Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com



Similar documents
Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

Group Encrypted Transport VPN

BUY ONLINE AT:

Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM

Cisco EXAM Implementing Cisco Secure Mobility Solutions (SIMOS) Buy Full Product.

DYNAMIC MULTIPOINT VPN HUB AND SPOKE INTRODUCTION

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

SEC , Cisco Systems, Inc. All rights reserved.

Introducing Basic MPLS Concepts

MPLS VPN Security BRKSEC-2145

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Network Virtualization Network Admission Control Deployment Guide

VPN. VPN For BIPAC 741/743GE

LinkProof And VPN Load Balancing

Cisco Which VPN Solution is Right for You?

Introduction to MPLS-based VPNs

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

Point-to-Point GRE over IPsec Design and Implementation

MPLS Implementation MPLS VPN

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

Demonstrating the high performance and feature richness of the compact MX Series

Lecture 17 - Network Security

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Disaster Recovery White Paper

Junos MPLS and VPNs (JMV)

MPLS Concepts. Overview. Objectives

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Cisco Site-to-Site VPN Lab 3 / GRE over IPSec VPNs by Michael T. Durham

Virtual Privacy vs. Real Security

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

MPLS Layer 3 and Layer 2 VPNs over an IP only Core. Rahul Aggarwal Juniper Networks. rahul@juniper.net

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

MPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

CCNA Security 1.1 Instructional Resource

TrustNet Group Encryption

MPLS Security Considerations

IMPLEMENTING CISCO MPLS V3.0 (MPLS)

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

BUILDING MPLS-BASED MULTICAST VPN SOLUTION. DENOG3 Meeting, /Frankfurt Carsten Michel

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Cisco Exam CCIE Service Provider Written Exam Version: 7.0 [ Total Questions: 107 ]

- Multiprotocol Label Switching -

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

IPv6 Fundamentals, Design, and Deployment

MPLS L3 VPN Supporting VoIP, Multicast, and Inter-Provider Solutions

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

VPN Consortium Scenario 1: Gateway-to-Gateway with Preshared Secrets

Virtual Private Networks

IPSec-VPN as a backup for the RMDCN

(d-5273) CCIE Security v3.0 Written Exam Topics

High Level Overview of IPSec and MPLS IPVPNs

Application Note: Onsight Device VPN Configuration V1.1

Enterprise Network Simulation Using MPLS- BGP

RFC 2547bis: BGP/MPLS VPN Fundamentals

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

Designing and Developing Scalable IP Networks

The Complete IS-IS Routing Protocol

UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...

Chapter 4 Virtual Private Networking

UNDERSTANDING JUNOS OS NEXT-GENERATION MULTICAST VPNS

Virtual Private LAN Service on Cisco Catalyst 6500/6800 Supervisor Engine 2T

Chapter 3 LAN Configuration

Connecting Remote Offices by Setting Up VPN Tunnels

Securing IP Networks with Implementation of IPv6

Case Study for Layer 3 Authentication and Encryption

Implementing MPLS VPN in Provider's IP Backbone Luyuan Fang AT&T

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Part The VPN Overview

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Tackling the Challenges of MPLS VPN Testing. Todd Law Product Manager Advanced Networks Division

VPLS Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date

MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Implementing Cisco MPLS

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

MPLS VPN Security in Service Provider Networks. Peter Tomsu Michael Behringer Monique Morrow

CS 4803 Computer and Network Security

Clustering. Configuration Guide IPSO 6.2

Network Security. Lecture 3

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

SDN CONTROLLER. Emil Gągała. PLNOG, , Kraków

This section provides a summary of using network location profiles to identify network connection types. Details include:

Unified Services Routers

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

How Routers Forward Packets

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Optimizing Networks for NASPI

Magnum Network Software DX

Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example

Transcription:

Advanced IPSec with GET VPN Nadhem J. AlFardan Consulting System Engineer Cisco Systems nalfarda@cisco.com 1

Agenda Motivations for GET-enabled IPVPN GET-enabled IPVPN Overview GET Deployment Properties GET-enabled VPN Reliability General Recommendations 2

Motivations for GET VPN 3

Challenges with Existing Security and IP VPN IPSec Peer Crypto Map Security IPSec TED Crypto Map Security Full Mesh of crypto map entries and dormant until packet flow initiates SA creation Potential m esh based on dynam ic crypto m ap entry and dorm ant until packet flow initiates SA creation CE CE CE CE PE MPLS VPN PE P E M P LS V P N P E CE CE CE CE CE CE IPSec DMVPN Security Persistent Partial Mesh with potential m esh based on dynam ic crypto m ap entry. Dorm ant spoke -to-spoke until packet flow initiates SA creation CE -HUB CE -HUB IPSec GRE Security Persistent Partial Mesh with potential mesh based on dynamic crypto map entry. CE -HUB CE -HUB PE MPLS VPN PE PE MPLS VPN PE CE -SPOKE CE -SPOKE CE -SPOKE CE -SPOKE CE -SPOKE CE -SPOKE Existing Models Create Overlay networks on IP VPN mitigating the value of IP VPN 4

MPLS VPN Attributes CE1 RR CE 3 10/4 10/2 IP VPN 10/3 10/1 CE 2 Hierarchical Routing Any-to-Any Connectivity MPLS PE and P Replication X CE 5 Redundancy Established between CE and PE CE 4 10/5 5

IPsec Attributes 10/4 CE1 CE 3 10/2 IP VPN 10/3 10/1 CE 2 Point-to-Point Connectivity Overlay Routing in Tunnels Redundancy Established by CE Multicast Replication Induced at CE CE 5 CE 4 10/5 6

Network Paradigm Assessment MPLS VPN IPsec Any-to-any connectivity without CE-CE Tunnel Adjacency Single Point Provisioning on per CE basis Distributed and Hierarchical Routing for Scalability Optimal traffic forwarding Security Confidentiality (segmentation only) Segmentation Integrity Scalability Constraints of Point-to-Point Tunnel Adjacency Per Peer Provisioning Scalability Constraints of Point-to-Point Overlay Routing or Route Insertion Traffic forwarding according to non-optimal Tunnel overlay Security Segmentation Confidentiality Integrity 7

Reconciliation of the Network Paradigms So Now What? Resolution A new security paradigm for multicast and unicast communication on an MPLS VPN Security paradigm does not create the VPN, it uses an existing MPLS VPN 8

GET Technical Overview 9

Group Security Functions Key Server Validate s Manage Security Policy Create Group Keys Distribute Policy / Keys Group Member Encryption Devices Route Between Secure / Unsecure Regions Multicast Participation Key Server Routing Members Routing Member Forwarding Replication Routing Group Member Group Member Group Member 10

Group Security Elements Key Encryption Key (KEK) Key Server Group Policy Traffic Encryption Key (TEK) RFC3547: Group Domain of Interpretation (GDOI) Group Member Routing Members Group Member Group Member Group Member 11

Group Security Association s share a security association Security association is not to a specific group member Security association is with a set of group members Safe when VPN gateways are working together to protect the same traffic The VPN gateways are trusted in the same way Traffic can flow between any of the VPN gateways 12

Basic GET VPN Architecture Step 1: s (GM) register via GDOI with the Key Server (KS) KS authenticates & authorizes the GM KS returns a set of IPsec SAs for the GM to use GM2 GM3 GM4 GM1 GM5 GM6 GM9 GM8 GM7 KS 13

Basic GET VPN Architecture Step 2: Data Plane Encryption GM exchange encrypted traffic using the group keys The traffic uses IPSec Tunnel Mode with address preservation GM2 GM3 GM4 GM1 GM5 GM6 GM9 GM8 GM7 KS 14

Basic GET VPN Architecture Step 3: Periodic Rekey of Keys KS pushes out replacement IPsec keys before current IPsec keys expire. This is called a rekey GM2 GM3 GM4 GM1 GM5 GM6 GM9 GM8 GM7 KS 15

GET Deployment Properties 16

IPsec Tunnel Mode IP Packet IP Header IP Payload IPsec Tunnel Mode New IP Header ESP IP Header IP Payload IPsec header inserted by VPN Gateway New IP Address requires overlay routing 17

IPsec Tunnel Mode with IP Address Preservation IP Packet IP Header IP Payload Group Encrypted Transport Copy of Original IP Header ESP IP Header IP Payload IPsec header preserved by VPN Gateway Preserved IP Address uses original routing plane 18

Secure Data Plane Unicast Data Protection Secure Unicast Premise: Receiver advertises destination prefix but does not know the potential encryption sources? GM GM?? GM GM 19

Secure Data Plane Unicast Data Protection Secure Unicast Premise: Receiver advertises destination prefix but does not know the potential encryption sources Receiver assumes that legitimate group members obtain Traffic Encryption Key from key server for the group GM KS GM GM GM 20

Secure Data Plane Unicast Premise: Receiver advertises destination prefix but does not know the potential encryption sources Receiver assumes that legitimate group members obtain Traffic Encryption Key from key server for the group Receiver can authenticate the group membership GM KS Data Protection Secure Unicast GM GM GM 21

Group Authorization? Key Server? GROUP AFFINITY GREEN = GM2, GM3, GM4 GROUP AFFINITY RED = GM1, GM2, GM3, GM4 Group Member 1 Routing 10/8 Members 10/8 Group Member 2 IDENTITY = 2; Member of RED Group IDENTITY = 3; Member of RED Group IDENTITY = 1; Member of RED Group IDENTITY = 4; Member of RED Group GM IDENTITY used to authorize membership Group Member 4 Group Member 3 22

Group Authorization? Key Server? GROUP AFFINITY GREEN = GM2, GM3, GM4 IDENTITY = 2; Member of GREEN Group GROUP AFFINITY RED = GM1, GM2, GM3, GM4 Group Member 2 Group Member 1 Routing 10/8 Members 232/8 Group Member 3 IDENTITY = 3; Member of GREEN Group GM IDENTITY used to authorize membership Group Member 4 IDENTITY = 4; Member of GREEN Group 23

Group Policy Considerations What may already be protected? Management Plane SSH, TACACS, HTTPS What should not be protected with Group Security? Control Plane Internet Key Exchange / Group Domain of Interpretation Routing Exchanges (OSPF, BGP) What needs to be protected with Group Security? Data Plane Enterprise Transactions Enterprise Multicast Streams What may be protected with Group Security? Data Plane Internet Transactions Diagnostics (LAN-LAN vs. WAN-WAN vs. WAN-LAN) 24

Group Policy Protection Scope of Data Plane Protection What class of traffic needs protection? Unicast from LANs Only Multicast from LANs Only Unicast and Multicast from LANs All Traffic Scope Exclusion What should not be encrypted? Control Plane Routing Control Plane (IGP, PIM) Crypto Control Plane (GDOI) 25

Encryption Methods Key Server Key Server maintains policy and encryption attributes per group IPsec Attributes IPsec Tunnel Mode w/header Preservation 3DES Policy permit ip 10/8 10/8 Unicast IPsec Attributes IPsec Tunnel Mode w/header Preservation Anti-Replay AES Policy permit ip 10/8 232/8 permit ip 10/8 10/8 Unicast and Multicast 26

Group Policy Distribution Group Keys Key Encryption Keys (Default Lifetime of 24 hours) Traffic Encryption Keys (Default Lifetime of 1 hour) Key Distribution Unicast Infrastructure Capable of Unicast Only Requirement for Rekey Acknowledgement Time Required for Serialized Key and Policy Distribution Multicast Infrastructure Capable of Multicast Quick Key and Policy Distribution 27

Group Keys Key Encryption Key (KEK) Used to encrypt GDOI (i.e. control traffic) between KS and GM Key Server KEK TEK1 Traffic Encryption Key (TEK) Used to encrypt data (i.e. user traffic) between GM IP VPN 28

Group Keys Key Server monitors expiration time of TEK1 Key Server creates TEK2 to replace TEK1 prior to expiration Key Server distributes TEK2 to all known GM via unicast or via multicast rekey group s install new TEK2 IP VPN Key Server KEK TEK1 TEK2 29

Group Keys All GM s capable of decrypting with TEK1 and TEK2 GM s pseudosynchronously transition encryption to TEK2 GM s continue to use TEK1 for decryption of data in flight. IP VPN KEK TEK1 TEK2 30

Group Keys All GM transitioned to TEK2 encryption TEK1 expires on GM pseudo-synchronously KEK TEK1 TEK2 IP VPN 31

GET Reliability 32

Cooperative Key Server: Roles Key Servers Bootstrap into Secondary Role Key Servers setup sessions between themselves and exchange key server state s Bootstrap with repeated Registration Attempts Registration Fails Until a Primary Key Server is Elected Secondary Secondary GDOI Registration Cooperative Key Server Protocol IPVPN Secondary 33

Cooperative Key Server: Roles A Key Server is Elected Primary, Creates Keys, and Distributes Keys s Complete Registration to an available Key Server and Receive Policy and Keys Primary Secondary GET VPN Secondary 34

Cooperative Key Server: Primary Processes Primary Key Server Generates new Keys on a Periodic Basis Primary Checks Consistency of Policies and Coordinates Group Member List with Secondary KS Primary Distributes Keys to Secondary KS and s Primary Notifies Secondary of Primary Presence Primary Secondary GET VPN Secondary 35

Cooperative Key Server: Secondary Processes Secondary Key Server Checks Consistency of Policies with Primary Key Server Secondary Key Server Authenticates s and Updates List with Primary KS Secondary Key Server Provides Keys and Policies to Registering s Secondary Key Server Monitors Presence of Primary Key Server Primary Secondary IPVPN GET VPN Secondary 36

Failure Scenarios: Key Server Failure Primary Key Server Database Lost (not disconnected) System Reboot, GDOI Database Cleared Secondary Key Servers Detect Loss of Primary Primary Secondary GET VPN Secondary 37

Failure Scenarios: Key Server Failure One Secondary KS Elected as New Primary KS Elected Primary Manages Policies, Keys, and List Elected Primary Now Responsible for Group Rekey Messages Primary Secondary Primary GET VPN Secondary 38

Failure Scenarios: Key Server Recovery Restored KS Recovers and Assumes Secondary Role Validates Policy with the Primary and Receives Keys and Group Member List Restored Key Server Eligible for Registrations Secondary Primary GET VPN Secondary 39

Redundant Key Server s Attempt to Register to a Key Server Configured with Ordered Set of Key Server Primary Key Server GET IPVPN X Dead Key Server 40

Failure Scenarios: Key Server Partition Primary Elected in Each Network Partition Elected Primary Creates New Keys and Distributes to s Primary Secondary Primary GET VPN Secondary 41

Failure Scenarios: Key Server Merge Lower Priority Primary KS Demoted to Secondary KS Demoted Key Server Provides Key Set to Elected Primary KS Elected Primary Synchronizes Keys with all Secondary KS Elected Primary Distributes Keys to All s Primary Secondary Primary Primary GET VPN Secondary 42

General Architectural Recommendations Key Server Architectural Considerations Distribute s Preferred Registration Across Multiple Key Servers Simplify configuration by using symmetric IPsec proxy identities for entire VPN (eg. permit ip any any or permit ip 10/8 10/8 ) Separate KS sites physically but provide highly reliable Cooperative KS connectivity via diverse paths between KS Architectural Considerations Consistent control plane / management plane selection on all PE-CE (i.e. IGP, SSH, SYSLOG, etc.) Distinct Address Ranges for Management, Data Plane, and Control 43

Q and A 44