275

IPsec site-to-site VPNs, 647-655

advanced authentication, 656-661

hardware-based failover, 683-687

IKEv1 phase 1, 644-645

QoS, 670-678

QoS, 257-263

SSL VPN deployment, portal layout,375-379

user accounts, attributes, 59

connection profiles, 50-56. See also

client profiles

AnyConnect Secure Mobility Client,assigning, 98-100

certificate to connection profile mapping, 53-54

creating for clientless SSL VPN deployment, 315-318

default connection profiles, 55-56

group aliases, 52-53

group policies, assigning, 586-588

group URLs, 52

per-user connection profile lock, 54

connectivity, troubleshooting CiscoIPsec VPN client, 507-511

content caching, clientless SSL VPNdeployment, 472-473

content transformation, clientless SSLVPN deployment

Application Helper profiles, 329-330

gateway content rewriting, 327-329

Java code signing, 330-331

controlling VPN access on ASA, 29-32

CRLs (certificate revocation lists), 152

clientless SSL VPN deployment, 295-311

CSD (Cisco Secure Desktop), 224

authorization, DAPs, 461-463

Cache Cleaner, 227-228

enabling on ASA, 450-452

Host Emulation Detection, 228

host endpoint assessment, 460-461

Host Scan, 225

Keystroke Logger Detection, 228

launching, 228-231

modules, 441-447

Prelogin Assessment, 225-226

prelogin criteria, configuring, 452-460

prelogin policies, configuring, 234-237

supported browsers, 449

supported operating systems, 447-449

troubleshooting, 463-464

Vault, 226

customizing

AnyConnect Secure Mobility Client,188-193

Cisco IPsec VPN client GUI, 507-509

Page 65: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

718 DAPs (Dynamic Access Policies)

D

DAPs (Dynamic Access Policies), 416-426

attributes, 417-418

configuring, 213-215, 418-426

CSD, authorization, 461-463

debugging, 435-436

policy inheritance, 417

record aggregation, 427-432

testing, 432-434

troubleshooting, 432-436

DART (Diagnostic AnyConnectReporting Tool), 161-162

debugging DAPs, 435-436

default connection profiles, 55-56

defining interesting traffic for IPsec site-to-site VPNs, 652-655

deploying AnyConnect Secure MobilityClient, 167

automatic web deployment, 172-176

IKEv2 deployment, 92-97

manual predeployment, 168-172

SSL VPN deployment, 85-92

DHCP (Dynamic Host ConfigurationProtocol), configuring Cisco EasyVPN solution, 538-539

digital certificates

AnyConnect Secure Mobility Client

authentication, 124-150

certificate mapping, configuring,134-138

certificates, provisioning as localCA, 126-134

authentication, Cisco Easy VPN solution, 554-555

direct user address assignment,AnyConnect Secure Mobility Client,104

downloading

exam updates, 703-704

practice exam, 694

DPD (dead peer detection), 604-605

configuring, 265-267

DTLS (Datagram Transport LayerSecurity), 80-81

configuring, 255-256

Dynamic Access Records, 213

dynamic routing, configuring ASA, 16-18

E

editing client profiles, 179-180

email proxy, configuring clientless SSLVPN deployment, 363-365

ESP (Encapsulating Security Payload),486-488

establishing SSL/TLS connections

handshake stage, 286-289

tunnel negotiation, 285-286

EtherChannels, configuring ASA, 11-12

exam

preparing for, 696-697

updates, downloading, 703-704

extended ACLs, configuring ASA, 13-14

external load balancing, 253-254, 470

clientless SSL VPN deployment, 473-474

configuring, 274-275

F

failover

Cisco Easy VPN solution, troubleshooting, 615-617

Page 66: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

hierarchical policy model 719

hardware-based, 251-252, 606-612

IPsec site-to-site VPNs, configuring, 683-687

licensing, ASA, 43

features, Cisco IPsec VPN client, 488-491

FTP, clientless SSL VPN deploymentaccess control, 321-323

full-tunnel VPN technology, AnyConnectSecure Mobility Client, 76-114

access hours, configuring, 110-111

ACLs, configuring, 105-107

authorization, configuring, 199-207

client profiles, 177-181

connection profile assignment, 98-100

customizing, 188-193

DTLS, 80-81

group policy assignment, 100-104

IKEv2, 81-83

installing, 84

IP address allocation, 97-104

Posture Assessment module, 231

SSL/TLS, 76-80

Telemetry module, 243-245

troubleshooting, 111-114

Web Security module, 241-243

G

gateway content rewriting, 327-329

group aliases, 52-53

group policies, 49, 56-59

AnyConnect Secure Mobility Client,authorization, configuring, 199-207

ASA, configuring, 582-588

assigning to AnyConnect SecureMobility Client, 100-104

assigning to connection profiles, 586-588

assigning to local user account, 586

clientless SSL VPN deployment, accesscontrol, 323-327

external group policies, AAA, configuring, 60-69

hierarchical policy model, 50

group URLs, 52

GUI, customizing Cisco IPsec VPNclient, 507-509

H

HA (High Availability)

Cisco Easy VPN solution, DPD, 604-605

clientless SSL VPN deployment, 469-471

clustering VPNs, Cisco Easy VPN solution, configuring, 612-615

failover, Cisco Easy VPN solution, troubleshooting, 615-617

hardware-based failover, 251-252

configuring, 267-271

IPsec site-to-site VPNs, 669-670

troubleshooting, 688-689

methods, 604

VPN clustering, 252-253

configuring, 272-275

handshake stage, establishing SSL/TLSconnections, 286-289

hardware-based failover, 251-252

Cisco Easy VPN solution, 606-612

configuring, 267-271

IPsec site-to-site VPNs, configuring,683-687

help, obtaining for clientless SSL VPNportal, 386-387

hierarchical policy model, 50

Page 67: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

720 Host Emulation Detection module (CSD)

Host Emulation Detection module(CSD), 228

host endpoint assessment, CSD, 460-461

Host Scan module

ASA, 232-234

CSD, 225, 460-461

HTTP/HTTPS, clientless SSL VPNdeployment access control, 320

HTTP/HTTPS proxy, configuring clientless SSL VPN deployment, 365

I

IKEv1, 483-486

Cisco Easy VPN solution, configuring,522-527

phase 1, configuring IPsec site-to-siteVPNs, 644-645

phase 2, configuring IPsec site-to-siteVPNs, 645-646

IKEv2, 81-83

installing

AnyConnect Secure Mobility Client, 84

automatic web deployment, 172-176

manual predeployment, 168-172

Cisco IPsec VPN client, 491-497

practice exam CD, 694

interesting traffic, defining for IPsecsite-to-site VPNs, 652-655

interfaces

ASA

configuring, 6-11

security levels, 9-11

SSL, enabling for clientless SSL VPNdeployment, 311-312

internal group policies, configuringAnyConnect Secure Mobility Client,201-204

IP addressing

AnyConnect Secure Mobility Client,97-104

connection profiles, 98-100

direct user address assignment, 104

group policies, 100-104

Cisco Easy VPN solution, configuring,527-528, 533-538

clientless SSL VPN deployment, 293

IPsec. See also Cisco IPsec VPN client

AH, 486-488

ESP, 486-488

IKEv1, 483-486

site-to-site VPNs

advanced authentication, configuring, 656-661

configuring, 647-655

HA, 669-670

HA, troubleshooting, 688-689

IKEv1 phase 1, configuring, 644-645

IKEv1 phase 2, configuring, 645-646

interesting traffic, defining, 652-655

QoS, configuring, 670-678

redundant peering, 678-679

routing, 679-683

troubleshooting, 661-663

J-K

Java code signing, clientless SSL VPNdeployment content transformation,330-331

Keystroke Logger Detection module(CSD), 228

Page 68: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

NTP (Network Time Protocol) server, configuring on ASA 721

L

LACP (Link Aggregation ControlProtocol), 11

launching CSD, 228-231

layout, configuring SSL VPN portal,375-379

licensing, ASA, 32-43

model-specific, 33-41

time-based, 41-42

LLQ (low-latency queuing), 257, 671

load balancing

external load balancing, 253-254, 470, 473-474

configuring, 274-275

troubleshooting, 477-478

local group policies

AnyConnect Secure Mobility Client,configuring, 199-207

ASA, configuring, 582-588

local user accounts

creating for clientless SSL VPN deployment, 312-314

group policies, assigning, 586

localization, configuring clientless SSL VPN portal, 381-385

logging

NetFlow, 211

RADIUS, 211-212

Syslog, 209

M

managing ASA, 27-28

manual launch sequence, CSD, 228-231

manual predeployment, AnyConnectSecure Mobility Client, 168-172

memory tables, 695-696

model-specific licensing, ASA, 33-41

modules

AnyConnect Secure Mobility Client

NAM module, 238-241

Telemetry module, 243-245

Web Security module, 241-243

CSD, 441-447

Cache Cleaner, 227-228

Host Emulation Detection, 228

Host Scan, 225

Keystroke Logger Detection, 228

Prelogin Assessment, 225-226

Vault, 226

MPF (Modular Policy Framework), 15-16

multiple authentication, requiring

AnyConnect Client users, 155-160

clientless SSL VPN users, 399-402

mutual/hybrid authentication, 561-562

N

NAM module, 238-241

NAT (Network Address Translation)

ASA, configuring, 18-21

Object NAT, configuring, 18

Twice NAT, configuring, 19-21

NAT-T (NAT Traversal), 487

NetFlow

ASA, logging, 591-593

logging, 211

NTP (Network Time Protocol) server,configuring on ASA, 125-126

Page 69: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

722 Object NAT, configuring ASA

O

Object NAT, configuring ASA, 18

obtaining portal help (clientless SSLVPN), 386-387

operating systems, CSD support, 447-449

OSCP (Online Certificate StatusProtocol), 152-155

clientless SSL VPN deployment, 297-301

P

packet processing, ASA, 28-29

Pearson Cert Practice Test Engine, 696-697

peering VPNs, 252-253, 470-471

IPsec site-to-site VPNs, 678-679

per-user connection profile lock, 54

physical topologies for SSL VPN deployment, 289-292

PKI

advanced deployment strategies, 570-575

Cisco Easy VPN solution, configuring,556-561

membership, establishing for clientlessSSL VPN deployment, 294

SSO integration, troubleshooting, 406-409

policies

DAPs

attributes, 417-418

configuring, 213-215, 418-426

CSD, authorization, 461-463

debugging, 435-436

record aggregation, 427-432

testing, 432-434

troubleshooting, 432-436

group policies, 56-59

AnyConnect Secure MobilityClient, 199-207

ASA, configuring, 582-588

assigning to AnyConnect SecureMobility Client, 100-104

clientless SSL VPN deployment,access control, 323-327

external group policies, configuring, 60-69

hierarchical policy model, 50

prelogin policies (CSD), configuring,234-237

policing, 670

port forwarding, application access for clientless SSL VPN deployment, 343-349

portal (clientless SSL VPN)

AnyConnect Secure Mobility Client integration, 387-388

help, obtaining, 386-387

layout, configuring, 375-379

localization, configuring, 381-385

post-login phase, remote users, 49

Posture Assessment module, 231

practice exam

CD, installing, 694

downloading, 694

Prelogin Assessment module (CSD),225-226

prelogin criteria, configuring CSD, 452-460

prelogin phase, remote users, 49

prelogin policies (CSD), configuring,234-237

preparing for exam, 696-697

pre-shared keys, configuring Cisco Easy VPN solution, 529-532

provisioning

certificates as local CA, 126-134

certificates from third-party CA, 139-150, 566-570

Page 70: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

SNMP (Simple Network Management Protocol), logging ASA 723

Q

QoS (quality of service), 256-263

configuring, 257-263

IPsec site-to-site VPNs, configuring,670-678

LLQ, 257, 671

R

RADIUS

ASA, logging, 593-594

logging, enabling, 211-212

record aggregation, DAPs, 427-432

redundancy

Cisco Easy VPN solution, backupservers, 605-606

clustering VPNs, 470, 474-477

DPD, configuring, 265-267

external load balancing, 253-254

HA, IPsec site-to-site VPNs, 669-670

hardware-based failover, configuring,267-271

IPsec site-to-site VPNs, routing, 679-683

peering VPNs, IPsec site-to-site VPNs,678-679

VPN clustering, 252-253

VPN peering, 252-253, 470-471

remote group policies

AnyConnect Secure Mobility Client,configuring, 199-207

ASA, configuring, 582-588

requiring multiple authentication forAnyConnect Client users, 155-160

root certificate, adding for clientless SSL VPN deployment, 294-295

routing

ASA, 16-18

IPsec site-to-site VPN, redundancy,679-683

rules, MPF (Modular Policy Framework),15-16

S

SBL (Start Before Login), AnyConnectclient profiles, 182

scripts, uploading to AnyConnectSecure Mobility Client, 193

security levels, ASA, 9-11

session termination, CSD, 231

shaping, 670

site-to-site VPNs

advanced authentication, configuring,656-661

configuring, 647-655

HA, 669-670

hardware-based failover, configuring,683-687

IKEv1 phase 1, configuring, 644-645

IKEv1 phase 2, configuring, 645-646

interesting traffic, defining, 652-655

QoS

configuring, 670-678

LLQ, 671

redundant peering, 678-679

routing, 679-683

troubleshooting, 661-663

smart tunnels, clientless SSL VPNdeployment application access, 357-361

SNMP (Simple Network ManagementProtocol), logging ASA, 594-596

Page 71: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

724 split tunneling

split tunneling

AnyConnect Secure Mobility Client,configuring, 107-110

Cisco Easy VPN solution, configuring,545-546

SSL VPN deployment. See also clientlessSSL VPN deployment

DTLS, configuring, 255-256

physical topologies, 289-292

SSL/TLS (Secure SocketsLayer/Transport Layer Security), 76-80

connections, establishing

handshake stage, 286-289

tunnel negotiation, 285-286

proxies, configuring for clientless SSLVPN deployment

email proxy, 363-365

HTTP/HTTPS proxy, 365

SSO (Single Sign-On), configuring clientless SSL VPN deployment, 403-406

standard ACLs, configuring ASA, 14-15

stateful HA, 603

stateless HA, 603

static routing, configuring ASA, 16-18

Syslog, enabling, 209

T

Telemetry module, 243-245

terminating CSD sessions, 231

testing DAPs, 432-434

third-party CAs, provisioning certifi-cates, 139-150, 566-570

time-based licenses, ASA, 41-42

TLS (Transport Layer Security), 77-80

tracked default routes, ASA, 17-18

traffic shaping, 670

troubleshooting

AnyConnect Secure Mobility Client,111-114

authentication, 161-162

authorization, 216-217

Cisco Easy VPN solution, 546-547

ASA 5505 remote client hardware,633-635

clustering VPNs, 615-617

failover, 615-617

troubleshooting, 575-576

Cisco IPsec VPN client, connectivity,507-511

clientless SSL VPN deployment, 331-334

application access, 366-369

PKI and SSO integration, 406-409

clustering VPNs, 477-478

CSD, 463-464

DAPs, 432-436

IPsec site-to-site VPNs, 661-663

HA, 688-689

load balancing, 477-478

Trusted Network Detection,AnyConnect client profiles, 182-188

tunnel negotiation, establishing SSL/TLSconnections, 285-286

tunneled default routes, ASA, 17

Twice NAT, configuring ASA, 19-21

U

updates to exam, downloading, 703-704

uploading

portal pages (clientless SSL VPN), 381

scripts, AnyConnect Secure MobilityClient, 193

Page 72: CCNP Security VPN 642-647 - pearsoncmg.comptgmedia.pearsoncmg.com/.../samplepages/1587142562.pdfCisco Press 800 East 96th Street Indianapolis, IN 46240 CCNP Security VPN 642-647 Official

XAUTH 725

user accounts, configuring attributes, 59

user policies

connection profiles, 50-56

certificate to connection profilemapping, 53-54

default connection profiles, 55-56

group aliases, 52-53

group URLs, 52

per-user connection profile lock, 54

group policies, 56-59

V

Vault module (CSD), 226, 446

viewing ASA logging information, 210-211

VPN clustering, 252-253

configuring, 272-275

VPN peering, 252-253, 470-471

W-X-Y-Z

web browsers, CSD support, 449

Web Security module, 241-243

XAUTH, 532-533