|
March 23, 2000
Cisco Secure VPN Client (VPN Client) provides client-to-gateway Virtual Private Networking capability on a Windows 95, Windows 98, and Windows NT desktop or laptop computer. The information in this document applies to version 1.1 of the VPN Client.
For information on versions 1.0 and 1.0a features, installation notes, limitations and restrictions, usage notes, and caveats, refer to the following URL:
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/csvpnc/csvpnrn/index.htm
Note If you have a previous version of SafeNet/SoftPK Client or Cisco Secure VPN Client on your machine, you must uninstall this version before you install Cisco Secure VPN Client. For example, you must uninstall VPN Client version 1.0a before you install VPN Client version 1.1. For more information, see the "Installation Notes" section. |
These release notes contain the following sections:
The Cisco Secure VPN Client provides Virtual Private Networking (VPN) capability on a desktop or laptop computer. Based on the latest industry-standard IPSec recommendations, the VPN Client enables secure client-to-gateway communications over TCP/IP networks, including the Internet.
Note Cisco Secure VPN Client is also referenced as SafeNet/Soft-PK version 2.1.2, build 16, in the software. Also, the SafeNet icon appears as the graphical user interface icon in the Windows taskbar. Unless the taskbar is changed, this icon appears in lower right corner of the screen. |
The VPN Client gives you the tools you need to use public key encryption for your secure Internet communications. It automatically generates the public/private key pair you need to obtain a digital certificate. It lets you import and maintain digital certificates in its Certificate Manager, and it allows you to import or configure your Secure Connection in its Security Policy Editor.
The following sections list the computer and network requirements. Refer to http://www.cisco.com/go/vpnclient for the latest version of the release notes.
The VPN Client requires the following:
The sections that follow describe each new feature and each new enhancement in this release. See "Important Notes" for additional information on new features.
The following features are available in the VPN Client, version 1.1.
IETF Extended Authentication or Xauth provides user authentication within the IKE protocol. Xauth prompts the user for authentication material (user name and password) and verifies this information via the use of an AAA server (RADIUS or TACACS+). Authentication occurs between IKE phase 1 and IKE phase 2. If the user successfully authenticates, phase 2 SA is established after which data can be sent securely to the protected network.
Token cards are not supported.
The IP InSight Activator is a Service Level Management software that has been installed in conjunction with an OEM software manufacturer for measuring performance of remote access VPNs. The software is not fully functional until it receives instructions from a corporate network site to "activate," and begin sending quality of service data to the network operations center.
The IP InSight Activator is launched at install time, and at all subsequent reboots. Once "activated," the full IP InSight Client is installed in the directory \<install_directory>\Inverse IP InSight. For more information about the IP InSight Activator, see the readme1st.txt file in the directory \<install_directory>\Cisco\Cisco Secure VPN Client\IP InSight.
Simple Certificate Enrollment Protocol (SCEP) is a certificate enrollment protocol based on common and well understood PKCS #10/7 standards using HTTP transport methods. SCEP provides a standard way to enroll network devices with a Certification Authority, as well as to lookup and retrieve CRL information from LDAP or HTTP methods. Version 1.1 of the VPN Client now supports the Registration Authority (RA) mode for SCEP enrollment. RA SCEP is currently supported by the Entrust and Microsoft CAs.
The following are feature enhancements or improvements available in the VPN Client, version 1.1:
Note If you are installing on a Windows NT system, log on through the administrator account, before installing the VPN Client. |
Note If you are upgrading from a previous version of SafeNet/SoftPK Client or Cisco Secure VPN Client, uninstall the old version, then reboot, then install the new version. If the old version is not uninstalled, two images and two identical icons in the system taskbar are created and the new version will be corrupted. |
To install the VPN Client, perform the following steps:
Step 2 If you are upgrading from a previous version of SafeNet/SoftPK Client or Cisco Secure VPN Client, uninstall the old version, then reboot, then install the new version. When you uninstall a previous version, you may keep any existing key pairs, personal certificates, and security policies.
Step 3 Insert the Cisco Secure VPN Client CD-ROM. The installation program should start automatically. If it does not, perform the following:
a. Click Start>Run.
b. Type d:\setup.exe (d
designates your CD-ROM drive, which could be different depending on your computer's setup).
Step 4 When the Installation Wizard starts, follow the instructions on your screen.
Step 5 When the setup completes, select Yes, I want to restart my computer now. Remove the CD-ROM, and click Finish. Your computer will automatically restart.
The SafeNet icon appears in the status area of your Windows taskbar, which is usually located in the lower right corner of your screen.
Step 6 Once you have successfully installed VPN Client, you need either a pre-shared key or a digital certificate and a Secure Connection to secure communications. Look for detailed instructions in your Cisco Secure VPN Client Version 1.1 Quick Start Guide or help file. To access the help file, right-click the SafeNet icon on the taskbar and click Help.
The VPN Client starts automatically each time your computer starts, and runs transparently on your computer.
The SafeNet icon changes color and image as you begin and end communications sessions:
For more information, review the help file, which you can view by right-clicking the SafeNet icon on the taskbar, or from the Help menu in the Security Policy Editor or Certificate Manager.
Note Before calling customer support, display the View Log by right-clicking the SafeNet icon on the taskbar and clicking Log Viewer. |
You can temporarily deactivate the client by right-clicking the SafeNet icon on the taskbar and clicking Deactivate Security Policy. When you are ready to restart the client, click Activate Security Policy on this same menu.
Note You could be violating your organization's Secure Connection by removing this software from your hard drive. Check with your network administrator before continuing. |
To uninstall VPN Client:
Step 2 Double-click Add/Remove Programs. The Add/Remove Programs Properties window appears.
Step 3 Click the Install/Uninstall tab.
Step 4 Click Cisco Secure VPN Client from the list.
Step 5 Click Add/Remove.
Step 6 You are prompted with the following:
Are you sure you want to completely remove `Cisco Secure VPN
Client' and all of its components?
Click Yes. You will still be prompted to save or delete your certificates and key pairs.
Step 7 The uninstall starts, and you are prompted with the following:
Would you like to delete Security Policy Personal Certificates
and Private/Public Keys?
If you plan to reinstall this product, click No; otherwise, click Yes.
Step 8 After the uninstallation completes, if any files were in use, you are prompted with a reminder that you should restart your computer to remove files in use during the uninstallation. Click OK at this prompt to acknowledge this reminder.
Step 9 Restart your computer now by clicking Start>Shutdown.
The following restrictions apply to the VPN Client, version 1.1:
This section provides information about using VPN Client, version 1.1.
The VPN Client will not install properly if 3Com's Smart Agent software is loaded on the machine before installing VPN Client.
Cisco recommends that you install the VPN Client before installing 3Com's Smart Agent software.
The VPN Client is incompatible with AtGuard PC firewall on Windows 98 SE. Loading the VPN Client on a Windows 98 SE machine with AtGuard PC firewall causes the machine to no longer pass secure or clear data.
The AT&T Global Network Dialer software and the VPN Client when installed on Windows 98 are incompatible. With both are installed on Windows 98, the AT&T Global Network Dialer software cannot dial to Internet.
When the AT&T Global Network Dialer software installs itself, it places a shortcut on your desktop. This shortcut is linked to a program called connect.exe
. Do not run this program. Instead use the Dial-Up Networking program. To get to this program, click the My Computer icon on your desktop, then select Dial-Up Networking. From the Dial-Up Networking window, dial up your connection.
When using digital certificates, use a unique subject name for each VPN Client. Otherwise, when terminating multiple connections, the security gateway will not be able to determine which public key to use during authentication since the public key is chosen based on the VPN Client's subject name.You are prompted to enter a subject name after choosing the Request Certificate button from the My Certificates tab in the Certificate Manager window.
The VPN Client lets you specify various combinations of IPSec protocols on the menu at Network Security Policy>connection_name>Security Policy>Key Exchange (Phase 2)>Proposal.
PIX Firewall and Cisco IOS software support all VPN Client IPSec protocols with these exceptions:
If you see the error message "integrity check failed" when submitting your certificate request, check your version of the MSCEP.DLL. The version must be greater than 5.131.2195.1.
Before upgrading Microsoft Dial-Up Networking (DUN), uninstall the Cisco Secure VPN Client. Once DUN is installed and configured, reinstall the client. When you uninstall the VPN Client, you can choose not to delete Security Policy Personal Certificates and Private/Public Keys. We require MS DUN version 1.3 or later.
The VPN Client is incompatible with Microsoft's Connection Manager.
The auto setup part of Microsoft's MSN package is incompatible with intermediate drivers between the dialup adapter and TCP/IP. The result is that connection manager attempts to re-add TCP/IP ad infinitum, until the max instance value is reached.
As a workaround, Cisco recommends that MSN users configure the Dialup adapter and TCP/IP and Internet Explorer manually. For example, if the adapter and TCP/IP are loaded before installing MSN, the Microsoft Connection Manager detects that the dial-up adapter is already installed and continues with the MSN installation. The VPN Client can be loaded before or after MSN, if the dial-up adapter and TCP/IP are installed manually.
The VPN Client and Microsoft's Internet Connection Sharing (ICS) for Windows 98 Second Edition are incompatible. If you attempt to install the VPN Client over ICS or vice versa, the VPN Client does not install or is automatically uninstalled. To check for ICS, look for the following key in the Windows registry:
HKEY_LOCAL_MACHINE\Enum\Network\ICSHAREP
If this key is present, uninstall the ICS and try installing the VPN Client again.
You can provide users a standardized Secure Connection by creating it with the values you determine, and then exporting it by clicking File>Export Security Policy. When you are prompted to protect the exported Secure Connection by making it non-editable, click Yes. When users open the Secure Connection, the Connection Security information displays the message that it is Secure. Users can view the parameters, but they cannot change them.
Note Before importing an non-editable Secure Connection, make sure you have at least one editable Secure Connection on your system. If you do not have an editable Secure Connection available to you and if you want to change the locked Secure Connection, you must reinstall. |
The Remote Party Identity and Addressing menu appears on the Connection menu after you start a new Network Security Policy.
The following ID Type values are supported as follows:
Before you configure a Secure Connection, you must already have established a connection and configured the preliminary settings through the Options>Secure>All Connections or Specified Connections options.
The purpose of configuring a Secure Connection is to create a security association (SA) for each connection through IKE negotiations.
There are two phases to every IKE negotiation, which you must also configure:
Note When creating multiple IPSec SAs to the same Secure Gateway, only one IKE SA will be used. This means that one IKE SA is established to protect multiple IPSec SAs. When multiple Secure Connections are defined to the same secure gateway, their Authentication (Phase 1) proposals must be identical. Specifying different Phase 1 proposals for multiple Secure Connections that use a single security gateway causes unpredictable results. If you create multiple Secure Connections to the same security gateway, use identical Phase 1 proposals. |
Note Toggling between Secure, Block, and Non-secure on a Secure Connection may cause a subnet defined in Remote Party Identity and Addressing to change the ID type to IP Address. The user will need to redefine the ID type. |
Note Cisco recommends that when configuring SA lifetimes, use seconds or apply the default value of Unspecified (28,800 seconds). |
The default Internet Key Exchange (IKE) lifetime on the VPN gateway is 24 hours (86,400 seconds), the client has a default of 8 hours (28,800 seconds), and the PIX Firewall has a default of 24 hours.
The client may offer any value to the VPN gateway, with the lower of the two lifetimes used.
On the menu at Network Security Policy>connection_name>Security Policy>Key Exchange (Phase 2)>Proposal, you can set the IPSec SA Life (lifetime) value to either Seconds or Kbytes (kilobytes). When specifying a lifetime in seconds, the peers, whether client and Cisco router or client and PIX Firewall, will agree to use the smaller of the values proposed by each peer.
By default, the router uses 1 hour (3,600 seconds), the VPN Client uses 8 hours (28,800 seconds), and the PIX Firewall uses 8 hours for the IPSec SA lifetime. We recommend using the default values for optimal stability.
The VPN Client is incompatible with Signal 9 ConSeal PC Firewall on Windows 98. Loading the VPN Client on a machine with Signal 9 ConSeal PC Firewall causes the machine to no longer pass secure or clear data.
When enrolling a client with the VeriSign CA service, the domain name field of the online request must contain the FQDN (fully qualified domain name) of the device.
You can display the view log by right-clicking the SafeNet icon on the taskbar and clicking Log Viewer.
A delay may occur between the time the Windows network login prompt appears and the actual establishment of the IPSec tunnel. This delay may cause the login attempt to time out because a server is not available. If this occurs, cancel the first attempt and retry. Use the event log on the VPN Client during this process to view login status.
Windows NT does not support Plug and Play via a manufacturer's custom utility, and the VPN Client is incompatible with these custom, non-standard, non-NDIS-compliant utilities.
As a workaround in the case of the laptop utilities, disable the manufacturer's custom utility and obtain the latest NIC driver from the vendor. (Ensure that you do not obtain the special pre-packaged NIC driver that the laptop vendor supplies with the utility).
This section covers the open and resolved caveats within the VPN Client, version 1.1.
The open caveats described in this section provide important information that you need to run the VPN Client. Table 1 lists the caveats for version 1.1.
If you have an account with Cisco Connection Online (CCO), you can use the Bug Toolkit to determine the status of open caveats:
1. Access CCO at http://www.cisco.com.
2. Click Login on the upper toolbar. When prompted, enter your CCO username and password.
3. Go to the Bug Toolkit on CCO at Service & Support>Online Technical Support>Software Bug Toolkit>Search for Bug by ID Number, or at http://www.cisco.com/kobayashi/bugs/bugs.html.
4. Enter the bug ID number and click Search to view the current status.
Table 1 lists the open caveats for version 1.1:
DDTS ID | Description |
---|---|
Certificate Issues | |
CSCdm69390 | The Security Policy Editor must be closed and reopened before changes made in the Certificate Manager are visible to the Secure Connection. |
CSCdm69392 | For remote identity or a Security Gateway when using certificates, the identity type has to be Domain Name and the identity has to be specified as FQDN. Also, the IP address has to be specified because the FQDN is not resolvable on the VPN Client computer. |
CSCdm69393 | The VPN Client has a fixed CRL (Certificate Revocation List) download period of 4 hours. As a result, if the CRL has expired, the client will not be able to identify the validity of the remote peer's certificate. In this case, the client will not establish an IKE SA until the CRL is updated. As a workaround, we recommend setting the CA's CRL lifetime to 24 hours. This reduces the likelihood of the client acquiring a CRL with an imminent expiration. |
CSCdr05403 | Unable to generate digital certificate requests when the & character is used within the Name, Department, or Company fields. As a workaround, Cisco recommends not using the & character in the certificate request. |
CSCdr05418 | Importing a certificate chain overwrites the CA properties that are within the cacert.cser file. If the personal certificate with the CA chain file is imported after the SCEP properties have been configured, the SCEP CA properties (CA domain and On-Line certificate server information) are lost. This problem can also occur during a VPN Client install. If a personal certificate with CA chain file and a "Cacert.cser" file are bundled with the initial install, the SCEP CA properties that are included with the "Cacert.cser" file are lost. The root cause of this problem is that the personal certificate with the CA chain does not actually contain the SCEP CA properties information. To avoid overwriting the CA certificate settings while importing the certificate chain, Cisco recommends the user answers no to adding the CA certificate. During install, do not include the CA chain with the personal certificate. |
Miscellaneous | |
CSCdm55397 | Uninstall any previous version of the SafeNet/SoftPK Client or Cisco Secure VPN Client before installing a new version of the VPN Client. |
CSCdm88654 | The VPN Client is not interoperable with VeriSign CRLs. |
CSCdm89035 | Before adding or removing any network adapters from the Network Control Panel, uninstall the VPN Client, and reboot the computer. After the adapters are configured appropriately, reinstall the client. If this procedure is not followed you may experience system instability upon rebooting after adapters have been added or removed. You can recover by starting your Windows system in Safe Mode, uninstalling the client, rebooting, and then reinstalling the client. |
CSCdp79684 | Exporting a policy as protected does not make the new configuration non-editable. Users can still change any parameter under My Identity. This will allow a single policy to be exported and distributed to multiple clients. |
CSCdp86758 | In rare circumstances, uninstalling the VPN Client on a Windows NT system may take up to 15 minutes to complete. If you end the uninstall process before it completes on its own, reinstall the same VPN Client version and uninstall again. |
CSCdr03653 | When using a pre-shared key and the Aggressive Mode of IKE Phase 1, specifying the ID type of "Domain Name" within the My Identity window fails. As a workaround, Cisco recommends specifying either Email Address or IP Address for ID type. |
CSCdr05380 | For secure domain logon, Cisco recommends you wait 10 seconds after a failed domain login attempt. |
CSCdr06345 | The VPN Client does not always prompt the user to reboot after an uninstall. As a precaution, the user should always reboot after uninstallation. |
CSCdr06441 | When using Windows 95, the VPN Client will not function after coming out of the suspend mode. If this occurs, reboot your system. To ensure it does not occur again, disable the suspend mode. |
CSCdr08637 | Fingerprints are not supported for manual (file-based) certificate requests or for CAs manually imported from a file. |
CSCdr30330 | The client may truncate part of a new pin message displayed to the user when using Xauth with a token card. The amount of truncation will depend on the token authentication server used. |
Table 2 lists resolved caveats for version 1.1:
DDTS ID | Description |
---|---|
CSCdm50577 | The interoperability problems with per port support within IPSec are fixed. |
CSCdm60716 | Security Policy Editor/Certificate Manager: On Windows NT workstations, the VPN Client now operates with non-Administrator users. |
CSCdm69381 | If the VPN Client is configured to send less than the Cisco IOS software default for IKE (86,400 seconds---24 hours), the lifetime proposed by the VPN Client will be used. |
CSCdm69396 | On Windows NT Service Pack 4, when adding a new CA certificate (online through SCEP or importing from a file) a confirmation dialog displays. |
CSCdm80701 | Configuring the client for TCP traffic will only allow TCP traffic. |
CSCdp10777 | For security purposes, pre-shared keys are now starred out during entry and encrypted in the registry. Importing of a previous policy or upgrading from a previous policy will automatically encrypt the pre-shared key. |
CSCdp19890 | The Windows NT domain logon no longer fails when the VPN Client is assigned an internal IP address with either IKE Mode Config or static assignment. |
CSCdp22155 | The VPN Client now functions through a Network Address Translation device, such as a firewall. |
CSCdp46826 | The VPN Client co-exists with Token Ring cards and allows IPSEC sessions over dial-up connections. IPSEC sessions over Token Ring cards are not supported. |
Use this document in conjunction with the following related documents, which are available on CCO and the Documentation CD-ROM:
Note Refer to the CCO online version of these release notes for the most current information. |
You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Registered CCO users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.
Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).
Cisco provides Cisco Connection Online (CCO) as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed docs, or by sending mail to Cisco.
Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
CCO's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.
You can access CCO in the following ways:
You can e-mail questions about using CCO to cco-team@cisco.com.
The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.
To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.
To contact by e-mail, use one of the following:
Language | E-mail Address |
---|---|
English | |
Hanzi (Chinese) | |
Kanji (Japanese) | |
Hangul (Korean) | |
Spanish | |
Thai | thai-tac@cisco.com |
In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.
If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:
Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate and value your comments.
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Access Registrar, AccessPath, Any to Any, AtmDirector, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA, CCNP, CCSI, CD-PAC, the Cisco logo, Cisco Certified Internetwork Expert logo, CiscoLink, the Cisco Management Connection logo, the Cisco NetWorks logo, the Cisco Powered Network logo, Cisco Systems Capital, the Cisco Systems Capital logo, Cisco Systems Networking Academy, the Cisco Systems Networking Academy logo, the Cisco Technologies logo, ConnectWay, Fast Step, FireRunner, Follow Me Browsing, FormShare, GigaStack, IGX, Intelligence in the Optical Core, Internet Quotient, IP/VC, Kernel Proxy, MGX, MultiPath Data, MultiPath Voice, Natural Network Viewer, NetSonar, Network Registrar, the Networkers logo, Packet, PIX, Point and Click Internetworking, Policy Builder, Precept, ScriptShare, Secure Script, ServiceWay, Shop with Me, SlideCast, SMARTnet, SVX, The Cell, TrafficDirector, TransPath, ViewRunner, Virtual Loop Carrier System, Virtual Service Node, Virtual Voice Line, VisionWay, VlanDirector, Voice LAN, WaRP, Wavelength Router, Wavelength Router Protocol, WebViewer, Workgroup Director, and Workgroup Stack are trademarks; Changing the Way We Work, Live, Play, and Learn, Empowering the Internet Generation, The Internet Economy, and The New Internet Economy are service marks; and ASIST, BPX, Catalyst, Cisco, Cisco IOS, the Cisco IOS logo, Cisco Systems, the Cisco Systems logo, the Cisco Systems Cisco Press logo, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub, FastLink, FastPAD, FastSwitch, GeoTel, IOS, IP/TV, IPX, LightStream, LightSwitch, MICA, NetRanger, Post-Routing, Pre-Routing, Registrar, StrataView Plus, Stratm, TeleRouter, and VCO are registered trademarks of Cisco Systems, Inc. or its affiliates in the U.S. and certain other countries. All other trademarks mentioned in this document are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any of its resellers. (9912R)
Copyright © 2000, Cisco Systems, Inc.
All rights reserved.
Posted: Fri Apr 21 14:07:20 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.