E N D
1. CiscoVPN Solutions
2. Agenda Introduction to IPSec
IPSec VPN Topologies
Cisco Site-to-Site VPN Solutions
3. IPSec Design Guide
4. IPSec Overview Initiating the IPSec session
Phase one—exchanging keys
Phase two—setting up security associations
Encrypting/decrypting packets
Rebuilding security associations
Timing out security associations
Simple IPSec configuration
5. Initiating the IPSec SessionPhase One—ISAKMP Internet Security Association Key Management Protocol (ISAKMP)
Both sides need to agree on the ISAKMP security parameters
ISAKMP parameters
Encryption algorithm
Hash algorithm
Authentication method
Diffie-Hellman modulus
Group lifetime Protection suite of priority 1
encryption algorithm: Three key triple DES
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite
encryption algorithm: DES - Data Encryption Standard (56 bit keys).
hash algorithm: Secure Hash Standard
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limitProtection suite of priority 1
encryption algorithm: Three key triple DES
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite
encryption algorithm: DES - Data Encryption Standard (56 bit keys).
hash algorithm: Secure Hash Standard
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limit
6. Initiating the IPSec SessionPhase Two—IPSec Both sides need to agree on the IPSec security parameters
IPSec parameters
IPSec peer
Endpoint of IPSec tunnel
IPSec proxy
Traffic to be encrypted/decrypted
IPSec transform
Encryption and hashing
IPSec lifetime
Phase two SA regeneration time SA’s will regenerate behind the scenes
7206BA#sh crypto ipsec security-association-lifetime
Security association lifetime: 4608000 kilobytes/3600 secondsSA’s will regenerate behind the scenes
7206BA#sh crypto ipsec security-association-lifetime
Security association lifetime: 4608000 kilobytes/3600 seconds
7. Encrypting andDecrypting Packets Phase one and phase two completes
Security Associations (SA) are created at both IPSec endpoints
Using the negotiated SA information
Outbound packets are encrypted
Inbound packets are decrypted
8. RebuildingSecurity Associations To ensure that keys are not compromised they are periodically refreshed
Security associations will be rebuilt when:
The lifetime expires, or
Data volume has been exceeded, or
Another SA is attempted with identical parameters Protection suite of priority 1
encryption algorithm: Three key triple DES
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite
encryption algorithm: DES - Data Encryption Standard (56 bit keys).
hash algorithm: Secure Hash Standard
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limitProtection suite of priority 1
encryption algorithm: Three key triple DES
hash algorithm: Secure Hash Standard
authentication method: Pre-Shared Key
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limit
Default protection suite
encryption algorithm: DES - Data Encryption Standard (56 bit keys).
hash algorithm: Secure Hash Standard
authentication method: Rivest-Shamir-Adleman Signature
Diffie-Hellman group: #1 (768 bit)
lifetime: 86400 seconds, no volume limit
9. Simple IPSec Configuration
10. Topologies
11. GRE Over IPSec(Common Configuration Issues) Apply crypto map on both the tunnel interfaces and the physical interfaces
Specify GRE traffic as IPSec interesting traffic.
access-list 101 permit gre host 200.1.1.1 host 150.1.1.1
Static or dynamic routing is needed to send VPN traffic to the GRE tunnel before it gets encrypted.
12. GRE over IPSec (Avoid Recursive Routing) To avoid GRE tunnel interface damping due to recursive routing, keep transport and passenger routing info. separate:
Use different routing protocols or separate routing protocol identifiers
Keep tunnel IP address and actual IP network addresses ranges distinct
For tunnel interface IP address, don’t use unnumbered to loopback interface when the loopback’s IP address resides in the ISP address space
13. GRE over IPsec (MTU Issues) Overhead calculation of GRE over IPSec (assume ESP-DES & ESP-MD5-HMAC):
ESP overhead (with authentication) : 31 ~ 38 bytes
GRE header: 24 bytes
IP header: 20 byes
GRE over IPSec with tunnel mode introduces ~75 bytes overhead, GRE over IPSec with transport mode introduces ~55 bytes overhead
14. GRE over IPSec
15. GRE over IPSec (MTU Issues) After GRE tunnel encapsulation, the packets will be sent to physical interface with DF bit set to 0
The GRE packets will then be encrypted at physical interface; if IPSec overhead causes final IPSec packets to be bigger than the interface MTU, the router will fragment the packets
The remote router will need to reassemble the fragmented IPSec packets (process switched) which causes performance degradation
16. GRE over IPSec (MTU issue) To avoid fragementation and reassembly of IPSec packets:
Set ip mtu 1420 (GRE/IPSec tunnel mode), ip mtu 1440 (GRE/IPSec transport mode) under tunnel interface.
Enable “tunnel path-mtu-discovery” (DF bit copied after GRE encapsulation) under tunnel interface.
Use “show ip int switching” to verify switching path
17. GRE IPSec Config
18. GRE IPSEC Config continued
19. GRE IPSEC Config continued
20. GRE IPSEC Config continued
21. Preventing Traffic Injection ACL on the physical interface
Even better, VRF lite !
22. VPN Types and Applications
23. VPN Requirements Vary By Application Site-to-site VPNs and remote access VPNs tend to have different requirements
Site-to-site VPNs and remote access VPNs tend to have different requirements
24. Cisco VPN PortfolioPurpose-Built for Specific VPN Environments
25. VPN Product Function Matrix
26. Cisco IOS SoftwareEnhanced VPN Software Features Quality of Service
Application-aware packet classification
Congestion management and packet queuing
Traffic shaping and policing
Stateful IOS Firewall
Per application content filtering and Java blocking
Denial of service protection and intrusion detection
Time-based ACLs
VPN Resiliency
Dynamic Route Recovery - using routing protocols through IPSec secured GRE tunnel
Dynamic Tunnel Recovery - IPSec Keep-Alives
Full Layer 3 Routing and Broad Interface Support
EIGRP, BGP, OSPF, and others
Numerous LAN and WAN interfaces
27. Cisco Site-to-Site VPN SolutionsScalability for Every Site
28. VPN-Enabled Broadband Routers
29. VPN-Enabled Routers
30. VPN-Enabled Routers
31. 2650 Enhanced Performance VPN Module AIM-VPN/EP Enhanced Performance Module
Delivers 14 Mbps 3DES performance
New AIM-VPN/EP is specially designed to take advantage of the 2650 High Performance Router
This VPN Module is being offered in addition to our present AIM-VPN/BP (Base Performance Module)
Supported on all 2600 platforms
32. VPN Acceleration Module (VAM) for 7100/7200 Greater than DS3 encryption performance
145 Mbps 3DES IPSec performance for scalable site-to-site encryption
Allows large number of VPN Tunnels
5000 simultaneous IPSec sessions
Fast VPN tunnel setup time
Hardware acceleration for RSA: Tunnel setup & key generation
Compression for bandwidth conservation
Hardware acceleration for IPPCP LZS compression
33. VPN Management VPN Device Manager
Embedded web single device policy manager
VPN Management Solutions
Enterprise VPN monitoring & policy manager
Cisco Secure Policy Manager
Centralized, intelligent security policy management for firewall and VPN
Telnet/SSH/rlogin/rsh/rcp CLI, tftp, MIBs
34. Site-to-Site VPN Platform Summary Comprehensive Suite of Site-to-Site VPN Features
Supports the most diverse VPN environments
High Performance VPN
Up to 145 Mbps 3DES/HMAC-SHA1 IPSec
Up to 5,000 simultaneous tunnels
Site Specific VPN Scalability
DSL, Cable, & ISDN VPN routers
Ethernet-to-Ethernet broadband routers
Network Management Tailored for Site-to-Site Applications
35. For More Information... http://www.cisco.com/GO/VPN