Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.

Slides:



Advertisements
Similar presentations
Cisco Router as a VPN Server. Agenda VPN Categories of VPN – Secure VPNs – Trusted VPN Hardware / Software Requirement Network Diagram Basic Router Configuration.
Advertisements

Internet Protocol Security (IP Sec)
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
Building IPSEC VPNS Using Cisco Routers
Security at the Network Layer: IPSec
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Crypto – chapter 16 - noack Introduction to network stcurity Chapter 16 - Stallings.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Agenda VPN tunnels Configuration of basic core network components Maintenance of Cisco devices Exercises & troubleshooting.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Implementing Secure Converged Wide Area Networks (ISCW)
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW)
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -1/100- OfficeServ 7400 Enterprise IP Solutions Quick Install.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 Implementing Virtual Private Networks.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Creating an IPsec VPN using IOS command syntax. What is IPSec IPsec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
RE © 2003, Cisco Systems, Inc. All rights reserved.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
Implementing VPN Solutions Laurel Boyer, CCIE 4918 Presented, June 2003.
© 2003, Cisco Systems, Inc. All rights reserved. FNS 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Implementing Secure Converged Wide Area Networks (ISCW) Module 3.2.
406 NW’98 1 © 1998, Cisco Systems, Inc. IPSec Loss of Privacy Security Threats Impersonation Loss of Integrity Denial of Service m-y-p-a-s-s-w-o-r-d.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Advanced Unix 25 Oct 2005 An Introduction to IPsec.
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 Module 3 City College of San.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 4: Securing IP.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
Chapter 8: Implementing Virtual Private Networks
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 2 ver.2 Module 4 City College.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
18 July 2004Bill Nickless / IPSec1 IPSec Internet Protocol Security And You.
Attacking IPsec VPNs Charles D George Jr. Overview Internet Protocol Security (IPSec) is a suite of protocols for authenticating and encrypting packets.
IPSec VPN: How does it really work? Yasushi Kono (ComputerLinks Frankfurt)
Implementing Secure Converged Wide Area Networks (ISCW) Module 3.3.
1 CMPT 471 Networking II Authentication and Encryption © Janice Regan,
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
IPSec VPN Chapter 13 of Malik. 2 Outline Types of IPsec VPNs IKE (or Internet Key Exchange) protocol.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Virtual Private Network Configuration
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
© 2012 Cisco and/or its affiliates. All rights reserved. 1 IPsec.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
WELCOME LAN TO LAN VPN LAN to LAN VPN also known as Site to Site VPN is the most basic and the most simplest of all the VPN’s used on CISCO devices. It.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Module 4: Configuring Site to Site VPN with Pre-shared keys
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
CSE 4905 IPsec II.
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Presentation transcript:

Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005

IPsec – An Introduction  IPsec is a suite of protocols used to create virtual private networks (VPNs)  Creates encrypted tunnel between 2 private networks  Authenticates both ends of the tunnel

IPsec – An Introduction (Cont’d)  Can choose what traffic to encrypt and how to encrypt it  Encapsulates and encrypts IP data only (can use GRE for non-IP traffic)  IPsec is composed of the following main protocols:  Internet Key Exchange (IKE) protocol  Encapsulating Security Payload (ESP) protocol  Authentication Header (AH) protocol

IPsec - Fundamental Mechanisms  Packet Encapsulation Encapsulating Security Payload (ESP) - encrypts and authenticates data Authentication Header (AH) – authenticates data and header Tunnel mode - new IP header appended in front of original IP header of packet Transport mode - uses original IP header of packet  Encryption Uses symmetric key algorithms DES or 3DES  Integrity Checking Uses Message Authentication Codes using Hashing (HMAC) Hashing algorithms used are MD5 or SHA-1

IPsec Implementation  LAN-to-LAN IPsec VPN Also called site-to-site IPsec VPN Merges 2 private networks across a public network Appears as one virtual network with shared resources

IKE – An Introduction  Responsible for negotiating the details of the IPsec tunnel between the 2 peers  Main functions of IKE in IPsec: Negotiate protocol parameters Exchanging public keys Authenticate both ends Managing keys after exchange

How IKE Works  IKE is a two phase protocol Phase 1  Uses main mode or aggressive mode exchanges between peers  Negotiates a secure, authenticated communication channel between the IPsec peers Phase 2  Uses quick mode exchanges between peers  Negotiates security associations for the IPsec services

IKE - Main Mode  The main functions of the main mode (or aggressive mode) are: Agree on a set of parameters that will be used to authenticate the 2 IPsec peers Agree on a set of parameters that will be used to encrypt a part of the main mode and all of the quick mode exchange. Authenticate the 2 IPsec peers to each other Generate keys that can be used to generate the necessary data encryption keys after negotiations are done.

IKE - Main Mode (Cont’d)  All the information negotiated in main mode is stored as an IKE or ISAKMP security association (SA).  There is only one SA between any 2 IPsec peers.

IKE - Quick Mode  The main functions of the quick mode are: Agree on a set of parameters for creating the IPsec SAs used to encrypt (for ESP) the data between the 2 peers If Perfect Forward Secrecy (FPS) is being used, performs another Diffie-Hellman (DH) exchange to generate new keys for generating the data encryption keys

IKE Authentication Mechanisms  Preshared Keys Define the same key on both IPsec peers Simple but not scalable  Digital Signatures Uses public/private key pairs generated on both IPsec peers Public key is exchanged using a digital certificate that also contains sender info Certificate issued by a certificate authority (CA) server  Encrypted Nonces Pseudo-random numbers are encrypted and exchanged by the IPsec peers

IPsec Negotiation Using IKE  IKE negotiates IPsec tunnels between IPsec peers using one of three main methods: 1.Main mode using preshared key authentication followed by quick mode negotiation 2.Main mode using digital signature authentication followed by quick mode negotiation 3.Aggressive mode using preshared key authentication followed by quick mode negotiation

Configuration of LAN-to-LAN IPsec - Network Diagram Initiator Responder / /24  Cisco Routers R1 and R2 both running IOS version T11 (including support for IPsec and 3DES)  Cisco Catalyst Switch running IOS version (EA1a)

Configuration of LAN-to-LAN IPsec - Setup of Routers  Step 1: Ensure that IKE is enabled Router(config)# crypto isakmp enable  Step 2: Create the ISAKMP policy which defines the attributes negotiated between the peers for the IKE SA Router(config)# crypto isakmp policy 1 Router(config-isakmp)# encryption 3des Router(config-isakmp)# hash md5 Router(config-isakmp)# authentication pre-share Router(config-isakmp)# group 1 Router(config-isakmp)# lifetime priority

Configuration of LAN-to-LAN IPsec - Setup of Routers (Cont’d)  Step 3: Define the pre-shared key and the IP address of the IPsec peer Router(config)# crypto isakmp key 42DB72B3 address  Step 4: Define a transform-set for use with IPsec as follows: Router(config)# crypto ipsec transform-set myset1 esp-3des esp-md5-hmac  Step 5: Define the mode associated with the transform-set (optional) Router(cfg-crypto-tran)# mode tunnel

Configuration of LAN-to-LAN IPsec - Setup of Routers (Cont’d)  Step 6: Define an access list which specifies the interesting traffic for IPsec Can be used to specify “interesting” traffic for IPsec Router(config)# access-list 101 permit ip  Step 7: Define a crypto map The crypto map links together all of the details of the IPsec configuration Router(config)# crypto map mymap1 ipsec-isakmp

Configuration of LAN-to-LAN IPsec - Setup of Routers (Cont’d)  Step 8: Within the identified crypto map, define the IP address of the IPsec peer Router(config-crypto-m)# set peer  Step 9: Within the identified crypto map, define which transform-set is to be used with this crypto map Router(config-crypto-m)# set transform-set myset1  Step 10: Within the identified crypto map, define which access list is to be used with this crypto map Router(config-crypto-m)# match address access-list 101

Configuration of LAN-to-LAN IPsec - Setup of Routers (Cont’d)  Step 11: Assign the crypto map to the specific interface of the router on which IPsec traffic will flow Router(config)# interface Ethernet 0/0 Router(config-if)# crypto map mymap1  Step 12: Verify that the defined policy, transform-set, and pre-shared key are the same on both IPsec peers

Configuration of LAN-to-LAN IPsec – Viewing IPsec attributes  Assigned IPsec attributes can be viewed using following commands: Router# show crypto isakmp policy Router# show crypto isakmp sa Router# show crypto isakmp key Router# show crypto ipsec transform-set Router# show crypto map Router# show crypto ipsec sa Router# show crypto ipsec security-association lifetime

Configuration of LAN-to-LAN IPsec – Screenshot1 of Router 1 crypto

Configuration of LAN-to-LAN IPsec – Screenshot2 of Router 1 crypto

Configuration of LAN-to-LAN IPsec – Screenshot1 of Router 1 config

Configuration of LAN-to-LAN IPsec – Screenshot2 of Router 1 config

Configuration of LAN-to-LAN IPsec – Screenshot3 of Router 1 config

Configuration of LAN-to-LAN IPsec – Screenshot1 of Router 2 crypto

Configuration of LAN-to-LAN IPsec – Screenshot2 of Router 2 crypto

Configuration of LAN-to-LAN IPsec – Screenshot1 of Router 2 config

Configuration of LAN-to-LAN IPsec – Screenshot2 of Router 2 config

Configuration of LAN-to-LAN IPsec – Screenshot3 of Router 2 config

Configuration of LAN-to-LAN IPsec Debug output on router 1 (initiator)

Configuration of LAN-to-LAN IPsec Debug output on router 1 (cont’d)

Configuration of LAN-to-LAN IPsec Debug output on router 2 (responder)

Configuration of LAN-to-LAN IPsec Debug output on router 2 (cont’d)

References  Network Security Principles and Practices by Saadat Malik  Cisco IOS Security Configuration Guide, Release 12.2  Cisco IOS Security Command Reference, Release 12.2  Cisco IOS Configuration Fundamental Configuration Guide, Release 12.2  Cisco IOS Interface Command Reference, Release 12.2