FlexVPN for Carrier Network Security



Similar documents
Deploying FlexVPN with IKEv2 and SSL

Advanced IPSec with FlexVPN

Cisco EXAM Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product.

Configuring Remote Access to MPLS VPN

Notice the router names, as these are often used in MPLS terminology. The Customer Edge router a router that directly connects to a customer network.

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

DYNAMIC MULTIPOINT VPN HUB AND SPOKE INTRODUCTION

BGP Link Bandwidth. Finding Feature Information. Prerequisites for BGP Link Bandwidth

BUY ONLINE AT:

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

Implementing MPLS VPNs over IP Tunnels

Module 6 Configure Remote Access VPN

BGP Link Bandwidth. Finding Feature Information. Contents

Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software

Scenario: Remote-Access VPN Configuration

Network Security 2. Module 6 Configure Remote Access VPN

MPLS VPN Implementation

Configuring a Basic MPLS VPN

Cisco Easy VPN on Cisco IOS Software-Based Routers

Point-to-Point GRE over IPsec Design and Implementation

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

CCNA Security 1.1 Instructional Resource

Cisco Actualtests Exam Questions & Answers

MPLS-based Layer 3 VPNs

This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T.

Lab a Configure Remote Access Using Cisco Easy VPN

IPv4/IPv6 Transition Mechanisms. Luka Koršič, Matjaž Straus Istenič

Configuring IKEv2 Load Balancer

Configure ISDN Backup and VPN Connection

Configuring MPLS Hub-and-Spoke Layer 3 VPNs

Using PIX Firewall in SOHO Networks

Lab Configure Remote Access Using Cisco Easy VPN

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

Cisco Virtual Office Deployment Guide

Provisioning Dial Access to MPLS VPN Integration

MPLS. Cisco MPLS. Cisco Router Challenge 227. MPLS Introduction. The most up-to-date version of this test is at:

Deploying and Configuring MPLS Virtual Private Networks In IP Tunnel Environments

Scenario: IPsec Remote-Access VPN Configuration

TheGreenBow VPN Client. User Guide

Licenses are not interchangeable between the ISRs and NGX Series ISRs.

Connecting Remote Offices by Setting Up VPN Tunnels

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

VPN_2: Deploying Cisco ASA VPN Solutions

Quick Note 20. Configuring a GRE tunnel over an IPSec tunnel and using BGP to propagate routing information. (GRE over IPSec with BGP)

Extending Your IT Infrastructure Into Amazon Web Services Using Cisco DMVPN and the Cisco Cloud Services Router 1000V Series

Configuring Global Protect SSL VPN with a user-defined port

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Multiprotocol Label Switching Load Balancing

Implementing Cisco Secure Mobility

IPv6 Security. Scott Hogg, CCIE No Eric Vyncke. Cisco Press. Cisco Press 800 East 96th Street Indianapolis, IN USA

Implementing Object Tracking on Cisco IOS XR Software

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

Case Study for Layer 3 Authentication and Encryption

IP Office Technical Tip

Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.

SEC , Cisco Systems, Inc. All rights reserved.

Introduction Inter-AS L3VPN

Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W

Advanced Concepts of DMVPN (Dynamic Multipoint VPN) Mike Sullenberger Distinguished Engineer BRKSEC-4054

ASA Remote Access VPN with OCSP Verification under Microsoft Windows 2012 and OpenSSL

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

CCNP Security SECURE

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

Transitioning to BGP. ISP Workshops. Last updated 24 April 2013

Remote Access VPN Business Scenarios

Inter-Autonomous Systems for MPLS VPNs

This topic discusses Cisco Easy VPN, its two components, and its modes of operation. Cisco VPN Client > 3.x

LAN-Cell to Cisco Tunneling

WiNG 5.X How-To Guide

Dial-Up VPN auf eine Juniper

crypto key generate rsa

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

CCIE Security Written Exam ( ) version 4.0

Cisco Certified Security Professional (CCSP)

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource

Joe Davies Principal Writer Windows Server Documentation

Cox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]

How To Design An Ipsec Vpn Network Connection

WAN Edge MPLS VPN over DMVPN 2547oDMVPN (Hub and Spoke Only)

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Frame Mode MPLS Implementation

Securing Networks with Cisco Routers and Switches ( )

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuring Remote Access IPSec VPNs

FortiOS Handbook - IPsec VPN VERSION 5.2.2

MPLS VPN Security BRKSEC-2145

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

How To Industrial Networking

External Authentication with Cisco Router with VPN and Cisco EZVpn client Authenticating Users Using SecurAccess Server by SecurEnvoy

APNIC elearning: BGP Basics. Contact: erou03_v1.0

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

Cisco Which VPN Solution is Right for You?

BorderWare Firewall Server 7.1. Release Notes

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

Virtual Private Network (VPN)

Encrypted Preshared Key

Advanced Concepts of DMVPN (Dynamic Multipoint VPN)

Configuring Internet Key Exchange Security Protocol

Transcription:

FlexVPN for Carrier Network Security Alex HONORÉ <ahonore@cisco.com> Customer Support Engineer, Cisco TAC

Session Agenda Overview of FlexVPN Case Study: Managed Remote Access Use Case #1: Single Customer, Multiple VRFs Use Case #2: Multiple Customers & VRFs Case Study: Mixed Client & Branch Access Case Study: MPLS VPN Dynamic Mesh Further Information Q & A Cisco Public 2

Overview of FlexVPN Cisco Public 3

Solution Positioning Interop. Dynamic Routing IPsec Routing Spoke to Spoke Direct Remote Access Simple Failover Source Failover Confg Push Per-Peer Confg Per-Peer QoS Full AAA Mgmt Easy VPN No No Yes No Yes Yes No Yes Yes Yes Complex DMVPN No Yes No Yes No Partial No No No Group No Crypto Map Yes No Yes No Yes Poor No No No No No FlexVPN Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes One VPN to learn and deploy Everything works no questions asked Cisco Public 4

Comparing IKEv1 & IKEv2 Same Objectives Authentication Integrity EAP-Only IKEv2 RFC 5998 Confdentiality DPD ISAKMP RFC 2408 Childless IKEv2 RFC 6023 More Secure Suite-B IPsec DOI RFC 2407 IKEv1 Mode Confg IKEv2 IKEv2 RFC 5996 Anti-DoS PSK, RSA-Sig IKE RFC 2409 NAT-T IKEv2 Redirect RFC 5685 Authentication Options EAP Auth. Hybrid Auth. Etc.... Cleaner Identity & Key Exchange Bidirectional Confguration Exchange Similar but Diferent Uses UDP Ports 500 & 4500 Main + Aggressive INITIAL Acknowledged Notifcations Cisco Public 5

Dynamic Point-to-Point Virtual Interfaces FlexVPN Server P2P virtual interface template crypto ikev2 profile default Dynamically instantiated P2P interfaces... virtual-template 1 interface Virtual-Access1 ip interface unnumbered Virtual-Access2 Loopback0 tunnel ip interface unnumbered source <local-address> Virtual-Access3 Loopback0 tunnel tunnel ip destination unnumbered source <local-address> <remote-address> Loopback0 tunnel tunnel tunnel mode destination ipsec source ipv4 <local-address> <remote-address> VA1 VA2 VA3 VT1 interface Virtual-Template1 type tunnel ip unnumbered Loopback0 tunnel mode ipsec ipv4 tunnel protection ipsec profile default tunnel tunnel tunnel protection mode destination ipsec ipsec ipv4 profile <remote-address> default service-policy tunnel tunnel protection mode output ipsec ipsec mobile-qos ipv4 profile default service-policy tunnel protection output ipsec traveler-qos profile default Server routing table (RIB/FIB) service-policy output home-office-qos S default via Ethernet0/0 L 10.0.1.1/32 local Loopback0 S 10.0.1.10/32 via Virtual-Access1 S 10.0.1.11/32 via Virtual-Access2 S 10.0.1.12/32 via Virtual-Access3 S 10.42.1.0/24 via Virtual-Access3 Static P2P virtual interface 10.0.1.10/32 10.0.1.11/32 10.0.1.12/32 10.42.1.0/24 Tun0 interface Tunnel0 ip address negotiated tunnel source Ethernet0/0 tunnel destination <server-address> tunnel mode ipsec ipv4 tunnel protection ipsec profile default Cisco Public 6

Confguration Example crypto ikev2 profile default match identity remote fqdn domain cisco.com identity local fqdn router.cisco.com IKEv2 identity & profle selection authentication local rsa-sig authentication remote eap IKEv2 authentication & certifcates pki trustpoint root sign aaa authentication eap default aaa authorization user eap AAA integration (authentication, authorization, accounting) virtual-template 1 interface Virtual-Template1 type tunnel Dynamic point-to-point interfaces ip unnumbered Loopback0 tunnel mode ipsec ipv4 Native IPsec tunnel or GRE/IPsec tunnel protection ipsec profile default Cisco Public 7

High-Level Functional Interactions FlexVPN Client IKEv2 Initiator RADIUS Client EAP Supplicant FlexVPN Server IKEv2 Responder RADIUS NAS EAP Authenticator AAA Server RADIUS Server EAP Backend IKEv2 Authentication (certifcate, PSK) AAA PSK Storage (optional) EAP Client Authentication (password, TLS, token, etc.) RADIUS Authorization (per-user and/or per-group) RADIUS Accounting Cisco Public 8

Case Study: Managed Remote Access Cisco Public 9

Use Case #1: Single Customer, Multiple VRFs Requirements: VRF: blue Joe s profle VRF: green Tom s profle Certifcate-based authentication Cisco AnyConnect VPN client & Windows native IKEv2 client QoS: low-bw Zone: restricted Blue VRF QoS: high-bw Zone: unrestricted Green VRF Per-user features pushed via AAA (VRF, ZBF, QoS,...) Proposed solution: Eth0/1 Joe s V-Access Eth0/2 Tom s V-Access Single IKEv2 profle & V-Template RADIUS authorization for certifcate CN Global VRF Per-user interface-confg strings Internet CN=Joe CN=Tom Cisco Public 10

FlexVPN Server Confguration RADIUS-based authorization Match on peer identity certifcate aaa new-model aaa authorization network my-rad group my-rad crypto pki certificate map my-map 1 issuer-name co o = my-org Extract CN from IKE ID of type DN crypto ikev2 name-mangler cert-cn dn common-name crypto ikev2 profile default match certificate my-map identity local dn Mutual RSA-Sig authentication Per-user authorization based on CN authentication remote rsa-sig authentication local rsa-sig pki trustpoint my-ca aaa authorization user cert list my-rad name-mangler cert-cn virtual-template 1 interface Virtual-Template1 type tunnel Minimal V-Template for all clients no ip address tunnel mode ipsec ipv4 tunnel protection ipsec profile default Cisco Public 11

RADIUS Server Confguration Joe Client address pool, V-Access & IP unnumbered in VRF blue Per-user interface commands for QoS & ZBF features ipsec:addr-pool=blue ip:interface-config=vrf forwarding blue ip:interface-config=ip unnumbered Loopback1 ip:interface-config=service-policy output low-bw ip:interface-config=zone-member security restricted Tom ipsec:addr-pool=green ip:interface-config=vrf forwarding green ip:interface-config=ip unnumbered Loopback2 ip:interface-config=service-policy output high-bw ip:interface-config=zone-member security unrestricted interface Virtual-Access1 vrf forwarding blue Interface confg commands are dynamically applied at run-time upon V-Access instantiation ip unnumbered Loopback1 tunnel source... tunnel mode ipsec ipv4 tunnel destination... tunnel protection ipsec profile default service-policy output low-bw zone-member security restricted Cisco Public 12

Use Case #2: Multiple Customers, Shared Headend Requirements: Customer Blue VRF Customer Green VRF Username-password authentication on customer-managed AAA server AAA Server AAA Server Cisco AnyConnect VPN client VRF & QoS imposed by headend MPLS Proposed solution: Multiple IKEv2 profles & V-Templates Joe s V-Access Tom s V-Access EAP authentication Global VRF Internet Joe Tom Cisco Public 13

FlexVPN Server Confguration RADIUS-based EAP authentication with AAA server in the customer VRF Local authorization attributes aaa new-model aaa authentication login blue-rad group blue-rad crypto ikev2 authorization policy blue-pol pool blue-pool Match on IKE ID confgured in AnyConnect XML profle Allow client to authenticate using EAP Authenticate to client using RSA-Sig Get address pool from local authorization policy crypto ikev2 profile blue match identity remote key-id blue-id identity local dn authentication remote eap query-identity authentication local rsa-sig pki trustpoint blue-ca aaa authentication eap blue-rad aaa authorization group eap list default blue-pol virtual-template 1 Specifc tunnel protection profle using default IPsec transform set crypto ipsec profile blue set ikev2-profile blue interface Virtual-Template1 type tunnel Specifc V-Template with correct VRF & QoS settings for this customer vrf forwarding blue ip unnumbered Loopback1 tunnel mode ipsec ipv4 tunnel protection ipsec profile blue service-policy output blue-qos Cisco Public 14

Case Study: Mixed Client & Branch Access Cisco Public 15

Use Case: Mixed Client & Branch Access Requirements: RADIUS/EAP Server (in management VRF) Single responder for software clients & remote branches (spokes) Multiple VRFs behind hub Spoke-to-spoke tunnels enabled FlexVPN Hub on a per-branch basis VRF enforced per user/branch IPsec tunnels Branches use IKE certifcates, clients Internet use EAP (password or TLS certifcates) Proposed solution: Bob (VRF blue) Ad-hoc tunnel Tom (VRF green) Single IKEv2 profle & V-Template Diferentiated AAA authorization Branch A (VRF red) Joe (VRF blue) depending on authentication method Branch B (VRF red) Cisco Public 16

FlexVPN Server Confguration RADIUS-based EAP authentication and AAA authorization Match on FQDN domain for branches Match statements for clients (depending on allowed client types) Allow peers to authenticate using either EAP or certifcates aaa new-model aaa authentication login my-rad group my-rad aaa authorization network my-rad group my-rad crypto ikev2 profile default match identity remote fqdn domain example.com match identity remote {key-id email address}... identity local dn authentication remote rsa-sig authentication remote eap query-identity authentication local rsa-sig pki trustpoint my-ca User authorization using attributes returned during EAP authentication Branch authorization using RADIUS aaa authentication eap my-rad aaa authorization user eap cached aaa authorization user cert list my-rad virtual-template 1 Automatic detection of tunnel mode 1 (pure IPsec tunnel mode for clients, GRE/IPsec for branches/spokes) interface Virtual-Template1 type tunnel no ip address tunnel mode auto tunnel protection ipsec profile default 1 Starting with IOS-XE 3.12S Cisco Public 17

RADIUS Server Confguration Clients can perform password-based or TLS-based EAP authentication (TLS: RADIUS account = CN or UPN) User attributes returned by RADIUS with successful EAP authentication joe cleartext-password=c1sc0 ipsec:addr-pool=blue ip:interface-config=vrf forwarding blue ip:interface-config=ip unnumbered Loopback1 ip:interface-config=service-policy output blue-pol ip:interface-config=... Branch attributes returned by RADIUS during AAA authorization step Add/remove NHRP to enable/disable spoke-to-spoke tunnels per branch Exchange prefxes via IKEv2 routing, branch prefx(es) controlled by branch branch1.example.com ip:interface-config=vrf forwarding red ip:interface-config=ip unnumbered Loopback3 ip:interface-config=ip nhrp network-id 3 ip:interface-config=ip nhrp redirect ipsec:route-set=prefix 192.168.0.0 255.255.0.0 ipsec:route-accept=any branch2.example.com ip:interface-config=vrf forwarding green Branch prefx controlled by AAA server (installed as local static route) ip:interface-config=ip unnumbered Loopback2 ipsec:route-set=prefix 192.168.0.0 255.255.0.0 ipsec:route-set=local 192.168.1.0 Cisco Public 18

FlexVPN Branch/Spoke Confguration crypto ikev2 profile default match identity remote fqdn domain example.com identity local fqdn branch1.example.com authentication remote rsa-sig Apply default authorization policy: - route set interface - route accept any (if needed, add extra route set... ) authentication local rsa-sig pki trustpoint my-ca dpd 10 2 on-demand aaa authorization group cert list default default virtual-template 1 Static tunnel interface (spoke-hub) Enable spoke-spoke tunnel creation (also requires hub-side VA confg) interface Tunnel0 ip unnumbered Loopback1 ip nhrp network-id 1 ip nhrp shortcut virtual-template 1 tunnel source Ethernet0/0 tunnel destination 192.0.2.10 tunnel protection ipsec profile default interface Virtual-Template1 type tunnel V-Template (spoke-spoke) with same NHRP confg as Tunnel0 ip unnumbered Loopback1 ip nhrp network-id 1 ip nhrp shortcut virtual-template 1 tunnel protection ipsec profile default Cisco Public 19

FlexVPN Static & Dynamic Interfaces FlexVPN Hub Virtual-Template1 VA1 VA2 Tunnel0 VA1 VA1 Tunnel0 Virtual-Template1 Virtual-Template1 FlexVPN Spoke FlexVPN Spoke Cisco Public 20

Case Study: MPLS VPN Dynamic Mesh Cisco Public 21

Use Case: MPLS VPN over FlexVPN Requirements: MPLS Trafc segregation using MPLS VPN Dynamic spoke-to-spoke tunnels FlexVPN Hub Certifcate-based authentication Proposed solution: MPLS-enabled GRE/IPsec tunnels IPsec tunnels in global VRF (a single tunnel carries all VRFs using VPNv4 labels) Internet Trafc in VRF red Trafc in VRF blue Spokes peer with hub using MP-iBGP Spoke A Ad-hoc tunnel Spoke C NHRP carries label information for spoke-to-spoke direct forwarding Spoke B Trafc in VRF red Trafc in VRF green Cisco Public 22

FlexVPN Hub Confguration (1) crypto ikev2 profile default match identity remote fqdn domain example.com identity local fqdn hub.example.com authentication remote rsa-sig authentication local rsa-sig pki trustpoint my-ca Apply default authorization policy V-Template & V-Access in global VRF Enable NHRP on V-Template Enable spoke-spoke redirection & give NHRP control over MPLS dpd 10 2 on-demand aaa authorization group cert list default default virtual-template 1 interface Virtual-Template1 type tunnel ip unnumbered Loopback1 ip nhrp network-id 1 ip nhrp redirect mpls nhrp tunnel protection ipsec profile default Cisco Public 23

FlexVPN Hub Confguration (2) Use BGP Dynamic Neighbor feature to listen for incoming connections Use V-Template unnumbered IP address as the update-source Exchange VPNv4 prefxes with spokes router bgp 65001 bgp listen range 10.0.0.0/16 peer-group spokes neighbor spokes peer-group neighbor spokes remote-as 65001 neighbor spokes update-source Loopback1 address-family vpnv4 neighbor spokes activate neighbor spokes send-community extended Send summary route to all spokes within each VRF address-family ipv4 vrf blue network 192.168.0.0 mask 255.255.0.0 exit-address-family... ip route vrf blue 192.168.0.0 255.255.0.0 Null0 Cisco Public 24

FlexVPN Spoke Confguration (1) crypto ikev2 profile default match identity remote fqdn domain example.com identity local fqdn spoke1.example.com authentication remote rsa-sig authentication local rsa-sig pki trustpoint my-ca Apply default authorization policy Static tunnel interface (spoke-hub) located in global VRF Enable spoke-spoke tunnel creation & give NHRP control over MPLS dpd 10 2 on-demand aaa authorization group cert list default default virtual-template 1 interface Tunnel0 ip unnumbered Loopback1 ip nhrp network-id 1 ip nhrp shortcut virtual-template 1 mpls nhrp tunnel source Ethernet0/0 tunnel destination 192.0.2.10 tunnel protection ipsec profile default interface Virtual-Template1 type tunnel V-Template (spoke-spoke) with same NHRP confg as Tunnel0 ip unnumbered Loopback1 ip nhrp network-id 1 ip nhrp shortcut virtual-template 1 mpls nhrp tunnel protection ipsec profile default Cisco Public 25

FlexVPN Spoke Confguration (2) Confgure hub as static ibgp neighbor (with Tunnel0 unnumbered IP address as the update-source) router bgp 65001 neighbor 10.0.0.10 remote-as 65001 neighbor 10.0.0.10 update-source Loopback1 address-family vpnv4 Exchange VPNv4 prefxes with hub neighbor 10.0.0.10 activate neighbor 10.0.0.10 send-community extended exit-address-family Send local prefxes to hub for all VRFs address-family ipv4 vrf blue network 192.168.1.0 exit-address-family... Cisco Public 26

Further Information Cisco Public 27

Further Information Cisco Live recordings/slides (www.ciscolive365.com) Milan 2014: BRKSEC-2881: FlexVPN Remote Access Milan 2014: BRKSEC-3036: FlexVPN Advanced Site-to-Site London 2013: BRKSEC-3013: Advanced IPsec with FlexVPN & IKEv2 IOS & IOS-XE Confguration Guide (www.cisco.com) More literature is in the works... Cisco Public 28

Thank you Cisco Public 29