I am currently in need of an Auth scheme that protects our internal assets from prying eyes. Currently we have Remote access VPN clients (VPN Client 3.X) connecting to a 2621 wih 3DES tunnels with Pre-shared key. We have preconfigured the client that we are shipping out however, we want to ensure that any of our clients don't send the setup.exe to another PC and install the client there as well, then inform them of their password to obtain access.
This VPN is to be used by up to 20 users, so we don't want to spend alot over this issue. What can I do to ensure that it is the rep. Should I be installing MS IAS and CA? or RSA SecurID? Any ideas would be greatly appreciated.
If you want to just authenticate the user, you could implement xauth and authenticate the users via Radius, which could backend to an One Time Password server such SecureID. This would make it a bit harder to share their passwords. If you want to go even further so it would even be harder to connect with their group name/password. You could implement the use of certificates (using the OU as their group name), thus they need to enroll their machines to your cert server before they could connect to your router.
Of course you need to enroll your router to the same CA too.
If I use certificates, a certificate has to be enrolled for their PC, is this correct? That certificate is not transferable? Is the backend to a OTP server cost effective for only 20 users? Can give me an sample config and some recommendations for a OTP server to use?
Would it be possible to use Microsoft CA for the certificates? Is there a config for the using Microsoft CA with the router and client?
Taking into consideration that we are dealing with 20 users, which is most cost effective and simple to work with for this situation?
Thank you for taking the time to respond, your help is greatly appreciated.
The certificate is a machine cert and is not transferable from one machine to another, not unless you are using a smart card. For the backend to OTP, don't know the cost really but it might be more than using certs, since you have to buy the 3rd party OTP software and tokens, whereas a MS CA is free with Windows 2K.
Sample config of router and client using certs is on:
Just to adding to this, the certs are exportable and thus could be moved from one machine to another. I stand corrected on my previous statement. Just bear in mind that the cert is your groupname/password, ie your pre-shared key. If you would want to further authenticate users connecting you could implement xauth in conjunction with certs. A bit complicated but it all depends on your security policy. Simple implementation against more security and more complex implementation.
Besides Authentication, what can I do to ensure that only the Laptop's we authorized only have access to our VPN. Ensuring that users cannot load a VPN on a unauthorized PC. If certificates are transferrable then they defeat the purpose and are the same as using a group key in terms of Hose connectivity, we require some kind of service that does the equivalent of checking the MAC address to ensure that is one that is listed to enable access.
Any ideas? If User Authentication is the only solution then we are pretty much looking at a OTP solution.
The two factor auth is a good way that I use. The radius piece is fairly easy and the token server is not bad either. The UNIX version of SAFEWORD turns out to be even easier than the Windows stuff. The issue of course is cost.
This will keep your users from passing there install disk around and force them to have a token on their keychain. Other than that you could always run off those pesky users!!hehe
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :