Remote-access Guide

flexvpn remote access configuration

by Sterling Schumm Published 2 years ago Updated 1 year ago
image

The FlexVPN server is configured to authenticate FlexVPN clients that use EAP by configuring the authentication remote eap command in IKEv2 profile configuration mode. FlexVPN clients authenticate using EAP by skipping the AUTH payload in the IKE_AUTH request.

Full Answer

Can I use flexvpn with local or remote users?

Both local and remote user authentication is possible. Local authentication is a great option for small networks because you don’t need an AAA server. The FlexVPN server presents a certificate to the remote user so they can check the validity of the FlexVPN server.

How does EAP work with flexvpn?

All EAP communication terminates on the FlexVPN server. This is different from standards-based EAP methods such as EAP-MD5 or EAP-GTC, which pass through to an AAA server. Both local and remote user authentication is possible. Local authentication is a great option for small networks because you don’t need an AAA server.

Does flexvpn support Cisco AnyConnect-EAP?

This works with a Cisco proprietary AnyConnect-EAP method. All EAP communication terminates on the FlexVPN server. This is different from standards-based EAP methods such as EAP-MD5 or EAP-GTC, which pass through to an AAA server.

What is a flexvpn certificate?

The FlexVPN server presents a certificate to the remote user so they can check the validity of the FlexVPN server. The clients can authenticate themselves to the FlexVPN server with a username and password or a certificate.

image

What is difference between Getvpn and FlexVPN?

GET VPN is used for site-to-site only, whereas FLEX VPN is able to work with site-to-site and Remote Access (RA VPN) deployments at once. GET VPN was designed to take advantage of the inherent full-mesh capabilities of MPLS networks.

Which requirement is needed to use local authentication for Cisco AnyConnect secure mobility clients that connect to a FlexVPN server?

Cisco AnyConnect Secure Mobility Client requires that the server authenticate itself using a certificate (rsa-sig). The router must have a web server certificate (that is, a certificate with 'server authentication' within the extended key usage extension) from a trusted certificate authority (CA).

What is Flex VPN?

FlexVPN is Cisco's implementation of the IKEv2 standard featuring a unified paradigm and CLI that combines site to site, remote access, hub and spoke topologies and partial meshes (spoke to spoke direct).

Is FlexVPN Cisco proprietary?

Connections between devices are still point-to-point GRE tunnels, spoke-to-spoke connectivity is still achieved with NHRP redirect message, IOS routers even run the same NHRP code for both DMVPN and FlexVPN, which also means that both are Cisco's proprietary technologies.

What is VPN type IKEv2?

IKEv2 (Internet Key Exchange version 2) is a VPN encryption protocol responsible for request and response actions. It handles the SA (security association) attribute within an authentication suite called IPSec.

What is a difference between Getvpn and IPSec?

GETVPN is a tunnel-less VPN technology providing end-to-end security for network traffic across fully meshed topology. DMVPN provides full meshed connectivity with simple configuration of hub and Spoke. DMVPN forms IPsec tunnel over dynamically/statically addressed spokes. Better due to no multicast replication issues.

What is Getvpn Cisco?

GETVPN (Group Encrypted Transport VPN) is a tunnel-less VPN technology meant for private networks like MPLS VPN where we use a single SA (Security Association) for all routers in a group. Traditional IPSec has some scalability issues because it's point-to-point.

What is a DMVPN router?

A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites/routers without passing traffic through an organization's virtual private network (VPN) server or router, located at its headquarters.

What is IKEv2 fragmentation?

1.3. 2, IKEv2 fragmentation is a new solution that improves security by avoiding IP-level fragmentation.

What is a commonality between DMVPN and flex VPN technologies?

What is a commonality between DMVPN and FlexVPN technologies? FlexVPN and DMVPN use the new key management protocol, IKEv2. FlexVPN and DMVPN use IS-IS routing protocol to communicate with spokes. IOS routers run the same NHRP code for DMVPN and FlexVPN. FlexVPN and DMVPN use the same hashing algorithms.

How does AnyConnect authenticate?

The AnyConnect server on the MX supports client certificate authentication as a factor of authentication. If certificate authentication is enabled, the AnyConnect server will use the uploaded trusted CA certificate to validate authenticating clients before requesting for the users' credentials.

How do I use Cisco AnyConnect secure mobility client?

ConnectOpen the Cisco AnyConnect app.Select the connection you added, then turn on or enable the VPN.Select a Group drop-down and choose the VPN option that best suits your needs.Enter your Andrew userID and password.Tap Connect.

How does Cisco AnyConnect VPN client work?

Remote and mobile users use the Cisco AnyConnect Secure VPN client to establish VPN sessions with the adaptive security appliance. The adaptive security appliance sends web traffic to the Web Security appliance along with information identifying the user by IP address and user name.

How do I add a profile to AnyConnect secure mobility client?

Navigate to Configuration > Remote Access VPN > Network (Client) Access > AnyConnect Client Profile. Choose Add. Give the profile a name. Choose the Umbrella Security Roaming Client type from the Profile Usage drop-down list.

Introduction

This document provides a sample configuration for a VPN routing and forwarding (VRF)-aware FlexVPN in a remote access scenario. The configuration uses a Cisco IOS® router as the tunnel aggregation device with remote access AnyConnect clients.

Prerequisites

In this example configuration, the VPN connections are terminated on a Multiprotocol Label Switching (MPLS) Provider Edge (PE) device where the tunnel termination point is in an MPLS VPN (the front VRF [FVRF]). After the encrypted traffic is decrypted, the clear text traffic is forwarded into another MPLS VPN (the internal VRF [IVRF]).

Configure

In this section, you are presented with the information to configure the features described in this document.

Verify

Use this section to confirm that your configuration works properly. Verify the derived virtual access interface, then verify the IVRF and FVRF settings.

Troubleshoot

There is currently no specific troubleshooting information available for this configuration.

IKEv2

Let’s configure our IKEv2 settings. With some of these settings, you could use smart defaults but I prefer to configure this myself. It’s possible that with new versions of the AnyConnect client, certain protocols don’t work anymore. When this happens, you want to be able to quickly update your configuration.

IPSec

We need an IPSec transform-set and an IKEv2 profile. I’ll create both:

What is the only mandatory bit to get FlexVPN running?

The only other mandatory bit to get FlexVPN running is tunnel IPSec encryption. FlexVPN relies heavily on IKEv2 for things like interface matching, authentication and peer route injection. All devices will have one IKEv2 profile configured per FlexVPN cloud. Below is the example of a generic Cloud 1 profile:

What is DMVPN like?

One of the main features of DMVPN-like networks is the ability to build spoke-to-spoke tunnels on demand. This feature can be added to FlexVPN using just a few commands. FlexVPN only implements DMVPN phase 3 logic of NHRP so similar notions of NHRP redirects and shortcuts will be applied here.

What is the default mechanism to control peer availability in IPsec?

Default mechanism to control peer availability in IPsec is Dead Peer Detection (DPD). For example, to detect a peer loss in 20 seconds add the following command to every IKEv2 profile:

Does FlexVPN have a CA?

Each FlexVPN cloud has its own Certificate Authority (CA) All devices in one cloud will have their certificates signed by the same CA and have a common domain portion of the CN attribute (cloud.one or cloud.two) All Spokes have one unique certificate per FlexVPN cloud.

Can a site have a WAN link?

Sometimes sites may have additional WAN links either for redundancy or additional capacity. Active/standby redundancy is quite easy to achieve on a Spoke using floating static routes and IP SLA inside a FVRF. The same requirement for a Hub dictates the use of FlexVPN client block config on all Spokes connecting to that Hub. Active/Active can only be achieved by splitting the router into multiple inside VRFs (iVRFs) and defining traffic sharing policies on downstream device (e.g. core LAN switch).

What is FlexVPN phase 4?

FlexVPN is an improvement over DMVPN and is sometimes (unofficially) referred to as DMVPN phase 4. FlexVPN uses virtual tunnel interfaces (VTI), an alternative to the older crypto-maps. There are two VTI types:

How many virtual templates are there for remote spoke routers?

With two remote spoke routers, you will have one virtual-template and two virtual-access interfaces. The virtual template can include most of what you would use on a regular interface. You can add access-lists, policy-maps for QoS, etc. These are all copied to the virtual access interfaces.

Finding Feature Information

Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release.

Restrictions for the FlexVPN Server

When configuring a dual-stack tunnel interface in a VPN routing and forwarding (VRF)-aware IPsec scenario, you cannot use the ip vrf forwarding command to configure an Inside VPN routing and forwarding (IVRF) instance because this is not a valid configuration.

Information About the FlexVPN Server

The FlexVPN server supports peer authentication using the Extensible Authentication protocol (EAP) and acts as a pass-through authenticator relaying EAP messages between the client and the backend EAP server. The backend EAP server is typically a RADIUS server that supports EAP authentication.

How to Configure the FlexVPN Server

This task describes the IKEv2 profile commands required for configuring the FlexVPN server in addition to the basic IKEv2 profile commands.

Feature Information for Configuring the FlexVPN Server

The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.

image

FlexVPN Network Topology

Image
This document provides a sample configuration for a VPN routing and forwarding (VRF)-aware FlexVPN in a remote access scenario. The configuration uses a Cisco IOS® router as the tunnel aggregation device with remote access AnyConnect clients.
See more on cisco.com

Assumptions

FlexVPN Configuration Elements

Convergence Optimization

Corner Case Analysis – Multiple Wan Links

Image
The network we’ll be looking at is a dual-hub dual-cloud FlexVPN with PKI authentication. Each FlexVPN cloud is represented by its own domain encoded in Common Name (CN) attribute of X.509 certificate. Each Spoke will have a unique certificate per-cloud and will connect to both FlexVPN Hubs. To demonstrate som…
See more on packetpushers.net

Conclusions

  • In this post I will not focus on particular design choices and will follow best practices outlined in FlexVPN Overview and Design post. Before we jump to FlexVPN configuration let me go over some of the assumptions I’ve made about pre-existing state of the network: 1. I will assume that PKI infrastructure is already setup in the following way: 1.1. Each FlexVPN cloud has its own Cer…
See more on packetpushers.net

Bonus

  • Instead of providing the full show runoutputs here, I’ve decided to split FlexVPN configuration into a number of small building blocks and examine them separately. Throughout this section, if configuration is the same for both FlexVPN clouds, I will only include examples for one of them.
See more on packetpushers.net

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9