Quản trị mạng - Chapter 8: Implementing virtual private networks

Describe the purpose and operation of VPN types • Describe the purpose and operation of GRE VPNs • Describe the components and operations of IPsec VPNs • Configure and verify a site-to-site IPsec VPN with preshared key authentication using CLI • Configure and verify a site-to-site IPsec VPN with preshared key authentication using CCP • Configure and verify a Remote Access VPN

pdf124 trang | Chia sẻ: nguyenlam99 | Lượt xem: 911 | Lượt tải: 1download
Bạn đang xem trước 20 trang tài liệu Quản trị mạng - Chapter 8: Implementing virtual private networks, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
Chapter 8- Implementing Virtual Private Networks CCNA Security Major Concepts • Describe the purpose and operation of VPN types • Describe the purpose and operation of GRE VPNs • Describe the components and operations of IPsec VPNs • Configure and verify a site-to-site IPsec VPN with pre- shared key authentication using CLI • Configure and verify a site-to-site IPsec VPN with pre- shared key authentication using CCP • Configure and verify a Remote Access VPN Lesson Objectives Upon completion of this lesson, the successful participant will be able to: 1. Describe the purpose and operation of VPNs 2. Differentiate between the various types of VPNs 3. Identify the Cisco VPN product line and the security features of these products 4. Configure a site-to-site VPN GRE tunnel 5. Describe the IPSec protocol and its basic functions 6. Differentiate between AH and ESP 7. Describe the IKE protocol and modes 8. Describe the five steps of IPSec operation Lesson Objectives 9. Describe how to prepare IPSec by ensuring that ACLs are compatible with IPSec 10. Configure IKE policies using the CLI 11. Configure the IPSec transform sets using the CLI 12. Configure the crypto ACLs using the CLI 13. Configure and apply a crypto map using the CLI 14. Describe how to verify and troubleshoot the IPSec configuration 15. Describe how to configure IPSec using CCP 16. Configure a site-to-site VPN using the Quick Setup VPN Wizard in CCP 17. Configure a site-to-site VPN using the step-by-step VPN Wizard in CCP Lesson Objectives 18. Verify, monitor and troubleshoot VPNs using CCP 19. Describe how an increasing number of organizations are offering telecommuting options to their employees 20. Differentiate between Remote Access IPSec VPN solutions and SSL VPNs 21. Describe how SSL is used to establish a secure VPN connection 22. Describe the Cisco Easy VPN feature 23. Configure a VPN Server using SDM 24. Connect a VPN client using the Cisco VPN Client software Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com What is a VPN? Refer to 8.1.1.1 • A VPN is a private network that is created via tunneling over a public network, usually the Internet. • Instead of using a dedicated physical connection, a VPN uses virtual connections routed through the Internet from the organization to the remote site. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com What is a VPN? • Virtual ? • Private ? Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com What is a VPN? 1. What is the Tunnel ? 2. Does the VPN always include authentication and encryption ? Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com 3. How does a network administrator prevent eavesdropping of data in a VPN? Benefits of VPN 1. Cost savings: – VPNs eliminate expensive dedicated WAN links and modem banks. – Additionally, with the advent of cost-effective, high-bandwidth technologies, such as DSL, organizations can use VPNs to reduce their connectivity costs while simultaneously increasing remote connection bandwidth. 2. Security: – Use advanced encryption and authentication protocols that protect data from unauthorized access. 3. Scalability – VPNs use the Internet infrastructure. So it is easy to add new users, corporations can add significant capacity without adding significant infrastructure 4. Compatibility with broadband technology – DSL, Cable, broadband wireless Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Layer 3 VPN Refer to 8.1.1.2 • VPN can be made at either Layer 2 or Layer 3 of the OSI model. Establishing connectivity between sites over a Layer 2 or Layer 3 is the same. This chapter focuses on Layer 3 VPN technology. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Layer 3 VPN SOHO with a Cisco DSL Router VPN Internet IPSec IPSec 1. Generic routing encapsulation (GRE): point-to-point site connections 2. Multiprotocol Label Switching (MPLS): they can establish any-to-any connectivity to many sites. 3. IPSec: point-to-point site connections Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Types of VPN Networks 1. Site-to-site 2. Remote-Access Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Site-to-Site VPN Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Site-to-Site VPN • A site-to-site VPN is created when connection devices on both sides of the VPN connection are aware of the VPN configuration in advance. • The VPN remains static, and internal hosts have no knowledge that a VPN exists. • Frame Relay, ATM, GRE, and MPLS VPNs are examples of site-to-site VPNs. • In a site-to-site VPN, hosts send and receive normal TCP/IP traffic through a VPN gateway, which can be a router, firewall, Cisco VPN Concentrator, or Cisco ASA 5500 Series Adaptive Security Appliance. • The VPN gateway is responsible for encapsulating and encrypting outbound traffic from a particular site and sending it through a VPN tunnel over the Internet to a peer VPN gateway at the target site. • Upon receipt, the peer VPN gateway strips the headers, decrypts the content, and relays the packet toward the target host inside its private network Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Remote-Access VPNs Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Remote-Access VPNs • A remote-access VPN is created when VPN information is not statically set up, but instead allows for dynamically changing information and can be enabled and disabled. • Remote-access VPNs can support the needs of telecommuters, mobile users, and extranet consumer-to-business traffic. • Remote-access VPNs support a client / server architecture where a VPN client (remote host) requires secure access to the enterprise network via a VPN server device at the network edge. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com VPN Client Software R1 R1-vpn-cluster.span.com “R1” In a remote-access VPN, each host typically has Cisco VPN Client software Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Cisco IOS SSL VPN Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 8.1.2.5 Cisco IOS SSL VPN • Provides remote-access connectivity from almost any Internet-enabled host using a web browser and its native Secure Sockets Layer (SSL) encryption. • Delivers three modes of access: – Clientless: A remote client needs only an SSL-enabled web browser to access HTTP- or HTTPS- enabled web servers on the corporate LAN. – Thin client: A remote client must download a small, Java- based applet for secure access of TCP applications that use static port numbers. UDP is not supported in a thin client environment. – Full Client • SSL VPNs are appropriate for user populations that require per-application or per-server access control, or access from non-enterprise-owned desktops. SSL VPNs are not a complete replacement for IPsec VPNs. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Cisco VPN Product Family Product Choice Remote-Access VPN Site-to-Site VPN Cisco VPN-Enabled Router Secondary role Primary role Cisco PIX 500 Series Security Appliances Secondary role Primary role Cisco ASA 5500 Series Adaptive Security Appliances Primary role Secondary role Cisco VPN 3000 Series Concentrators Primary role Secondary role Home Routers (SOHO Routers) Primary role Secondary role Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com VPN Solutions Cisco provides a suite of VPN- optimized routers. Cisco IOS software for routers combines VPN services with routing services. The Cisco VPN software adds strong security using encryption and authentication The Cisco IOS feature sets incorporate many VPN features: – Voice and Video Enabled VPN (V3PN) – Ipsec stateful failover – Dynamic Multipoint Virtual Private Network (DMVPN) – Ipsec and MPLS integration – Cisco Easy VPN Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com • Voice and Video Enabled VPN (V3PN) - Integrates IP telephony, QoS, and IPsec, providing an end-to-end VPN service that helps ensure the timely delivery of latency-sensitive applications such as voice and video. • IPsec stateful failover - Provides fast and scalable network resiliency for VPN sessions between remote and central sites. With both stateless and stateful failover solutions available, such as Hot Standby Router Protocol (HSRP), IPsec stateful failover ensures maximum uptime of mission-critical VPN features applications. • Dynamic Multipoint Virtual Private Network (DMVPN) - Enables the auto-provisioning of site-to-site IPsec VPNs, combining three Cisco IOS software features: Next Hop Resolution Protocol (NHRP), multipoint GRE, and IPsec VPN. This combination eases the provisioning challenges for customers and provides secure connectivity between all locations. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com • IPsec and MPLS integration – Enables ISPs to map IPsec sessions directly into an MPLS VPN. – This solution can be deployed on co-located edge routers that are connected to a Cisco IOS software MPLS provider edge (PE) network. • Cisco Easy VPN – Simplifies VPN deployment for remote offices and teleworkers. – The Cisco Easy VPN solution centralizes VPN management across all Cisco VPN devices, thus reducing the management complexity of VPN VPN features deployments. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Cisco ASA 5500 Series Adaptive Security Appliances • Cisco ASA 5500 Series Adaptive Security Appliances offer flexible technologies that deliver tailored solutions to suit remote-access and site-to-site connectivity requirements. • These appliances provide easy-to- manage IPsec and SSL VPN-based remote-access and network-aware, site-to-site VPN connectivity • These are some of the features that Cisco ASA 5500 Series Adaptive Security Appliances provide: – Flexible platform – Resilient clustering – Cisco Easy VPN – Automatic Cisco VPN Client updates – Cisco IOS SSL VPN – VPN infrastructure for contemporary applications – Integrated web-based management Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Cisco ASA 5500 Series Adaptive Security Appliances • Each Cisco ASA 5500 Series Adaptive Security Appliance supports a number of VPN peers: – Cisco ASA 5505 - 10 IPsec VPN peers and 25 SSL VPN peers, with a Base license, and 25 VPN peers (IPsec or SSL) with the Security Plus license – Cisco ASA 5510 - 250 VPN peers – Cisco ASA 5520 - 750 VPN peers – Cisco ASA 5540 - 5000 IPsec VPN peers and 2500 SSL VPN peers – Cisco ASA 5550 - 5000 VPN peers Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com IPSec Clients Refer to 8.1.3.4 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com IPSec Clients Cisco remote-access VPNs can use four IPsec clients: • Certicom client: A wireless client that is loaded on to wireless personal digital assistants (PDAs) running the Palm or Microsoft Windows Mobile operating systems. • Cisco VPN Client software: Loaded on the PC or laptop of an individual, the Cisco VPN Client allows organizations to establish end-to- end, encrypted VPN tunnels for secure connectivity for mobile employees or teleworkers. • Cisco Remote Router VPN Client : A Cisco remote router, configured as a VPN client, that connects small office, home office (SOHO) LANs to the VPN. • Cisco AnyConnect VPN Client : Next-generation VPN client that provides remote users with secure VPN connections to the Cisco 5500 Series Adaptive Security Appliance running Cisco ASA 5500 Series Software Version 8.0 and higher or Cisco ASDM Version 6.0 and higher. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Hardware Acceleration Modules To enhance performance and offload the encryption task to specialized hardware, the Cisco VPN family of devices offers hardware acceleration modules: • AIM: Advanced integration modules are installed inside the router chassis and offload encryption tasks from the router CPU. Cisco IPsec VPN SPA • Cisco IPSec VPN Shared Port Adapter (SPA): Delivers scalable and cost-effective VPN performance for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers. • Cisco PIX VPN Accelerator Card+ (VAC+): The PIX Firewall VAC+ delivers hardware acceleration up to 425 Mb/s of DES, 3DES, or AES IPsec encryption throughput. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com GRE VPN Overview Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Encapsulation with GRE Original IP Packet Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com • Step 1. Creating a tunnel interface using the interface tunnel 0 command. • Step 2. Assigning the tunnel an IP address. • Step 3. Identifying the source tunnel interface using the tunnel source command. Configuring a GRE Tunnel • Step 4. Identifying the destination of the tunnel using the tunnel destination command. • Step 5. Configuring which protocol GRE will encapsulate using the tunnel mode gre command. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring a GRE Tunnel Create a tunnel interface Assign the tunnel an IP address R1(config)# interface tunnel 0 R1(config–if)# ip address 10.1.1.1 255.255.255.252 R1(config–if)# tunnel source serial 0/0 R1(config–if)# tunnel destination 192.168.5.5 R1(config–if)# tunnel mode gre ip R1(config–if)# R2(config)# interface tunnel 0 R2(config–if)# ip address 10.1.1.2 255.255.255.252 R2(config–if)# tunnel source serial 0/0 R2(config–if)# tunnel destination 192.168.3.3 R2(config–if)# tunnel mode gre ip R2(config–if)# Identify the source tunnel interface Identify the destination of the tunnel Configure what protocol GRE will encapsulate Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 8.2.1.3 Configuring a GRE Tunnel R1(config)# interface tunnel 0 R1(config–if)# ip address 10.1.1.1 255.255.255.252 R1(config–if)# tunnel source serial 0/0 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com R1(config–if)# tunnel destination 192.168.5.5 R1(config–if)# tunnel mode gre ip R1(config–if)# Using GRE Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 8.2.1.4 IPSec Topology Business Partner with a Cisco Router Legacy Concentrator Main Site Perimeter Router Legacy Cisco IPsec POP Refer to 8.3.1 • Works at the network layer, protecting and authenticating IP packets. – It is a framework of open standards which is algorithm-independent. – It provides security: data confidentiality, data integrity, and origin authentication. Regional Office with a Cisco PIX Firewall SOHO with a Cisco SDN/DSL Router Mobile Worker with a Cisco VPN Client on a Laptop Computer ASA PIX Firewall Corporate Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Essential security of IPsec 1. Confidentiality: IPsec ensures confidentiality by using encryption. 2. Integrity: IPsec ensures that data arrives unchanged at the destination using a hash algorithm such as MD5 or SHA. 3. Authentication: IPsec uses Internet Key Exchange (IKE) to authenticate users and devices that can carry out communication independently. IKE uses several types of authentication, including username and password, one-time password, biometrics, pre-shared keys (PSKs), and digital certificates. 4. Secure key exchange: IPsec uses the DH algorithm to provide a public key exchange method for two peers to establish a shared secret key. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com IPSec Framework Why is IPSec called a framework ? Diffie-Hellman DH7 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com IPSec Implementation Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Confidentiality Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 8.3.1.2 Integrity Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Integrity • Hashed Message Authentication Codes (HMAC) is a data integrity algorithm that guarantees the integrity of the message using a hash value. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Integrity Refer to 8.3.1.3 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Authentication Refer to 8.3.1.4 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Pre-shared Key (PSK) DH7Diffie-Hellman Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com RSA Signatures Secure Key Exchange Refer to 8.3.1.5 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com IPSec Framework Protocols All data is in plaintext.R1 R2 Authentication Header AH provides the following:  Authentication  Integrity Data payload is encrypted.R1 R2 Encapsulating Security Payload ESP provides the following:  Encryption  Authentication  Integrity Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Authentication Header Refer to 8.3.2.2 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Authentication Header Authentication Data IP Header + Data + Key R2 Hash IP Header + Data + Key DataAHIP HDR 1. The IP Header and data payload are hashed (00ABCDEF) R1 Recomputed Hash (00ABCDEF) Hash Received Hash (00ABCDEF) = DataAHIP HDR Internet 2. The hash builds a new AH header which is prepended to the original packet 3. The new packet is transmitted to the IPSec peer router 4. The peer router hashes the IP header and data payload, extracts the transmitted hash and compares Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Authentication Header • If the IP header is hashed, does that ensure to check the integrity ? Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com The AH function is applied to the entire packet, except for any mutable IP header fields that change in transit. For example, Time to Live (TTL) fields that are modified by the routers along the transmission path are mutable fields. Authentication Header •AH can have problems if the environment uses NAT. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Why ? ESP Refer to 8.3.2.3 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Function of ESP Router Router IP HDR Data IP HDR Data Internet ESP Trailer ESP Auth • Provides confidentiality with encryption • Provides integrity with authentication ESP HDRNew IP HDR IP HDR Data Authenticated Encrypted Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Function of ESP What is used for hashing ? Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com First, the payload is encrypted. Next, the encrypted payload is sent through a hash algorithm, HMAC-MD5 or HMAC- SHA-1. Anti-replay Protection • Anti-replay protection verifies that each packet is unique and is not duplicated Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 8.3.2.3 Mode Types Refer to 8.3.2.5 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Mode Types Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Security Associations • The negotiated parameters between two devices are known as a security association (SA). • An SA is a basic building block of IPsec. Security associations are maintained within a SA database (SADB), which is established by each device. A VPN has SA entries defining the IPsec encryption parameters as well as SA entries defining the key exchange parameters. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Security Associations • Security Association Database (SADB) Router# show crypto ipsec sa inbound esp sas: spi: 0x19646448(426009672) transform: esp-des , in use settings ={Tunnel, } conn id: 19, flow_id: 19, crypto map: MYMAP sa timing: remaining key lifetime (k/sec): (4431954/2604) IV size: 8 bytes 59 replay detection support: N Status: ACTIVE outbound esp sas: spi: 0x7AF99042(2063175746) transform: esp-des , in use settings ={Tunnel, } conn id: 20, flow_id: 20, crypto map: MYMAP sa timing: remaining key lifetime (k/sec): (4431953/2564) IV size: 8 bytes replay detection support: N Status: ACTIVE Internet Key Exchange (IKE) Protocol • IPsec uses the Internet Key Exchange (IKE) protocol to establish the key exchange process. • IKE is layered on UDP and uses UDP port 500 Refer to 8.3.3.1 to exchange IKE information between the security gateways. • IKE is a hybrid protocol (ISAKMP, Oakley, Skeme) Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Internet Key Exchange (IKE) Protocol Is ISAKMP the same as IKE ? Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Host A Host BR1 R2 10.0.1.3 10.0.2.3 IKE Phase 1 Exchange 1. Negotiate IKE policy sets IKE Phases Policy 15 DES MD5 Policy 10 DES MD5 1. Negotiate IKE policy sets Refer to 8.3.3.2 2. DH key exchange 3. Verify the peer identity IKE Phase 2 Exchange Negotiate IPsec policy Negotiate IPsec policy pre-share DH1 lifetime pre-share DH1 lifetime 2. DH key exchange 3. Verify the peer identity Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Policy 15 DES MD5 Policy 10 DES MD5 IKE Policy Sets Negotiate IKE Proposals Host A Host B R1 R2 10.0.1.3 10.0.2.3 IKE Phase 1 – First Exchange Negotiates matching IKE policies to protect IKE exchange pre-share DH1 lifetime pre-share DH1 lifetimePolicy 20 3DES SHA pre-share DH1 lifetime Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com IKE Phase 1 – Second Exchange Private value, XA Public value, YA Private value, XB Public value, YB Alice Bob YA YB = g mod pXBYA = g mod pXA Establish DH Key (YB ) mod p = K (YA ) mod p = K XBXA YB A DH exchange is performed to establish keying material. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com IKE Phase 1 – Third Exchange HR Servers Remote Office Corporate Office Internet Peer Authenticate Peer Peer authentication methods • PSKs • RSA signatures • RSA encrypted nonces Authentication A bidirectional IKE SA is now established. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com IKE Phase 1 – Aggressive Mode Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com 1. First packet - The initiator packages everything needed for the SA negotiation in the first message, including its DH public key. 2. Second packet - The recipient responds with the acceptable parameters, authentication IKE Phase 1 – Aggressive Mode information, and its DH public key. 3. Third packet - The initiator then sends a confirmation that it received that information. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Negotiate IPsec Security Parameters Host A Host BR1 R2 10.0.1.3 10.0.2.3 IKE Phase 2 IKE Phase 2 performs the following functions: • Negotiates IPsec security parameters, known as IPsec transform sets • Establishes IPsec SAs • Periodically renegotiates IPsec SAs to ensure security • Optionally performs an additional DH exchange Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com IKE Phase 1IKE SA IKE SA 1. Host A sends interesting traffic to Host B. 2. R1 and R2 negotiate an IKE Phase 1 session. R1 R2 10.0.2.310.0.1.3 IPSec VPN Negotiation IKE Phase 2 IPsec SAIPsec SA 3. R1 and R2 negotiate an IKE Phase 2 session. 4. Information is exchanged via IPsec tunnel. 5. The IPsec tunnel is terminated. IPsec Tunnel Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 8.4.1.1 PFS Perfect forward secrecy (PFS) is a property that states that keys used to protect data are not used to derive any other keys. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com PFS ensures that if one key is compromised, previous and subsequent keys remain secure. Internet Key Exchange (IKE) Protocol What is an alternative to using IKE ? Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Manual IPSec Manual IPSec 72 Configuring IPsec Task 1: Ensure that ACLs are compatible with IPsec. Task 2: Create ISAKMP (IKE) policy. Tasks to Configure IPsec: Refer to 8.4.2 Task 3: Configure IPsec transform set. Task 4: Create a crypto ACL. Task 5: Create and apply the crypto map. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Task 1: Configure Compatible ACLs AH ESP IKE Site 1 Site 2 10.0.1.3 10.0.2.3R1 R2 Internet 10.0.1.0/24 10.0.2.0/24 • Ensure that protocols 50 (ESP), 51 (AH) and UDP port 500 (ISAKMP) traffic are not blocked by incoming ACLs on interfaces used by IPsec. S0/0/0 172.30.1.2 S0/0/0 172.30.2.2 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Permitting Traffic Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Task 2: Configure IKE Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com ISAKMP Parameters Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Multiple Policies Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Policy Negotiations Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Crypto ISAKMP Key Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Sample Configuration Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Task 3: Configure the Transform Set Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Task 3: Configure the Transform Set Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Transform Sets Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Sample Configuration Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Task 4: Configure the Crypto ACLs Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Command Syntax Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Symmetric Crypto ACLs Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Task 5: Apply the Crypto Map Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com crypto map map-name seq-num ipsec-manual crypto map map-name seq-num ipsec-isakmp [dynamic dynamic-map-name] router(config)# crypto map Parameters Command Parameters Description Defines the name assigned to the crypto map set or indicates the name of the crypto Crypto Map Command map-name map to edit. seq-num The number assigned to the crypto map entry. ipsec-manual Indicates that ISAKMP will not be used to establish the IPsec SAs. ipsec-isakmp Indicates that ISAKMP will be used to establish the IPsec SAs. cisco (Default value) Indicates that CET will be used instead of IPsec for protecting the traffic. dynamic (Optional) Specifies that this crypto map entry references a preexisting static crypto map. If this keyword is used, none of the crypto map configuration commands are available. dynamic-map-name (Optional) Specifies the name of the dynamic crypto map set that should be used as the policy template. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Crypto Map Configuration- Mode Commands Command Description set Used with the peer, pfs, transform-set, and security-association commands. peer [hostname | ip- address] Specifies the allowed IPsec peer by IP address or hostname. pfs [group1 | group2] Specifies DH Group 1 or Group 2. Specify list of transform sets in priority order. When the ipsec-manual transform-set [set_name(s)] parameter is used with the crypto map command, then only one transform set can be defined. When the ipsec-isakmp parameter or the dynamic parameter is used with the crypto map command, up to six transform sets can be specified. security-association lifetime Sets SA lifetime parameters in seconds or kilobytes. match address [access- list-id | name] Identifies the extended ACL by its name or number. The value should match the access-list-number or name argument of a previously defined IP-extended ACL being matched. no Used to delete commands entered with the set command. exit Exits crypto map configuration mode. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Sample Configuration Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Assign the Crypto Map Set Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com CLI Commands Show Command Description show crypto map Displays configured crypto maps show crypto isakmp policy Displays configured IKE policies show crypto ipsec sa Displays established IPsec tunnels show crypto ipsec transform-set Displays configured IPsec transform sets debug crypto isakmp Debugs IKE events debug crypto ipsec Debugs IPsec events Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com show crypto map Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com show crypto isakmp policy Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com show crypto ipsec transform-set Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com show crypto ipsec sa Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com debug crypto isakmp Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Implementing Site-to-Site Ipsec VPNs with CCP Refer to 8.5 Implementing Remote-Access VPNs Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Telecommuting • Flexibility in working location and working hours • Employers save on real- estate, utility and other overhead costs • Succeeds if program is voluntary, subject to management discretion, and operationally feasible Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Telecommuting Benefits • Organizational benefits: – Continuity of operations – Increased responsiveness – Secure, reliable, and manageable access to information – Cost-effective integration of data, voice, video, and applications – Increased employee productivity, satisfaction, and retention • Social benefits: – Increased employment opportunities for marginalized groups – Less travel and commuter related stress • Environmental benefits: – Reduced carbon footprints, both for individual workers and organizations Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Implementing Remote Access Refer to 8.6.1.3 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Methods for Deploying Remote Access IPsec Remote Access VPN SSL-Based VPN Any Application Anywhere Access Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Comparison of SSL and IPSec SSL IPsec Applications Web-enabled applications, file sharing, e-mail All IP-based applications Encryption ModerateKey lengths from 40 bits to 128 bits Stronger Key lengths from 56 bits to 256 bits Authentication ModerateOne-way or two-way authentication Strong Two-way authentication using shared secrets or digital certificates Ease of Use Very high ModerateCan be challenging to nontechnical users Overall Security ModerateAny device can connect Strong Only specific devices with specific configurations can connect Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com SSL VPNs • Integrated security and routing • Browser-based full network SSL VPN access SSL VPN Headquarters Internet Workplace Resources SSL VPN Tunnel Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Types of Access Refer to 8.6.3.2 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Full Tunnel Client Access Mode Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 8.6.3.3 User using SSL client Establishing an SSL Session User makes a connection to TCP port 443 Router replies with a digitally signed public key User software creates a 1 2 3 SSL VPN enabled ISR router Shared-secret key, encrypted with public key of the server, is sent to the router Bulk encryption occurs using the shared-secret key with a symmetric encryption algorithm shared-secret key 4 5 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com SSL VPN Design Considerations • User connectivity • Router feature • Infrastructure planning • Implementation scope Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Refer to 8.6.3.5 Cisco Easy VPN Refer to 8.6.4 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Cisco Easy VPN 1. Negotiates tunnel parameters 2. Establishes tunnels according to set parameters 3. Automatically creates a NAT / PAT and associated ACLs 4. Authenticates users by usernames, group names, and passwords 5. Manages security keys for encryption and decryption 6. Authenticates, encrypts, and decrypts data through the tunnel Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Cisco Easy VPN Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Securing the VPN Initiate IKE Phase 1 Establish ISAKMP SA Accept Proposal1 Username/Password Challenge 1 2 3 4 Refer to 8.6.4.3 Username/Password System Parameters Pushed Reverse Router Injection (RRI) adds a static route entry on the router for the remote clients IP address Initiate IKE Phase 2: IPsec IPsec SA 5 6 7 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Configuring a VPN Server with CCP Refer to 8.6.5 Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com VPN Client Overview R1 R1-vpn-cluster.span.com R1 R1-vpn-cluster.span.com Refer to 8.6.6 • Establishes end-to-end, encrypted VPN tunnels for secure connectivity • Compatible with all Cisco VPN products • Supports the innovative Cisco Easy VPN capabilities Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Establishing a Connection Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Summary • A VPN is a private network that is created via tunneling over a public network, usually the Internet. • There are site-to-site VPNs and remote access VPNs. • VPNs require the use of modern encryption techniques to ensure secure transport of information. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Summary Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com • IPsec is a framework of open standards that establishes the rules for secure communications. • IPsec relies on existing algorithms to achieve encryption, authentication, and key exchange. Summary • IPsec can encapsulate a packet using either Authentication Header (AH) or the more secure Encapsulation Security Protocol (ESP). • IPsec uses the Internet Key Exchange (IKE) protocol to establish the key exchange process. Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Summary Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Summary Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com Học viện công nghệ thông tin Bach Khoa - Website: www.bkacad.com

Các file đính kèm theo tài liệu này:

  • pdfccna_security_chapter_8_vpn_495_9496.pdf
Tài liệu liên quan