NCD – Cisco Adaptive Security Appliance (ASA) Example VPN Configuration
The following diagrams identify example VPN settings at the Navisite Cloud Director (NCD) Create/Edit VPN page, and map them to their corresponding values in the Cisco® Adaptive Security Appliance (ASA) example configuration, below.
Cisco Adaptive Security Appliance (ASA) VPN Configuration Elements
The following sections detail elements of the Cisco Adaptive Security Appliance (ASA) configuration displayed above, and provide additional information for use when configuring your VPN connection.Object Group – Cisco ASA Device VLAN Subnet Network Information
Thisobject-group
defines the network information for the VLAN subnet on your Cisco ASA device.object-group network [YOUR_LOCAL_VLAN_SUBNET]
network-object [VLAN_NET_IP] [VLAN_NET_MASK]
Object Group – Navisite Cloud Director VLAN Subnet Network Information (Diagram Element 2)
Thisobject-group
defines the network information for the VLAN subnet in your NCD environment.object-group network [YOUR_REMOTE_NCD_VLAN_SUBNET]
network-object [VLAN_NET_IP] [VLAN_NET_MASK]
Access List
Theaccess-list
identifies traffic from the local and remote VLANs as requiring encryption.access-list ipsec-[YOUR_VPN_NAME] extended permit ip
object-group [YOUR_LOCAL_VLAN_SUBNET]
object-group [YOUR_REMOTE_NCD_VLAN_SUBNET]
Route Setup
This route command allows traffic bound for the remote NCD subnet to be routed externally.route outside [YOUR_REMOTE_NCD_VLAN_SUBNET] [YOUR_REMOTE_NCD_VLAN_MASK]
[ASA_EXTERNAL_IP] 1
Maximum Transmission Unit (MTU) Size (Diagram Element 5)
Themtu
command sets the Maximum Transmission Unit (MTU), or largest allowable packet size, on the interface used to host the VLAN subnet on your CISCO ASA device (e.g., Ethernet0/1.123
, or the nameif
defined on Ethernet0/1.123
).mtu [NAMEIF_ORIINTERFACE_ID] 1500
Encryption – Crypto Transform Set (Diagram Element 3)
Thecrypto ipsec transform-set
defines a combination of security protocols and algorithms for the VPN connection. The following example displays a transform set for 3des
encryption and the sha 1 hmac
hash set. In order to connect with NCD, encryption can be set to 3des
, aes
, or aes-256
. The hash set must be esp-sha-hmac
.crypto ipsec transform-set [TRANSFORM_SET_NAME] esp-3des esp-sha-hmac
IPSec Security Association (SA) Lifetime
Theipsec security-association lifetime
value must be set to 28800 seconds (8 hours).crypto ipsec security-association lifetime
seconds 28800
VPN Crypto Map (Diagram Element 1)
Configure the VPNcrypto map
as follows:- Set the
match address
to the previously specifiedaccess-list
- Enable perfect forward secrecy (
pfs
) - Specify the public IP address of the
peer
site - Set the
transform-set
to the previously definedipsec transform-set
- Set the
security-association
(SA) lifetime to 3600 seconds (1 hour) - Bind the crypto map to the outside
interface
of the ASA device
crypto map CMAP_outside 20 match address ipsec-[YOUR_VPN_NAME]
crypto map CMAP_outside 20 set pfs
crypto map CMAP_outside 20 set peer [PEER_SITE_PUBLIC_IP]
crypto map CMAP_outside 20 set transform-set [TRANSFORM_SET_NAME]
crypto map CMAP_outside 20 set security-association lifetime seconds 3600
crypto map CMAP_outside interface [ASA_DEVICE_OUTSIDE_INTERFACE]
ISAKMP
Configure the ISAKMP policy as follows:- Configure the IP address of the host ASA as phase 2 ID
- Enable ISAKMP negotiation on the outside interface
crypto isakmp identity address
crypto isakmp enable outside
crypto isakmp policy 10
authentication pre-share
encryption 3des
hash sha
group 2
lifetime 28800
VPN Tunnel Setup (Diagram Elements 1 & 4)
Configure the VPN tunnel as follows:- Configure the ipsec tunnel using
ipsec-121
(for a VPN over the public internet) - Configure the tunnel with a pre-shared key – it is recommended that you use the pre-shared key generated by NCD.
tunnel-group [PEER_SITE_PUBLIC_IP] type ipsec-l2l
tunnel-group [PEER_SITE_PUBLIC_IP] ipsec-attributes
pre-shared-key [PRE_SHARED_KEY_PASSWORD]
Verifying the Connection
Once the VPN connection to NCD has been established, it can be verified as follows:- From the ASA device, issue the following commands to check the status of the VPN tunnel connection:
show vpn-sessiondb
- an active IPsec LAN-to-LAN session should be displayed
- active IKE and IPsec tunnels should be displayed
show crypto isakmp
- an IKE peer for the NCD public IP should be displayed with a state of
MM_ACTIVE
show crypto ipsec stats
- inbound and outbound encryption values that change when pinging between the NCD and ASA firewall should be displayed