Enterasys Networks XSR-3020 manual Generate Master Encryption Key, Configure Access Control Lists

Page 71

VPN Site-to-Site Sample Configuration

Generate Master Encryption Key

If you have not already generated a master encryption key, you must do so now to configure the VPN. A master key need only be generated once.

Caution: The master encryption key is stored in hardware, not Flash, and you cannot read the key - only overwrite the old key by writing a new one. To ensure router security, it is critical not to compromise the key. There are situations where you may want to keep the key, for example, to save the user database off-line in order to later download it to the XSR. In order to encrypt the user database, you need the same master key, indicating the key designation with the master key specify command. Be aware that if the XSR is inoperable you may have to return to factory defaults, which erases the master key forcing you to generate a new one.

Generate the master key:

XSR(config)#crypto key master generate

New key is 2173 4521 3764 2ff5 163b 4bdf fe92 dbc1 1232 ffe0 f8d9 3649

Configure Access Control Lists

ACL 101 configured below is strongly restrictive in denying all but IKE traffic (well-knownACL #

500)through the router. ACLs 190, 191, and 192 are crypto map filters configured to accept any IPSec-encrypted traffic over site-to-site tunnels and pass that traffic to the three specified networks only.

XSR(config)#access-list 101 permit udp any any eq 500

XSR(config)#access-list 101 permit udp esp any any

XSR(config)#access-list 101 permit udp ah any any

XSR(config)#access-list 101 deny ip any any

XSR(config)#access-list 190 permit ip any 112.16.72.0 0.0.0.255

XSR(config)#access-list 191 permit ip any 112.16.76.0 0.0.0.255

XSR(config)#access-list 192 permit ip any 112.16.80.0 0.0.0.255

Set Up IKE Phase I Security

The following proposal sets pre-shared authentication and MD5 hashing:

XSR(config)#crypto isakmp proposal acme

XSR(config-isakmp)#authentication pre-share

XSR(config-isakmp)#hash md5

Configure IKE Policy for Remote Peer

The following proposal specifies the XSR’s remote peer IP address as any peer matching its IKE policy, sets NAT to automatically detect routers performing NAT between tunnel endpoints and directs the XSR to switch on UDP encapsulation when found.

It also designates the peer as a gateway which will initiate the configuration mode in terms of IKE negotiation:

XSR(config)#crypto isakmp peer 0.0.0.0 0.0.0.0

XSR(config-isakmp-peer)#proposal acme

XSR(config-isakmp-peer)#config-mode gateway

XSR(config-isakmp-peer)#nat-traversal automatic

XSR Getting Started Guide 3-27

Image 71
Contents Version PeditionSecurity RouterPage Enterasys Networks, Inc Minuteman Road Andover, MA Regulatory Compliance Information Industry Canada Notices Product Safety Supplement to Product Instructions Vcci Notice N826 Enterasys Networks, Inc. Firmware License Agreement Page Page Contents BRI Leased Line BRI Leased Frame Relay BRI Switched Line Index Appendix a SpecificationsXiv About This Guide Contents of the GuideBold/En negrilla FTP Getting HelpXviii System Description OverviewPstn Hardware FeaturesXSR-3020 IP Protocol Software FeaturesOperating System Industry-common CLISnmp and Statistics Gathering IP RoutingFrame Relay SecurityIntegrated Services Digital Network Isdn BRI/PRI Dynamic Host Configuration Protocol DhcpVirtual Private Network VPN Quality of Service QoSGRE over IPSec Dial-on-Demand/Bandwidth-on-Demand DoD/BoD Dial ServiceDial Backup Asynchronous Digital Subscriber Line AdslInstallation Overview Installation Overview Verifying Your Shipment Installation Site SuggestionsIntroduction Removing XSR Cover Installing NIM Cards and Rack MountingRemoving NIM Slot Cover Fastening Rack Brackets CompactFlash Card Installation Installing a CompactFlash Memory CardFormatting the CompactFlash Card CompactFlash Card for the Adsl NIMConnecting Serial COM Console Cable Connecting Cables11 Connecting High Speed Serial Connector 3020 15 Attaching Ethernet Connector 17 Attaching Ethernet LAN NIM Connector 19 Connecting Power Supply Cord Initializing XSR Software Software ConfigurationInitializing XSR Software Opening a COM Console Session Optional Configuring Remote Auto InstallConfiguring RAI for Frame Relay Remote Auto Install Attempting Forever Configuring RAI over Adsl Configuring RAI for Dhcp over LANVirtual-template 1 pppoe limit per-mac Setting User Name, Privilege and Password Configuring the XSR Name and User InformationSetting the Clock PRI Configuration Configuring the LAN PortsConfiguring the WAN Ports BRI Leased Frame Relay BRI ConfigurationBRI Leased Line BRI Switched Line PPPoA Adsl ConfigurationPPPoE IPoA Firewall Sample ConfigurationXSR with Firewall Topology Complete LAN and WAN interface configuration Setting Up RIP RoutingConfiguring Frame Relay Point to Point Networks Configure Ospf RoutingSetting Up an Snmp Community String, Traps and V3 Values Viewing Your Configuration Configuring Message Logging and Severity LevelProduct Version Connecting Remotely via the WebWeb Product Version Window Backup Site Hostname branch2 LAN-PPP Services Sample ConfigurationFrame Relay WAN Link with PPP Backup Sample Configuration Configure Quality of Service Configure Users and PasswordsConfigure LAN Interface XSRconfig-pmap-cpriority-server#priority medium 20 Configure WAN/Frame Relay PortApply QoS Configure Ospf RoutingConfigure More Access Lists Configure the Dial Backup Connection Configure DHCP/BOOTP RelayConfigure Snmp VPN Site-to-Site Sample ConfigurationGenerate Master Encryption Key Configure Access Control ListsSet Up IKE Phase I Security Configure IKE Policy for Remote PeerCreate a Transform Set Configure Crypto MapsConfiguring VPN at Interface Mode and Setting Up RIP Configuring Authentication AAA VPN Sample Configuration with Network Extension ModeVPN Topology with NEM, EZ-IPSec and Internet Access Create the Isakmp IKE global peer Initialization Output XSR Rebooting CharacteristicsReboot Triggers Reboot TriggersPower-up Error Conditions Bootrom Monitor Mode Commands Bootrom Monitor Mode Commands Dir CopyDel Ffc Rename RemoveFTP Bootrom Monitor Mode Commands Bootrom Monitor Mode Commands Software Configuration System Specifications SpecificationsNIM WAN Cable, CompactFlash and Accessory SpecificationsXSR Getting Started Guide A-3 COM COM Console PortMini-GBIC Fiber, Copper Port GigabitEthernet PortsCopper/Fiber-optic Ethernet NIMs Regulatory/Safety Compliance21 DTE Port Serial NIM Card PortFigure A-8 EIA-232/530 DTE Pin Assignments Figure A-9 EIA-449 DTE Pin Assignments Figure A-10 Combined V.35/EIA-232/530 DTE Pin Assignments Figure A-11 DTE Pin Assignments T1/E1/ISDN PRI T1/E1/ISDN PRI NIM Card PortsGrounding Shunt for E1 NIM Cards Balun for E1 or PRI NIM CardsFigure A-16 Installing a Grounding Shunt on the E1 NIM Card Installing Shunt/Terminal StripFigure A-17 1-Port T3/E3 NIM Card T3/E3 NIM CardBRI-S/T Port BRI-S/T NIM Card PortsTermination Shunt for the Isdn BRI-S/T NIM Card Figure A-21 Isdn BRI-U NIM Card RJ-49C ports shown Port BRI-U NIM Card PortsFigure A-23 Adsl NIM Card Port Adsl NIM Card PortFigure A-25 T1/E1 D&I NIM Card T1/E1 Drop & Insert D&I NIMLED Behavior CompactFlash Memory CardPWR Index Index-2

XSR-3020 specifications

Enterasys Networks XSR-3020 is a sophisticated Layer 2 and Layer 3 switch designed to meet the demands of modern networking environments. Known for its robust performance and versatility, the XSR-3020 is an ideal solution for enterprises that require high efficiency, comprehensive security, and network reliability.

This switch supports a variety of advanced technologies, making it suitable for both data center and edge deployments. One of its standout features is its scalability. The XSR-3020 can accommodate growing network demands by allowing for easy integration of additional modules. This capacity for expansion ensures that organizations can adapt their networks without the need for complete hardware replacements.

The XSR-3020 offers high-speed connectivity through its multiple gigabit Ethernet ports, providing up to 48 10/100/1000BASE-T ports in a single chassis. This high-density design optimizes the physical space and ensures that organizations can connect numerous devices simultaneously without sacrificing performance. Additionally, it supports Power over Ethernet (PoE), allowing users to power network devices, such as IP cameras and access points, directly through the switch. This feature streamlines installations and reduces the clutter of electrical wiring.

Security is a critical consideration in today’s network landscape, and the XSR-3020 addresses this need with robust security features. It incorporates advanced access control capabilities, enabling administrators to segment traffic and enforce policies effectively. The switch also supports 802.1X authentication, ensuring that only authorized devices can connect to the network.

In terms of management, the XSR-3020 is designed to simplify operations through its user-friendly interface and extensive support for management protocols. It offers native support for Simple Network Management Protocol (SNMP) and can be easily integrated with various network management systems, allowing for efficient monitoring and troubleshooting.

Another key characteristic of the XSR-3020 is its reliability. With features such as redundant power supplies and fans, the switch ensures high availability, minimizing downtime for critical applications. It is also built to withstand harsh conditions, making it suitable for diverse environments.

Overall, the Enterasys Networks XSR-3020 combines high performance, scalability, and security, making it an excellent choice for organizations looking to enhance their network infrastructure. Its comprehensive set of features positions it as a reliable backbone for any modern enterprise network, ensuring that businesses can operate efficiently and securely.