Chapter Eight Implementing Virtual Private Networks

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Chapter 9: Access Control Lists
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L4 1 Implementing Secure Converged Wide Area Networks (ISCW)
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Implementing Secure Converged Wide Area Networks (ISCW)
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW)
© 2012 Cisco and/or its affiliates. All rights reserved. 1 Implementing Virtual Private Networks.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Creating an IPsec VPN using IOS command syntax. What is IPSec IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering.
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 8 – Implementing Virtual Private Networks.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
RE © 2003, Cisco Systems, Inc. All rights reserved.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Implementing VPN Solutions Laurel Boyer, CCIE 4918 Presented, June 2003.
© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Chapter 13 – Network Security
Access Control List ACL. Access Control List ACL.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Implementing Secure Converged Wide Area Networks (ISCW) Module 3.2.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Chapter 8: Implementing Virtual Private Networks
Page 1 Chapter 11 CCNA2 Chapter 11 Access Control Lists : Creating ACLs, using Wildcard Mask Bits, Standard and Extended ACLs.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 4 City College.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
1 © 2009 Cisco Learning Institute. CCNA Security Chapter Eight Implementing Virtual Private Networks.
Implementing Secure Converged Wide Area Networks (ISCW) Module 3.3.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Virtual Private Network Configuration
© 2012 Cisco and/or its affiliates. All rights reserved. 1 IPsec.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Securing Access to Data Using IPsec Josh Jones Cosc352.
WELCOME LAN TO LAN VPN LAN to LAN VPN also known as Site to Site VPN is the most basic and the most simplest of all the VPN’s used on CISCO devices. It.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Module 4: Configuring Site to Site VPN with Pre-shared keys
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
IPSec Detailed Description and VPN
Chapter 5 Network Security Protocols in Practice Part I
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Providing Teleworker Services
Instructor Materials Chapter 7: Access Control Lists
Chapter 18 IP Security  IP Security (IPSec)
SECURING NETWORK TRAFFIC WITH IPSEC
CSE 4905 IPsec II.
UNIT.4 IP Security.
Configuring and Troubleshooting Routing and Remote Access
IPSec VPN Chapter 13 of Malik.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Slides have been taken from:
Virtual Private Networks (VPNs)
Chapter 10: Advanced Cisco Adaptive Security Appliance
Introduction to Network Security
Presentation transcript:

Chapter Eight Implementing Virtual Private Networks CCNA Security Chapter Eight Implementing Virtual Private Networks

Lesson Planning This lesson should take 3-4 hours to present The lesson should include lecture, demonstrations, discussions and assessments The lesson can be taught in person or using remote instruction

Major Concepts Describe the purpose and operation of VPN types Describe the purpose and operation of GRE VPNs Describe the components and operations of IPsec VPNs Configure and verify a site-to-site IPsec VPN with pre-shared key authentication using CLI Configure and verify a site-to-site IPsec VPN with pre-shared key authentication using SDM Configure and verify a Remote Access VPN

Lesson Objectives Upon completion of this lesson, the successful participant will be able to: Describe the purpose and operation of VPNs Differentiate between the various types of VPNs Identify the Cisco VPN product line and the security features of these products Configure a site-to-site VPN GRE tunnel Describe the IPSec protocol and its basic functions Differentiate between AH and ESP Describe the IKE protocol and modes Describe the five steps of IPSec operation

Lesson Objectives Describe how to prepare IPSec by ensuring that ACLs are compatible with IPSec Configure IKE policies using the CLI Configure the IPSec transform sets using the CLI Configure the crypto ACLs using the CLI Configure and apply a crypto map using the CLI Describe how to verify and troubleshoot the IPSec configuration Describe how to configure IPSec using SDM Configure a site-to-site VPN using the Quick Setup VPN Wizard in SDM Configure a site-to-site VPN using the step-by-step VPN Wizard in SDM 5

Lesson Objectives Verify, monitor and troubleshoot VPNs using SDM Describe how an increasing number of organizations are offering telecommuting options to their employees Differentiate between Remote Access IPSec VPN solutions and SSL VPNs Describe how SSL is used to establish a secure VPN connection Describe the Cisco Easy VPN feature Configure a VPN Server using SDM Connect a VPN client using the Cisco VPN Client software 6

SOHO with a Cisco DSL Router What is a VPN? Business Partner with a Cisco Router Mobile Worker with a Cisco VPN Client CSA VPN Internet Firewall SOHO with a Cisco DSL Router Corporate Network VPN WAN Virtual: Information within a private network is transported over a public network. Private: The traffic is encrypted to keep the data confidential. VPN Regional branch with a VPN enabled Cisco ISR router

SOHO with a Cisco DSL Router Layer 3 VPN IPSec IPSec VPN Internet SOHO with a Cisco DSL Router Generic routing encapsulation (GRE) Multiprotocol Label Switching (MPLS) IPSec

SOHO with a Cisco DSL Router Types of VPN Networks Business Partner with a Cisco Router Remote-access VPNs Mobile Worker with a Cisco VPN Client CSA MARS VPN Internet SOHO with a Cisco DSL Router Firewall Site-to-Site VPNs VPN IPS WAN VPN Iron Port CSA Regional branch with a VPN enabled Cisco ISR router CSA CSA CSA CSA CSA Web Server Email Server DNS

SOHO with a Cisco DSL Router Site-to-Site VPN MARS VPN Iron Port Firewall IPS Web Server Email Server DNS CSA Regional branch with a VPN enabled Cisco ISR router SOHO with a Cisco DSL Router Business Partner with a Cisco Router Site-to-Site VPNs Internet WAN Hosts send and receive normal TCP/IP traffic through a VPN gateway

Remote-Access VPNs Remote-access VPNs Internet Mobile Worker with a Cisco VPN Client CSA MARS Internet Firewall VPN IPS Iron Port CSA CSA CSA CSA CSA CSA Web Server Email Server DNS

VPN Client Software R1 R1-vpn-cluster.span.com “R1” In a remote-access VPN, each host typically has Cisco VPN Client software

Cisco IOS SSL VPN Provides remote-access connectivity from any Internet-enabled host Uses a web browser and SSL encryption Delivers two modes of access: Clientless Thin client

Cisco VPN Product Family Product Choice Remote-Access VPN Site-to-Site VPN Cisco VPN-Enabled Router Secondary role Primary role Cisco PIX 500 Series Security Appliances Cisco ASA 5500 Series Adaptive Security Appliances Cisco VPN 3000 Series Concentrators Home Routers

Cisco VPN-Optimized Routers Remote Office Cisco Router Main Office Cisco Router Internet Regional Office Cisco Router VPN Features: Voice and video enabled VPN (V3PN) IPSec stateful failover DMVPN IPSec and Multiprotocol Label Switching (MPLS) integration Cisco Easy VPN SOHO Cisco Router

Cisco ASA 5500 Series Adaptive Security Appliances Central Site Remote Site Internet Intranet Remote User Extranet Business-to-Business Flexible platform Resilient clustering Cisco Easy VPN Automatic Cisco VPN Cisco IOS SSL VPN VPN infrastructure for contemporary applications Integrated web-based management

IPSec Clients Internet Internet A wireless client that is loaded on a pda Certicom PDA IPsec VPN Client Internet Router with Firewall and VPN Client Cisco VPN Software Client Software loaded on a PC Small Office A network appliance that connects SOHO LANs to the VPN Cisco AnyConnect VPN Client Internet Provides remote users with secure VPN connections

Hardware Acceleration Modules AIM Cisco IPSec VPN Shared Port Adapter (SPA) Cisco PIX VPN Accelerator Card+ (VAC+) Enhanced Scalable Encryption Processing (SEP-E) Cisco IPsec VPN SPA

GRE VPN Overview

Encapsulation Original IP Packet Encapsulated with GRE

Configuring a GRE Tunnel Create a tunnel interface Assign the tunnel an IP address R1(config)# interface tunnel 0 R1(config–if)# ip address 10.1.1.1 255.255.255.252 R1(config–if)# tunnel source serial 0/0 R1(config–if)# tunnel destination 192.168.5.5 R1(config–if)# tunnel mode gre ip R1(config–if)# R2(config)# interface tunnel 0 R2(config–if)# ip address 10.1.1.2 255.255.255.252 R2(config–if)# tunnel source serial 0/0 R2(config–if)# tunnel destination 192.168.3.3 R2(config–if)# tunnel mode gre ip R2(config–if)# Identify the source tunnel interface Identify the destination of the tunnel Configure what protocol GRE will encapsulate

Using GRE User Traffic Use GRE Tunnel Use IPsec VPN IP Only? Yes Unicast Only? No Use GRE Tunnel Use IPsec VPN No Yes GRE does not provide encryption

IPSec Topology Main Site Business Partner with a Cisco Router IPsec Perimeter Router Legacy Cisco PIX Firewall Legacy Concentrator POP Regional Office with a Cisco PIX Firewall ASA Mobile Worker with a Cisco VPN Client on a Laptop Computer Corporate SOHO with a Cisco SDN/DSL Router Works at the network layer, protecting and authenticating IP packets. It is a framework of open standards which is algorithm-independent. It provides data confidentiality, data integrity, and origin authentication.

IPSec Framework Diffie-Hellman DH7

Least secure Most secure Confidentiality Least secure Most secure Key length: - 56-bits Key length: - 56-bits (3 times) Key lengths: 128-bits 192 bits 256-bits Diffie-Hellman DH7 Key length: - 160-bits

Least secure Most secure Integrity Least secure Most secure Key length: - 128-bits Key length: - 160-bits) Diffie-Hellman DH7

Authentication Diffie-Hellman DH7

Pre-shared Key (PSK)  [JG1]It? At the local device, the authentication key and the identity information (device-specific information) are sent through a hash algorithm to form hash_I. One-way authentication is established by sending hash_I to the remote device. If the remote device can independently create the same hash, the local device is authenticated. The authentication process continues in the opposite direction. The remote device combines its identity information with the preshared-based authentication key and sends it through the hash algorithm to form hash_R. hash_R is sent to the local device. If the local device can independently create the same hash, the remote device is authenticated. Diffie-Hellman DH7

RSA Signatures At the local device, the authentication key and identity information (device-specific information) are sent through the hash algorithm forming hash_I. hash_I is encrypted using the local device's private encryption key creating a digital signature. The digital signature and a digital certificate are forwarded to the remote device. The public encryption key for decrypting the signature is included in the digital certificate. The remote device verifies the digital signature by decrypting it using the public encryption key. The result is hash_I. Next, the remote device independently creates hash_I from stored information. If the calculated hash_I equals the decrypted hash_I, the local device is authenticated. After the remote device authenticates the local device, the authentication process begins in the opposite direction and all steps are repeated from the remote device to the local device.

Secure Key Exchange Diffie-Hellman DH7

IPSec Framework Protocols Authentication Header R1 R2 All data is in plaintext. AH provides the following: Authentication Integrity Encapsulating Security Payload R1 R2 Data payload is encrypted. ESP provides the following: Encryption Authentication Integrity

Authentication Header 1. The IP Header and data payload are hashed IP Header + Data + Key R2 Hash IP HDR AH Data Authentication Data (00ABCDEF) IP Header + Data + Key 3. The new packet is transmitted to the IPSec peer router Internet Hash IP HDR AH Data Recomputed Hash (00ABCDEF) Received Hash (00ABCDEF) 2. The hash builds a new AH header which is prepended to the original packet = R1 4. The peer router hashes the IP header and data payload, extracts the transmitted hash and compares

ESP DH7 Diffie-Hellman

Function of ESP Encrypted Authenticated Internet Router Router IP HDR Data IP HDR Data ESP Trailer ESP Auth New IP HDR ESP HDR IP HDR Data Encrypted Authenticated Provides confidentiality with encryption Provides integrity with authentication

Mode Types Transport Mode Tunnel Mode IP HDR Data Encrypted IP HDR Original data prior to selection of IPSec protocol mode Transport Mode Encrypted ESP Trailer ESP Auth IP HDR ESP HDR Data Authenticated Tunnel Mode Encrypted ESP Trailer New IP HDR ESP HDR IP HDR Data ESP Auth Authenticated

Security Associations IPSec parameters are configured using IKE

IKE Phases R1 R2 Host A Host B 10.0.1.3 10.0.2.3 IKE Phase 1 Exchange Negotiate IKE policy sets DH key exchange Verify the peer identity Policy 10 DES MD5 pre-share DH1 lifetime Policy 15 DES MD5 pre-share DH1 lifetime Negotiate IKE policy sets DH key exchange Verify the peer identity IKE Phase 2 Exchange Negotiate IPsec policy Negotiate IPsec policy

IKE Phase 1 – First Exchange Host A Host B Negotiate IKE Proposals 10.0.1.3 10.0.2.3 Policy 10 DES MD5 pre-share DH1 lifetime Policy 15 DES MD5 pre-share DH1 lifetime IKE Policy Sets Policy 20 3DES SHA pre-share DH1 lifetime Negotiates matching IKE policies to protect IKE exchange

IKE Phase 1 – Second Exchange Establish DH Key Private value, XA Public value, YA Private value, XB Public value, YB Alice Bob YA = g mod p XA YB = g mod p XB YA YB XA XB (YB ) mod p = K (YA ) mod p = K A DH exchange is performed to establish keying material.

IKE Phase 1 – Third Exchange Authenticate Peer Remote Office Corporate Office Internet HR Servers Peer Authentication Peer authentication methods PSKs RSA signatures RSA encrypted nonces A bidirectional IKE SA is now established.

IKE Phase 1 – Aggressive Mode Host A Host B 10.0.1.3 10.0.2.3 IKE Phase 1 Aggressive Mode Exchange Confirm IKE policy set, calculate shared secret and send R2’s DH key Authenticate peer and begin Phase 2. Send IKE policy set and R1’s DH key Calculate shared secret, verify peer identify, and confirm with peer Policy 10 DES MD5 pre-share DH1 lifetime Policy 15 DES MD5 pre-share DH1 lifetime IKE Phase 2 Exchange Negotiate IPsec policy Negotiate IPsec policy

IKE Phase 2 IKE negotiates matching IPsec policies. R1 R2 Host A Host B 10.0.1.3 Negotiate IPsec Security Parameters 10.0.2.3 IKE negotiates matching IPsec policies. Upon completion, unidirectional IPsec Security Associations(SA) are established for each protocol and algorithm combination.

IPSec VPN Negotiation Host A sends interesting traffic to Host B. 10.0.2.3 10.0.1.3 Host A sends interesting traffic to Host B. R1 and R2 negotiate an IKE Phase 1 session. IKE SA IKE Phase 1 IKE SA R1 and R2 negotiate an IKE Phase 2 session. IPsec SA IKE Phase 2 IPsec SA Information is exchanged via IPsec tunnel. IPsec Tunnel The IPsec tunnel is terminated.

Configuring IPsec Tasks to Configure IPsec: Task 1: Ensure that ACLs are compatible with IPsec. Task 2: Create ISAKMP (IKE) policy. Task 3: Configure IPsec transform set. Task 4: Create a crypto ACL. Task 5: Create and apply the crypto map.

Task 1 Configure Compatible ACLs AH ESP IKE Site 1 Site 2 10.0.1.3 10.0.2.3 R1 R2 Internet S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 10.0.1.0/24 10.0.2.0/24 Ensure that protocols 50 (ESP), 51 (AH) and UDP port 500 (ISAKMP) traffic are not blocked by incoming ACLs on interfaces used by IPsec.

Permitting Traffic Site 1 Site 2 Internet AH ESP IKE 10.0.1.0/24 10.0.2.0/24 10.0.2.3 10.0.1.3 R1 R2 Internet S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 R1(config)# access-list 102 permit ahp host 172.30.2.2 host 172.30.1.2 R1(config)# access-list 102 permit esp host 172.30.2.2 host 172.30.1.2 R1(config)# access-list 102 permit udp host 172.30.2.2 host 172.30.1.2 eq isakmp R1(config)# R1(config)# interface Serial0/0/0 R1(config-if)# ip address 172.30.1.2 255.255.255.0 R1(config-if)# ip access-group 102 in ! R1(config)# exit R1# R1# show access-lists access-list 102 permit ahp host 172.30.2.2 host 172.30.1.2 access-list 102 permit esp host 172.30.2.2 host 172.30.1.2 access-list 102 permit udp host 172.30.2.2 host 172.30.1.2 eq isakmp

Task 2 Configure IKE Site 2 Site 1 Internet router(config)# 10.0.2.0/24 10.0.1.0/24 10.0.1.3 R1 R2 10.0.2.3 Internet Site 2 Site 1 Policy 110 DES MD5 Preshare 86400 DH1 Tunnel router(config)# crypto isakmp policy priority Defines the parameters within the IKE policy R1(config)# crypto isakmp policy 110 R1(config–isakmp)# authentication pre-share R1(config–isakmp)# encryption des R1(config–isakmp)# group 1 R1(config–isakmp)# hash md5 R1(config–isakmp)# lifetime 86400

ISAKMP Parameters Parameter Keyword Accepted Values Default Value Description encryption des 3des aes aes 192 aes 256 56-bit Data Encryption Standard Triple DES 128-bit AES 192-bit AES 256-bit AES Message encryption algorithm hash sha md5 SHA-1 (HMAC variant) MD5 (HMAC variant) Message integrity (Hash) algorithm authentication pre-share rsa-encr rsa-sig preshared keys RSA encrypted nonces RSA signatures Peer authentication method group 1 2 5 768-bit Diffie-Hellman (DH) 1024-bit DH 1536-bit DH Key exchange parameters (DH group identifier) lifetime seconds Can specify any number of seconds 86,400 sec (one day) ISAKMP-established SA lifetime Note: Actual parameters vary based on IOS image.

Multiple Policies Internet Site 2 Site 1 10.0.1.0/24 10.0.2.0/24 10.0.1.3 R1 R2 10.0.2.3 Internet Site 2 Site 1 R1(config)# R2(config)# crypto isakmp policy 100 hash md5 authentication pre-share ! crypto isakmp policy 200 hash sha authentication rsa-sig crypto isakmp policy 300 crypto isakmp policy 100 hash md5 authentication pre-share ! crypto isakmp policy 200 hash sha authentication rsa-sig crypto isakmp policy 300

Policy Negotiations Site 1 Site 2 R1 attempts to establish a VPN tunnel with R2 and sends its IKE policy parameters 10.0.1.0/24 10.0.2.0/24 R1 R2 10.0.2.3 10.0.1.3 Internet Site 1 Site 2 Policy 110 Preshare 3DES SHA DH2 43200 Tunnel Notice however, that policy numbers are only locally significant and do not have to match between IPsec peers. R2 must have an ISAKMP policy configured with the same parameters. R1(config)# crypto isakmp policy 110 R1(config–isakmp)# authentication pre-share R1(config–isakmp)# encryption 3des R1(config–isakmp)# group 2 R1(config–isakmp)# hash sha R1(config–isakmp)# lifetime 43200 R2(config)# crypto isakmp policy 100 R2(config–isakmp)# authentication pre-share R2(config–isakmp)# encryption 3des R2(config–isakmp)# group 2 R2(config–isakmp)# hash sha R2(config–isakmp)# lifetime 43200

Crypto ISAKMP Key router(config)# crypto isakmp key keystring address peer-address router(config)# crypto isakmp key keystring hostname hostname Parameter Description keystring This parameter specifies the PSK. Use any combination of alphanumeric characters up to 128 bytes. This PSK must be identical on both peers. peer-address This parameter specifies the IP address of the remote peer. hostname This parameter specifies the hostname of the remote peer. This is the peer hostname concatenated with its domain name (for example, myhost.domain.com). The peer-address or peer-hostname can be used, but must be used consistently between peers. If the peer-hostname is used, then the crypto isakmp identity hostname command must also be configured.

Sample Configuration Site 1 Site 2 Internet 10.0.1.0/24 10.0.2.0/24 10.0.2.3 10.0.1.3 Internet Site 1 Site 2 R1(config)# crypto isakmp policy 110 R1(config–isakmp)# authentication pre-share R1(config–isakmp)# encryption 3des R1(config–isakmp)# group 2 R1(config–isakmp)# hash sha R1(config–isakmp)# lifetime 43200 R1(config-isakmp)# exit R1(config)# crypto isakmp key cisco123 address 172.30.2.2 R1(config)# R2(config)# crypto isakmp policy 110 R2(config–isakmp)# authentication pre-share R2(config–isakmp)# encryption 3des R2(config–isakmp)# group 2 R2(config–isakmp)# hash sha R2(config–isakmp)# lifetime 43200 R2(config-isakmp)# exit R2(config)# crypto isakmp key cisco123 address 172.30.1.2 R2(config)# Note: The keystring cisco1234 matches. The address identity method is specified. The ISAKMP policies are compatible. Default values do not have to be configured.

Task 3 Configure the Transform Set router(config)# crypto ipsec transform–set transform-set-name transform1 [transform2] [transform3]] crypto ipsec transform-set Parameters Command Description transform-set-name This parameter specifies the name of the transform set to create (or modify). transform1, transform2, transform3 Type of transform set. You may specify up to four "transforms": one Authentication Header (AH), one Encapsulating Security Payload (ESP) encryption, one ESP authentication. These transforms define the IP Security (IPSec) security protocols and algorithms. A transform set can have one AH transform and up to two ESP transforms A transform set is a combination of IPsec transforms that enact a security policy for traffic.

Transform Sets Internet Host B Host A R1 R2 172.30.1.2 Internet 10.0.1.3 10.0.2.3 172.30.2.2 transform-set ALPHA esp-3des tunnel 1 transform-set RED esp-des tunnel 2 3 transform-set BETA esp-des, esp-md5-hmac tunnel 4 transform-set BLUE esp-des, ah-sha-hmac tunnel 5 6 7 transform-set CHARLIE esp-3des, esp-sha-hmac tunnel transform-set YELLOW esp-3des, esp-sha-hmac tunnel 8 Match 9 Transform sets are negotiated during IKE Phase 2. The 9th attempt found matching transform sets (CHARLIE - YELLOW).

Sample Configuration Site 1 Site 2 Internet Note: 172.30.1.2 Internet A B 10.0.1.3 10.0.2.3 172.30.2.2 R1(config)# crypto isakmp key cisco123 address 172.30.2.2 R1(config)# crypto ipsec transform-set MYSET esp-aes 128 R1(cfg-crypto-trans)# exit R1(config)# Note: Peers must share the same transform set settings. Names are only locally significant. R2(config)# crypto isakmp key cisco123 address 172.30.1.2 R2(config)#crypto ipsec transform-set OTHERSET esp-aes 128 R2(cfg-crypto-trans)# exit

Task 4 Configure the Crypto ACLs Host A R1 Internet Outbound Traffic Encrypt Bypass (Plaintext) Inbound Traffic Permit Bypass Discard (Plaintext) Outbound indicates the data flow to be protected by IPsec. Inbound filters and discards traffic that should have been protected by IPsec.

source and destination Command Syntax Site 1 Site 2 10.0.1.0/24 10.0.2.0/24 R1 R2 10.0.1.3 Internet 10.0.2.3 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 router(config)# access-list access-list-number [dynamic dynamic-name [timeout minutes]]{deny | permit} protocol source source-wildcard destination destination-wildcard [precedence precedence] [tos tos] [log] access-list access-list-number Parameters access-list access-list-number Command Description permit This option causes all IP traffic that matches the specified conditions to be protected by cryptography, using the policy described by the corresponding crypto map entry. deny This option instructs the router to route traffic in plaintext. protocol This option specifies which traffic to protect by cryptography based on the protocol, such as TCP, UDP, or ICMP. If the protocol is IP, then all traffic IP traffic that matches that permit statement is encrypted. source and destination If the ACL statement is a permit statement, these are the networks, subnets, or hosts between which traffic should be protected. If the ACL statement is a deny statement, then the traffic between the specified source and destination is sent in plaintext.

Symmetric Crypto ACLs Internet Site 2 Site 1 R1 R2 S0/1 10.0.2.0/24 10.0.1.0/24 R1 R2 10.0.1.3 Internet 10.0.2.3 S0/0/0 172.30.2.2 S0/0/0 172.30.1.2 S0/1 Applied to R1 S0/0/0 outbound traffic: R1(config)# access-list 110 permit tcp 10.0.1.0 0.0.0.255 10.0.2.0 0.0.0.255 (when evaluating inbound traffic– source: 10.0.2.0, destination: 10.0.1.0) Applied to R2 S0/0/0 outbound traffic: R2(config)# access-list 101 permit tcp 10.0.2.0 0.0.0.255 10.0.1.0 0.0.0.255 (when evaluating inbound traffic- source: 10.0.1.0, destination: 10.0.2.0)

Task 5 Apply the Crypto Map Site 1 Site 2 R1 R2 Internet 10.0.1.3 10.0.2.3 Crypto maps define the following: ACL to be used Remote VPN peers Transform set to be used Key management method SA lifetimes Encrypted Traffic Router Interface or Subinterface

Crypto Map Command router(config)# crypto map map-name seq-num ipsec-manual crypto map map-name seq-num ipsec-isakmp [dynamic dynamic-map-name] crypto map Parameters Command Parameters Description map-name Defines the name assigned to the crypto map set or indicates the name of the crypto map to edit. seq-num The number assigned to the crypto map entry. ipsec-manual Indicates that ISAKMP will not be used to establish the IPsec SAs. ipsec-isakmp Indicates that ISAKMP will be used to establish the IPsec SAs. cisco (Default value) Indicates that CET will be used instead of IPsec for protecting the traffic. dynamic (Optional) Specifies that this crypto map entry references a preexisting static crypto map. If this keyword is used, none of the crypto map configuration commands are available. dynamic-map-name (Optional) Specifies the name of the dynamic crypto map set that should be used as the policy template.

Crypto Map Configuration Mode Commands Description set Used with the peer, pfs, transform-set, and security-association commands. peer [hostname | ip-address] Specifies the allowed IPsec peer by IP address or hostname. pfs [group1 | group2] Specifies DH Group 1 or Group 2. transform-set [set_name(s)] Specify list of transform sets in priority order. When the ipsec-manual parameter is used with the crypto map command, then only one transform set can be defined. When the ipsec-isakmp parameter or the dynamic parameter is used with the crypto map command, up to six transform sets can be specified. security-association lifetime Sets SA lifetime parameters in seconds or kilobytes. match address [access-list-id | name] Identifies the extended ACL by its name or number. The value should match the access-list-number or name argument of a previously defined IP-extended ACL being matched. no Used to delete commands entered with the set command. exit Exits crypto map configuration mode.

Sample Configuration Internet Site 1 Site 2 10.0.1.0/24 10.0.2.0/24 R1 R2 Internet 10.0.2.3 10.0.1.3 S0/0/0 172.30.2.2 R3 S0/0/0 172.30.3.2 R1(config)# crypto map MYMAP 10 ipsec-isakmp R1(config-crypto-map)# match address 110 R1(config-crypto-map)# set peer 172.30.2.2 default R1(config-crypto-map)# set peer 172.30.3.2 R1(config-crypto-map)# set pfs group1 R1(config-crypto-map)# set transform-set mine R1(config-crypto-map)# set security-association lifetime seconds 86400 Multiple peers can be specified for redundancy.

Assign the Crypto Map Set Site 1 Site 2 10.0.1.0/24 10.0.2.0/24 R1 R2 10.0.1.3 Internet 10.0.2.3 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 MYMAP router(config-if)# crypto map map-name R1(config)# interface serial0/0/0 R1(config-if)# crypto map MYMAP Applies the crypto map to outgoing interface Activates the IPsec policy

show crypto isakmp policy show crypto ipsec transform-set CLI Commands Show Command Description show crypto map Displays configured crypto maps show crypto isakmp policy Displays configured IKE policies show crypto ipsec sa Displays established IPsec tunnels show crypto ipsec transform-set Displays configured IPsec transform sets debug crypto isakmp Debugs IKE events debug crypto ipsec Debugs IPsec events

show crypto map Internet router# show crypto map Site 1 Site 2 10.0.1.0/24 10.0.2.0/24 R1 R2 10.0.1.3 Internet 10.0.2.3 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 show crypto map Displays the currently configured crypto maps router# R1# show crypto map Crypto Map “MYMAP" 10 ipsec-isakmp Peer = 172.30.2.2 Extended IP access list 110 access-list 102 permit ip host 10.0.1.3 host 10.0.2.3 Current peer: 172.30.2.2 Security association lifetime: 4608000 kilobytes/3600 seconds PFS (Y/N): N Transform sets={ MYSET, }

show crypto isakmp policy Site 1 Site 2 10.0.1.0/24 10.0.2.0/24 R1 R2 10.0.1.3 Internet 10.0.2.3 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 router# show crypto isakmp policy R1# show crypto isakmp policy Protection suite of priority 110 encryption algorithm: 3DES - Data Encryption Standard (168 bit keys). hash algorithm: Secure Hash Standard authentication method: preshared Diffie-Hellman group: #2 (1024 bit) lifetime: 86400 seconds, no volume limit Default protection suite encryption algorithm: DES - Data Encryption Standard (56 bit keys). authentication method: Rivest-Shamir-Adleman Signature Diffie-Hellman group: #1 (768 bit)

show crypto ipsec transform-set Site 1 Site 2 10.0.1.0/24 10.0.2.0/24 R1 R2 10.0.1.3 Internet 10.0.2.3 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 show crypto ipsec transform-set Displays the currently defined transform sets R1# show crypto ipsec transform-set Transform set AES_SHA: { esp-128-aes esp-sha-hmac } will negotiate = { Tunnel, },

show crypto ipsec sa Internet Site 1 Site 2 R1 R2 10.0.1.3 10.0.2.3 10.0.1.0/24 10.0.2.0/24 R1 R2 10.0.1.3 Internet 10.0.2.3 S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 R1# show crypto ipsec sa Interface: Serial0/0/0 Crypto map tag: MYMAP, local addr. 172.30.1.2 local ident (addr/mask/prot/port): (172.30.1.2/255.255.255.255/0/0) remote ident (addr/mask/prot/port): (172.30.2.2/255.255.255.255/0/0) current_peer: 172.30.2.2 PERMIT, flacs={origin_is_acl,} #pkts encaps: 21, #pkts encrypt: 21, #pkts digest 0 #pkts decaps: 21, #pkts decrypt: 21, #pkts verify 0 #send errors 0, #recv errors 0 local crypto endpt.: 172.30.1.2, remote crypto endpt.: 172.30.2.2 path mtu 1500, media mtu 1500 current outbound spi: 8AE1C9C

debug crypto isakmp This is an example of the Main Mode error message. router# debug crypto isakmp 1d00h: ISAKMP (0:1): atts are not acceptable. Next payload is 0 1d00h: ISAKMP (0:1); no offers accepted! 1d00h: ISAKMP (0:1): SA not acceptable! 1d00h: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Main Mode failed with peer at 172.30.2.2 This is an example of the Main Mode error message. The failure of Main Mode suggests that the Phase I policy does not match on both sides. Verify that the Phase I policy is on both peers and ensure that all the attributes match.

Starting a VPN Wizard 1. Click Configure in main toolbar 1 3 Wizards for IPsec Solutions, includes type of VPNs and Individual IPsec components 3 3. Choose a wizard 2 2. Click the VPN button to open the VPN page 4. Click the VPN implementation subtype VPN implementation Subtypes. Vary based On VPN wizard chosen. 4 5 5. Click the Launch the Selected Task button

VPN Components VPN Wizards VPN Components SSL VPN parameters Individual IPsec components used to build VPNs VPN Wizards SSL VPN parameters Easy VPN server parameters Public key certificate parameters Encrypt VPN passwords VPN Components

Configuring a Site-to-Site VPN Choose Configure > VPN > Site-to-Site VPN Click the Create a Site-to-Site VPN Click the Launch the Selected Task button

Site-to-Site VPN Wizard Choose the wizard mode Click Next to proceed to the configuration of parameters.

Quick Setup Configure the parameters Interface to use Peer identity information Authentication method Traffic to encrypt

Verify Parameters

Step-by-Step Wizard Choose the outside interface that is used to connect to the IPSec peer 1 Specify the IP address of the peer 2 3 Choose the authentication method and specify the credentials 4 Click Next

Creating a Custom IKE Proposal 1 2 3 Click Add to define a proposal Make the selections to configure the IKE Policy and click OK Click Next

Creating a Custom IPSec Transform Set Define and specify the transform set name, integrity algorithm, encryption algorithm, mode of operation and optional compression 2 1 Click Add 3 Click Next

Protecting Traffic Subnet to Subnet Click Protect All Traffic Between the Following subnets 1 2 3 Define the IP address and subnet mask of the local network Define the IP address and subnet mask of the remote network

Protecting Traffic Custom ACL Click the ellipses button to choose an existing ACL or create a new one 1 2 Click the Create/Select an Access-List for IPSec Traffic radio button 3 To use an existing ACL, choose the Select an Existing Rule (ACL) option. To create a new ACL, choose the Create a New Rule (ACL) and Select option

Add a Rule 1 2 Give the access rule a name and description Click Add

Configuring a New Rule Entry 1 2 3 Choose an action and enter a description of the rule entry Define the source hosts or networks in the Source Host/Network pane and the destination hosts or network in the Destination/Host Network pane (Optional) To provide protection for specific protocols, choose the specific protocol radio box and desired port numbers

Configuration Summary Click Back to modify the configuration. Click Finish to complete the configuration.

Verify VPN Configuration Choose Configure > VPN > Site-to-Site VPN > Edit Site-to-Site VPN Check VPN status. Create a mirroring configuration if no Cisco SDM is available on the peer. Test the VPN configuration.

Monitor Choose Monitor > VPN Status > IPSec Tunnels 1 Lists all IPsec tunnels, their parameters, and status.

Telecommuting Flexibility in working location and working hours Employers save on real-estate, utility and other overhead costs Succeeds if program is voluntary, subject to management discretion, and operationally feasible

Telecommuting Benefits Organizational benefits: Continuity of operations Increased responsiveness Secure, reliable, and manageable access to information Cost-effective integration of data, voice, video, and applications Increased employee productivity, satisfaction, and retention Social benefits: Increased employment opportunities for marginalized groups Less travel and commuter related stress Environmental benefits: Reduced carbon footprints, both for individual workers and organizations

Implementing Remote Access

Methods for Deploying Remote Access IPsec Remote Access VPN SSL-Based VPN Any Application Anywhere Access

Comparison of SSL and IPSec Applications Web-enabled applications, file sharing, e-mail All IP-based applications Encryption Moderate Key lengths from 40 bits to 128 bits Stronger Key lengths from 56 bits to 256 bits Authentication One-way or two-way authentication Strong Two-way authentication using shared secrets or digital certificates Ease of Use Very high Can be challenging to nontechnical users Overall Security Any device can connect Only specific devices with specific configurations can connect

SSL VPNs Internet SSL VPN Tunnel Integrated security and routing Browser-based full network SSL VPN access SSL VPN Internet Headquarters SSL VPN Tunnel Workplace Resources

Types of Access

Full Tunnel Client Access Mode

Establishing an SSL Session User makes a connection to TCP port 443 1 Router replies with a digitally signed public key 2 User using SSL client SSL VPN enabled ISR router 3 User software creates a shared-secret key Shared-secret key, encrypted with public key of the server, is sent to the router 4 Bulk encryption occurs using the shared-secret key with a symmetric encryption algorithm 5

SSL VPN Design Considerations User connectivity Router feature Infrastructure planning Implementation scope

Cisco Easy VPN Negotiates tunnel parameters Establishes tunnels according to set parameters Automatically creates a NAT / PAT and associated ACLs Authenticates users by usernames, group names, and passwords Manages security keys for encryption and decryption Authenticates, encrypts, and decrypts data through the tunnel

Cisco Easy VPN

Securing the VPN Initiate IKE Phase 1 Establish ISAKMP SA 2 Establish ISAKMP SA 3 Accept Proposal1 Username/Password Challenge 4 Username/Password 5 System Parameters Pushed Reverse Router Injection (RRI) adds a static route entry on the router for the remote clients IP address 6 7 Initiate IKE Phase 2: IPsec IPsec SA

Configuring Cisco Easy VPN Server 1 4 3 2 5

Configuring IKE Proposals Specify required parameters 2 1 Click Add Click OK 3

Creating an IPSec Transform Set 3 1 2 4

Group Authorization and Group Policy Lookup 1 Select the location where Easy VPN group policies can be stored Click Add 3 2 4 5 Click Next Click Next Configure the local group policies

Summary of Configuration Parameters

VPN Client Overview R1 R1-vpn-cluster.span.com R1 R1-vpn-cluster.span.com Establishes end-to-end, encrypted VPN tunnels for secure connectivity Compatible with all Cisco VPN products Supports the innovative Cisco Easy VPN capabilities

Establishing a Connection R1-vpn-cluster.span.com R1 “R1” Once authenticated, status changes to connected.