Cisco Systems OL-5532-02 manual Use Client Address, L2TP Compression, Required, Require Stateless

Page 22

Chapter 4 Remote Access VPN Services

Creating Remote Access VPN Policies

Figure 4-21 The Remote Access VPN Policy – VPN 3000 L2TP Page

Step 2

Follow the instructions in Table 4-10to select options for VPN 3000 L2TP tunneling.

 

Table 4-10 Remote Access VPN Policy – VPN 3000 L2TP Editor Fields

 

 

 

 

Field Name

 

Type

Instructions

 

 

 

 

Use Client Address

 

checkbox

Check the box if you want to accept and use an IP address received from the client.

 

 

 

 

L2TP Compression

 

checkbox

Check the box if you want to enable compression for L2TP connections for this

 

 

 

group.

 

 

 

 

Required

 

checkbox

Check the box if you want to require encryption.

 

 

 

 

Require Stateless

 

checkbox

When enabled, during connection setup the L2TP clients must agree to use stateless

 

 

 

encryption to encrypt data or they will not be connected. With stateless encryption,

 

 

 

the encryption keys are changed on every packet. Otherwise, the keys are changed

 

 

 

after some number of packets or whenever a packet is lost. Stateless encryption is

 

 

 

more secure, but it requires more processing. However, its performance can improve

 

 

 

in a lossy environment (where packets are lost), such as the Internet.

 

 

 

This option is unchecked (disabled) by default. Do not check this option if you use

 

 

 

the NT Domain option for user authentication. The NT Domain authentication

 

 

 

cannot negotiate encryption.

 

 

 

Check the box if you want to enable stateless encryption.

 

 

 

 

40-Bit

 

checkbox

Check the box if you want to use 40-bit encryption.

 

 

 

 

128-Bit

 

checkbox

Check the box if you want to use 128-bit encryption.

 

 

 

 

PAP

 

checkbox

Check the box to use Password Authentication Protocol (PAP), or uncheck the box to

 

 

 

disable use of this protocol.

 

 

 

 

CHAP

 

checkbox

Check the box to use Challenge-Handshake Authentication Protocol (CHAP), or

 

 

 

uncheck the box to disable use of this protocol.

 

 

 

 

Cisco IP Solution Center Integrated VPN Management Suite Security User Guide, 3.2

4-22

OL-5532-02

 

 

Image 22
Contents Remote Access VPN Services Adding AAA Server Devices to Your Repository AAA Servers Owner Select button TimeoutName IP AddressCreating Encryption Policies Click Remote Access VPN Policy PoliciesRemote Access VPN Policy General Editor XAuth Timeout Group PasswordConfirm Password Use ModeNAT Traversal AuthenticationDefault Domain IKE NAT KeepaliveRemote Access VPN Policy Address Pools Defining Address PoolsEnding Address Starting AddressNet Mask 11 Remote Access VPN Policy Split Tunneling Network List Defining Split Tunneling Networks OptionalGenerate Split TunnelingPolicy CreateDefining the Remote Access User List Optional 14 The Everything Option for Split TunnelingPassword User IDEnabled SA Idle Timeout SA Idle TimeoutDefining Cisco IOS Software-Specific Parameters Injection Defining PIX Firewall-Specific ParametersReverse Route Group LockMax Connect Time Idle TimeoutDefining VPN 3000-Specific Parameters Sysopt Connection Authentication on Logins Min Password Only Passwords SimultaneousDefining the VPN 3000 Access Hours Start Time Defining the VPN 3000 L2TP ParametersControl End TimeRequired Use Client AddressL2TP Compression Require StatelessMSCHAPv1 SummaryMSCHAPv2 23 The Policies Page with Policy Status Displayed Creating Remote Access VPN Service Requests IPsec Network-basedDescription AAA Servers Remote AccessPolicies CPEs29 CPEs Associated with Remote Access Service Dialog Box 31 Add/Remove Templates Dialog Box 32 The Template DataFile Chooser Action ActiveOL-5532-02