SlideShare a Scribd company logo
CCNA Security
1
© 2009 Cisco Learning Institute.
Chapter Eight
Implementing Virtual Private Networks
Major Concepts
• Describe the purpose and operation of VPN types
• Describe the purpose and operation of GRE VPNs
• Describe the components and operations of IPsec VPNs
• Configure and verify a site-to-site IPsec VPN with pre-
2
2
2
© 2009 Cisco Learning Institute.
• Configure and verify a site-to-site IPsec VPN with pre-
shared key authentication using CLI
• Configure and verify a site-to-site IPsec VPN with pre-
shared key authentication using SDM
• Configure and verify a Remote Access VPN
Lesson Objectives
Upon completion of this lesson, the successful participant
will be able to:
1. Describe the purpose and operation of VPNs
2. Differentiate between the various types of VPNs
3. Identify the Cisco VPN product line and the security features of
3
3
3
© 2009 Cisco Learning Institute.
3. Identify the Cisco VPN product line and the security features of
these products
4. Configure a site-to-site VPN GRE tunnel
5. Describe the IPSec protocol and its basic functions
6. Differentiate between AH and ESP
7. Describe the IKE protocol and modes
8. Describe the five steps of IPSec operation
Lesson Objectives
9. Describe how to prepare IPSec by ensuring that ACLs are
compatible with IPSec
10. Configure IKE policies using the CLI
11. Configure the IPSec transform sets using the CLI
12. Configure the crypto ACLs using the CLI
13. Configure and apply a crypto map using the CLI
4
4
4
© 2009 Cisco Learning Institute.
13. Configure and apply a crypto map using the CLI
14. Describe how to verify and troubleshoot the IPSec configuration
15. Describe how to configure IPSec using SDM
16. Configure a site-to-site VPN using the Quick Setup VPN Wizard
in SDM
17. Configure a site-to-site VPN using the step-by-step VPN Wizard
in SDM
Lesson Objectives
18. Verify, monitor and troubleshoot VPNs using SDM
19. Describe how an increasing number of organizations are
offering telecommuting options to their employees
20. Differentiate between Remote Access IPSec VPN solutions and
SSL VPNs
21. Describe how SSL is used to establish a secure VPN
5
5
5
© 2009 Cisco Learning Institute.
21. Describe how SSL is used to establish a secure VPN
connection
22. Describe the Cisco Easy VPN feature
23. Configure a VPN Server using SDM
24. Connect a VPN client using the Cisco VPN Client software
What is a VPN?
CSA
VPN
Mobile Worker
with a Cisco
VPN Client
Business Partner
with a Cisco Router
6
6
6
© 2009 Cisco Learning Institute.
- Virtual: Information within a private network is
transported over a public network.
- Private: The traffic is encrypted to keep the
data confidential.
VPN
VPN
Firewall
Regional branch with
a VPN enabled
Cisco ISR router
SOHO with a Cisco
DSL Router
VPN
Corporate
Network
WAN
Internet
Layer 3 VPN
SOHO with a Cisco DSL
Router
VPN
Internet
IPSec
IPSec
7
7
7
© 2009 Cisco Learning Institute.
• Generic routing encapsulation (GRE)
• Multiprotocol Label Switching (MPLS)
• IPSec
Types of VPN Networks
MARS
CSA
VPN
Mobile Worker
with a Cisco
VPN Client
Business Partner
with a Cisco Router
Remote-access
VPNs
8
8
8
© 2009 Cisco Learning Institute.
VPN
VPN
Iron Port
Firewall
IP
S
Web
Server
Email
Server DNS
CSA
CSACSA
CSA
CSA
CSA
Regional branch with
a VPN enabled
Cisco ISR router
SOHO with a
Cisco DSL Router
VPN
Site-to-Site
VPNs
Internet
WAN
Site-to-Site VPN
MARS
CSA
VP
Business Partner
with a Cisco
Router
Internet
Hosts send and receive normal
TCP/IP traffic through a VPN gateway
9
9
9
© 2009 Cisco Learning Institute.
VPN
VPN
Iron
Port
Firewall
IP
S
Web
Server
Email
Server DNS
CS
A
CS
A
CS
A
CSA
CSA
CSA
Regional branch with
a VPN enabled
Cisco ISR router
SOHO with a
Cisco DSL
Router
VP
N
Site-to-Site
VPNs
Internet
WAN
Remote-Access VPNs
MARS
Firewall
CSA
Mobile Worker
with a Cisco
VPN Client
Remote-access
VPNs
Internet
10
10
10
© 2009 Cisco Learning Institute.
VPN
Iron Port
Firewall
IPS
Web
Server
Email
Server DNS
CSA
CSA CSA
CSA
CSA
CSA
VPN Client Software
11
11
11
© 2009 Cisco Learning Institute.
R1 R1-vpn-cluster.span.com
“R1”
In a remote-access VPN, each host
typically has Cisco VPN Client software
Cisco IOS SSL VPN
• Provides remote-access
connectivity from any
Internet-enabled host
• Uses a web browser and
SSL encryption
12
12
12
© 2009 Cisco Learning Institute.
SSL encryption
• Delivers two modes of
access:
- Clientless
- Thin client
Cisco VPN Product Family
Product Choice
Remote-Access
VPN
Site-to-Site VPN
Cisco VPN-Enabled Router Secondary role Primary role
Cisco PIX 500 Series Security Appliances Secondary role Primary role
13
13
13
© 2009 Cisco Learning Institute.
Cisco PIX 500 Series Security Appliances Secondary role Primary role
Cisco ASA 5500 Series Adaptive Security
Appliances
Primary role Secondary role
Cisco VPN
3000 Series Concentrators
Primary role Secondary role
Home Routers Primary role
Cisco VPN-Optimized Routers
Remote Office
Cisco Router
Main Office
Cisco Router
Internet
14
14
14
© 2009 Cisco Learning Institute.
Regional Office
Cisco Router
SOHO
Cisco Router
Internet
VPN Features:
• Voice and video enabled VPN (V3PN)
• IPSec stateful failover
• DMVPN
• IPSec and Multiprotocol Label Switching
(MPLS) integration
• Cisco Easy VPN
Cisco ASA 5500 Series Adaptive
Security Appliances
Intranet
Remote Site Central Site
Internet
15
15
15
© 2009 Cisco Learning Institute.
• Flexible platform
• Resilient clustering
• Cisco Easy VPN
• Automatic Cisco VPN
• Cisco IOS SSL VPN
• VPN infrastructure for
contemporary applications
• Integrated web-based
management
Extranet
Business-to-Business
Remote User
IPSec Clients
Certicom PDA IPsec
VPN Client
Internet
Router with
Firewall and
A wireless client that is loaded on a pda
16
16
16
© 2009 Cisco Learning Institute.
Small Office
Internet
Cisco
AnyConnect
VPN Client
Cisco VPN
Software Client
Firewall and
VPN Client
Software loaded on a PC
A network appliance that connects SOHO LANs to the VPN
Provides remote users with secure VPN connections
Hardware Acceleration Modules
• AIM
• Cisco IPSec VPN Shared
Port Adapter (SPA)
• Cisco PIX VPN
17
17
17
© 2009 Cisco Learning Institute.
• Cisco PIX VPN
Accelerator Card+ (VAC+)
• Enhanced Scalable
Encryption Processing
(SEP-E) Cisco IPsec VPN SPA
GRE VPN Overview
18
18
18
© 2009 Cisco Learning Institute.
Encapsulation
Original IP Packet
Encapsulated with GRE
19
19
19
© 2009 Cisco Learning Institute.
Configuring a GRE Tunnel
Create a tunnel
interface
Assign the tunnel an IP address
20
20
20
© 2009 Cisco Learning Institute.
R1(config)# interface tunnel 0
R1(config–if)# ip address 10.1.1.1 255.255.255.252
R1(config–if)# tunnel source serial 0/0
R1(config–if)# tunnel destination 192.168.5.5
R1(config–if)# tunnel mode gre ip
R1(config–if)#
R2(config)# interface tunnel 0
R2(config–if)# ip address 10.1.1.2 255.255.255.252
R2(config–if)# tunnel source serial 0/0
R2(config–if)# tunnel destination 192.168.3.3
R2(config–if)# tunnel mode gre ip
R2(config–if)#
Assign the tunnel an IP address
Identify the source tunnel interface
Identify the destination of the tunnel
Configure what protocol GRE will encapsulate
Using GRE
User
Traffic
IP
Only
?
No
No
Yes
Yes
21
21
21
© 2009 Cisco Learning Institute.
Use
GRE
Tunnel
No
No
No
No Yes
Yes
Unicast
Only?
Use
IPsec
VPN
GRE does not provide encryption
IPSec Topology
Business Partner
with a Cisco Router
Legacy
Concentrator
Main Site
Perimeter
Router
Legacy
Cisco
PIX
IPsec
POP
22
22
22
© 2009 Cisco Learning Institute.
• Works at the network layer, protecting and authenticating IP packets.
- It is a framework of open standards which is algorithm-independent.
- It provides data confidentiality, data integrity, and origin authentication.
Regional Office with a
Cisco PIX Firewall
SOHO with a Cisco
SDN/DSL Router
Mobile Worker with a
Cisco VPN Client
on a Laptop Computer
ASA
PIX
Firewall
POP
Corporate
IPSec Framework
23
23
23
© 2009 Cisco Learning Institute.
Diffie-Hellman DH7
Confidentiality
Least secure Most secure
24
24
24
© 2009 Cisco Learning Institute.
DH7
Diffie-Hellman
Key length:
- 56-bits
Key length:
- 56-bits (3 times)
Key length:
- 160-bits
Key lengths:
-128-bits
-192 bits
-256-bits
Integrity
25
25
25
© 2009 Cisco Learning Institute.
DH7
Diffie-Hellman
Key length:
- 128-bits
Key length:
- 160-bits)
Least secure Most secure
Authentication
26
26
26
© 2009 Cisco Learning Institute.
DH7
Diffie-Hellman
Pre-shared Key (PSK)
27
27
27
© 2009 Cisco Learning Institute.
DH7
Diffie-Hellman
•At the local device, the authentication key and the identity information (device-specific
information) are sent through a hash algorithm to form hash_I. One-way authentication is
established by sending hash_I to the remote device. If the remote device can independently
create the same hash, the local device is authenticated.
• The authentication process continues in the opposite direction. The remote device
combines its identity information with the preshared-based authentication key and sends it
through the hash algorithm to form hash_R. hash_R is sent to the local device. If the local
device can independently create the same hash, the remote device is authenticated.
RSA Signatures
28
28
28
© 2009 Cisco Learning Institute.
• At the local device, the authentication key and identity information (device-specific information)
are sent through the hash algorithm forming hash_I. hash_I is encrypted using the local
device's private encryption key creating a digital signature. The digital signature and a digital
certificate are forwarded to the remote device. The public encryption key for decrypting the
signature is included in the digital certificate. The remote device verifies the digital signature by
decrypting it using the public encryption key. The result is hash_I.
• Next, the remote device independently creates hash_I from stored information. If the
calculated hash_I equals the decrypted hash_I, the local device is authenticated. After the
remote device authenticates the local device, the authentication process begins in the opposite
direction and all steps are repeated from the remote device to the local device.
Secure Key Exchange
29
29
29
© 2009 Cisco Learning Institute.
Diffie-Hellman DH7
IPSec Framework Protocols
All data is in plaintext.
R1 R2
Authentication Header
AH provides the following:
 Authentication
 Integrity
30
30
30
© 2009 Cisco Learning Institute.
Data payload is encrypted.
R1 R2
Encapsulating Security Payload
 Integrity
ESP provides the following:
 Encryption
 Authentication
 Integrity
Authentication Header
Authentication Data
IP Header + Data + Key R2
Hash
IP Header + Data + Key
Data
AH
IP HDR
1. The IP Header and data payload are hashed
31
31
31
© 2009 Cisco Learning Institute.
Authentication Data
(00ABCDEF)
R1
Recomputed
Hash
(00ABCDEF)
IP Header + Data + Key
Hash
Received
Hash
(00ABCDEF)
=
Data
AH
IP HDR
Internet
2. The hash builds a new AH
header which is prepended
to the original packet
3. The new packet is
transmitted to the
IPSec peer router
4. The peer router hashes the IP
header and data payload, extracts
the transmitted hash and compares
ESP
32
32
32
© 2009 Cisco Learning Institute.
Diffie-Hellman DH7
Function of ESP
Router Router
IP HDR Data IP HDR Data
Internet
33
33
33
© 2009 Cisco Learning Institute.
ESP
Trailer
ESP
Auth
• Provides confidentiality with encryption
• Provides integrity with authentication
ESP HDR
New IP HDR IP HDR Data
Authenticated
Encrypted
IP HDR ESP HDR Data
Transport Mode
ESP
Trailer
ESP
Auth
IP HDR Data
Encrypted
Original data prior to selection of IPSec protocol mode
Mode Types
34
34
34
© 2009 Cisco Learning Institute.
IP HDR ESP HDR Data
ESP HDR IP HDR
New IP HDR Data
Tunnel Mode
Trailer Auth
ESP
Trailer
ESP
Auth
Authenticated
Authenticated
Encrypted
Security Associations
35
35
35
© 2009 Cisco Learning Institute.
IPSec parameters are configured using IKE
Host A Host B
R1 R2
10.0.1.3 10.0.2.3
IKE Phase 1 Exchange
1. Negotiate IKE policy sets
IKE Phases
Policy 15
DES
MD5
pre-share
Policy 10
DES
MD5
pre-share
1. Negotiate IKE policy sets
36
36
36
© 2009 Cisco Learning Institute.
2. DH key exchange
3. Verify the peer identity
IKE Phase 2 Exchange
Negotiate IPsec policy Negotiate IPsec policy
pre-share
DH1
lifetime
pre-share
DH1
lifetime
2. DH key exchange
3. Verify the peer identity
Policy 15
DES
MD5
pre-share
Policy 10
DES
MD5
pre-share IKE Policy Sets
Negotiate IKE Proposals
Host A Host B
R1 R2
10.0.1.3 10.0.2.3
IKE Phase 1 – First Exchange
37
37
37
© 2009 Cisco Learning Institute.
Negotiates matching IKE policies to protect IKE exchange
pre-share
DH1
lifetime
pre-share
DH1
lifetime
IKE Policy Sets
Policy 20
3DES
SHA
pre-share
DH1
lifetime
IKE Phase 1 – Second Exchange
Private value, XA
Public value, YA
Private value, XB
Public value, YB
Alice
Bob
Y
YA
A
YB = g mod p
XB
Y
YA
A = g mod p
XA
Establish DH Key
38
38
38
© 2009 Cisco Learning Institute.
(
(YB ) mod p = K (YA ) mod p = K
XB
XA
Y
YA
A
Y
YB
B
A DH exchange is performed to establish keying material.
IKE Phase 1 – Third Exchange
HR
Servers
Remote Office Corporate Office
Internet
Peer
Authenticate Peer
39
39
39
© 2009 Cisco Learning Institute.
Peer authentication methods
• PSKs
• RSA signatures
• RSA encrypted nonces
Peer
Authentication
A bidirectional IKE SA is now established.
Host A Host B
R1 R2
10.0.1.3 10.0.2.3
IKE Phase 1 Aggressive Mode Exchange
1.Send IKE policy set
and R1’s DH key
Policy 15
DES
MD5
pre-share
DH1
Policy 10
DES
MD5
pre-share
DH1
2. Confirm IKE policy
IKE Phase 1 – Aggressive Mode
40
40
40
© 2009 Cisco Learning Institute.
and R1’s DH key
3.Calculate shared
secret, verify peer
identify, and confirm
with peer
IKE Phase 2 Exchange
Negotiate IPsec policy Negotiate IPsec policy
DH1
lifetime
DH1
lifetime 2. Confirm IKE policy
set, calculate
shared secret and
send R2’s DH key
4. Authenticate peer
and begin Phase 2.
Negotiate IPsec
Security Parameters
Host A Host B
R1 R2
10.0.1.3 10.0.2.3
IKE Phase 2
41
41
41
© 2009 Cisco Learning Institute.
• IKE negotiates matching IPsec policies.
• Upon completion, unidirectional IPsec Security
Associations(SA) are established for each protocol and
algorithm combination.
IKE Phase 1
IKE SA IKE SA
1. Host A sends interesting traffic to Host B.
2. R1 and R2 negotiate an IKE Phase 1 session.
R1 R2 10.0.2.3
10.0.1.3
IPSec VPN Negotiation
42
42
42
© 2009 Cisco Learning Institute.
IKE Phase 1
IKE Phase 2
IKE SA IKE SA
IPsec SA
IPsec SA
3. R1 and R2 negotiate an IKE Phase 2 session.
4. Information is exchanged via IPsec tunnel.
5. The IPsec tunnel is terminated.
IPsec Tunnel
Configuring IPsec
Task 1: Ensure that ACLs are compatible with IPsec.
Task 2: Create ISAKMP (IKE) policy.
Tasks to Configure IPsec:
43
43
43
© 2009 Cisco Learning Institute.
Task 2: Create ISAKMP (IKE) policy.
Task 3: Configure IPsec transform set.
Task 4: Create a crypto ACL.
Task 5: Create and apply the crypto map.
Task 1
Configure Compatible ACLs
AH
ESP
IKE
Site 1 Site 2
10.0.1.3
10.0.2.3
R1 R2
Internet
10.0.1.0/24
10.0.2.0/24
44
44
44
© 2009 Cisco Learning Institute.
• Ensure that protocols 50 (ESP), 51 (AH) and UDP port 500 (ISAKMP)
traffic are not blocked by incoming ACLs on interfaces used by IPsec.
S0/0/0
172.30.1.2
S0/0/0
172.30.2.2
AH
ESP
IKE
Site 1 Site 2
10.0.1.3 10.0.2.3
R1 R2
Internet
S0/0/0
172.30.1.2
S0/0/0
172.30.2.2
10.0.1.0/24 10.0.2.0/24
Permitting Traffic
45
45
45
© 2009 Cisco Learning Institute.
R1(config)# access-list 102 permit ahp host 172.30.2.2 host 172.30.1.2
R1(config)# access-list 102 permit esp host 172.30.2.2 host 172.30.1.2
R1(config)# access-list 102 permit udp host 172.30.2.2 host 172.30.1.2 eq isakmp
R1(config)#
R1(config)# interface Serial0/0/0
R1(config-if)# ip address 172.30.1.2 255.255.255.0
R1(config-if)# ip access-group 102 in
!
R1(config)# exit
R1#
R1# show access-lists
access-list 102 permit ahp host 172.30.2.2 host 172.30.1.2
access-list 102 permit esp host 172.30.2.2 host 172.30.1.2
access-list 102 permit udp host 172.30.2.2 host 172.30.1.2 eq isakmp
R1#
Tunnel
Policy 110
DES
MD5
Preshare
86400
DH1
Site 1 Site 2
10.0.1.3 10.0.2.3
R1 R2
Internet
10.0.1.0/24 10.0.2.0/24
Task 2
Configure IKE
46
46
46
© 2009 Cisco Learning Institute.
Defines the parameters within the IKE policy
crypto isakmp policy priority
router(config)#
R1(config)# crypto isakmp policy 110
R1(config–isakmp)# authentication pre-share
R1(config–isakmp)# encryption des
R1(config–isakmp)# group 1
R1(config–isakmp)# hash md5
R1(config–isakmp)# lifetime 86400
DH1
ISAKMP Parameters
Parameter Keyword Accepted Values
Default
Value
Description
encryption
des
3des
aes
aes 192
aes 256
56-bit Data Encryption Standard
Triple DES
128-bit AES
192-bit AES
256-bit AES
des
Message encryption
algorithm
47
47
47
© 2009 Cisco Learning Institute.
hash
sha
md5
SHA-1 (HMAC variant)
MD5 (HMAC variant)
sha
Message integrity
(Hash) algorithm
authenticati
on
pre-share
rsa-encr
rsa-sig
preshared keys
RSA encrypted nonces
RSA signatures
rsa-sig
Peer authentication
method
group
1
2
5
768-bit Diffie-Hellman (DH)
1024-bit DH
1536-bit DH
1
Key exchange
parameters (DH
group identifier)
lifetime seconds
Can specify any number of
seconds
86,400 sec
(one day)
ISAKMP-established
SA lifetime
Multiple Policies
crypto isakmp policy 100
hash md5
crypto isakmp policy 100
hash md5
R1(config)# R2(config)#
Site 1 Site 2
10.0.1.3
10.0.2.3
R1 R2
Internet
10.0.1.0/24 10.0.2.0/24
48
48
48
© 2009 Cisco Learning Institute.
hash md5
authentication pre-share
!
crypto isakmp policy 200
hash sha
authentication rsa-sig
!
crypto isakmp policy 300
hash md5
authentication rsa-sig
hash md5
authentication pre-share
!
crypto isakmp policy 200
hash sha
authentication rsa-sig
!
crypto isakmp policy 300
hash md5
authentication pre-share
Site 1 Site 2
10.0.1.3 10.0.2.3
R1 R2
Internet
10.0.1.0/24 10.0.2.0/24
R1 attempts to establish a VPN tunnel with
R2 and sends its IKE policy parameters
Policy Negotiations
49
49
49
© 2009 Cisco Learning Institute.
R1(config)# crypto isakmp policy 110
R1(config–isakmp)# authentication pre-share
R1(config–isakmp)# encryption 3des
R1(config–isakmp)# group 2
R1(config–isakmp)# hash sha
R1(config–isakmp)# lifetime 43200
Policy 110
Preshare
3DES
SHA
DH2
43200
R2(config)# crypto isakmp policy 100
R2(config–isakmp)# authentication pre-share
R2(config–isakmp)# encryption 3des
R2(config–isakmp)# group 2
R2(config–isakmp)# hash sha
R2(config–isakmp)# lifetime 43200
R2 must have an ISAKMP policy
configured with the same parameters.
Tunnel
Site 1 Site 2
Crypto ISAKMP Key
crypto isakmp key keystring address peer-address
router(config)#
crypto isakmp key keystring hostname hostname
router(config)#
Parameter Description
This parameter specifies the PSK. Use any combination of alphanumeric characters
50
50
50
© 2009 Cisco Learning Institute.
• The peer-address or peer-hostname can be used, but must be
used consistently between peers.
• If the peer-hostname is used, then the crypto isakmp
identity hostname command must also be configured.
keystring This parameter specifies the PSK. Use any combination of alphanumeric characters
up to 128 bytes. This PSK must be identical on both peers.
peer-
address
This parameter specifies the IP address of the remote peer.
hostname
This parameter specifies the hostname of the remote peer.
This is the peer hostname concatenated with its domain name (for example,
myhost.domain.com).
R1(config)# crypto isakmp policy 110
R1(config–isakmp)# authentication pre-share
Site 1 Site 2
10.0.1.3 10.0.2.3
R1 R2
Internet
10.0.1.0/24 10.0.2.0/24
Sample Configuration
51
51
51
© 2009 Cisco Learning Institute.
R1(config–isakmp)# authentication pre-share
R1(config–isakmp)# encryption 3des
R1(config–isakmp)# group 2
R1(config–isakmp)# hash sha
R1(config–isakmp)# lifetime 43200
R1(config-isakmp)# exit
R1(config)# crypto isakmp key cisco123 address 172.30.2.2
R1(config)#
R2(config)# crypto isakmp policy 110
R2(config–isakmp)# authentication pre-share
R2(config–isakmp)# encryption 3des
R2(config–isakmp)# group 2
R2(config–isakmp)# hash sha
R2(config–isakmp)# lifetime 43200
R2(config-isakmp)# exit
R2(config)# crypto isakmp key cisco123 address 172.30.1.2
R2(config)#
Note:
• The keystring cisco1234 matches.
• The address identity method is
specified.
• The ISAKMP policies are compatible.
• Default values do not have to be
configured.
router(config)#
crypto ipsec transform–set transform-set-name
transform1 [transform2] [transform3]]
crypto ipsec transform-set Parameters
Command
Description
Task 3
Configure the Transform Set
52
52
52
© 2009 Cisco Learning Institute.
transform-set-name
This parameter specifies the name of the transform set
to create (or modify).
transform1,
transform2, transform3
Type of transform set. You may specify up to four
transforms: one Authentication Header (AH), one
Encapsulating Security Payload (ESP) encryption, one
ESP authentication. These transforms define the IP
Security (IPSec) security protocols and algorithms.
A transform set is a combination of IPsec transforms that enact a
security policy for traffic.
Transform Sets
Host B
10.0.1.3 10.0.2.3
R1 R2
Host A
transform-set ALPHA
esp-3des
tunnel
transform-set RED
esp-des
tunnel
Internet
1
2
3
172.30.2.2
172.30.1.2
53
53
53
© 2009 Cisco Learning Institute.
• Transform sets are negotiated during IKE Phase 2.
• The 9th attempt found matching transform sets (CHARLIE - YELLOW).
transform-set BETA
esp-des, esp-md5-hmac
tunnel
transform-set CHARLIE
esp-3des, esp-sha-hmac
tunnel
transform-set BLUE
esp-des, ah-sha-hmac
tunnel
transform-set YELLOW
esp-3des, esp-sha-hmac
tunnel
Match
3
4
5
6
7
8
9
Site 1 Site 2
A B
10.0.1.3 10.0.2.3
R1 R2
Internet
R1(config)# crypto isakmp key cisco123 address 172.30.2.2
R1(config)# crypto ipsec transform-set MYSET esp-aes 128
R1(cfg-crypto-trans)# exit
R1(config)#
172.30.2.2
172.30.1.2
Sample Configuration
54
54
54
© 2009 Cisco Learning Institute.
R1(config)#
R2(config)# crypto isakmp key cisco123 address 172.30.1.2
R2(config)#crypto ipsec transform-set OTHERSET esp-aes 128
R2(cfg-crypto-trans)# exit
Note:
• Peers must share the
same transform set
settings.
• Names are only locally
significant.
Task 4
Configure the Crypto ACLs
Host A
R1
Internet
Outbound
Traffic
Encrypt
Bypass (Plaintext)
55
55
55
© 2009 Cisco Learning Institute.
• Outbound indicates the data flow to be protected by IPsec.
• Inbound filters and discards traffic that should have been
protected by IPsec.
Inbound
Traffic
Bypass (Plaintext)
Permit
Bypass
Discard (Plaintext)
10.0.1.3
10.0.2.3
R1 R2
Internet
router(config)#
access-list access-list-number [dynamic dynamic-name [timeout minutes]]{deny |
permit} protocol source source-wildcard destination destination-wildcard
10.0.1.0/24
Site 1
10.0.2.0/24
Site 2
S0/0/0
172.30.1.2
S0/0/0
172.30.2.2
Command Syntax
56
56
56
© 2009 Cisco Learning Institute.
permit} protocol source source-wildcard destination destination-wildcard
[precedence precedence] [tos tos] [log]
access-list access-list-number Parameters
access-list access-list-number
Command
Description
permit This option causes all IP traffic that matches the specified conditions to be protected by
cryptography, using the policy described by the corresponding crypto map entry.
deny This option instructs the router to route traffic in plaintext.
protocol
This option specifies which traffic to protect by cryptography based on the protocol,
such as TCP, UDP, or ICMP. If the protocol is IP, then all traffic IP traffic that matches
that permit statement is encrypted.
source and destination
If the ACL statement is a permit statement, these are the networks, subnets, or hosts
between which traffic should be protected. If the ACL statement is a deny statement,
then the traffic between the specified source and destination is sent in plaintext.
S0/1
10.0.1.3 10.0.2.3
R1 R2
Internet
Site 2
Applied to R1 S0/0/0 outbound traffic:
S0/0/0
172.30.2.2
S0/0/0
172.30.1.2
10.0.1.0/24
Site 1
10.0.2.0/24
Symmetric Crypto ACLs
57
57
57
© 2009 Cisco Learning Institute.
Applied to R1 S0/0/0 outbound traffic:
R1(config)# access-list 110 permit tcp 10.0.1.0 0.0.0.255 10.0.2.0 0.0.0.255
(when evaluating inbound traffic– source: 10.0.2.0, destination: 10.0.1.0)
Applied to R2 S0/0/0 outbound traffic:
R2(config)# access-list 101 permit tcp 10.0.2.0 0.0.0.255 10.0.1.0 0.0.0.255
(when evaluating inbound traffic- source: 10.0.1.0, destination: 10.0.2.0)
Task 5
Apply the Crypto Map
Crypto maps define the following:
Site 1
10.0.1.3
R1 R2
10.0.2.3
Site 2
Internet
58
58
58
© 2009 Cisco Learning Institute.
 ACL to be used
 Remote VPN peers
 Transform set to be used
 Key management method
 SA lifetimes
Encrypted Traffic
Router
Interface
or Subinterface
crypto map map-name seq-num ipsec-manual
crypto map map-name seq-num ipsec-isakmp [dynamic dynamic-map-name]
router(config)#
crypto map Parameters
Command Parameters Description
Defines the name assigned to the crypto map set or indicates the name of the crypto
Crypto Map Command
59
59
59
© 2009 Cisco Learning Institute.
map-name
Defines the name assigned to the crypto map set or indicates the name of the crypto
map to edit.
seq-num The number assigned to the crypto map entry.
ipsec-manual Indicates that ISAKMP will not be used to establish the IPsec SAs.
ipsec-isakmp Indicates that ISAKMP will be used to establish the IPsec SAs.
cisco
(Default value) Indicates that CET will be used instead of IPsec for protecting the
traffic.
dynamic
(Optional) Specifies that this crypto map entry references a preexisting static crypto
map. If this keyword is used, none of the crypto map configuration commands are
available.
dynamic-map-name
(Optional) Specifies the name of the dynamic crypto map set that should be used as
the policy template.
Crypto Map Configuration
Mode Commands
Command Description
set Used with the peer, pfs, transform-set, and security-association
commands.
peer [hostname | ip-
address]
Specifies the allowed IPsec peer by IP address or hostname.
pfs [group1 | group2] Specifies DH Group 1 or Group 2.
Specify list of transform sets in priority order. When the ipsec-manual
60
60
60
© 2009 Cisco Learning Institute.
transform-set
[set_name(s)]
Specify list of transform sets in priority order. When the ipsec-manual
parameter is used with the crypto map command, then only one transform set
can be defined. When the ipsec-isakmp parameter or the dynamic parameter
is used with the crypto map command, up to six transform sets can be
specified.
security-association
lifetime
Sets SA lifetime parameters in seconds or kilobytes.
match address [access-
list-id | name]
Identifies the extended ACL by its name or number. The value should match
the access-list-number or name argument of a previously defined IP-extended
ACL being matched.
no Used to delete commands entered with the set command.
exit Exits crypto map configuration mode.
R3
10.0.1.3
10.0.2.3
R1 R2
Internet
Sample Configuration
10.0.1.0/24
Site 1
10.0.2.0/24
Site 2
S0/0/0
172.30.2.2
61
61
61
© 2009 Cisco Learning Institute.
Multiple peers can be specified for redundancy.
S0/0/0
172.30.3.2
R1(config)# crypto map MYMAP 10 ipsec-isakmp
R1(config-crypto-map)# match address 110
R1(config-crypto-map)# set peer 172.30.2.2 default
R1(config-crypto-map)# set peer 172.30.3.2
R1(config-crypto-map)# set pfs group1
R1(config-crypto-map)# set transform-set mine
R1(config-crypto-map)# set security-association lifetime seconds 86400
MYMAP
Assign the Crypto Map Set
10.0.1.3
10.0.2.3
R1 R2
Internet
10.0.1.0/24
Site 1
10.0.2.0/24
Site 2
S0/0/0
172.30.1.2
S0/0/0
172.30.2.2
62
62
62
© 2009 Cisco Learning Institute.
• Applies the crypto map to outgoing interface
• Activates the IPsec policy
crypto map map-name
R1(config)# interface serial0/0/0
R1(config-if)# crypto map MYMAP
router(config-if)#
MYMAP
CLI Commands
Show Command Description
show crypto map Displays configured crypto maps
show crypto isakmp policy Displays configured IKE policies
63
63
63
© 2009 Cisco Learning Institute.
show crypto ipsec sa Displays established IPsec tunnels
show crypto ipsec
transform-set
Displays configured IPsec transform
sets
debug crypto isakmp Debugs IKE events
debug crypto ipsec
Debugs IPsec events
show crypto map
router#
show crypto map
10.0.1.3
10.0.2.3
R1 R2
Internet
10.0.1.0/24
Site 1
10.0.2.0/24
Site 2
S0/0/0
172.30.1.2
S0/0/0
172.30.2.2
64
64
64
© 2009 Cisco Learning Institute.
R1# show crypto map
Crypto Map “MYMAP 10 ipsec-isakmp
Peer = 172.30.2.2
Extended IP access list 110
access-list 102 permit ip host 10.0.1.3 host 10.0.2.3
Current peer: 172.30.2.2
Security association lifetime: 4608000 kilobytes/3600 seconds
PFS (Y/N): N
Transform sets={ MYSET, }
Displays the currently configured crypto maps
show crypto isakmp policy
router#
show crypto isakmp policy
10.0.1.3
10.0.2.3
R1 R2
Internet
10.0.1.0/24
Site 1
10.0.2.0/24
Site 2
S0/0/0
172.30.1.2
S0/0/0
172.30.2.2
65
65
65
© 2009 Cisco Learning Institute.
R1# show crypto isakmp policy
Protection suite of priority 110
encryption algorithm: 3DES - Data Encryption Standard (168 bit keys).
hash algorithm: Secure Hash Standard
authentication method: preshared
Diffie-Hellman group: #2 (1024 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite
encryption algorithm: DES - Data Encryption Standard (56 bit keys).
hash algorithm: Secure Hash Standard
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limit
show crypto ipsec transform-set
show crypto ipsec transform-set
10.0.1.3
10.0.2.3
R1 R2
Internet
10.0.1.0/24
Site 1
10.0.2.0/24
Site 2
S0/0/0
172.30.1.2
S0/0/0
172.30.2.2
66
66
66
© 2009 Cisco Learning Institute.
show crypto ipsec transform-set
Displays the currently defined transform sets
R1# show crypto ipsec transform-set
Transform set AES_SHA: { esp-128-aes esp-sha-hmac }
will negotiate = { Tunnel, },
show crypto ipsec sa
10.0.1.3
10.0.2.3
R1 R2
Internet
10.0.1.0/24
Site 1
10.0.2.0/24
Site 2
S0/0/0
172.30.1.2
S0/0/0
172.30.2.2
67
67
67
© 2009 Cisco Learning Institute.
R1# show crypto ipsec sa
Interface: Serial0/0/0
Crypto map tag: MYMAP, local addr. 172.30.1.2
local ident (addr/mask/prot/port): (172.30.1.2/255.255.255.255/0/0)
remote ident (addr/mask/prot/port): (172.30.2.2/255.255.255.255/0/0)
current_peer: 172.30.2.2
PERMIT, flacs={origin_is_acl,}
#pkts encaps: 21, #pkts encrypt: 21, #pkts digest 0
#pkts decaps: 21, #pkts decrypt: 21, #pkts verify 0
#send errors 0, #recv errors 0
local crypto endpt.: 172.30.1.2, remote crypto endpt.: 172.30.2.2
path mtu 1500, media mtu 1500
current outbound spi: 8AE1C9C
debug crypto isakmp
router#
debug crypto isakmp
1d00h: ISAKMP (0:1): atts are not acceptable. Next payload is 0 1d00h: ISAKMP (0:1); no
offers accepted!
1d00h: ISAKMP (0:1): SA not acceptable!
1d00h: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Main Mode failed with peer at 172.30.2.2
68
68
68
© 2009 Cisco Learning Institute.
• This is an example of the Main Mode error message.
• The failure of Main Mode suggests that the Phase I policy
does not match on both sides.
• Verify that the Phase I policy is on both peers and ensure that
all the attributes match.
1d00h: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Main Mode failed with peer at 172.30.2.2
Starting a VPN Wizard
Wizards for IPsec
Solutions, includes
type of VPNs and
Individual IPsec
components
1
2
3
1. Click Configure in main toolbar
3. Choose a wizard
69
69
69
© 2009 Cisco Learning Institute.
2
4
5
VPN implementation
Subtypes. Vary based
On VPN wizard chosen.
2. Click the VPN button
to open the VPN page
4. Click the VPN
implementation subtype
5. Click the Launch the
Selected Task button
VPN Components
Individual IPsec
components used
to build VPNs
VPN Wizards
SSL VPN parameters
70
70
70
© 2009 Cisco Learning Institute.
Easy VPN server parameters
Public key certificate
parameters
Encrypt VPN passwords
VPN Components
Configuring a Site-to-Site VPN
Choose Configure  VPN  Site-to-Site VPN
71
71
71
© 2009 Cisco Learning Institute.
Click the Launch the Selected Task button
Click the Create a Site-to-Site VPN
Site-to-Site VPN Wizard
Choose the wizard mode
72
72
72
© 2009 Cisco Learning Institute.
Click Next to proceed to the configuration of parameters.
Quick Setup
Configure the parameters
• Interface to use
73
73
73
© 2009 Cisco Learning Institute.
• Interface to use
• Peer identity information
• Authentication method
• Traffic to encrypt
Verify Parameters
74
74
74
© 2009 Cisco Learning Institute.
1
2
Step-by-Step Wizard
Choose the outside
interface that is used
to connect to the
IPSec peer
Specify the IP
address of the peer
75
75
75
© 2009 Cisco Learning Institute.
3
4
Choose the authentication
method and specify the
credentials
Click Next
Creating a Custom IKE Proposal
2
Make the selections to configure
the IKE Policy and click OK
76
76
76
© 2009 Cisco Learning Institute.
1
3
Click Add to define a proposal Click Next
2
Creating a Custom IPSec
Transform Set
Define and specify the transform
set name, integrity algorithm,
encryption algorithm, mode of
operation and optional compression
77
77
77
© 2009 Cisco Learning Institute.
1
3 Click Next
Click Add
1
Protecting Traffic
Subnet to Subnet
Click Protect All Traffic Between the Following subnets
78
78
78
© 2009 Cisco Learning Institute.
2 3
Define the IP address
and subnet mask of the
local network
Define the IP address
and subnet mask of the
remote network
Protecting Traffic
Custom ACL
79
79
79
© 2009 Cisco Learning Institute.
2
3
1
Click the Create/Select an Access-List
for IPSec Traffic radio button
Click the ellipses button
to choose an existing ACL
or create a new one
To use an existing ACL, choose the Select an Existing
Rule (ACL) option. To create a new ACL, choose the
Create a New Rule (ACL) and Select option
Add a Rule
1
2
Give the access rule a
80
80
80
© 2009 Cisco Learning Institute.
2
Give the access rule a
name and description
Click Add
Configuring a New Rule Entry
1
2
Choose an action and enter a description of the rule entry
81
81
81
© 2009 Cisco Learning Institute.
3
Define the source hosts or networks in the Source Host/Network pane
and the destination hosts or network in the Destination/Host Network pane
(Optional) To provide protection for specific protocols, choose
the specific protocol radio box and desired port numbers
Configuration Summary
82
82
82
© 2009 Cisco Learning Institute.
• Click Back to modify the configuration.
• Click Finish to complete the configuration.
Verify VPN Configuration
Choose Configure  VPN  Site-to-Site VPN  Edit Site-to-Site VPN
83
83
83
© 2009 Cisco Learning Institute.
Check VPN status.
Create a mirroring configuration if
no Cisco SDM is available on the
peer.
Test the VPN
configuration.
Lists all IPsec tunnels, their
parameters, and status.
1
Monitor
Choose Monitor  VPN Status  IPSec Tunnels
84
84
84
© 2009 Cisco Learning Institute.
parameters, and status.
Telecommuting
• Flexibility in working
location and working
hours
• Employers save on real-
estate, utility and other
85
85
85
© 2009 Cisco Learning Institute.
estate, utility and other
overhead costs
• Succeeds if program is
voluntary, subject to
management discretion,
and operationally feasible
Telecommuting Benefits
• Organizational benefits:
- Continuity of operations
- Increased responsiveness
- Secure, reliable, and manageable access to information
- Cost-effective integration of data, voice, video, and applications
- Increased employee productivity, satisfaction, and retention
86
86
86
© 2009 Cisco Learning Institute.
- Increased employee productivity, satisfaction, and retention
• Social benefits:
- Increased employment opportunities for marginalized groups
- Less travel and commuter related stress
• Environmental benefits:
- Reduced carbon footprints, both for individual workers and
organizations
Implementing Remote Access
87
87
87
© 2009 Cisco Learning Institute.
Methods for Deploying
Remote Access
88
88
88
© 2009 Cisco Learning Institute.
IPsec Remote
Access VPN
SSL-Based
VPN
Any
Application
Anywhere
Access
Comparison of SSL and IPSec
SSL IPsec
Applications Web-enabled applications, file sharing, e-mail All IP-based applications
Encryption
Moderate
Key lengths from 40 bits to 128 bits
Stronger
Key lengths from 56 bits to 256 bits
89
89
89
© 2009 Cisco Learning Institute.
Authentication
Moderate
One-way or two-way authentication
Strong
Two-way authentication using shared secrets
or digital certificates
Ease of Use Very high
Moderate
Can be challenging to nontechnical users
Overall Security
Moderate
Any device can connect
Strong
Only specific devices with specific
configurations can connect
SSL VPNs
• Integrated security and routing
• Browser-based full network SSL VPN access
SSL VPN
Headquarters
Internet
90
90
90
© 2009 Cisco Learning Institute.
Workplace
Resources
Headquarters
SSL VPN
Tunnel
Types of Access
91
91
91
© 2009 Cisco Learning Institute.
Full Tunnel Client Access Mode
92
92
92
© 2009 Cisco Learning Institute.
User using
SSL client
Establishing an SSL Session
User makes a connection
to TCP port 443
Router replies with a
digitally signed public key
User software creates a
1
2
3
SSL VPN
enabled ISR
router
93
93
93
© 2009 Cisco Learning Institute.
Shared-secret key, encrypted
with public key of the server, is
sent to the router
Bulk encryption occurs using the
shared-secret key with a
symmetric encryption algorithm
User software creates a
shared-secret key
3
4
5
router
SSL VPN Design Considerations
• User connectivity
• Router feature
• Infrastructure planning
94
94
94
© 2009 Cisco Learning Institute.
• Implementation scope
Cisco Easy VPN
• Negotiates tunnel parameters
• Establishes tunnels according to
set parameters
• Automatically creates a NAT /
PAT and associated ACLs
95
95
95
© 2009 Cisco Learning Institute.
PAT and associated ACLs
• Authenticates users by
usernames, group names,
and passwords
• Manages security keys for
encryption and decryption
• Authenticates, encrypts, and
decrypts data through the tunnel
Cisco Easy VPN
96
96
96
© 2009 Cisco Learning Institute.
Securing the VPN
Initiate IKE Phase 1
Establish ISAKMP
SA
Accept Proposal1
Username/Password
Challenge
1
2
3
4
97
97
97
© 2009 Cisco Learning Institute.
Challenge
Username/Password
System Parameters Pushed
Reverse Router Injection
(RRI) adds a static route
entry on the router for the
remote clients IP address
Initiate IKE Phase 2: IPsec
IPsec SA
5
6
7
Configuring Cisco Easy VPN Server
1
2
3
4
98
98
98
© 2009 Cisco Learning Institute.
5
Configuring IKE Proposals
Specify required parameters
99
99
99
© 2009 Cisco Learning Institute.
1
2
3
Click Add
Specify required parameters
Click OK
Creating an IPSec Transform Set
1
3
100
100
100
© 2009 Cisco Learning Institute.
2
4
Group Authorization and Group
Policy Lookup
1
3
Select the location where
Easy VPN group policies
can be stored
Click Add
101
101
101
© 2009 Cisco Learning Institute.
2 4
5
Click Next
Click Next
Configure the local
group policies
Summary of Configuration
Parameters
102
102
102
© 2009 Cisco Learning Institute.
VPN Client Overview
R1 R1-vpn-cluster.span.com
R1 R1-vpn-cluster.span.com
103
103
103
© 2009 Cisco Learning Institute.
• Establishes end-to-end, encrypted VPN tunnels for
secure connectivity
• Compatible with all Cisco VPN products
• Supports the innovative Cisco Easy VPN capabilities
Establishing a Connection
R1-vpn-cluster.span.com
Once
authenticated,
status changes to
connected.
104
104
104
© 2009 Cisco Learning Institute.
R1 R1-vpn-cluster.span.com
“R1”
105
105
105
© 2009 Cisco Learning Institute.

More Related Content

PPT
Chapter 8 overview
PDF
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
PPTX
ENSA_Module_8.pptx
PPTX
ENSA_Module_9 VPN NETWORK SITE TO SITE.pptx
PPTX
ENSA_Module_8.pptx_nice_ipsec_presentation
PPT
CCNA Security - Chapter 8
PDF
Brkcrt 1160 c3-rev2
PDF
Openstack Summit Vancouver 2018 - Multicloud Networking
Chapter 8 overview
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
ENSA_Module_8.pptx
ENSA_Module_9 VPN NETWORK SITE TO SITE.pptx
ENSA_Module_8.pptx_nice_ipsec_presentation
CCNA Security - Chapter 8
Brkcrt 1160 c3-rev2
Openstack Summit Vancouver 2018 - Multicloud Networking

Similar to Ch8 - Implementing Virtual Private Networks (20)

PPTX
Network Security version Virtual Private Networks
PPTX
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
PDF
CCNP Security-VPN
PPTX
#CiscoLiveLA 2017 Presentacion de Jerome Henry
PDF
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
PDF
Ip tunneling and vpns
PPTX
DevNetDay2020_Ent_IntroDNAC-Digital.pptx
PDF
Cisco ISE Performance, Scalability and Best Practices.pdf
PDF
Ip tunnelling and_vpn
PDF
Design and Deployment of Enterprise WLANs
PPTX
Cisco prime network 4.1 technical overview
PPT
CCNA Icnd110 s04l08
PPTX
Cisco SDWAN presentation for Headquarters
PDF
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
PPTX
The Data Center Network Evolution
PDF
Vpn security agenda by cover our privacy
PDF
Ccnp iscw lab guide
 
PPTX
4. VPN4. VPN4. VPN4. VPN4. VPN4. VPN.pptx
PPTX
Ccna security
PPTX
Ccna security
Network Security version Virtual Private Networks
NetDevOps for the Network Dude: How to get started with API's, Ansible and Py...
CCNP Security-VPN
#CiscoLiveLA 2017 Presentacion de Jerome Henry
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Ip tunneling and vpns
DevNetDay2020_Ent_IntroDNAC-Digital.pptx
Cisco ISE Performance, Scalability and Best Practices.pdf
Ip tunnelling and_vpn
Design and Deployment of Enterprise WLANs
Cisco prime network 4.1 technical overview
CCNA Icnd110 s04l08
Cisco SDWAN presentation for Headquarters
Cisco Connect Vancouver 2017 - Understanding Cisco next gen SD-WAN
The Data Center Network Evolution
Vpn security agenda by cover our privacy
Ccnp iscw lab guide
 
4. VPN4. VPN4. VPN4. VPN4. VPN4. VPN.pptx
Ccna security
Ccna security
Ad

More from OhmRon (16)

PPTX
Masih Relevankah CIA-Triad untuk CyberSecurity 5.0
PPTX
Pengenalan CyberSecurity dan evolusi Cybersecurity 5.0
PPTX
Introduction to Artificial Intelligence - Hands-On
PPTX
HCIA Course Overview and Network Infrastructure Overview
PPTX
Pengenalan Dasar Big Data untuk Praktisi Pemula
PPT
Ilmu dasar Statistika dan Probabilitas untuk Pemula
PPT
Slide - Multimedia Literacy for the Beginer
PPT
What is Technology for New IT Person [Basic]
PPTX
HCIA Test Preperation - 20QA - Short Sample
PDF
Chapter 6-Securing the Local Area Network.pdf
PDF
Chapter 7 - Cryptographic Systems (Crypto).pdf
PDF
Ch5-Implementing Intrusion Prevention.pdf
PDF
Ch4-Implementing Firewall Technologies.pdf
PDF
Ch3-Authentication, Authorization, and Accounting.pdf
PDF
Ch2 - Securing Network Devices - CCNA Security.pdf
PDF
Ch1-Modern Network Security Threats - CCNA SEC.pdf
Masih Relevankah CIA-Triad untuk CyberSecurity 5.0
Pengenalan CyberSecurity dan evolusi Cybersecurity 5.0
Introduction to Artificial Intelligence - Hands-On
HCIA Course Overview and Network Infrastructure Overview
Pengenalan Dasar Big Data untuk Praktisi Pemula
Ilmu dasar Statistika dan Probabilitas untuk Pemula
Slide - Multimedia Literacy for the Beginer
What is Technology for New IT Person [Basic]
HCIA Test Preperation - 20QA - Short Sample
Chapter 6-Securing the Local Area Network.pdf
Chapter 7 - Cryptographic Systems (Crypto).pdf
Ch5-Implementing Intrusion Prevention.pdf
Ch4-Implementing Firewall Technologies.pdf
Ch3-Authentication, Authorization, and Accounting.pdf
Ch2 - Securing Network Devices - CCNA Security.pdf
Ch1-Modern Network Security Threats - CCNA SEC.pdf
Ad

Recently uploaded (20)

PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Lesson notes of climatology university.
PPTX
Cell Structure & Organelles in detailed.
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
01-Introduction-to-Information-Management.pdf
PDF
Classroom Observation Tools for Teachers
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Lesson notes of climatology university.
Cell Structure & Organelles in detailed.
102 student loan defaulters named and shamed – Is someone you know on the list?
Anesthesia in Laparoscopic Surgery in India
Microbial diseases, their pathogenesis and prophylaxis
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
01-Introduction-to-Information-Management.pdf
Classroom Observation Tools for Teachers
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Pre independence Education in Inndia.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf
Insiders guide to clinical Medicine.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Ch8 - Implementing Virtual Private Networks

  • 1. CCNA Security 1 © 2009 Cisco Learning Institute. Chapter Eight Implementing Virtual Private Networks
  • 2. Major Concepts • Describe the purpose and operation of VPN types • Describe the purpose and operation of GRE VPNs • Describe the components and operations of IPsec VPNs • Configure and verify a site-to-site IPsec VPN with pre- 2 2 2 © 2009 Cisco Learning Institute. • Configure and verify a site-to-site IPsec VPN with pre- shared key authentication using CLI • Configure and verify a site-to-site IPsec VPN with pre- shared key authentication using SDM • Configure and verify a Remote Access VPN
  • 3. Lesson Objectives Upon completion of this lesson, the successful participant will be able to: 1. Describe the purpose and operation of VPNs 2. Differentiate between the various types of VPNs 3. Identify the Cisco VPN product line and the security features of 3 3 3 © 2009 Cisco Learning Institute. 3. Identify the Cisco VPN product line and the security features of these products 4. Configure a site-to-site VPN GRE tunnel 5. Describe the IPSec protocol and its basic functions 6. Differentiate between AH and ESP 7. Describe the IKE protocol and modes 8. Describe the five steps of IPSec operation
  • 4. Lesson Objectives 9. Describe how to prepare IPSec by ensuring that ACLs are compatible with IPSec 10. Configure IKE policies using the CLI 11. Configure the IPSec transform sets using the CLI 12. Configure the crypto ACLs using the CLI 13. Configure and apply a crypto map using the CLI 4 4 4 © 2009 Cisco Learning Institute. 13. Configure and apply a crypto map using the CLI 14. Describe how to verify and troubleshoot the IPSec configuration 15. Describe how to configure IPSec using SDM 16. Configure a site-to-site VPN using the Quick Setup VPN Wizard in SDM 17. Configure a site-to-site VPN using the step-by-step VPN Wizard in SDM
  • 5. Lesson Objectives 18. Verify, monitor and troubleshoot VPNs using SDM 19. Describe how an increasing number of organizations are offering telecommuting options to their employees 20. Differentiate between Remote Access IPSec VPN solutions and SSL VPNs 21. Describe how SSL is used to establish a secure VPN 5 5 5 © 2009 Cisco Learning Institute. 21. Describe how SSL is used to establish a secure VPN connection 22. Describe the Cisco Easy VPN feature 23. Configure a VPN Server using SDM 24. Connect a VPN client using the Cisco VPN Client software
  • 6. What is a VPN? CSA VPN Mobile Worker with a Cisco VPN Client Business Partner with a Cisco Router 6 6 6 © 2009 Cisco Learning Institute. - Virtual: Information within a private network is transported over a public network. - Private: The traffic is encrypted to keep the data confidential. VPN VPN Firewall Regional branch with a VPN enabled Cisco ISR router SOHO with a Cisco DSL Router VPN Corporate Network WAN Internet
  • 7. Layer 3 VPN SOHO with a Cisco DSL Router VPN Internet IPSec IPSec 7 7 7 © 2009 Cisco Learning Institute. • Generic routing encapsulation (GRE) • Multiprotocol Label Switching (MPLS) • IPSec
  • 8. Types of VPN Networks MARS CSA VPN Mobile Worker with a Cisco VPN Client Business Partner with a Cisco Router Remote-access VPNs 8 8 8 © 2009 Cisco Learning Institute. VPN VPN Iron Port Firewall IP S Web Server Email Server DNS CSA CSACSA CSA CSA CSA Regional branch with a VPN enabled Cisco ISR router SOHO with a Cisco DSL Router VPN Site-to-Site VPNs Internet WAN
  • 9. Site-to-Site VPN MARS CSA VP Business Partner with a Cisco Router Internet Hosts send and receive normal TCP/IP traffic through a VPN gateway 9 9 9 © 2009 Cisco Learning Institute. VPN VPN Iron Port Firewall IP S Web Server Email Server DNS CS A CS A CS A CSA CSA CSA Regional branch with a VPN enabled Cisco ISR router SOHO with a Cisco DSL Router VP N Site-to-Site VPNs Internet WAN
  • 10. Remote-Access VPNs MARS Firewall CSA Mobile Worker with a Cisco VPN Client Remote-access VPNs Internet 10 10 10 © 2009 Cisco Learning Institute. VPN Iron Port Firewall IPS Web Server Email Server DNS CSA CSA CSA CSA CSA CSA
  • 11. VPN Client Software 11 11 11 © 2009 Cisco Learning Institute. R1 R1-vpn-cluster.span.com “R1” In a remote-access VPN, each host typically has Cisco VPN Client software
  • 12. Cisco IOS SSL VPN • Provides remote-access connectivity from any Internet-enabled host • Uses a web browser and SSL encryption 12 12 12 © 2009 Cisco Learning Institute. SSL encryption • Delivers two modes of access: - Clientless - Thin client
  • 13. Cisco VPN Product Family Product Choice Remote-Access VPN Site-to-Site VPN Cisco VPN-Enabled Router Secondary role Primary role Cisco PIX 500 Series Security Appliances Secondary role Primary role 13 13 13 © 2009 Cisco Learning Institute. Cisco PIX 500 Series Security Appliances Secondary role Primary role Cisco ASA 5500 Series Adaptive Security Appliances Primary role Secondary role Cisco VPN 3000 Series Concentrators Primary role Secondary role Home Routers Primary role
  • 14. Cisco VPN-Optimized Routers Remote Office Cisco Router Main Office Cisco Router Internet 14 14 14 © 2009 Cisco Learning Institute. Regional Office Cisco Router SOHO Cisco Router Internet VPN Features: • Voice and video enabled VPN (V3PN) • IPSec stateful failover • DMVPN • IPSec and Multiprotocol Label Switching (MPLS) integration • Cisco Easy VPN
  • 15. Cisco ASA 5500 Series Adaptive Security Appliances Intranet Remote Site Central Site Internet 15 15 15 © 2009 Cisco Learning Institute. • Flexible platform • Resilient clustering • Cisco Easy VPN • Automatic Cisco VPN • Cisco IOS SSL VPN • VPN infrastructure for contemporary applications • Integrated web-based management Extranet Business-to-Business Remote User
  • 16. IPSec Clients Certicom PDA IPsec VPN Client Internet Router with Firewall and A wireless client that is loaded on a pda 16 16 16 © 2009 Cisco Learning Institute. Small Office Internet Cisco AnyConnect VPN Client Cisco VPN Software Client Firewall and VPN Client Software loaded on a PC A network appliance that connects SOHO LANs to the VPN Provides remote users with secure VPN connections
  • 17. Hardware Acceleration Modules • AIM • Cisco IPSec VPN Shared Port Adapter (SPA) • Cisco PIX VPN 17 17 17 © 2009 Cisco Learning Institute. • Cisco PIX VPN Accelerator Card+ (VAC+) • Enhanced Scalable Encryption Processing (SEP-E) Cisco IPsec VPN SPA
  • 18. GRE VPN Overview 18 18 18 © 2009 Cisco Learning Institute.
  • 19. Encapsulation Original IP Packet Encapsulated with GRE 19 19 19 © 2009 Cisco Learning Institute.
  • 20. Configuring a GRE Tunnel Create a tunnel interface Assign the tunnel an IP address 20 20 20 © 2009 Cisco Learning Institute. R1(config)# interface tunnel 0 R1(config–if)# ip address 10.1.1.1 255.255.255.252 R1(config–if)# tunnel source serial 0/0 R1(config–if)# tunnel destination 192.168.5.5 R1(config–if)# tunnel mode gre ip R1(config–if)# R2(config)# interface tunnel 0 R2(config–if)# ip address 10.1.1.2 255.255.255.252 R2(config–if)# tunnel source serial 0/0 R2(config–if)# tunnel destination 192.168.3.3 R2(config–if)# tunnel mode gre ip R2(config–if)# Assign the tunnel an IP address Identify the source tunnel interface Identify the destination of the tunnel Configure what protocol GRE will encapsulate
  • 21. Using GRE User Traffic IP Only ? No No Yes Yes 21 21 21 © 2009 Cisco Learning Institute. Use GRE Tunnel No No No No Yes Yes Unicast Only? Use IPsec VPN GRE does not provide encryption
  • 22. IPSec Topology Business Partner with a Cisco Router Legacy Concentrator Main Site Perimeter Router Legacy Cisco PIX IPsec POP 22 22 22 © 2009 Cisco Learning Institute. • Works at the network layer, protecting and authenticating IP packets. - It is a framework of open standards which is algorithm-independent. - It provides data confidentiality, data integrity, and origin authentication. Regional Office with a Cisco PIX Firewall SOHO with a Cisco SDN/DSL Router Mobile Worker with a Cisco VPN Client on a Laptop Computer ASA PIX Firewall POP Corporate
  • 23. IPSec Framework 23 23 23 © 2009 Cisco Learning Institute. Diffie-Hellman DH7
  • 24. Confidentiality Least secure Most secure 24 24 24 © 2009 Cisco Learning Institute. DH7 Diffie-Hellman Key length: - 56-bits Key length: - 56-bits (3 times) Key length: - 160-bits Key lengths: -128-bits -192 bits -256-bits
  • 25. Integrity 25 25 25 © 2009 Cisco Learning Institute. DH7 Diffie-Hellman Key length: - 128-bits Key length: - 160-bits) Least secure Most secure
  • 26. Authentication 26 26 26 © 2009 Cisco Learning Institute. DH7 Diffie-Hellman
  • 27. Pre-shared Key (PSK) 27 27 27 © 2009 Cisco Learning Institute. DH7 Diffie-Hellman •At the local device, the authentication key and the identity information (device-specific information) are sent through a hash algorithm to form hash_I. One-way authentication is established by sending hash_I to the remote device. If the remote device can independently create the same hash, the local device is authenticated. • The authentication process continues in the opposite direction. The remote device combines its identity information with the preshared-based authentication key and sends it through the hash algorithm to form hash_R. hash_R is sent to the local device. If the local device can independently create the same hash, the remote device is authenticated.
  • 28. RSA Signatures 28 28 28 © 2009 Cisco Learning Institute. • At the local device, the authentication key and identity information (device-specific information) are sent through the hash algorithm forming hash_I. hash_I is encrypted using the local device's private encryption key creating a digital signature. The digital signature and a digital certificate are forwarded to the remote device. The public encryption key for decrypting the signature is included in the digital certificate. The remote device verifies the digital signature by decrypting it using the public encryption key. The result is hash_I. • Next, the remote device independently creates hash_I from stored information. If the calculated hash_I equals the decrypted hash_I, the local device is authenticated. After the remote device authenticates the local device, the authentication process begins in the opposite direction and all steps are repeated from the remote device to the local device.
  • 29. Secure Key Exchange 29 29 29 © 2009 Cisco Learning Institute. Diffie-Hellman DH7
  • 30. IPSec Framework Protocols All data is in plaintext. R1 R2 Authentication Header AH provides the following: Authentication Integrity 30 30 30 © 2009 Cisco Learning Institute. Data payload is encrypted. R1 R2 Encapsulating Security Payload Integrity ESP provides the following: Encryption Authentication Integrity
  • 31. Authentication Header Authentication Data IP Header + Data + Key R2 Hash IP Header + Data + Key Data AH IP HDR 1. The IP Header and data payload are hashed 31 31 31 © 2009 Cisco Learning Institute. Authentication Data (00ABCDEF) R1 Recomputed Hash (00ABCDEF) IP Header + Data + Key Hash Received Hash (00ABCDEF) = Data AH IP HDR Internet 2. The hash builds a new AH header which is prepended to the original packet 3. The new packet is transmitted to the IPSec peer router 4. The peer router hashes the IP header and data payload, extracts the transmitted hash and compares
  • 32. ESP 32 32 32 © 2009 Cisco Learning Institute. Diffie-Hellman DH7
  • 33. Function of ESP Router Router IP HDR Data IP HDR Data Internet 33 33 33 © 2009 Cisco Learning Institute. ESP Trailer ESP Auth • Provides confidentiality with encryption • Provides integrity with authentication ESP HDR New IP HDR IP HDR Data Authenticated Encrypted
  • 34. IP HDR ESP HDR Data Transport Mode ESP Trailer ESP Auth IP HDR Data Encrypted Original data prior to selection of IPSec protocol mode Mode Types 34 34 34 © 2009 Cisco Learning Institute. IP HDR ESP HDR Data ESP HDR IP HDR New IP HDR Data Tunnel Mode Trailer Auth ESP Trailer ESP Auth Authenticated Authenticated Encrypted
  • 35. Security Associations 35 35 35 © 2009 Cisco Learning Institute. IPSec parameters are configured using IKE
  • 36. Host A Host B R1 R2 10.0.1.3 10.0.2.3 IKE Phase 1 Exchange 1. Negotiate IKE policy sets IKE Phases Policy 15 DES MD5 pre-share Policy 10 DES MD5 pre-share 1. Negotiate IKE policy sets 36 36 36 © 2009 Cisco Learning Institute. 2. DH key exchange 3. Verify the peer identity IKE Phase 2 Exchange Negotiate IPsec policy Negotiate IPsec policy pre-share DH1 lifetime pre-share DH1 lifetime 2. DH key exchange 3. Verify the peer identity
  • 37. Policy 15 DES MD5 pre-share Policy 10 DES MD5 pre-share IKE Policy Sets Negotiate IKE Proposals Host A Host B R1 R2 10.0.1.3 10.0.2.3 IKE Phase 1 – First Exchange 37 37 37 © 2009 Cisco Learning Institute. Negotiates matching IKE policies to protect IKE exchange pre-share DH1 lifetime pre-share DH1 lifetime IKE Policy Sets Policy 20 3DES SHA pre-share DH1 lifetime
  • 38. IKE Phase 1 – Second Exchange Private value, XA Public value, YA Private value, XB Public value, YB Alice Bob Y YA A YB = g mod p XB Y YA A = g mod p XA Establish DH Key 38 38 38 © 2009 Cisco Learning Institute. ( (YB ) mod p = K (YA ) mod p = K XB XA Y YA A Y YB B A DH exchange is performed to establish keying material.
  • 39. IKE Phase 1 – Third Exchange HR Servers Remote Office Corporate Office Internet Peer Authenticate Peer 39 39 39 © 2009 Cisco Learning Institute. Peer authentication methods • PSKs • RSA signatures • RSA encrypted nonces Peer Authentication A bidirectional IKE SA is now established.
  • 40. Host A Host B R1 R2 10.0.1.3 10.0.2.3 IKE Phase 1 Aggressive Mode Exchange 1.Send IKE policy set and R1’s DH key Policy 15 DES MD5 pre-share DH1 Policy 10 DES MD5 pre-share DH1 2. Confirm IKE policy IKE Phase 1 – Aggressive Mode 40 40 40 © 2009 Cisco Learning Institute. and R1’s DH key 3.Calculate shared secret, verify peer identify, and confirm with peer IKE Phase 2 Exchange Negotiate IPsec policy Negotiate IPsec policy DH1 lifetime DH1 lifetime 2. Confirm IKE policy set, calculate shared secret and send R2’s DH key 4. Authenticate peer and begin Phase 2.
  • 41. Negotiate IPsec Security Parameters Host A Host B R1 R2 10.0.1.3 10.0.2.3 IKE Phase 2 41 41 41 © 2009 Cisco Learning Institute. • IKE negotiates matching IPsec policies. • Upon completion, unidirectional IPsec Security Associations(SA) are established for each protocol and algorithm combination.
  • 42. IKE Phase 1 IKE SA IKE SA 1. Host A sends interesting traffic to Host B. 2. R1 and R2 negotiate an IKE Phase 1 session. R1 R2 10.0.2.3 10.0.1.3 IPSec VPN Negotiation 42 42 42 © 2009 Cisco Learning Institute. IKE Phase 1 IKE Phase 2 IKE SA IKE SA IPsec SA IPsec SA 3. R1 and R2 negotiate an IKE Phase 2 session. 4. Information is exchanged via IPsec tunnel. 5. The IPsec tunnel is terminated. IPsec Tunnel
  • 43. Configuring IPsec Task 1: Ensure that ACLs are compatible with IPsec. Task 2: Create ISAKMP (IKE) policy. Tasks to Configure IPsec: 43 43 43 © 2009 Cisco Learning Institute. Task 2: Create ISAKMP (IKE) policy. Task 3: Configure IPsec transform set. Task 4: Create a crypto ACL. Task 5: Create and apply the crypto map.
  • 44. Task 1 Configure Compatible ACLs AH ESP IKE Site 1 Site 2 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 10.0.2.0/24 44 44 44 © 2009 Cisco Learning Institute. • Ensure that protocols 50 (ESP), 51 (AH) and UDP port 500 (ISAKMP) traffic are not blocked by incoming ACLs on interfaces used by IPsec. S0/0/0 172.30.1.2 S0/0/0 172.30.2.2
  • 45. AH ESP IKE Site 1 Site 2 10.0.1.3 10.0.2.3 R1 R2 Internet S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 10.0.1.0/24 10.0.2.0/24 Permitting Traffic 45 45 45 © 2009 Cisco Learning Institute. R1(config)# access-list 102 permit ahp host 172.30.2.2 host 172.30.1.2 R1(config)# access-list 102 permit esp host 172.30.2.2 host 172.30.1.2 R1(config)# access-list 102 permit udp host 172.30.2.2 host 172.30.1.2 eq isakmp R1(config)# R1(config)# interface Serial0/0/0 R1(config-if)# ip address 172.30.1.2 255.255.255.0 R1(config-if)# ip access-group 102 in ! R1(config)# exit R1# R1# show access-lists access-list 102 permit ahp host 172.30.2.2 host 172.30.1.2 access-list 102 permit esp host 172.30.2.2 host 172.30.1.2 access-list 102 permit udp host 172.30.2.2 host 172.30.1.2 eq isakmp R1#
  • 46. Tunnel Policy 110 DES MD5 Preshare 86400 DH1 Site 1 Site 2 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 10.0.2.0/24 Task 2 Configure IKE 46 46 46 © 2009 Cisco Learning Institute. Defines the parameters within the IKE policy crypto isakmp policy priority router(config)# R1(config)# crypto isakmp policy 110 R1(config–isakmp)# authentication pre-share R1(config–isakmp)# encryption des R1(config–isakmp)# group 1 R1(config–isakmp)# hash md5 R1(config–isakmp)# lifetime 86400 DH1
  • 47. ISAKMP Parameters Parameter Keyword Accepted Values Default Value Description encryption des 3des aes aes 192 aes 256 56-bit Data Encryption Standard Triple DES 128-bit AES 192-bit AES 256-bit AES des Message encryption algorithm 47 47 47 © 2009 Cisco Learning Institute. hash sha md5 SHA-1 (HMAC variant) MD5 (HMAC variant) sha Message integrity (Hash) algorithm authenticati on pre-share rsa-encr rsa-sig preshared keys RSA encrypted nonces RSA signatures rsa-sig Peer authentication method group 1 2 5 768-bit Diffie-Hellman (DH) 1024-bit DH 1536-bit DH 1 Key exchange parameters (DH group identifier) lifetime seconds Can specify any number of seconds 86,400 sec (one day) ISAKMP-established SA lifetime
  • 48. Multiple Policies crypto isakmp policy 100 hash md5 crypto isakmp policy 100 hash md5 R1(config)# R2(config)# Site 1 Site 2 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 10.0.2.0/24 48 48 48 © 2009 Cisco Learning Institute. hash md5 authentication pre-share ! crypto isakmp policy 200 hash sha authentication rsa-sig ! crypto isakmp policy 300 hash md5 authentication rsa-sig hash md5 authentication pre-share ! crypto isakmp policy 200 hash sha authentication rsa-sig ! crypto isakmp policy 300 hash md5 authentication pre-share
  • 49. Site 1 Site 2 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 10.0.2.0/24 R1 attempts to establish a VPN tunnel with R2 and sends its IKE policy parameters Policy Negotiations 49 49 49 © 2009 Cisco Learning Institute. R1(config)# crypto isakmp policy 110 R1(config–isakmp)# authentication pre-share R1(config–isakmp)# encryption 3des R1(config–isakmp)# group 2 R1(config–isakmp)# hash sha R1(config–isakmp)# lifetime 43200 Policy 110 Preshare 3DES SHA DH2 43200 R2(config)# crypto isakmp policy 100 R2(config–isakmp)# authentication pre-share R2(config–isakmp)# encryption 3des R2(config–isakmp)# group 2 R2(config–isakmp)# hash sha R2(config–isakmp)# lifetime 43200 R2 must have an ISAKMP policy configured with the same parameters. Tunnel Site 1 Site 2
  • 50. Crypto ISAKMP Key crypto isakmp key keystring address peer-address router(config)# crypto isakmp key keystring hostname hostname router(config)# Parameter Description This parameter specifies the PSK. Use any combination of alphanumeric characters 50 50 50 © 2009 Cisco Learning Institute. • The peer-address or peer-hostname can be used, but must be used consistently between peers. • If the peer-hostname is used, then the crypto isakmp identity hostname command must also be configured. keystring This parameter specifies the PSK. Use any combination of alphanumeric characters up to 128 bytes. This PSK must be identical on both peers. peer- address This parameter specifies the IP address of the remote peer. hostname This parameter specifies the hostname of the remote peer. This is the peer hostname concatenated with its domain name (for example, myhost.domain.com).
  • 51. R1(config)# crypto isakmp policy 110 R1(config–isakmp)# authentication pre-share Site 1 Site 2 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 10.0.2.0/24 Sample Configuration 51 51 51 © 2009 Cisco Learning Institute. R1(config–isakmp)# authentication pre-share R1(config–isakmp)# encryption 3des R1(config–isakmp)# group 2 R1(config–isakmp)# hash sha R1(config–isakmp)# lifetime 43200 R1(config-isakmp)# exit R1(config)# crypto isakmp key cisco123 address 172.30.2.2 R1(config)# R2(config)# crypto isakmp policy 110 R2(config–isakmp)# authentication pre-share R2(config–isakmp)# encryption 3des R2(config–isakmp)# group 2 R2(config–isakmp)# hash sha R2(config–isakmp)# lifetime 43200 R2(config-isakmp)# exit R2(config)# crypto isakmp key cisco123 address 172.30.1.2 R2(config)# Note: • The keystring cisco1234 matches. • The address identity method is specified. • The ISAKMP policies are compatible. • Default values do not have to be configured.
  • 52. router(config)# crypto ipsec transform–set transform-set-name transform1 [transform2] [transform3]] crypto ipsec transform-set Parameters Command Description Task 3 Configure the Transform Set 52 52 52 © 2009 Cisco Learning Institute. transform-set-name This parameter specifies the name of the transform set to create (or modify). transform1, transform2, transform3 Type of transform set. You may specify up to four transforms: one Authentication Header (AH), one Encapsulating Security Payload (ESP) encryption, one ESP authentication. These transforms define the IP Security (IPSec) security protocols and algorithms. A transform set is a combination of IPsec transforms that enact a security policy for traffic.
  • 53. Transform Sets Host B 10.0.1.3 10.0.2.3 R1 R2 Host A transform-set ALPHA esp-3des tunnel transform-set RED esp-des tunnel Internet 1 2 3 172.30.2.2 172.30.1.2 53 53 53 © 2009 Cisco Learning Institute. • Transform sets are negotiated during IKE Phase 2. • The 9th attempt found matching transform sets (CHARLIE - YELLOW). transform-set BETA esp-des, esp-md5-hmac tunnel transform-set CHARLIE esp-3des, esp-sha-hmac tunnel transform-set BLUE esp-des, ah-sha-hmac tunnel transform-set YELLOW esp-3des, esp-sha-hmac tunnel Match 3 4 5 6 7 8 9
  • 54. Site 1 Site 2 A B 10.0.1.3 10.0.2.3 R1 R2 Internet R1(config)# crypto isakmp key cisco123 address 172.30.2.2 R1(config)# crypto ipsec transform-set MYSET esp-aes 128 R1(cfg-crypto-trans)# exit R1(config)# 172.30.2.2 172.30.1.2 Sample Configuration 54 54 54 © 2009 Cisco Learning Institute. R1(config)# R2(config)# crypto isakmp key cisco123 address 172.30.1.2 R2(config)#crypto ipsec transform-set OTHERSET esp-aes 128 R2(cfg-crypto-trans)# exit Note: • Peers must share the same transform set settings. • Names are only locally significant.
  • 55. Task 4 Configure the Crypto ACLs Host A R1 Internet Outbound Traffic Encrypt Bypass (Plaintext) 55 55 55 © 2009 Cisco Learning Institute. • Outbound indicates the data flow to be protected by IPsec. • Inbound filters and discards traffic that should have been protected by IPsec. Inbound Traffic Bypass (Plaintext) Permit Bypass Discard (Plaintext)
  • 56. 10.0.1.3 10.0.2.3 R1 R2 Internet router(config)# access-list access-list-number [dynamic dynamic-name [timeout minutes]]{deny | permit} protocol source source-wildcard destination destination-wildcard 10.0.1.0/24 Site 1 10.0.2.0/24 Site 2 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 Command Syntax 56 56 56 © 2009 Cisco Learning Institute. permit} protocol source source-wildcard destination destination-wildcard [precedence precedence] [tos tos] [log] access-list access-list-number Parameters access-list access-list-number Command Description permit This option causes all IP traffic that matches the specified conditions to be protected by cryptography, using the policy described by the corresponding crypto map entry. deny This option instructs the router to route traffic in plaintext. protocol This option specifies which traffic to protect by cryptography based on the protocol, such as TCP, UDP, or ICMP. If the protocol is IP, then all traffic IP traffic that matches that permit statement is encrypted. source and destination If the ACL statement is a permit statement, these are the networks, subnets, or hosts between which traffic should be protected. If the ACL statement is a deny statement, then the traffic between the specified source and destination is sent in plaintext.
  • 57. S0/1 10.0.1.3 10.0.2.3 R1 R2 Internet Site 2 Applied to R1 S0/0/0 outbound traffic: S0/0/0 172.30.2.2 S0/0/0 172.30.1.2 10.0.1.0/24 Site 1 10.0.2.0/24 Symmetric Crypto ACLs 57 57 57 © 2009 Cisco Learning Institute. Applied to R1 S0/0/0 outbound traffic: R1(config)# access-list 110 permit tcp 10.0.1.0 0.0.0.255 10.0.2.0 0.0.0.255 (when evaluating inbound traffic– source: 10.0.2.0, destination: 10.0.1.0) Applied to R2 S0/0/0 outbound traffic: R2(config)# access-list 101 permit tcp 10.0.2.0 0.0.0.255 10.0.1.0 0.0.0.255 (when evaluating inbound traffic- source: 10.0.1.0, destination: 10.0.2.0)
  • 58. Task 5 Apply the Crypto Map Crypto maps define the following: Site 1 10.0.1.3 R1 R2 10.0.2.3 Site 2 Internet 58 58 58 © 2009 Cisco Learning Institute. ACL to be used Remote VPN peers Transform set to be used Key management method SA lifetimes Encrypted Traffic Router Interface or Subinterface
  • 59. crypto map map-name seq-num ipsec-manual crypto map map-name seq-num ipsec-isakmp [dynamic dynamic-map-name] router(config)# crypto map Parameters Command Parameters Description Defines the name assigned to the crypto map set or indicates the name of the crypto Crypto Map Command 59 59 59 © 2009 Cisco Learning Institute. map-name Defines the name assigned to the crypto map set or indicates the name of the crypto map to edit. seq-num The number assigned to the crypto map entry. ipsec-manual Indicates that ISAKMP will not be used to establish the IPsec SAs. ipsec-isakmp Indicates that ISAKMP will be used to establish the IPsec SAs. cisco (Default value) Indicates that CET will be used instead of IPsec for protecting the traffic. dynamic (Optional) Specifies that this crypto map entry references a preexisting static crypto map. If this keyword is used, none of the crypto map configuration commands are available. dynamic-map-name (Optional) Specifies the name of the dynamic crypto map set that should be used as the policy template.
  • 60. Crypto Map Configuration Mode Commands Command Description set Used with the peer, pfs, transform-set, and security-association commands. peer [hostname | ip- address] Specifies the allowed IPsec peer by IP address or hostname. pfs [group1 | group2] Specifies DH Group 1 or Group 2. Specify list of transform sets in priority order. When the ipsec-manual 60 60 60 © 2009 Cisco Learning Institute. transform-set [set_name(s)] Specify list of transform sets in priority order. When the ipsec-manual parameter is used with the crypto map command, then only one transform set can be defined. When the ipsec-isakmp parameter or the dynamic parameter is used with the crypto map command, up to six transform sets can be specified. security-association lifetime Sets SA lifetime parameters in seconds or kilobytes. match address [access- list-id | name] Identifies the extended ACL by its name or number. The value should match the access-list-number or name argument of a previously defined IP-extended ACL being matched. no Used to delete commands entered with the set command. exit Exits crypto map configuration mode.
  • 61. R3 10.0.1.3 10.0.2.3 R1 R2 Internet Sample Configuration 10.0.1.0/24 Site 1 10.0.2.0/24 Site 2 S0/0/0 172.30.2.2 61 61 61 © 2009 Cisco Learning Institute. Multiple peers can be specified for redundancy. S0/0/0 172.30.3.2 R1(config)# crypto map MYMAP 10 ipsec-isakmp R1(config-crypto-map)# match address 110 R1(config-crypto-map)# set peer 172.30.2.2 default R1(config-crypto-map)# set peer 172.30.3.2 R1(config-crypto-map)# set pfs group1 R1(config-crypto-map)# set transform-set mine R1(config-crypto-map)# set security-association lifetime seconds 86400
  • 62. MYMAP Assign the Crypto Map Set 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 Site 1 10.0.2.0/24 Site 2 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 62 62 62 © 2009 Cisco Learning Institute. • Applies the crypto map to outgoing interface • Activates the IPsec policy crypto map map-name R1(config)# interface serial0/0/0 R1(config-if)# crypto map MYMAP router(config-if)# MYMAP
  • 63. CLI Commands Show Command Description show crypto map Displays configured crypto maps show crypto isakmp policy Displays configured IKE policies 63 63 63 © 2009 Cisco Learning Institute. show crypto ipsec sa Displays established IPsec tunnels show crypto ipsec transform-set Displays configured IPsec transform sets debug crypto isakmp Debugs IKE events debug crypto ipsec Debugs IPsec events
  • 64. show crypto map router# show crypto map 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 Site 1 10.0.2.0/24 Site 2 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 64 64 64 © 2009 Cisco Learning Institute. R1# show crypto map Crypto Map “MYMAP 10 ipsec-isakmp Peer = 172.30.2.2 Extended IP access list 110 access-list 102 permit ip host 10.0.1.3 host 10.0.2.3 Current peer: 172.30.2.2 Security association lifetime: 4608000 kilobytes/3600 seconds PFS (Y/N): N Transform sets={ MYSET, } Displays the currently configured crypto maps
  • 65. show crypto isakmp policy router# show crypto isakmp policy 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 Site 1 10.0.2.0/24 Site 2 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 65 65 65 © 2009 Cisco Learning Institute. R1# show crypto isakmp policy Protection suite of priority 110 encryption algorithm: 3DES - Data Encryption Standard (168 bit keys). hash algorithm: Secure Hash Standard authentication method: preshared Diffie-Hellman group: #2 (1024 bit) lifetime: 86400 seconds, no volume limit Default protection suite encryption algorithm: DES - Data Encryption Standard (56 bit keys). hash algorithm: Secure Hash Standard authentication method: Rivest-Shamir-Adleman Signature Diffie-Hellman group: #1 (768 bit) lifetime: 86400 seconds, no volume limit
  • 66. show crypto ipsec transform-set show crypto ipsec transform-set 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 Site 1 10.0.2.0/24 Site 2 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 66 66 66 © 2009 Cisco Learning Institute. show crypto ipsec transform-set Displays the currently defined transform sets R1# show crypto ipsec transform-set Transform set AES_SHA: { esp-128-aes esp-sha-hmac } will negotiate = { Tunnel, },
  • 67. show crypto ipsec sa 10.0.1.3 10.0.2.3 R1 R2 Internet 10.0.1.0/24 Site 1 10.0.2.0/24 Site 2 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 67 67 67 © 2009 Cisco Learning Institute. R1# show crypto ipsec sa Interface: Serial0/0/0 Crypto map tag: MYMAP, local addr. 172.30.1.2 local ident (addr/mask/prot/port): (172.30.1.2/255.255.255.255/0/0) remote ident (addr/mask/prot/port): (172.30.2.2/255.255.255.255/0/0) current_peer: 172.30.2.2 PERMIT, flacs={origin_is_acl,} #pkts encaps: 21, #pkts encrypt: 21, #pkts digest 0 #pkts decaps: 21, #pkts decrypt: 21, #pkts verify 0 #send errors 0, #recv errors 0 local crypto endpt.: 172.30.1.2, remote crypto endpt.: 172.30.2.2 path mtu 1500, media mtu 1500 current outbound spi: 8AE1C9C
  • 68. debug crypto isakmp router# debug crypto isakmp 1d00h: ISAKMP (0:1): atts are not acceptable. Next payload is 0 1d00h: ISAKMP (0:1); no offers accepted! 1d00h: ISAKMP (0:1): SA not acceptable! 1d00h: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Main Mode failed with peer at 172.30.2.2 68 68 68 © 2009 Cisco Learning Institute. • This is an example of the Main Mode error message. • The failure of Main Mode suggests that the Phase I policy does not match on both sides. • Verify that the Phase I policy is on both peers and ensure that all the attributes match. 1d00h: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Main Mode failed with peer at 172.30.2.2
  • 69. Starting a VPN Wizard Wizards for IPsec Solutions, includes type of VPNs and Individual IPsec components 1 2 3 1. Click Configure in main toolbar 3. Choose a wizard 69 69 69 © 2009 Cisco Learning Institute. 2 4 5 VPN implementation Subtypes. Vary based On VPN wizard chosen. 2. Click the VPN button to open the VPN page 4. Click the VPN implementation subtype 5. Click the Launch the Selected Task button
  • 70. VPN Components Individual IPsec components used to build VPNs VPN Wizards SSL VPN parameters 70 70 70 © 2009 Cisco Learning Institute. Easy VPN server parameters Public key certificate parameters Encrypt VPN passwords VPN Components
  • 71. Configuring a Site-to-Site VPN Choose Configure VPN Site-to-Site VPN 71 71 71 © 2009 Cisco Learning Institute. Click the Launch the Selected Task button Click the Create a Site-to-Site VPN
  • 72. Site-to-Site VPN Wizard Choose the wizard mode 72 72 72 © 2009 Cisco Learning Institute. Click Next to proceed to the configuration of parameters.
  • 73. Quick Setup Configure the parameters • Interface to use 73 73 73 © 2009 Cisco Learning Institute. • Interface to use • Peer identity information • Authentication method • Traffic to encrypt
  • 74. Verify Parameters 74 74 74 © 2009 Cisco Learning Institute.
  • 75. 1 2 Step-by-Step Wizard Choose the outside interface that is used to connect to the IPSec peer Specify the IP address of the peer 75 75 75 © 2009 Cisco Learning Institute. 3 4 Choose the authentication method and specify the credentials Click Next
  • 76. Creating a Custom IKE Proposal 2 Make the selections to configure the IKE Policy and click OK 76 76 76 © 2009 Cisco Learning Institute. 1 3 Click Add to define a proposal Click Next
  • 77. 2 Creating a Custom IPSec Transform Set Define and specify the transform set name, integrity algorithm, encryption algorithm, mode of operation and optional compression 77 77 77 © 2009 Cisco Learning Institute. 1 3 Click Next Click Add
  • 78. 1 Protecting Traffic Subnet to Subnet Click Protect All Traffic Between the Following subnets 78 78 78 © 2009 Cisco Learning Institute. 2 3 Define the IP address and subnet mask of the local network Define the IP address and subnet mask of the remote network
  • 79. Protecting Traffic Custom ACL 79 79 79 © 2009 Cisco Learning Institute. 2 3 1 Click the Create/Select an Access-List for IPSec Traffic radio button Click the ellipses button to choose an existing ACL or create a new one To use an existing ACL, choose the Select an Existing Rule (ACL) option. To create a new ACL, choose the Create a New Rule (ACL) and Select option
  • 80. Add a Rule 1 2 Give the access rule a 80 80 80 © 2009 Cisco Learning Institute. 2 Give the access rule a name and description Click Add
  • 81. Configuring a New Rule Entry 1 2 Choose an action and enter a description of the rule entry 81 81 81 © 2009 Cisco Learning Institute. 3 Define the source hosts or networks in the Source Host/Network pane and the destination hosts or network in the Destination/Host Network pane (Optional) To provide protection for specific protocols, choose the specific protocol radio box and desired port numbers
  • 82. Configuration Summary 82 82 82 © 2009 Cisco Learning Institute. • Click Back to modify the configuration. • Click Finish to complete the configuration.
  • 83. Verify VPN Configuration Choose Configure VPN Site-to-Site VPN Edit Site-to-Site VPN 83 83 83 © 2009 Cisco Learning Institute. Check VPN status. Create a mirroring configuration if no Cisco SDM is available on the peer. Test the VPN configuration.
  • 84. Lists all IPsec tunnels, their parameters, and status. 1 Monitor Choose Monitor VPN Status IPSec Tunnels 84 84 84 © 2009 Cisco Learning Institute. parameters, and status.
  • 85. Telecommuting • Flexibility in working location and working hours • Employers save on real- estate, utility and other 85 85 85 © 2009 Cisco Learning Institute. estate, utility and other overhead costs • Succeeds if program is voluntary, subject to management discretion, and operationally feasible
  • 86. Telecommuting Benefits • Organizational benefits: - Continuity of operations - Increased responsiveness - Secure, reliable, and manageable access to information - Cost-effective integration of data, voice, video, and applications - Increased employee productivity, satisfaction, and retention 86 86 86 © 2009 Cisco Learning Institute. - Increased employee productivity, satisfaction, and retention • Social benefits: - Increased employment opportunities for marginalized groups - Less travel and commuter related stress • Environmental benefits: - Reduced carbon footprints, both for individual workers and organizations
  • 87. Implementing Remote Access 87 87 87 © 2009 Cisco Learning Institute.
  • 88. Methods for Deploying Remote Access 88 88 88 © 2009 Cisco Learning Institute. IPsec Remote Access VPN SSL-Based VPN Any Application Anywhere Access
  • 89. Comparison of SSL and IPSec SSL IPsec Applications Web-enabled applications, file sharing, e-mail All IP-based applications Encryption Moderate Key lengths from 40 bits to 128 bits Stronger Key lengths from 56 bits to 256 bits 89 89 89 © 2009 Cisco Learning Institute. Authentication Moderate One-way or two-way authentication Strong Two-way authentication using shared secrets or digital certificates Ease of Use Very high Moderate Can be challenging to nontechnical users Overall Security Moderate Any device can connect Strong Only specific devices with specific configurations can connect
  • 90. SSL VPNs • Integrated security and routing • Browser-based full network SSL VPN access SSL VPN Headquarters Internet 90 90 90 © 2009 Cisco Learning Institute. Workplace Resources Headquarters SSL VPN Tunnel
  • 91. Types of Access 91 91 91 © 2009 Cisco Learning Institute.
  • 92. Full Tunnel Client Access Mode 92 92 92 © 2009 Cisco Learning Institute.
  • 93. User using SSL client Establishing an SSL Session User makes a connection to TCP port 443 Router replies with a digitally signed public key User software creates a 1 2 3 SSL VPN enabled ISR router 93 93 93 © 2009 Cisco Learning Institute. Shared-secret key, encrypted with public key of the server, is sent to the router Bulk encryption occurs using the shared-secret key with a symmetric encryption algorithm User software creates a shared-secret key 3 4 5 router
  • 94. SSL VPN Design Considerations • User connectivity • Router feature • Infrastructure planning 94 94 94 © 2009 Cisco Learning Institute. • Implementation scope
  • 95. Cisco Easy VPN • Negotiates tunnel parameters • Establishes tunnels according to set parameters • Automatically creates a NAT / PAT and associated ACLs 95 95 95 © 2009 Cisco Learning Institute. PAT and associated ACLs • Authenticates users by usernames, group names, and passwords • Manages security keys for encryption and decryption • Authenticates, encrypts, and decrypts data through the tunnel
  • 96. Cisco Easy VPN 96 96 96 © 2009 Cisco Learning Institute.
  • 97. Securing the VPN Initiate IKE Phase 1 Establish ISAKMP SA Accept Proposal1 Username/Password Challenge 1 2 3 4 97 97 97 © 2009 Cisco Learning Institute. Challenge Username/Password System Parameters Pushed Reverse Router Injection (RRI) adds a static route entry on the router for the remote clients IP address Initiate IKE Phase 2: IPsec IPsec SA 5 6 7
  • 98. Configuring Cisco Easy VPN Server 1 2 3 4 98 98 98 © 2009 Cisco Learning Institute. 5
  • 99. Configuring IKE Proposals Specify required parameters 99 99 99 © 2009 Cisco Learning Institute. 1 2 3 Click Add Specify required parameters Click OK
  • 100. Creating an IPSec Transform Set 1 3 100 100 100 © 2009 Cisco Learning Institute. 2 4
  • 101. Group Authorization and Group Policy Lookup 1 3 Select the location where Easy VPN group policies can be stored Click Add 101 101 101 © 2009 Cisco Learning Institute. 2 4 5 Click Next Click Next Configure the local group policies
  • 102. Summary of Configuration Parameters 102 102 102 © 2009 Cisco Learning Institute.
  • 103. VPN Client Overview R1 R1-vpn-cluster.span.com R1 R1-vpn-cluster.span.com 103 103 103 © 2009 Cisco Learning Institute. • Establishes end-to-end, encrypted VPN tunnels for secure connectivity • Compatible with all Cisco VPN products • Supports the innovative Cisco Easy VPN capabilities
  • 104. Establishing a Connection R1-vpn-cluster.span.com Once authenticated, status changes to connected. 104 104 104 © 2009 Cisco Learning Institute. R1 R1-vpn-cluster.span.com “R1”
  • 105. 105 105 105 © 2009 Cisco Learning Institute.