Two types of VPNs that are widely used:
1. Remote access VPNs - here a teleworker may access head quarters securely using VPN access using public Internet. Remote-access VPNs can use IPsec or SSL technologies for their VPN.
2. Site-to-site VPNs - here, the VPN connectivity is provided between two sites. By this, anybody accessing any host on the second site can connect and transfer information securely even though there is no secure connectivity from the host. Communication will be secured when the packet leaves the corporate network. The VPN tunnel ends after it enters the remote site. Site-to-site VPNs traditionally use a collection of VPN technologies called Ipsec.
The benefits of implementing Virtual Private Networks (VPNs) include the following:
The benefits of implementing Virtual Private Networks (VPNs) include the following:
1. Data integrity - the data contained in the packets can't be changed by attacker
2. Data confidentiality or privacy - an attacker will not be able to see or read the data
3. Authentication - the sender is the one who claims to be.
4. No replay - it is not possible to replay properly configured, secure VPN communication.
The VPN can be implemented in any of the following combinations:
1. Gateway-to-gateway VPN
2. Gateway-to-host VPN
3. Host-to-gateway VPN
4. Host-to-host VPN
IKE Phase 1 configuration:
1. Specify the interface to be used for VPN
2. Specify the remote peer IP address
3. Provide pre-shared key (or digital certificate). Required for authenticating itself with the peer.
4. Specify IKE Phase 1 Policies (Optional, you may use default or custom)
IKE Phase 2 configuration:
1. Define transform-sets (Optional): The policies used for IKE Phase 2 are called transform sets. A transform set refers to the methods of encryption and hashing that you want to use for the IKE Phase 2 tunnels. Remember that whatever you choose here, you also need to configure on the other router, as well.
2. Configuring the ACL used to classify which traffic should be protected by IPsec
3. Finish or commit the configuration changes.
The next step would be to configure the peer router. For this purpose, an option called "Configure Mirror" is available soon after finishing one end. You can make necessary changes (if any) and commit the configuration to the peer router with one click.
IKE Phase 1 steps:
Step 1: Negotiate the IKE Phase 1 Tunnel. The end points of the VPN tunnel need to agree on:
Step 2: Run the DH Key Exchange
Step 3: Authenticate the Peer; the authentication could be done either using a PSK or using RSA digital signatures.
The purpose of IKE phase 2 is to negotiate IPSec SAs to set up the IPSec tunnel. IKE phase 2 performs the following functions:
This IKE Phase 1 tunnel is used for only management purpose. To protect the end user's packets, the two VPN devices build a second tunnel for the sole purpose of encrypting the end-user packets. This second tunnel is called the IKE Phase 2 tunnel; it is also commonly referred to as the IPsec tunnel. The basic configuration steps are as given below.
Given below are the steps involved in configuring clientless VPN connection using ASASDM:
Note that a clientless VPN connection does not require any software be installed specially on the client machine.