DEPLOYING SITE-TO-SITE IPSEC VPNS
|
|
|
- Lisa Blair
- 9 years ago
- Views:
Transcription
1 DEPLOYING SITE-TO-SITE IPSEC VPNS SESSION 1 IPSEC REMAINS THE DOMINANT TUNNELING AND ENCRYPTION TECHNOLOGY FOR VPNS. INFONETICS RESEARCH REPORT Q303 IPSec Remains the Dominant Tunneling and Encryption Technology for VPNs, but MPLS and SSL Are Now Having a Mainstream Impact; Users Are Wary of MPLS Deployed with No Encryption, So IPSec Will Sell Well as a Complement to MPLS, and SSL Can Only Satisfy a Portion of the total VPN Market (Remote Access and Extranet); Ultimately these Technologies Will All Co-operate in a VPN Ecosystem 2 Printed in USA.
2 Other VPN Sessions SEC-1000: Introduction to Network Security SEC-2006: Managing Security Technologies SEC-2010: Deploying Remote-Access IPSec VPNs SEC-3010: Troubleshooting Cisco IOS and PIX-Firewall Based IPSec Implementations SEC-3011: Troubleshooting VPN 3000 IPSec Implementations SEC-4010: Advanced IPSec Algorithms and Protocols SEC-4011: Deploying Complex and Large Scale IPSec VPNs 3 APPLICATION OF SITE-TO-SITE IPSEC VPN 4 Printed in USA.
3 What Are We Talking About? Secure IPSec VPN A I m A Here Is My Proof Authority Identity Authentication and Trust B I m B Here Is My Proof PKI Proposals Key Generation Key Management Security Association IPSec VPN Tunnel ISAKMP and IKE Proposals IPSec Encryption Algorithms and Standards Hash Algorithms Tunneling Technology Cryptography Building Blocks A B Needs Secure Communications over Insecure Channel 5 WAN Replacement Using Site-to-Site IPSec VPNs Intranet Branch/Remote Office Frame Internet Relay WAN VPN Network Extranet Business-to-Business POP DSL Cable Central Site 6 Printed in USA.
4 WAN Backup Using Site-to-Site IPSec VPNs Intranet Branch/Remote Office Extranet Business-to-Business VPN VPN Frame Relay WAN Network Internet VPN PSTN/ISDN Broadband VPN VPN Central Site 7 Regulatory Encryption Using Site-to-Site IPSec VPNs By law, encryption is required to protect data such as medical records (HIPPA), Corporate or Personal Financial data, academic records even if another VPN technology is used (Frame Relay, MPLS VPN) Intranet Branch/Remote Office Frame Relay or MPLS VPNs Extranet Business-to-Business 8 Printed in USA.
5 DESIGN CONSIDERATIONS 9 Design Topics for Consideration IP addressing Routing Security Device authentication Migration Security policy enforcement Access control Scalability Device placement Performance Best products for function High availability QoS Management Interoperability 10 Printed in USA.
6 Design Considerations: IP Addressing and Routing IP Addressing IPSec VPN is an overlays on existing IP network; VPN device needs routable IP address, Private IP address space can be used across VPN Design VPN address space to allow summarization NAT is not required or bypassed for VPN traffic Routing Routing required to forward encrypted and un-encrypted traffic appropriately Large-scale networks require dynamic routing 11 Design Considerations: Security Components of a VPN Packet IPSec Tunnel Packet L3 L7 Inspection IDS/FW IPSec L3 Filtering (Stateless) Network Transport L3 Filtering (Stateless) IPSec L3 L7 Inspection IDS/FW Peer Authentication Packet Integrity Data Encryption Session Re-Keying Apply Defense in Depth model to VPN designs Intranet and extranet consideration 12 Printed in USA.
7 B A N K Design Considerations: Cryptographic Options RFC IPSec Implementation Secure VPN IPSec Many Safeguards Hides Networks Transparent Tunneling Encryption Authentication Integrity IPSec GRE DES Triple DES AES RSA Digital Certificates Pre-shared Key HMAC-MD5 HMAC-SHA-1 13 Design Considerations: VPN Device Authentication Pre-shared keys Tied to unique IP address, not highly scalable, moderate difficulty to deploy Wildcard pre-shared keys Any device may use regardless of IP address, insecure since if the key is compromised all devices can be tunneled to, extremely easy to deploy Digital certificates Highly scalable, initial investment significant, very secure, non-repudiation option, not tied to IP address 14 Printed in USA.
8 Design Considerations: Migration Migration from traditional WAN Generally Internet access via a router and/or firewall already exists If existing Internet WAN link is used for VPN as well, augment bandwidth to accommodate extra VPN traffic and QoS may be required Policy routing may be necessary during a phased migration approach 15 Design Considerations: Scaling, Sizing and Performance: I Head-end VPN Device sizing consideration factors: Total number of remote sites, tunnels VPN traffic throughput Features: routing protocols, GRE, Firewall, QoS Scalability The head-end design must scale to support future load requirements Consider integrated verses purposedefined devices Routing, resilience, load balancing, and the WAN connection are all key factors 16 Printed in USA.
9 Design Considerations: Scaling, Sizing and Performance: II A head-end device should not be deployed in a configuration that results in CPU utilization higher than 50% after failure The 50% target includes all overhead incurred by IPSec and any other enabled features (firewall, routing, IDS, logging, etc.) Branch devices should not be taxed above 65% CPU utilization 17 Cisco VPN Security Router Performance Cisco VPN Security Router Cisco SOHO 90 Cisco 830 Cisco 1700 with VPN Module Cisco 2600XM with AIM-VPN/BPII Cisco 2691 with AIM-VPN/EPII Cisco 3725 with AIM-VPN/EPII Cisco 3745 with AIM-VPN/EPII Cisco 7200VXR with a single SA- VAM2 Cisco 7301 with SA-VAM2 Cisco Catalyst 6500/7600 with a single VPNSM Max Tunnels DES Throughput 1 Mbps 7 Mbps 15 Mbps 22 Mbps 150 Mbps 186 Mbps 190 Mbps 260 Mbps 370 Mbps 1.9 Gbps AES Throughput N/A 2 Mbps N/A 22 Mbps 150 Mbps 186 Mbps 190 Mbps 260 Mbps 370 Mbps N/A 18 Printed in USA.
10 Performance: Features and Packet Sizes Throughput Unencrypted Firewall Unencrypted QoS 3DES-SHA/Software 3DES-SHA/Hardware IPsec/FW IPsec/QoS IPsec/QoS/FW GRE 3DES-SHA VPN Headend and Branch Device Consideration Cisco 1700 Series Cisco PIX 506-E Cisco VPN 3005 Remote Office T-1/E-1 Cisco 7200/7300/6500 Series Cisco PIX 535 Cisco VPN 3080 Cisco 2600/3600 Series Cisco PIX 515-E Cisco VPN 3030/3060 nxt-1/e-1 Regional Office Broadband Central Office Cisco 800/900 Series Cisco PIX 501 Cisco VPN3002 Home Office 20 Printed in USA.
11 Design Consideration: Topology Peer-to-peer Hub and spoke Most common topology Scales well, o(n) Performance penalty due to two encryption/decryption cycles Mesh Partial Compared to hub and spoke topology, more direct spoke to spoke communications Mesh Full Scaling issues: IPSec tunnels grow exponentially as number of sites increases Difficult to provision 21 IPSec Site to Site VPN Solutions: Productivity at Low Cost for ALL Situations DYNAMIC MULTIPOINT IPSEC VPNS Simplified Scaling and Mgmt. Traffic-based dynamic tunnels DYNAMIC MULTIPOINT VPN: On-Demand VPNs Enhanced Service ROUTED GRE/IPSEC The power of IOS networking applied to VPNs Full routing, application support, instrumentation STANDARD IPSEC: Interoperability EASY VPN: Ease of Deployment STANDARD IPSEC Full standards compliance Interoperates with other vendors EXAMPLE: EXTRANET VPN ROUTED GRE/IPSEC: Proven IOS Networking EASY VPN IPSEC Policy Push for Easy Deployment High Scalability at Low Cost Improved Productivity 22 Printed in USA.
12 Design Consideration: VPN Device Placement VPN Device Parallel to Firewall VPN Device DMZ of Firewall VPN Device Integrated with Firewall/IDS 23 VPN Device: Parallel to Firewall Stateless L3 Filtering (IKE,ESP) VPN Termination VPN Focused Layer 4 77 Analysis To WAN Edge To Campus Monitoring Internet Traffic DMZ Layer Stateful Inspection and Filtering DOS Mitigation 24 Printed in USA.
13 Design Summary ADVANTAGES DISADVANTAGES Simplifies migration task VPN device addition Easy device management High scalability stack VPN devices IPSec decrypted traffic is NOT firewall inspected Lacks stateful inspection unless VPN device supports it No centralized point of logging/content inspection 25 VPN Device: DMZ of Firewall Stateless L3 Filtering (IKE,ESP) VPN VPN Termination Focused Layer 4 77 Analysis To WAN Edge To Campus Monitoring Internet Traffic DMZ Layer Stateful Inspection and Filtering DOS Mitigation 26 Printed in USA.
14 Design Summary ADVANTAGES Abides to the layered security model and enforces security policies that require firewalling Easy management with additional device Migration relatively straight-forward with addition of LAN interface to firewall Moderate-to-high scalability as we stack VPN devices DISADVANTAGES Configuration complexity increases additional configuration on firewall Firewall must support policy routing to differentiate VPN verses non-vpn traffic Firewall may impose bandwidth restrictions on stacks of VPN devices 27 VPN Device: Integrated with Firewall/IDS To WAN Edge To Campus DMZ To WAN Edge DMZ To Campus To WAN Edge To Campus 28 Printed in USA.
15 Design Summary ADVANTAGES Abides to the layered security model and enforces security policies that require firewalling Migration relatively straightforward with addition of VPN feature set to firewall Same number of devices to manage DISADVANTAGES Scalability can be an issue as single device must scale to meet performance requirements of multiple features Complex configuration, many eggs in one basket 29 VPN Device: Placement Overview High Availability Scalability Management Defense in Depth Performance Consolidated Solution VPN Device Parallel to FW Above Average Superior Superior Below Average Superior Below Average VPN Device DMZ of FW Superior Superior Superior Superior Superior Below Average VPN Device Integrated with FW/IDS Superior Above Average Superior Superior Superior Superior VPN Device Choice for Site to Site IPSec VPN: 1. Cisco IOS Router Platform 2. Cisco Secure PIX Firewall 3. Cisco VPN3000 Concentrator 30 Printed in USA.
16 DEPLOYMENT SCENARIOS 31 Site-to-Site VPN Deployment Scenarios Basic peer-to-peer topology Basic site-to-site IPSec configuration Static vs. dynamic mapping Crypto ACL consideration Split tunneling consideration Access control Hub and spoke topology GRE over IPSec Partial/Fully Mesh Topology Dynamic Multipoint VPN (DMVPN) 32 Printed in USA.
17 Peer-to-Peer Configuration: IKE (Phase I) Policy Backbone Router1 Router / /24 crypto isakmp policy 1 authentication pre-shared hash sha encr aes 128 group 2 crypto isakmp key df*li^gj*al address netmask crypto isakmp policy 1 authentication pre-shared hash sha encr aes 128 group 2 crypto isakmp key df*li^gj*al address netmask IPSec (Phase II) Policy Backbone Router1 Router / /24 crypto ipsec transform-set aes_sha espaes 128 esp-sha-hmac access-list 101 permit ip crypto map VPN_To_R2 10 ipsec-isakmp set peer match address 101 set transform-set aes_sha crypto ipsec transform-set aes_sha esp-aes 128 esp-sha-hmac access-list 101 permit ip crypto map VPN_To_R1 10 ipsec-isakmp set peer match address 101 set transform-set aes_sha 34 Printed in USA.
18 Apply VPN Configuration Backbone Router1 Router / /24 interface serial 1/0 ip address crypto map VPN_To_R2 interface serial 3/0 ip address crypto map VPN_To_R1 ip route ip route PIX Firewall Site-to-Site VPN Configuration isakmp policy 1 authentication pre-share isakmp policy 1 encryption 3des isakmp policy 1 hash md5 isakmp policy 1 group 2 isakmp policy 1 lifetime isakmp key ********** address netmask access-list vpnacl permit ip crypto ipsec transform-set myset esp-3des esp-md5-hmac crypto map vpnmap 1 ipsec-isakmp crypto map vpnmap 1 match address vpnacl crypto map vpnmap 1 set peer crypto map vpnmap 1 set transform-set myset access-list bypass_nat permit ip nat (inside) 0 access-list bypass_nat sysopt connection permit-ipsec isakmp enable outside crypto map vpnmap interface outside Define IKE (phase I) policy Define IPSec (phase II) Policy Bypass NAT Allow VPN through Apply tunnel 36 Printed in USA.
19 VPN 3000 Concentrator Configuration 37 VPN 3000 Concentrator (Cont.) 38 Printed in USA.
20 Static vs. Dynamic Crypto Map Site_A Site_B ISP Dynamic Crypto Map crypto map vpn 10 IPSec-isamkp dynamic dynamap crypto dynamic-map dynamap 10 set transform-set match address Static Crypto Map crypto map vpn 10 IPSec-isakmp set peer Site_A set transform-set match address 101 crypto map vpn 20 IPSec-isakmp set peer Site_B set transform-set match address Static vs. Dynamic Crypto Map (Cont.) STATIC CRYPTO MAP Need to VPN peer, crypto ACL, IPSec transform-set Use multiple crypto map instances to define multiple VPN peers Bi-directional tunnel initiation Requires more intensive management, deployment and troubleshooting DYNAMIC CRYPTO MAP Only need to configure IPSec transform-set, crypto ACL is optional One dynamic map as a template Only the remote peer can initiate tunnel Used when remote peer has dynamic IP address Simple to manage and deploy 40 Printed in USA.
21 Crypto ACL Consideration: Cisco IOS and PIX Firewall Crypto ACL defines IPSec SA proxy identities which specifies what data traffic IPSec protects Cisco IOS/VPNSM/PIX use access-list which supports L3/L4 protocol, L4 Ports, port ranges, IP address, IP subnets, subnet ranges Only use the any keyword once in a given ACL entry Take care to match more specific ACL entries first Never use any any 41 Crypto ACL Consideration: VPN 3000 Concentrator VPN 3000 uses network lists which support only IP address, subnets, subnet ranges Auto Discovery in conjunction with routing can be enabled to automatically exchange crypto network list between VPN peers Crypto ACL: / /24 Internet RIP / /24 42 Printed in USA.
22 IPSec SA Scalability: Crypto ACL Summarization ISP Internet access-list 199 permit tcp range any eq www Six SAs access-list 101 permit ip access-list 101 permit ip access-list 101 permit ip Two SAs: access-list 101 permit ip any Each ACL entry corresponds to two IPSec SAs Plan VPN addressing scheme carefully so that crypto ACL can be summarized: Reduce configuration Improve IPSec SA performance 43 Split Tunneling Definition: Split tunneling is the ability of a device to forward clear and encrypted traffic at the same time over the same interface Without Split Tunneling Central Site With Split Tunneling Central Site VPN Head End VPN VPN Head End VPN 44 Printed in USA.
23 Split Tunneling (Cont.) Split Tunnel Policy Allowed Corporate Network Bound Traffic Via Tunnel Internet Bound Traffic Via Internet Disallowed Via Tunnel Via Tunnel In Site-to-Site VPN, Use routing and crypto ACL to control split tunneling Enabling split tunneling on spoke site can reduce load on head end; use firewalls on spoke site to secure spoke VPN devices 45 Filtering/Access Control When filtering at the edge there s not much to see IKE UDP port 500 ESP, AH IP Protocol numbers 50,51 respectively NAT Transparency Enabled UDP port 4500 Internal access control should be implemented via the internal interface ACLs or group policy and not the crypto ACLs for the performance reasons 46 Printed in USA.
24 Current Inbound Encrypted Packet Flow 5 Packet Forwarding IPSec Decryption 3 inbound ACL drop 2 Reverse Crypto Map ACL 1 Layer 2 Decapsulation Arriving IP packet Is checked against reverse of Crypto Map ACL. If denied then packet is dropped, because it was not encrypted, but it should have been IP packet is checked against interface inbound ACL; If denied it is dropped If IP packet is encrypted it is then decrypted Just decrypted IP packet is again checked against interface inbound ACL, if denied it is dropped Just decrypted and not encrypted IP packets permitted by interface inbound ACL are forwarded 4 drop 47 Current Outbound Encrypted Packet Flow 1 Crypto Map ACL 2 Outbound ACL IPSec Encryption Layer 2 Encapsulation drop Departing IP packet is checked against Crypto Map ACL, if permitted it is marked for encryption All IP packets are checked against outbound interface ACL; If denied they are dropped IP packets not marked for encryption are Layer-2 encapsulated IP packets marked for encryption are encrypted Encrypted IP packets are Layer-2 encapsulated 48 Printed in USA.
25 New Inbound Encrypted Packet Flow 2 3 Packet Forwarding 6 Inbound Access Crypto Map ACL 5 3 IPSec Decryption 4 inbound ACL 2 Reverse Crypto Map ACL 1 Layer 2 Decapsulation drop 1 Arriving IP packet Is checked against reverse of Crypto Map ACL; If denied then packet is dropped, because it was not encrypted, but it should have been IP packet is checked against interface inbound ACL; If denied it is dropped If IP packet is not encrypted it is forwarded drop drop 4 If IP packet is encrypted it is then decrypted 5 Just decrypted IP packet is checked against Inbound Access Crypto Map ACL (optional), if denied it is dropped 6 Just decrypted IP packet is forwarded 49 New Outbound Encrypted Packet Flow 1 Crypto Map ACL 3 Outbound Access Crypto Map ACL 2 IPSec Encryption 4 5 Outbound ACL drop 6 Layer 2 Encapsulation drop All departing IP packets are checked against Crypto Map ACL, if permitted they are marked for encryption IP packets unmarked for encryption are checked against outbound interface ACL; If denied they are dropped IP packets marked for encryption are checked against Outbound Access Crypto Map ACL (optional); If denied they are dropped Permitted IP packets are encrypted 5 Encrypted IP packets are checked against outbound interface ACL. If denied they are dropped 6 Permitted IP packets are Layer-2 encapsulated 50 Printed in USA.
26 IPSec ACL Configuration Example1: / / Internet A IPSec Tunnel B Only allow encrypted host traffic between hosts on /24 and /24 No clear-text traffic from Internet to any host 51 Current IPSec ACL Configuration Example 1: Router A crypto map vpnmap 10 ipsec-isakmp set peer set transform-set trans1 match address 101 interface Ethernet0/0 ip address interface Serial1/0 ip address ip access-group 150 in ip access-group 160 out crypto map vpnmap access-list 101 permit ip access-list 150 permit udp host eq 500 host eq 500 access-list 150 permit esp host host access-list 150 permit ip access-list 160 permit udp host eq 500 host eq 500 access-list 160 permit ip Printed in USA.
27 New IPSec ACL Configuration Without Crypto Access ACLs Example 1: Router A crypto map vpnmap 10 ipsec-isakmp set peer set transform-set trans1 match address 101 interface Ethernet0/0 ip address interface Serial1/0 ip address ip access-group 150 in ip access-group 160 out crypto map vpnmap access-list 101 permit ip access-list 150 permit udp host eq 500 host eq 500 access-list 150 permit esp host host access-list 160 permit udp host eq 500 host eq 500 access-list 160 permit esp host host Current IPSec ACL Configuration Example 1: Router B crypto map vpnmap 10 ipsec-isakmp set peer set transform-set trans1 match address 101 interface Ethernet0/0 ip address interface Serial1/0 ip address ip access-group 150 in ip access-group 160 out crypto map vpnmap access-list 101 permit ip access-list 150 permit udp host eq 500 host eq 500 access-list 150 permit esp host host access-list 150 permit ip access-list 160 permit udp host eq 500 host eq 500 access-list 160 permit ip Printed in USA.
28 New IPSec ACL Configuration Without Crypto Access ACLs Example 1: Router B crypto map vpnmap 10 ipsec-isakmp set peer set transform-set trans1 match address 101 interface Ethernet0/0 ip address interface Serial1/0 ip address ip access-group 150 in ip access-group 160 out crypto map vpnmap access-list 101 permit ip access-list 150 permit udp host eq 500 host eq 500 access-list 150 permit esp host host access-list 160 permit udp host eq 500 host eq 500 access-list 160 permit esp host host Hub and Spoke Topology 90% hub spoke, 10% spoke spoke traffic Design options: Cisco IOS: Uses crypto ACL summarization for smaller scale deployment; uses GRE over IPSec with dynamic routing protocol for larger scale deployment VPN 3000 concentrators use summarized network lists for small scale deployment PIX Firewalls do not support hub and spoke topology Best option: GRE over IPSec with dynamic routing protocol 56 Printed in USA.
29 Why GRE over IPSec L3 GRE Tunnel IPSec Tunnel IP IP ESP HDR Data IP GRE IP HDR Data IP HDR HDR HDR HDR HDR IPSec (ESP) tunnels only IP unicast traffic GRE encapsulates non-ip and IP multicast or broadcast packets into IP unicast packets Using a GRE tunnel inside an IPSec tunnel uses only three security associations (at maximum) Use tunnel mode IPSec vs. transport because: With hardware acceleration it is actually faster Some new features (LAF) require tunnel mode GRE IP HDR HDR Encrypted Data IP HDR Decapsulate Twice Data 57 GRE over IPSec Configuration crypto isakmp policy 1 authentication pre-share crypto isakmp key cisco47 address crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto map vpnmap2 local-address Ethernet1 crypto map vpnmap2 10 IPSec-isakmp set peer set transform-set trans2 match address 110 interface Ethernet1 ip address crypto map vpnmap2 interface Tunnel0 ip address ip mtu 1440 tunnel source Ethernet1 tunnel destination ******crypto map vpnmap2******** ip route access-list 110 permit gre - host host (13)T and later crypto isakmp policy 1 authentication pre-share crypto isakmp key cisco47 address crypto ipsec transform-set trans2 esp-3des esp-md5- hmac mode transport crypto ipsec profile vpnprof set transform-set trans2 interface Ethernet1 ip address interface Tunnel0 ip address ip mtu 1440 tunnel source Ethernet1 tunnel destination tunnel protection ipsec profile vpnprof ip route Printed in USA.
30 GRE over IPSec Configuration Evolution Before 12.2(13)T, crypto maps are required to apply to both GRE tunnel interface and physical interface From 12.2(13)T and later Only need to apply crypto map on physical interface Use tunnel protection ipsec profile under tunnel interface 59 GRE over IPSec Design Recommendations I h1 h2 INTERNET s1 s2 In order to avoid asymmetric routing, one of the two GRE tunnels between the head-end and remote site must be favored Change bandwidth value for the GRE interface on both ends to create primary and secondary tunnels Unrealistic bandwidth setting might affect the flow control of EIGRP Alternative: use the delay command under GRE tunnel interface 60 Printed in USA.
31 GRE over IPSec Design Recommendations II On failure recovery, the load should be dynamically rebalanced at the head-end Generally speaking the routing protocol at the head-end can safely scale up to 1000 peers Consider that EIGRP is less CPU intensive than OSPF GRE Keepalives can be used for failure detection in case of static routing 61 Partial/Full Mesh Topology More than 20% spoke spoke traffic Configuration task, number of IPSec SAs grow exponentially as number of spoke sites increases; does not scale well for above ~10 sites Dynamic peer discovery and on-demand tunnel creation mechanisms are required: Dynamic Multipoint VPN (DMVPN) 62 Printed in USA.
32 Why DMVPN Is Needed? Create the spoke to spoke tunnels dynamically based on traffic requirements Advantages: Dynamic mesh: number of active tunnels is much lower on each spoke Configuration scales better: no need for static definitions for each spoke in the hub configuration Easy to add a node: no need to configure the new spoke on all the other nodes THIS IS THE BASIS OF CISCO S DYNAMIC MULTIPOINT VPN 63 How Do Other Topologies Compare? Hub and Spoke + All traffic must go via hub + Easy to deploy Two encrypts/decrypts Can result in wasted bandwidth and hub resources Can result in unwieldy hub configuration files Full Mesh + Direct spoke to spoke tunnels Smaller spoke CPE can t support large numbers of connections (big configurations and lots of resources) Adding a node=lots of provisioning Basically a scaling and support headache, therefore most production networks use hub and spoke 64 Printed in USA.
33 Dynamic Multipoint VPN (DMVPN) /24 E / / Internet Rh / / / /24 E0 H / H3 Multi-point GRE greatly reduces configuration task Next hop resolution protocol (NHRP) is used to dynamically map GRE layer to backbone IP layer Dynamic, on-demand spoke-to-spoke communication; Spoke sites can have dynamic IP address GRE/IPSec / /24 E / Rs1.2 H /24 65 DMVPN: How Does It Work? Relies on Two Proven Cisco Technologies NHRP Next Hop Resolution Protocol Client/server protocol: hub is server; spokes are clients Hub maintains a (NHRP) database of all the spoke s real (public interface) addresses Each spoke registers its real address when it boots Spokes query HNRP database for real addresses of destination spokes to build direct tunnels Multipoint GRE Tunnel Interface Allows single GRE interface to support multiple IPSec tunnels Simplifies size and complexity of configuration 66 Printed in USA.
34 DMVPN: How Does It Work? Spokes have a permanent IPSec tunnel to the hub, but not to the spokes; They register as clients of the NHRP server When a spoke needs to send a packet to a destination (private) subnet on another spoke, he queries the NHRP server for the real (outside) address of the destination spoke Now the originating spoke can initiate a dynamic ipsec tunnel to the target spoke (because he knows the peer address) The spoke to spoke tunnel is built over the mgre interface 67 DMVPN Design: Key, Security and Redundancy Recommended: use certificates/pki (typically CA server located on hub s private subnet) Alternative: wildcard pre-shared key If key is compromised every spoke needs to be given a new key To prevent unauthorized nodes from joining the VPN: NHRP Network ID and Password: spokes must be configured for both to join the NHRP network mgre Network ID: must be configured on the spokes to match the hub These parameters are sent via the spoke-hub tunnel and are therefore encrypted Redundancy: you can configure multiple NHRP servers on multiple hubs for backup 68 Printed in USA.
35 Agenda Applications of Site-to-Site IPSec VPNs Design Considerations Deployment Scenarios Fine Tuning Site-to-Site Deployment High Availability Management Advanced IOS Features Case Study 69 FINE TUNING SITE-TO-SITE DEPLOYMENT 70 Printed in USA.
36 Fine Tune VPN Systems to Avoid MTU Issues Due to the overhead (~60bytes) added by IPSec in the middle of transmission path, the Path MTU (PMTU) setting of your VPN system might need to be fine tuned to avoid stalled application symptom Normal scenarios (no need to fine tune) Application sends only small-sized packets PMTU discovery (PMTUd) process helps end hosts reduce packet size automatically to accommodate IPSec overhead 71 Fine Tune VPN Systems to Avoid MTU Issues (Cont.) When do you need to find tune: PMTUd fails due to the ICMP messages used by PMTUd (Type 3 code 4) are lost or blocked IPSec fragments packets after encryption; the reassembly job done by the remote VPN device causes performance degradation When DF (Don t Fragment) bit is set 72 Printed in USA.
37 IPSec and PMTU Discovery MTU / /28 MTU 1500 e1/1 e1/0 MTU MTU MTU Path 1500 Media 1500 IPSec Tunnel Path 1500 Media DF=1 ICMP Type3 Code 4 ICMP: dst ( ) frag. needed and DF set unreachable sent to (1454) ( debug ip icmp output) 1454 DF= DF Copied 1454 DF=1 ICMP (1400) IPSec SPI Copied ICMP: dst ( ) frag. needed and DF set unreachable rcv from Adjust path MTU on corresponding IPSec SA path mtu 1400, media mtu 1500 ICMP Type3 Code 4 current outbound spi: EB84DC85 (1354) 1354 DF= PMTU Setting Options on VPN Devices General Consideration: Avoid fragmentation after encryption as much as possible Adjust MTU to leave room in advance for IPSec overhead Last resort: clear DF bit so that packet can get through Device Methods for setting PMTU Cisco IOS PIX VPN 3000 Adjust TCP MSS option Look Ahead Fragmentation (LAF) Adjust IP MTU of GRE tunnel interface Clear DF bit using policy routing or IPSec df-bit clear feature (last resort) Adjust TCP MSS option Pre-tunnel Fragmentation Adjust IP MTU of the interface Clear DF bit 74 Printed in USA.
38 Adjust TCP MSS Option TCP Maximum Send Segment (MSS) option is sent during TCP connection establishment phase; TCP end hosts obeys the MSS value conveyed to the other end Cisco IOS: ip tcp adjust-mss 1360 under ingress interface PIX: sysopt connection tcp mss Look Ahead Fragmentation (LAF) Fragmentation after IPSec requires reassembly on the receiving router Take the packet, look ahead by adding 84 bytes (max. ESP header size) If > path MTU size, then fragment before IPSec Early tests show, pre-frag increases performance on 7200VXR receiver from 12mb/s to 70mb/s Re-assembly now done on end host To enable: Crypto IPSec df-bit clear Crypto IPSec fragmentation before-encryption Cisco IOS/ VPNSM VPN Printed in USA.
39 GRE over IPSec MTU Considerations Fragmentation GRE fragments before encapsulation IPSec fragments after encryption Can get double fragmentation: Reassembly by IPSec peer and end host Solution: Set GRE interface IP MTU IPSec transport mode ip mtu 1400 IPSec tunnel mode ip mtu 1400 (20 more bytes used in tunnel mode) Use tunnel path-mtu-discovery under GRE interface so that PMTUd process will work after GRE Use LAF; the IP MTU of GRE tunnel interface will automatically adjusted 77 Quality of Service (QoS) in VPN Deployment Enable end-to-end QOS throughout the network Cisco VPN products preserve the TOS/DSCP bits after encryption QoS classification/marking must occur before encryption Challenges: QoS happens after IPSec on egress interface; some QoS mechanisms (Flow-based WFQ, PQ,CQ, CBWFQ) that classify traffic using L3/4 packet header info; no longer work when applied on egress interfaces Crypto engine is a FIFO queue; no priority associated with different classes of traffic 78 Printed in USA.
40 Cisco IOS VPN QoS Consideration: QoS Pre-Classify Network Headers Crypto Engine QoS pre-classify preserves the Layer3/4 information before crypto engine QoS mechanism at egress interface used preserved header info to classify packets 79 Cisco IOS VPN QoS Consideration: Crypto Low Latency Queuing (LLQ) D v D D CB WFQ D D D D v v v v Best Effort LLQ v v Crypto Engine D v IP Data Traffic VOIP Traffic LLQ before crypto engine is designed to minimize voice latency and jitter Queuing occurs when crypto engine is congested 80 Printed in USA.
41 VPN Service Module (VPNSM) QoS Consideration VPNSM supports priority queuing with two priorities: High and Low Class of Service (CoS) is used to map traffic to VPNSM priority queues Use Catalyst 6000 MLS QoS to mark packets with CoS values 81 VPN QoS Consideration: VPN 3000 Concentrator Allows bandwidth reservation for site-to-site tunnels Traffic policing is available to police excess packets 82 Printed in USA.
42 NAT and Site-to-Site VPN One-to-one NAT in between IPSec peers: Works fine with IPSec ESP Does not work with IPSec AH (integrity check covers IP header) Port address translation (PAT) breaks IPSec Solution: IPSec NAT transparency (NAT-T) During IKE phase I negotiation, special NAT discovery payload is used to discover the existence of NAT and location of NAT device If there is NAT, encapsulate ESP packet as UDP payload (UDP/4500) ISAKMP NAT keepalive is sent to keep NAT entry from timeout 83 Compression and VPNs Aids in path MTU issues LZS can be used for layer 3 compression over VPNs; to enable add the comp-lzs IPSec transform to the transform set The compression ratio will vary dramatically depending on the traffic undergoing compression The LZS implementation has a maximum 2:1 compression ratio IPCP-LZS in software runs in process mode and creates significant CPU overhead Some crypto hardware accelerator cards support LZS in hardware (VAM, VAM2) Layer 2 compression has no effect on IPSec traffic VAM-2 Compression Only NOT supported so do not deploy it for only compression 84 Printed in USA.
43 HIGH AVAILABILITY 85 High Availability Common High Availability (HA) practice in conjunction with IPSec HA features Design options Local HA via link resiliency Local HA via Hot Standby Routing Protocol/Virtual Router Redundancy Protocol/failover Geographical HA via IPSec backup peers Local/geographical HA via GRE over IPSec (dynamic routing) VPN peer reachability detection mechanism IKE timer IKE keepalive/dpd Routing protocol GRE Tunnel keepalive 86 Printed in USA.
44 IKE Keepalive and Dead Peer Detection (DPD) Consideration IKE KEEPALIVE ESP Used to clear stale IPSec SAs in the dead peer situation Must be enabled on both VPN peers Bi-directional, periodic keepalive between two peers Can cause high CPU usage on hub VPN device in large scale deployment; can scale up to 1000 peers? DPD Used to clear stale IPSec SAs in the dead peer situation Can be configured to track on direction only Keepalive sent only in absence of VPN traffic Compared to IKE keepalive, more efficient and use less CPU 87 Local HA via Link Resiliency ISPs Link Resiliency: ISDN backup, backup Frame Relay DLCI, etc. Choose multiple ISPs to achieve link diversity Use a loopback interface as the ISAKMP identity for the VPN router Failover mechanism: backup interface, dialer watch, floating static routes 88 Printed in USA.
45 Local HA Using HSRP/VRRP Remote HSRP Internet HE-2 VPN Head-End VPN HE-1 VRRP Corporate Intranet Available in Cisco IOS Active-active failover Reverse route injection (RRI) is required for the hosts behind HSRP routers to track tunnel states VRRP supported by VPN 3000 concentrator PIX failover is similar to VRRP mechanism Active-standby failover 89 Local HA Using HSRP/VRRP: Cisco IOS HSRP and RRI (1) SA Established To Primary Sending IKE Keepalives (2) Router P RRI: I can reach Remote P Internet (3) /24 via P Head-End /24 (8) /24 via S S (6) New SA Established To Secondary (5) Secondary Active Sending IKE Keepalives (7) Router S RRI: I can reach = Unscheduled Immediate Memory Initialization Routine (4) HSRP is enable on outside (WAN facing) interface Cisco IOS IPSec HA enhancement features: Allow IPSec use HSRP Virtual IP as the peer address Reverse route injection (RRI) injects IPSec remote proxy IDs into dynamic routing process 90 Printed in USA.
46 Cisco IOS HSRP and RRI Configuration crypto isakmp keepalive 10 crypto map vpn 10 IPSec-isakmp set peer set transform-set myset match address 101 reverse-route interface Ethernet1/0 ip address standby 1 ip standby 1 priority 200 standby 1 preempt standby 1 name VPNHA standby 1 track Ethernet1/1 150 crypto map vpn redundancy VPNHA interface Ethernet1/1 ip address router ospf 1 redistribute static subnets network area 0 access-list 101 permit ip Cisco IOS IPSec Stateful Failover inbound esp sas: spi: 0xB57000DA( ) transform: esp-des esp-md5- hmac, in use settings ={Tunnel, } slot: 100, conn id: 2000, flow_id: 1, crypto map: vpn sa timing: remaining key lifetime (k/sec): ( /663) IV size: 8 bytes replay detection support: Y P SSP S inbound esp sas: spi: 0xB57000DA( ) transform: esp-des esp-md5-hmac, in use settings ={Tunnel, } slot: 100, conn id: 2000, flow_id: 1, crypto map: vpn sa timing: remaining key lifetime (k/sec): ( /3489) IV size: 8 bytes replay detection support: Y HA Status: STANDBY IPSec stateful failover greatly improves failover time compared to the stateless IPSec/HSPR failure State Synchronization Protocol (SSP) is designed to sync ISAKMP and IPSec SA database between HSRP active and standby routers Use a dedicated link between the two HSRP routers for SSP exchange 92 Printed in USA.
47 Cisco IOS IPSec HSRP Stateful Failover Configuration ssp group 10 remote redundancy IPSec_HA crypto isakmp ssp 10 crypto ipsec transform-set myset esp- 3des esp-md5-hmac crypto map vpn ha replay-interval inbound 10 outbound 1 crypto map vpn 10 IPSec-isakmp set peer set transform-set myset match address 101 reverse-route interface Ethernet1/0 ip address standby 10 ip standby 10 preempt standby 10 name IPSec_HA standby 10 track Ethernet1/3 50 crypto map vpn ssp 10 access-list 101 permit ip Geographic HA Using IPSec Backup Peers Branch Office ISPs Corporate Network crypto isakmp keepalive 20 3 crypto map vpn 10 ipsec-isakmp set peer set peer set transform-set myset match address During IKE negotiation, IKE timer (3 retries) detects the peer failure IKE keepalive or DPD detected failed peer after tunnel is established1 94 Printed in USA.
48 Local/Geographical HA Using GRE over IPSec (Dynamic Routing) San Jose Branch Internet Corporate Network h1 h2 s1 Geographical HA New York s2 Primary Tunnel Secondary Tunnel Local HA with Redundant Hub Design Except under failure conditions: The IPSec and GRE tunnels are always up since routing protocols are always running The remote sites always have two apparent paths to all networks available via the head-end Use dynamic routing for path selection and failover 95 Redundant Hubs in Action Initial Build A H1 33% S1: P H1 S H2 S2: P H1 S H3 H2 33% S3: P H2 S H1 S4: P H2 S H3 H3 33% S5: P H3 S H1 S6: P H3 S H2 96 Printed in USA.
49 Redundant Hubs in Action after Failure S1: P H1 S H2 H1 33% 50% S2: P H1 S H3 H2 33% 0% S3: P H2 S H1 S4: P H2 S H3 H3 33% 50% S5: P H3 S H1 S6: P H3 S H2 97 Site-to-Site High Availability Summary Key: CK = Cisco-type IKE Keepalives; DPD = Dead Peer Detection; HA = High Availability; RP = Routing Protocol; DPD is preferred over CK; BP= IPSec backup peer Remote Device Cisco IOS/VPNSM Head-end Device Cisco IOS PIX 3000 RP/GRE (IKE peers); HSRP+ (IKE peer), DPD/CK, RRI/HSRP (RP/HSRP back-end)/bp DPD/CK/BP DPD/CK, RRI (RP back-end)/bp PIX Firewall HSRP+ (IKE peer), DPD/CK, RRI/HSRP (RP/HSRP back-end)/bp DPD/CK/BP DPD/CK, RRI (RP back-end)/bp VPN3000 HSRP+ (IKE peer), DPD/CK, RRI/HSRP (RP/HSRP back-end)/bp DPD/CK/BP DPD, RRI (RP back-end)/bp 98 Printed in USA.
50 MANAGEMENT 99 Managing VPN In order to manage remote devices via a VPN tunnel you should: Use static public IP addresses at remote sites and static crypto maps at the head-end Use Auto Update Server for dynamically assigned Remote site Be aware that some services do not always use the public IP address as the source address (e.g. TFTP) IPSec information is available via syslog (minimal) or the IPSec MIB via SNMP (IOS, 3000) Manage out-of-band Use dedicated management interfaces if possible If not possible, use VPN for secure management and restrict access over the tunnel to management protocols only When managing a VPN device across the Internet: Use strong authentication, integrity and encryption Use a different username for configuration management and troubleshooting If you cannot use IPSec, i.e. Catalyst LAN switch, use SSH/SSL. However, use IPSec from first hop Cisco IOS router 100 Printed in USA.
51 VPN Management Advanced Cisco IOS Features Applications Mgmt ON the Box [Device Managers] PDM PIX Device Manager VDM VPN Device Manager for Cisco IOS SDM Security Device Manager for Cisco IOS Mgmt OFF the Box [Multi Device Managers] Cisco IOS, IDS, PIX Management Advanced IOS Features Centers VPN / Security Management Advanced IOS Features Solution VPN Monitor VPN Solutions Center (service provider provisioning tool) 101 CASE STUDY 102 Printed in USA.
52 Company Profile: Existing infrastructure 20,000 employee company Frame Relay and ISDN are used to interconnect remote offices Currently has 150 Remote sites, growing to 500+ in the near future VPN design goals Use Internet VPN to replace WAN to save cost Migrating from FR environment, requires some level of assurance of service availability Flexible design to accommodate future growth 103 Current Traffic Profile Internet access Multiple OC-3 line, Firewall and Edge/ISP Router Head-End: ~450 Mbps throughput HTTP, FTP and other traffic Frame Relay network Head-End: ~45 Mbps throughput Remote Sites: 56/64K T1/E1, ~1Mbps throughput Intranet Services: Database, HTTP, FTP, Mail etc PSTN network Head-End: Access Server PRI Lines Remote Sites: 128K ISDN 104 Printed in USA.
53 Current Network Topology Internet Head Quarter PSTN Frame Relay Cloud Remote Sites 105 Design Considerations Checklist: I IP Addressing and Routing Private IP addressing used for VPN All spoke sites has static routable IP addresses Dynamic routing required GRE Over IPSec Security Use firewall in front of VPN devices Device Authentication Limited remotes sites IKE Pre-shared Key Cryptographic options 3DES encryption with data integrity and authentication 106 Printed in USA.
54 Design Considerations Checklist: II High Availability Multiple Head End devices Routing protocol (EIGRP) is used for convergence, transparent to end user Migration Utilize existing Internet connection for site-to-site IPSec VPN Upgrade existing Internet connection to accommodate added VPN traffic Dynamic routing needed to distinguish between Internet and intranet traffic 107 Design Considerations Checklist: III Device Sizing and Scalability (Head End and Remote): Number of branches ~ VPN Tunnels No. of Head End Devices = [ no. Tunnels/1000 ]+1)=2 Throughput per branch ~ 0.75Mbps Aggregated head-end VPN throughput: 0.75* Mbps Traffic throughput and CPU utilization Branch device CPU utilization is considered at 65% 2 Tunnels (Primary and Secondary) Product selection Head End: C7301 VPN Security Router with SA-VAM2 Remote Sites: C1700 C3600 with encryption modules 108 Printed in USA.
55 VPN Design P S Central Site Internet Remote Sites 109 Conclusions Security Stateful inspection of traffic at VPN Headend Adhere to security policy such as split tunneling Cost saving Great time-to-value Monthly cost to subscribe to Internet Initial equipment cost is re-captured by monthly savings Deploy VPN enabled routers (including DSL and other features) DSL and/or cable-free install by some ISP Scalability Minimal downtime during failover Use of DSL and/or cable technology Flexible design Future growth and resiliency with multiple links and additional hub sites 110 Printed in USA.
56 Flexible VPN Design to Accommodate Future Growth San Jose Atlanta VPN A-P VPN B-S VPN A-S VPN B-P Internet VPN Z-S VPN Z-P Site A Site B Corporate Network Multiple Hub Sites Site Z Remote VPN Sites 111 Reference Materials Performance of Cisco IOS Routers, PIX and VPN a72.html ROI Calculator for Site-to-Site VPN n_calc/vpnsite.html CERT Site VPN Design Pages VPN Insider Printed in USA.
57 Recommended Reading CCSP Self-Study: Cisco Secure Virtual Private Networks (CSVPN), Second Ed. [ ] Available late May 2004 Network Security Principles and Practices [ ] Available on-site at the Cisco Company Store 113 Q AND A 114 Printed in USA.
58 Complete Your Online Session Evaluation WHAT: WHY: Complete an online session evaluation and your name will be entered into a daily drawing Win fabulous prizes Give us your feedback WHERE: Go to the Internet stations located throughout the Convention Center HOW: Winners will be posted on the onsite Networkers Website; four winners per day Printed in USA.
59 APPENDIX: GRE OVER IPSEC 117 GRE over IPSec: Network Layout /24.2 H Rh Internet Rs Rs /24 H /24.2 H3 118 Printed in USA.
60 IPSec + GRE Hub and Spoke Hub Configuration Transport Mode Dynamic Crypto Map ACL Entries GRE Hub to Spokes crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto dynamic-map vpndyn 10 set transform-set trans2 match address 110 crypto map vpnmap local-address Ethernet4 crypto map vpnmap 10 ipsec-isakmp dynamic vpndyn interface Ethernet0 ip address interface Ethernet4 ip address crypto map vpnmap access-list 110 permit gre host host access-list 110 permit gre host host IPSec + GRE Hub and Spoke Hub Configuration (Cont.) GRE Tunnel Interfaces 1 per Spoke IP MTU EIGRP for Dynamic Routing interface Tunnel11 ip address ip mtu 1440 tunnel source Ethernet4 tunnel destination crypto map vpnmap interface Tunnel12 ip address ip mtu 1440 tunnel source Ethernet4 tunnel destination crypto map vpnmap router eigrp 1 network network no auto-summary 120 Printed in USA.
61 IPSec + GRE Hub and Spoke Hub Configuration crypto isakmp policy 1 authentication pre-share crypto isakmp key cisco47 address crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto dynamic-map vpndyn 10 set transform-set trans2 match address 110 crypto map vpnmap local-address Ethernet4 crypto map vpnmap 10 ipsec-isakmp dynamic vpndyn interface Ethernet0 ip address interface Ethernet4 ip address crypto map vpnmap interface Tunnel12 ip address ip mtu 1440 tunnel source Ethernet4 tunnel destination crypto map vpnmap interface Tunnel13 ip address ip mtu 1440 tunnel source Ethernet4 tunnel destination crypto map vpnmap router eigrp 1 network network no auto-summary ip route access-list 110 permit gre - host host access-list 110 permit gre - host host IPSec + GRE Hub and Spoke Spoke1 Configuration Transport Mode Static Crypto Map ACL Entry GRE Spoke to Hub crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto map vpnmap2 local-address Ethernet1 crypto map vpnmap2 10 ipsec-isakmp set peer set transform-set trans2 match address 120 access-list 120 permit gre host host Printed in USA.
62 IPSec + GRE Hub and Spoke Spoke1 Configuration (Cont.) GRE Tunnel Interface IP MTU EIGRP for Dynamic Routing interface Tunnel0 ip address ip mtu 1440 tunnel source Ethernet1 tunnel destination crypto map vpnmap2 interface Ethernet0 ip address interface Ethernet1 ip address crypto map vpnmap2 router eigrp 1 network network no auto-summary 123 IPSec + GRE Hub and Spoke Spoke Configuration crypto isakmp policy 1 authentication pre-share crypto isakmp key cisco47 address crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto map vpnmap2 local-address Ethernet1 crypto map vpnmap2 10 ipsec-isakmp set peer set transform-set trans2 match address 110 interface Ethernet0 ip address interface Ethernet1 ip address crypto map vpnmap2 interface Tunnel0 ip address ip mtu 1440 tunnel source Ethernet1 tunnel destination crypto map vpnmap2 router eigrp 1 network network no auto-summary ip route access-list 110 permit gre - host host Printed in USA.
63 IPSec + GRE Hub and Spoke Spoke2 Configuration Transport Mode Static Crypto Map ACL Entry GRE Spoke to Hub crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto map vpnmap2 local-address Ethernet1 crypto map vpnmap2 10 ipsec-isakmp set peer set transform-set trans2 match address 120 access-list 120 permit gre host host IPSec + GRE Hub and Spoke Spoke2 Configuration (Cont.) GRE Tunnel Interface IP MTU EIGRP for Dynamic Routing interface Tunnel0 ip address ip mtu 1440 tunnel source Ethernet1 tunnel destination crypto map vpnmap2 interface Ethernet0 ip address interface Ethernet1 ip address crypto map vpnmap2 router eigrp 1 network network no auto-summary 126 Printed in USA.
64 IPSec + GRE Hub and Spoke Spoke2 Configuration crypto isakmp policy 1 authentication pre-share crypto isakmp key cisco47 address crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto map vpnmap2 local-address Ethernet1 crypto map vpnmap2 10 ipsec-isakmp set peer set transform-set trans2 match address 110 interface Ethernet0 ip address interface Ethernet1 ip address crypto map vpnmap2 interface Tunnel0 ip address ip mtu 1440 tunnel source Ethernet1 tunnel destination crypto map vpnmap2 router eigrp 1 network network no auto-summary ip route access-list 110 permit gre - host host IPSec + GRE Routing Tables Hub Spoke1 Spoke2 C /28 is directly connected, Ethernet4 C /30 is directly connected, Tunnel12 C /30 is directly connected, Tunnel13 C /24 is directly connected, Ethernet0 D /24 [90/ ] via , 00:12:30, Tunnel11 D /24 [90/ ] via , 00:12:28, Tunnel12 S* /0 [1/0] via C /24 is directly connected, Ethernet1 C /30 is directly connected, Tunnel0 D /30 [90/ ] via , 00:18:39, Tunnel0 D /24 [90/ ] via , 00:18:39, Tunnel0 C /24 is directly connected, Ethernet0 D /24 [90/ ] via , 00:18:40, Tunnel0 S* /0 [1/0] via C /24 is directly connected, Ethernet1 D /30 [90/ ] via , 00:21:53, Tunnel0 C /30 is directly connected, Tunnel0 D /24 [90/ ] via , 00:21:53, Tunnel0 D /24 [90/ ] via , 00:21:54, Tunnel0 C /24 is directly connected, Ethernet0 S* /0 [1/0] via Printed in USA.
65 GRE over IPSec: Redundant Hubs S1: P H1 S H2 H1 33% S2: P H1 S H3 H2 33% S3: P H2 S H1 S4: P H2 S H3 H3 33% S5: P H3 S H1 S6: P H3 S H2 129 Redundant Hubs Base Hub Configuration ACL Definitions on Later Slide Hub s External IP Address Primary and Secondary Networks crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto dynamic-map vpndyn 10 set transform-set trans2 match address 110 crypto map vpnmap local-address Ethernet4 crypto map vpnmap 10 ipsec-isakmp dynamic vpndyn interface Ethernet0 ip address <x> interface Ethernet4 ip address <hub(x)> crypto map vpnmap router eigrp 1 network network network Printed in USA.
66 Redundant Hubs Hub1 Configuration: Tunnels Primary GRE Tunnels Bandwidth Controls Routing Secondary GRE Tunnels interface Tunnel11 ip address bandwidth 1000 tunnel source <hub1> tunnel destination <spoke1> crypto map vpnmap interface Tunnel12 ip address bandwidth 1000 tunnel source <hub1> tunnel destination <spoke2> crypto map vpnmap interface Tunnel13 ip address bandwidth 500 tunnel source <hub1> tunnel destination <spoke3> crypto map vpnmap interface Tunnel15 ip address bandwidth 500 tunnel source <hub1> tunnel destination <spoke5> crypto map vpnmap 131 Redundant Hubs Hub2 Configuration: Tunnels Secondary GRE Tunnel Primary GRE Tunnels Secondary GRE Tunnel interface Tunnel11 ip address bandwidth 500 tunnel source <hub2> tunnel destination <spoke1> crypto map vpnmap interface Tunnel13 ip address bandwidth 1000 tunnel source <hub2> tunnel destination <spoke3> crypto map vpnmap interface Tunnel14 ip address bandwidth 1000 tunnel source <hub2> tunnel destination <spoke4> crypto map vpnmap interface Tunnel16 ip address bandwidth 500 tunnel source <hub2> tunnel destination <spoke6> crypto map vpnmap 132 Printed in USA.
67 Redundant Hubs Hub3 Configuration: Tunnels Secondary GRE Tunnel Primary GRE Tunnels interface Tunnel12 ip address bandwidth 500 tunnel source <hub3> tunnel destination <spoke2> crypto map vpnmap interface Tunnel14 ip address bandwidth 500 tunnel source <hub3> tunnel destination <spoke4> crypto map vpnmap interface Tunnel15 ip address bandwidth 1000 tunnel source <hub3> tunnel destination <spoke5> crypto map vpnmap interface Tunnel16 ip address bandwidth 1000 tunnel source <hub3> tunnel destination <spoke6> crypto map vpnmap 133 Redundant Hubs Hub Configuration: ACLs Hub1: Hub2: Hub3: access-list 110 permit gre host <hub1> host <spoke1> access-list 110 permit gre host <hub1> host <spoke2> access-list 110 permit gre host <hub1> host <spoke3> access-list 110 permit gre host <hub1> host <spoke5> access-list 110 permit gre host <hub2> host <spoke3> access-list 110 permit gre host <hub2> host <spoke4> access-list 110 permit gre host <hub2> host <spoke1> access-list 110 permit gre host <hub2> host <spoke6> access-list 110 permit gre host <hub3> host <spoke5> access-list 110 permit gre host <hub3> host <spoke6> access-list 110 permit gre host <hub3> host <spoke2> access-list 110 permit gre host <hub3> host <spoke4> 134 Printed in USA.
68 Redundant Hubs Spoke1 Configuration Primary Crypto Map Secondary Crypto Map IPSec and GRE Peers Match crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto map vpnmap2 local-address Ethernet1 crypto map vpnmap2 10 ipsec-isakmp set peer <hub1> set transform-set trans2 match address 121 crypto map vpnmap2 20 ipsec-isakmp set peer <hub2> set transform-set trans2 match address 122 access-list 121 permit gre host <spoke1> host <hub1> access-list 122 permit gre host <spoke1> host <hub2> router eigrp 1 network network network no auto-summary 135 Redundant Hubs Spoke1 Configuration (Cont.) Primary GRE Tunnel Secondary GRE Tunnel interface Tunnel0 ip address bandwidth 1000 tunnel source <spoke1> tunnel destination <hub1> crypto map vpnmap2 interface Tunnel1 ip address bandwidth 500 tunnel source <spoke1> tunnel destination <hub2> crypto map vpnmap2 interface Ethernet0 ip address interface Ethernet1 ip address <spoke1> crypto map vpnmap2 136 Printed in USA.
69 Redundant Hubs Spoke2 Configuration Primary Crypto Map Secondary Crypto Map IPSec and GRE Peers Match crypto ipsec transform-set trans2 esp-3des esp-md5-hmac mode transport crypto map vpnmap2 local-address Ethernet1 crypto map vpnmap2 10 ipsec-isakmp set peer <hub1> set transform-set trans2 match address 121 crypto map vpnmap2 20 ipsec-isakmp set peer <hub3> set transform-set trans2 match address 122 access-list 121 permit gre host <spoke2> host <hub1> access-list 122 permit gre host <spoke2> host <hub3> router eigrp 1 network network network no auto-summary 137 Redundant Hubs Spoke2 Configuration (Cont.) Primary GRE tunnel Secondary GRE tunnel interface Tunnel0 ip address bandwidth 1000 tunnel source <spoke2> tunnel destination <hub1> crypto map vpnmap2 interface Tunnel1 ip address bandwidth 500 tunnel source <spoke2> tunnel destination <hub3> crypto map vpnmap2 interface Ethernet0 ip address interface Ethernet1 ip address <spoke2> crypto map vpnmap2 138 Printed in USA.
Deploying Site-to-Site IPSec VPNs
1 Deploying Site-to-Site IPSec VPNs Session Copyright Printed in USA. 2 Other VPN Sessions SEC-1000: Introduction to Network Security SEC-2010: Deploying Remote-Access IPSec VPNs SEC-2012: Deploying Complex
Case Studies. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study. Overview CHAPTER
CHAPTER 5 The following two case studies are provided as reference material for implementing p2p GRE over IPsec designs. Static p2p GRE over IPsec with a Branch Dynamic Public IP Address Case Study This
Point-to-Point GRE over IPsec Design and Implementation
CHAPTER 2 Point-to-Point GRE over IPsec Design and Implementation In designing a VPN deployment for a customer, it is essential to integrate broader design considerations such as high availability, resiliency,
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
IPsec Direct Encapsulation VPN Design Guide
This design guide provides guidelines and best practices for customer deployments of IP Security (IPsec) direct encapsulation VPNs. It is assumed that the reader has a basic understanding of IPsec. Contents
How To Design An Ipsec Vpn Network Connection
Solutions Guide Deploying IPsec Virtual Private Networks Introduction Corporate networks connected to the Internet can enable flexible and secure VPN access with IPsec. Connecting remote sites over the
Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham
Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham In part two of NetCertLabs Cisco CCNA Security VPN lab series, we explored setting up a site-to-site VPN connection where one side
Lab14.8.1 Configure a PIX Firewall VPN
Lab14.8.1 Configure a PIX Firewall VPN Complete the following lab exercise to practice what you learned in this chapter. Objectives In this lab exercise you will complete the following tasks: Visual Objective
DYNAMIC MULTIPOINT VPN HUB AND SPOKE INTRODUCTION
DYNAMIC MULTIPOINT VPN HUB AND SPOKE INTRODUCTION NOVEMBER 2004 1 INTRODUCTION Spoke, Presentation_ID 11/04 2004, Cisco Systems, Inc. All rights reserved. 2 What is Dynamic Multipoint VPN? Dynamic Multipoint
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Configuring IPsec VPN Fragmentation and MTU
CHAPTER 5 This chapter provides information about configuring IPsec VPN fragmentation and the maximum transmission unit (MTU). It includes the following sections: Understanding IPsec VPN Fragmentation
Deploying IPSec VPN in the Enterprise
VPN5 6/9/03 6:14 PM Page 137 Chapter 5 Deploying IPSec VPN in the Enterprise 5.1 Chapter Overview In Chapters 3 and 4, the focus was on implementing a single site-to-site IPSec VPN and the different IKE
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels
Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels This article provides a reference for deploying a Barracuda Link Balancer under the following conditions: 1. 2. In transparent (firewall-disabled)
BUY ONLINE AT: http://www.itgovernance.co.uk/products/730
IPSEC VPN DESIGN Introduction Chapter 1: Introduction to VPNs Motivations for Deploying a VPN VPN Technologies Layer 2 VPNs Layer 3 VPNs Remote Access VPNs Chapter 2: IPSec Overview Encryption Terminology
Most Common DMVPN Troubleshooting Solutions
Most Common DMVPN Troubleshooting s Document ID: 111976 Contents Introduction Prerequisites Requirements Components Used Conventions DMVPN Configuration does not work s Common Issues Verify if ISAKMP packets
Application Notes SL1000/SL500 VPN with Cisco PIX 501
Application Notes SL1000/SL500 VPN with Cisco PIX 501 Version 1.0 Copyright 2006, ASUSTek Computer, Inc. i Revision History Version Author Date Status 1.0 Martin Su 2006/5/4 Initial draft Copyright 2006,
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
Cisco Easy VPN on Cisco IOS Software-Based Routers
Cisco Easy VPN on Cisco IOS Software-Based Routers Cisco Easy VPN Solution Overview The Cisco Easy VPN solution (Figure 1) offers flexibility, scalability, and ease of use for site-to-site and remoteaccess
Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router
print email Article ID: 4938 Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router Objective Virtual Private
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
IPsec VPN WAN Design Overview
This design guide defines the comprehensive functional components that are required to build a site-to-site virtual private network (VPN) system in the context of enterprise wide area network (WAN) connectivity.
Configure ISDN Backup and VPN Connection
Case Study 2 Configure ISDN Backup and VPN Connection Cisco Networking Academy Program CCNP 2: Remote Access v3.1 Objectives In this case study, the following concepts are covered: AAA authentication Multipoint
GregSowell.com. Mikrotik VPN
Mikrotik VPN What is a VPN Wikipedia has a very lengthy explanation http://en.wikipedia.org/wiki/virtual_private_ network This class is really going to deal with tunneling network traffic over IP both
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
How To Monitor Cisco Secure Pix Firewall Using Ipsec And Snmp Through A Pix Tunnel
itoring Cisco Secure PIX Firewall Using SNMP and Syslog Thro Table of Contents Monitoring Cisco Secure PIX Firewall Using SNMP and Syslog Through VPN Tunnel...1 Introduction...1 Before You Begin...1 Conventions...1
Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520
Configuring an IPSec Tunnel between a Firebox & a Cisco PIX 520 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later) at one
Keying Mode: Main Mode with No PFS (perfect forward secrecy) SA Authentication Method: Pre-Shared key Keying Group: DH (Diffie Hellman) Group 1
Prepared by SonicWALL, Inc. 09/20/2001 Introduction: VPN standards are still evolving and interoperability between products is a continued effort. SonicWALL has made progress in this area and is interoperable
Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall
Netgear ProSafe VPN firewall (FVS318 or FVM318) to Cisco PIX firewall This document is a step-by-step instruction for setting up VPN between Netgear ProSafe VPN firewall (FVS318 or FVM318) and Cisco PIX
Cisco EXAM - 300-209. Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product. http://www.examskey.com/300-209.html
Cisco EXAM - 300-209 Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product http://www.examskey.com/300-209.html Examskey Cisco 300-209 exam demo product is here for you to test the quality
Packet Tracer Configuring VPNs (Optional)
Topology Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1 G0/0 192.168.1.1 255.255.255.0 N/A S0/0/0 10.1.1.2 255.255.255.252 N/A G0/0 192.168.2.1 255.255.255.0 N/A R2 S0/0/0
Vodafone MachineLink 3G. IPSec VPN Configuration Guide
Vodafone MachineLink 3G IPSec VPN Configuration Guide Copyright Copyright 2013 NetComm Wireless Limited. All rights reserved. Copyright 2013 Vodafone Group Plc. All rights reserved. The information contained
LAN-Cell to Cisco Tunneling
LAN-Cell to Cisco Tunneling Page 1 of 13 LAN-Cell to Cisco Tunneling This Tech Note guides you through setting up a VPN connection between a LAN-Cell and a Cisco router. As the figure below shows, the
Understanding the Cisco VPN Client
Understanding the Cisco VPN Client The Cisco VPN Client for Windows (referred to in this user guide as VPN Client) is a software program that runs on a Microsoft Windows -based PC. The VPN Client on a
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Network Security 2. Module 6 Configure Remote Access VPN
1 1 Network Security 2 Module 6 Configure Remote Access VPN 2 Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client
Cisco 1841 MyDigitalShield BYOG Integration Guide
Cisco 1841 MyDigitalShield BYOG Integration Guide CONTENTS Introduction 3 Assumptions 3 What You Will Need 4 Verify IP Address 5 Configure the IPSEC Tunnel 6 Configure Access List for Local Interface 6
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Course Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
Data-only Site-to-Site IPSec VPN Design Guide
Data-only Site-to-Site IPSec VPN Design Guide Version 1.0 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp
iguring an IPSec Tunnel Cisco Secure PIX Firewall to Checkp Table of Contents Configuring an IPSec Tunnel Cisco Secure PIX Firewall to Checkpoint 4.1 Firewall...1 Introduction...1 Before You Begin...1
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )
CCNA Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie ) Inform about ccna its basic course of networking Emergence
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
REMOTE ACCESS VPN NETWORK DIAGRAM
REMOTE ACCESS VPN NETWORK DIAGRAM HQ ASA Firewall As Remote Access VPN Server Workgroup Switch HQ-ASA Fa0/1 111.111.111.111 Fa0/0 172.16.50.1 172.16.50.10 IPSEC Tunnel Unsecured Network ADSL Router Dynamic
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1
640-816: Interconnecting Cisco Networking Devices Part 2 v1.1 Course Introduction Course Introduction Chapter 01 - Small Network Implementation Introducing the Review Lab Cisco IOS User Interface Functions
Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&
Building VPNs With IPSec and MPLS Nam-Kee Tan CCIE #4307 S& -.jr."..- i McGraw-Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT)
Cisco CCNP 642 845 Optimizing Converged Cisco Networks (ONT) Course Number: 642 845 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP Exam 642 845:
GPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
C H A P T E R Management Cisco SAFE Reference Guide OL-19523-01 9-1
CHAPTER 9 The primary goal of the management module is to facilitate the secure management of all devices and hosts within the enterprise network architecture. The management module is key for any network
Interconnecting Cisco Networking Devices Part 2
Interconnecting Cisco Networking Devices Part 2 Course Number: ICND2 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: 640 816: ICND2 Course Overview This course
Amazon Virtual Private Cloud. Network Administrator Guide API Version 2015-04-15
Amazon Virtual Private Cloud Network Administrator Amazon Virtual Private Cloud: Network Administrator Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Table of Contents
FortiOS Handbook - IPsec VPN VERSION 5.2.2
FortiOS Handbook - IPsec VPN VERSION 5.2.2 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
Module 6 Configure Remote Access VPN
Network Security 2 Module 6 Configure Remote Access VPN Learning Objectives 6.1 Introduction to Cisco Easy VPN 6.2 Configure the Easy VPN Server 6.3 Configure Easy VPN Remote for the Cisco VPN Client 4.x
How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations
How Cisco IT Uses Firewalls to Protect Cisco Internet Access Locations Cisco PIX Security Appliance provides stateful firewall protection at smaller Internet gateways. Cisco IT Case Study / Security and
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
Cisco CCNP 642 825 Implementing Secure Converged Wide Area Networks (ISCW)
Cisco CCNP 642 825 Implementing Secure Converged Wide Area Networks (ISCW) Course Number: 642 825 Length: 5 Day(s) Certification Exam This course will help you prepare for the following exam: Cisco CCNP
Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI
Lab 6.5.9b Configure a Secure VPN Using IPSec between a PIX and a VPN Client using CLI Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure and Verify
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
Table of Contents. Introduction
viii Table of Contents Introduction xvii Chapter 1 All About the Cisco Certified Security Professional 3 How This Book Can Help You Pass the CCSP Cisco Secure VPN Exam 5 Overview of CCSP Certification
FortiOS Handbook - IPsec VPN VERSION 5.2.4
FortiOS Handbook - IPsec VPN VERSION 5.2.4 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN Objective Scenario Topology In this lab, the students will complete the following tasks: Enable policy lookup via authentication, authorization,
Network virtualization
Martin Černý, Jan Fürman ([email protected], [email protected]) Department of Computer Systems Faculty of Information Technologies Czech technical university in Prague Martin Černý, Jan Fürman,
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Point-to-Point GRE over IPsec Design Guide
Point-to-Point GRE over IPsec Design Guide Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408
WAN Routing Configuration Examples for the Secure Services Gateway Family
Application Note WAN Routing Configuration Examples for the Secure Services Gateway Family Chien-shun Chu SPG Technical Marketing November, 2006 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN
Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN Product Overview Today s networked applications such as voice and video are accelerating the need
Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic
Configuring Tunnel Default Gateway on Cisco IOS EasyVPN/DMVPN Server to Route Tunneled Traffic Introduction This document discusses Cisco tunnel default gateway implementations that are available as part
The BANDIT Products in Virtual Private Networks
encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their
Group Encrypted Transport VPN
Group Encrypted Transport VPN Petr Růžička [email protected] Cisco Systems Czech Republic V Celnici 10, 117 21 Praha Abstract Today's networked applications, such as voice and video, are accelerating
Securing Networks with Cisco Routers and Switches 1.0 (SECURE)
Securing Networks with Cisco Routers and Switches 1.0 (SECURE) Course Overview: The Securing Networks with Cisco Routers and Switches (SECURE) 1.0 course is a five-day course that aims at providing network
Monitoring Remote Access VPN Services
CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,
Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products
Application Note Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
Triple DES Encryption for IPSec
Triple DES Encryption for IPSec Feature Summary Platforms Prerequisites IPSec supports the Triple DES encryption algorithm (168-bit) in addition to 56-bit encryption. Triple DES (3DES) is a strong form
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
IPsec VPN WAN Design Overview
Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 ALL DESIGNS, SPECIFICATIONS, STATEMENTS,
SDM: Site to Site IPsec VPN Between ASA/PIX and an IOS Router Configuration Example
SDM: Site to Site IPsec VPN Between ASA/PIX and an IOS Router Configuration Example Document ID: 110198 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Configuration
Cisco 3745. Cisco 3845 X X X X X X X X X X X X X X X X X X
Data Sheet Virtual Private Network (VPN) Advanced Integration Module (AIM) for the 1841 Integrated Services Router and 2800 and 3800 Series Integrated Services Routers The VPN Advanced Integration Module
VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
VPNs Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost.
Break Internet Bandwidth Limits Higher Speed. Extreme Reliability. Reduced Cost. Peplink. All Rights Reserved. Unauthorized Reproduction Prohibited Presentation Agenda Peplink Balance Pepwave MAX Features
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network
CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Table of Contents. Cisco Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall
IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to irewall Table of Contents Configuring an IPSec LAN to LAN Tunnel for Cisco VPN 5000 Concentrator to Cisco Secure PIX Firewall...1 Cisco has announced
SAFE VPN. IPSec Virtual Private Networks in Depth
WHITE PAPER SAFE VPN IPSec Virtual Private Networks in Depth Table of Contents Authors.................................... 2 Abstract.................................... 2 Audience...................................
Amazon Virtual Private Cloud. Network Administrator Guide API Version 2014-06-15
Amazon Virtual Private Cloud Network Administrator Amazon Web Services Amazon Virtual Private Cloud: Network Administrator Amazon Web Services Copyright 2014 Amazon Web Services, Inc. and/or its affiliates.
Virtual PortChannels: Building Networks without Spanning Tree Protocol
. White Paper Virtual PortChannels: Building Networks without Spanning Tree Protocol What You Will Learn This document provides an in-depth look at Cisco's virtual PortChannel (vpc) technology, as developed
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
