cc/td/doc/product/vpn/vpn3002/3_5
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Policy Management

Policy Management

The VPN 3002 works in either of two modes: Client mode or Network Extension mode.

Policy management on the VPN 3002 includes deciding whether you want the VPN 3002 to use Client Mode or Network Extension mode. This section lets you enable or disable PAT.

Client Mode/PAT

Client mode, also called Port Address Translation (PAT) mode, isolates all devices on the VPN 3002 private network from those on the corporate network. In PAT mode:

All traffic from the private network appears on the network behind the IKE peer with a single source IP address. This IP address is the one the central-site VPN Concentrator assigns to the VPN 3002. The IP addresses of the computers on the VPN 3002 private network are hidden. You cannot ping or access a device on the VPN 3002 private network from outside of that private network, or directly from a device on the private network at the central site.

In client mode, the tunnel establishes when data passes to the VPN Concentrator, or when you click Connect Now in the Monitoring | System Status screen.

Client Mode with Split Tunneling

You assign the VPN 3002 to a client group on the central-site VPN Concentrator. If you enable split tunneling for that group, IPSec and PAT are applied to all traffic that travels through the VPN 3002 to networks within the network list for that group behind the central-site VPN Concentrator.

Traffic from the VPN 3002 to any destination other than those within the network list for that group on the central-site VPN Concentrator travels in the clear without applying IPSec. NAT translates the network addresses of the devices connected to the VPN 3002 private interface to the assigned IP address of the public interface and also keeps track of these mappings so that it can forward replies to the correct device.

The network and addresses on the private side of the VPN 3002 are hidden, and cannot be accessed directly.

VPN 3000 Series VPN Concentrator Settings Required for PAT

For the VPN 3002 to use PAT, these are the requirements for the central-site VPN Concentrator.

    1. The VPN Concentrator at the central site must be running Software version 3.x or later.

    2. Address assignment must be enabled, by whatever method you choose to assign addresses (for example, DHCP, address pools, per user, or client-specified). If the VPN Concentrator uses address pools for address assignment, make sure to configure the address pools your network requires. See Chapter 6, Address Management, in the VPN 3000 Series Concentrator Reference Volume I.

    3. Configure a group to which you assign this VPN 3002. This includes assigning a group name and Password. See Chapter 14, User Management, in the VPN 3000 Series Concentrator Reference Volume I.

    4. Configure one or more users for the group, including usernames and passwords.

Network Extension Mode

Network Extension mode allows the VPN 3002 to present a single, routable network to the remote private network over the VPN tunnel. IPSec encapsulates all traffic from the VPN 3002 private network to networks behind the central-site VPN Concentrator. PAT does not apply. Therefore, devices behind the VPN Concentrator have direct access to devices on the VPN 3002 private network over the tunnel, and only over the tunnel, and vice versa. The VPN 3002 must initiate the tunnel, but after the tunnel is up, either side can initiate data exchange.

In this mode, the central-site VPN Concentrator does not assign an IP address for tunneled traffic (as it does in Client/PAT mode). The tunnel is terminated with the VPN 3002 private IP address (the assigned IP address). To use Network Extension mode, you must configure an IP address other than the default of 192.168.10.1 and disable PAT.

In Network Extension mode, the VPN 3002 automatically attempts to establish a tunnel to the VPN Concentrator. However, if you enable interactive hardware client authentication, the tunnel establishes when you perform the following steps.


Step 1   Click the Connection/Login Status button on the VPN 3002 Hardware Client login screen. The Connection/Login screen displays.

Step 2   Click Connect Now in the Connection/Login screen.

Step 3   Enter the username and password for the VPN 3002.


Alternatively, you can initiate a tunnel by clicking Connect Now on the in the Monitoring | System Status screen.

Network Extension Mode with Split Tunneling

You always assign the VPN 3002 to a client group on the central-site VPN Concentrator. If you enable split tunneling for that group, IPSec operates on all traffic that travels through the VPN 3002 to networks within the network list for that group behind the central-site VPN Concentrator. PAT does not apply.

Traffic from the VPN 3002 to any other destination than those within the network list on the central-site VPN Concentrator travels in the clear without applying IPSec. NAT translates the network addresses of the devices on the VPN 3002 private network to the address of the VPN 3002 public interface. Thus the network and addresses on the private side of the VPN 3002 are accessible over the tunnel, but are protected from the Internet, that is, they cannot be accessed directly.

VPN 3000 Series Concentrator Settings Required for Network Extension Mode

For the VPN 3002 to use Network Extension mode, these are the requirements for the central-site VPN Concentrator.

    1. The VPN Concentrator at the central site must be running Software version 3.0 or later.

    2. Configure a group to which you assign this VPN 3002. This includes assigning a group name and password. See Chapter 14, User Management, in the VPN 3000 Series Concentrator Reference Volume I.

    3. Configure one or more users for the group, including usernames and passwords.

    4. Configure either a default gateway or a static route to the VPN 3002 private network. See
    Chapter 8, "IP Routing" in the VPN 3000 Series Concentrator Reference Volume I.

    5. If you want the VPN 3002 to be able to reach devices on other networks that connect to this VPN Concentrator, review your Network Lists. See Chapter 15, "Policy Management" in the VPN 3000 Series Concentrator Reference Volume I.

Tunnel Initiation

The VPN 3002 always initiates the tunnel to the central-site VPN Concentrator. The central-site VPN Concentrator cannot initiate a tunnel to a VPN 3002. The VPN 3002 creates only one IPSec tunnel to the central-site VPN Concentrator, in either PAT or Network Extension mode. The tunnel can support multiple encrypted data streams between users behind the VPN 3002 and the central site. With split tunneling enabled, it can also support multiple unencrypted data streams to the internet.

In PAT mode, the tunnel establishes when data passes to the VPN Concentrator, or when you click Connect Now in the Monitoring | System Status screen.

In Network Extension mode, the VPN 3002 automatically attempts to establish a tunnel to the VPN Concentrator.

Tunnel Initiation with Interactive Hardware Client Authentication

In either Client or Network Extension mode, when you enable interactive hardware client authentication, the tunnel establishes when you perform the following steps.


Step 1   In the VPN 3002 Hardware Client login screen, click the Connection/Login Status button. The Connection/Login screen displays.

Step 2   Click Connect Now.

Step 3   Enter the username and password for the VPN 3002.

See the section, "Logging In With Interactive Hardware Client and Individual User Authentication" in Chapter 1 for detailed instructions.


Alternatively, you can click Connect Now on the in the Monitoring | System Status screen, after which the system prompts you to enter the username and password for the VPN 3002. See the section, "Monitoring | System Status" in the Monitoring chapter.

Data Initiation

After the tunnel is established between the VPN 3002 and the central-site VPN Concentrator, the VPN Concentrator can initiate data exchange only in Network Extension mode with all traffic travelling through the tunnel. If you want the tunnel to remain up indefinitely, configure the VPN 3002 for Network Extension mode and do not use split tunneling.

Table 11-1 summarizes instances in which the VPN 3002 and the central-site VPN Concentrator can initiate data exchange.


Table 11-1: Data Initiation: VPN 3002 and Central-Site VPN Concentrator
Mode Tunneling Policy VPN 3002 Can Send Data First Central-Site VPN Concentrator Can Send Data First (after VPN 3002 initiates the tunnel)

PAT

All traffic tunneled

Yes

No

PAT

Split tunneling enabled

Yes

No

Network Extension

All traffic tunneled

Yes

Yes

Network Extension

Split tunneling enabled

Yes

No

Configuration | Policy Management

The Configuration | Policy Management screen introduces this section of the Manager.


Figure 11-1: Configuration | Policy Management Screen


Traffic Management

To enable or disable PAT, click Traffic Management.

Configuration | Policy Management | Traffic Management

The Manager displays the Configuration | Policy Management | Traffic Management screen.


Figure 11-2: Configuration | Policy Management | Traffic Management Screen


PAT

To configure PAT (Port Address Translation) click PAT.

Configuration | Policy Management | Traffic
Management | PAT

The Configuration | Policy Management | Traffic Management | PAT screen displays.


Figure 11-3: Configuration | Policy Management | Traffic Management | PAT Screen


PAT mode provides many-to-one translation; that is, it translates many private network addresses to the single address configured on the public network interface.

Enable

To enable PAT, click Enable.

Configuration | Policy Management | Traffic Management |
PAT | Enable

This screen lets you enable or disable PAT, which applies PAT to all configured traffic flowing from the private interface to the public interface.


Figure 11-4: Configuration | Policy Management | Traffic Management | PAT | Enable Screen


PAT Enabled

Check the box to enable Client Mode (PAT), or clear it to enable Network Extension Mode.


Note   Remember that to use Network Extension Mode, you must configure an IP address other than the default for the private interface. If you do not change the IP address of the private interface, you can not disable PAT.

Apply/Cancel

To enable or disable PAT, and include your setting in the active configuration, click Apply. The Manager returns to the Configuration | Policy Management | Traffic Management | PAT screen.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

To discard your entry and leave the active configuration unchanged, click Cancel. The Manager returns to the Configuration | Policy Management | Traffic Management | PAT screen.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Nov 20 10:51:15 PST 2002
Copyright 1989-2000©Cisco Systems Inc.