ProCurve SR VPN Config Guide
ProCurve SR VPN Config Guide
5991-2120
April 2005
Understanding VPN
A truly private network is a network where a single entity (e.g., a company) owns all the wires from point
A to point B. In a Virtual Private Network (VPN), some part of the path from A to B is a public network
(e.g., the Internet or the public telephone system). VPN software technology creates a private “tunnel”
through the public network system for your sensitive traffic. Using encryption and authentication methods,
a VPN provides security over unsecured media.
VPN Benefits
VPNs provide a very cost-effective means of private communication by using inexpensive local call ISDN
or telephone connections (with the Internet as the backbone).
VPN Limitations
Obviously, when a technology incorporates portions of the network that are physically not in its control,
there are Quality of Service (QoS) limitations. With a true private network, users can demand a guaranteed
QoS from the telephone company or provider. However, this is not as clear-cut with VPNs.
Encryption
VPN-provided encryption algorithms (3DES, DES, etc.) are key to data confidentiality, allowing data
to pass through the network protected from unauthorized access.
Authentication
VPN-provided authentication may be used to ensure both data integrity and trusted-source data
origination. The use of hash algorithms (such as MD5 or SHA) ensures that data has not changed
during transfer. The use of preshared keys or digital certificates ensures that the data is from a
trusted/accepted source.
2 5991-2120
VPN Configuration Guide Configuring Your Secure Router
Note The ProCurve Secure Router 7100/7200 IPSec Module (J8471A) is required for VPN
functionality in the Procurve Secure Router 7000dl Series routers.
Configuration steps for each example are provided in the tables which follow the configuration
descriptions. You can follow the given steps by entering the command text shown in bold (modifying as
needed for your application).
Note Please note that these examples are given for your study and consideration only. They are
to help you reach a better understanding of the fundamental concepts before configuring
your own application. It will be necessary for you to modify these examples to match your
own network’s configuration.
Use the sample scripts in this section as a shortcut to configuring your unit. Use the text
tool in Adobe Acrobat to select and copy the scripts, paste them into any text editing
program, modify as needed, and then paste them directly into your SROS command line.
5991-2120 3
Configuring Your Secure Router VPN Configuration Guide
Note: The VPN gateways involved may be connected through multiple routers.
4 5991-2120
VPN Configuration Guide Configuring Your Secure Router
5991-2120 5
Configuring Your Secure Router VPN Configuration Guide
Sample Script
6 5991-2120
VPN Configuration Guide Configuring Your Secure Router
5991-2120 7
Configuring Your Secure Router VPN Configuration Guide
Note The ProCurve VPN Client (J8758A/J8750A) is available for remote VPN client
connectivity. For more information on the ProCurve VPN Client software, go to
www.procurve.com.
The following example configures an SROS device for VPN using IKE main mode with preshared keys
and mode config support (i.e., IPv4 address, primary and secondary DNS, and NBNS addresses). This is a
common configuration to support remote access over VPN (see Figure 2). In this configuration, the device
is configured to initiate and respond in main mode.
Corporate HQ
PPP 1 Remote Client
63.97.45.57 ProCurve VPN Client
Assigned to the corporate_vpn crypto map. (J8758A/J8750A)
Network IP: 10.10.10.0
Router A
Secure Router
7102dl/7203dl
eth 0/1 WAN IP: 68.105.15.129
LAN IP: 10.10.10.254 Virtual IP: 10.30.10.x
(mode-config assigned)
Mode Config Setup @ Central Site:
(config)#crypto ike client configuration pool vpn_users
(config-ike-client-pool)#ip-range 10.30.10.1 10.30.10.12
8 5991-2120
VPN Configuration Guide Configuring Your Secure Router
5991-2120 9
Configuring Your Secure Router VPN Configuration Guide
10 5991-2120
VPN Configuration Guide Configuring Your Secure Router
Sample Script
5991-2120 11
Configuring Your Secure Router VPN Configuration Guide
12 5991-2120
VPN Configuration Guide Verifying Your Configuration Using Show Commands
For example:
(config-eth 0/1)#do show access-list
5991-2120 13
Verifying Your Configuration Using Show Commands VPN Configuration Guide
Copyright 2005 Hewlett-Packard Development Company, LP. The information contained herein is subject to change without notice.
14 5991-2120