+ All Categories
Home > Documents > © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide...

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide...

Date post: 13-Dec-2015
Category:
Upload: avice-gordon
View: 219 times
Download: 1 times
Share this document with a friend
29
© 2007 Cisco Systems, Inc. All rights reserved. ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1
Transcript
Page 1: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1

Implementing Secure Converged Wide Area Networks (ISCW)

Module 3.1

Page 2: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 2

Major Concepts in Module 3

Describe the purpose and operation of VPN types

Describe the purpose and operation of GRE VPNs

Describe the components and operations of IPsec VPNs

Configure and verify a site-to-site IPsec VPN with pre-shared key authentication using CLI

Configure and verify a site-to-site IPsec VPN with pre-shared key authentication using SDM

Configure and verify a Remote Access VPN

Page 3: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 3

Module 3 Objectives

Upon completion of this lesson, the successful participant will be able to:

1. Describe the purpose and operation of VPNs

2. Differentiate between the various types of VPNs

3. Identify the Cisco VPN product line and the security features of these products

4. Configure a site-to-site VPN GRE tunnel

5. Describe the IPSec protocol and its basic functions

6. Differentiate between AH and ESP

7. Describe the IKE protocol and modes

8. Describe the five steps of IPSec operation

Page 4: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 4

Module 3 Objectives ctd …

9. Describe how to prepare IPSec by ensuring that ACLs are compatible with IPSec

10. Configure IKE policies using the CLI

11. Configure the IPSec transform sets using the CLI

12. Configure the crypto ACLs using the CLI

13. Configure and apply a crypto map using the CLI

14. Describe how to verify and troubleshoot the IPSec configuration

15. Describe how to configure IPSec using SDM

16. Configure a site-to-site VPN using the Quick Setup VPN Wizard in SDM

17. Configure a site-to-site VPN using the step-by-step VPN Wizard in SDM

Page 5: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 5

Module 3 Objectives ctd …

18. Verify, monitor and troubleshoot VPNs using SDM

19. Describe how an increasing number of organizations are offering telecommuting options to their employees

20. Differentiate between Remote Access IPSec VPN solutions and SSL VPNs

21. Describe how SSL is used to establish a secure VPN connection

22. Describe the Cisco Easy VPN feature

23. Configure a VPN Server using SDM

24. Connect a VPN client using the Cisco VPN Client software

Page 6: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 6

What is a VPN?

Virtual: Information within a private network is transported over a public network.

Private: The traffic is encrypted to keep the data confidential.

VPN

VPN

Firewall

CSA

Regional branch with a VPN enabled Cisco ISR router

SOHO with a Cisco DSL Router

VPN

Mobile Worker with a Cisco VPN Client

Business Partnerwith a Cisco Router

Corporate Network

WAN

Internet

Page 7: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 7

Layer 3 VPN

Generic routing encapsulation (GRE)

Multiprotocol Label Switching (MPLS)

IPSec

SOHO with a Cisco DSL Router

VPNInternet

IPSec

IPSec

Page 8: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 8

Types of VPN Networks

MARS

VPN

VPN

Iron Port

Firewall

IPS

Web Server

Email Server DNS

CSACSACSACSA

CSA

CSA

CSA

Regional branch with a VPN enabled Cisco ISR router

SOHO with a Cisco DSL Router

VPN

Mobile Worker with a Cisco VPN Client

Business Partnerwith a Cisco Router

Site-to-SiteVPNs

Remote-accessVPNs

Internet

WAN

Page 9: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 9

Site-to-Site VPN

MARS

VPN

VPN

Iron Port

Firewall

IPS

Web Server

Email Server DNS

CSA

CSA

CSA

CSA

CSA

CSA

CSA

Regional branch with a VPN enabled Cisco ISR router

SOHO with a Cisco DSL

Router

VPN

Business Partnerwith a Cisco

Router

Site-to-SiteVPNs

Internet

WAN

Hosts send and receive normalTCP/IP traffic through a VPN gateway

Page 10: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 10

Remote-Access VPNs

MARS

VPN

Iron Port

Firewall

IPS

Web Server

Email Server DNS

CSACSA CSACSA

CSA

CSA

CSA

Mobile Worker with a Cisco VPN Client

Remote-accessVPNs

Internet

Page 11: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 11

VPN Client Software

R1 R1-vpn-cluster.span.com

“R1”

In a remote-access VPN, each host typically has Cisco VPN Client software

Page 12: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 12

Cisco IOS SSL VPN

Provides remote-access connectivity from any Internet-enabled host

Uses a web browser and SSL encryption

Delivers two modes of access:

Clientless

Thin client

Page 13: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 13

Cisco VPN Product Family

Product ChoiceRemote-Access

VPNSite-to-Site VPN

Cisco VPN-Enabled Router Secondary role Primary role

Cisco PIX 500 Series Security Appliances Secondary role Primary role

Cisco ASA 5500 Series Adaptive Security Appliances

Primary role Secondary role

Cisco VPN 3000 Series Concentrators

Primary role Secondary role

Home Routers Primary role

Page 14: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 14

Cisco VPN-Optimized Routers

Remote OfficeCisco Router

Regional OfficeCisco Router

SOHOCisco Router

Main OfficeCisco Router

Internet

VPN Features:•Voice and video enabled VPN (V3PN)

•IPSec stateful failover•DMVPN

•IPSec and Multiprotocol Label Switching (MPLS) integration•Cisco Easy VPN

Page 15: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 15

Cisco ASA 5500 Series AdaptiveSecurity Appliances

Flexible platform

Resilient clustering

Cisco Easy VPN

Automatic Cisco VPN

Cisco IOS SSL VPN

VPN infrastructure for contemporary applications

Integrated web-based management

ExtranetBusiness-to-Business

Intranet

Remote User

Remote Site Central Site

Internet

Page 16: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 16

IPSec Clients

Small Office

Internet

Cisco AnyConnect VPN Client

Certicom PDA IPsecVPN Client

Internet

Cisco VPNSoftware Client

Router withFirewall andVPN Client

A wireless client that is loaded on a pda

Software loaded on a PC

A network appliance that connects SOHO LANs to the VPN

Provides remote users with secure VPN connections

Page 17: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 17

Hardware Acceleration Modules

AIM

Cisco IPSec VPN Shared Port Adapter (SPA)

Cisco PIX VPN Accelerator Card+ (VAC+)

Enhanced Scalable Encryption Processing (SEP-E)

Cisco IPsec VPN SPA

Page 18: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 18

GRE VPN Overview

Page 19: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 19

Encapsulation

Original IP Packet

Encapsulated with GRE

Page 20: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 20

Configuring a GRE Tunnel

R1(config)# interface tunnel 0R1(config–if)# ip address 10.1.1.1 255.255.255.252

R1(config–if)# tunnel source serial 0/0R1(config–if)# tunnel destination 192.168.5.5

R1(config–if)# tunnel mode gre ipR1(config–if)#

R2(config)# interface tunnel 0R2(config–if)# ip address 10.1.1.2 255.255.255.252

R2(config–if)# tunnel source serial 0/0R2(config–if)# tunnel destination 192.168.3.3

R2(config–if)# tunnel mode gre ipR2(config–if)#

Create a tunnel interface

Assign the tunnel an IP address

Identify the source tunnel interface

Identify the destination of the tunnel

Configure what protocol GRE will encapsulate

Page 21: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 21

Using GRE

User TrafficIP

Only?

Use GRE Tunnel

NoNo

YesYes

NoNo YesYesUnicast Only?

Use IPsec VPN

GRE does not provide encryption

Page 22: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 22

IPSec Topology

Works at the network layer, protecting and authenticating IP packets.

It is a framework of open standards which is algorithm-independent.

It provides data confidentiality, data integrity, and origin authentication.

Business Partnerwith a Cisco Router

Regional Office with aCisco PIX Firewall

SOHO with a CiscoSDN/DSL Router

Mobile Worker with aCisco VPN Client

on a Laptop Computer

ASA

LegacyConcentrator

Main Site

PerimeterRouter

LegacyCisco

PIXFirewall

IPsec

POP

Corporate

Page 23: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 23

IPSec Framework

Diffie-Hellman DH7

Page 24: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 24

DH7Diffie-Hellman

Confidentiality

Key length: - 56-bits

Key length: - 56-bits (3 times)

Key length: - 160-bits

Key lengths: -128-bits-192 bits-256-bits

Least secure Most secure

Page 25: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 25

DH7Diffie-Hellman

Integrity

Key length: - 128-bits

Key length: - 160-bits)

Least secure Most secure

Page 26: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 26

DH7Diffie-Hellman

Authentication

Page 27: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 27

DH7Diffie-Hellman

Pre-shared Key (PSK)

•At the local device, the authentication key and the identity information (device-specific information) are sent through a hash algorithm to form hash_I. One-way authentication is

established by sending hash_I to the remote device. If the remote device can independently create the same hash, the local device is authenticated.

• The authentication process continues in the opposite direction. The remote device combines its identity information with the preshared-based authentication key and sends it through the hash algorithm to form hash_R. hash_R is sent to the local device. If the local

device can independently create the same hash, the remote device is authenticated.

Page 28: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 28

RSA Signatures

• At the local device, the authentication key and identity information (device-specific information) are sent through the hash algorithm forming hash_I. hash_I is encrypted using

the local device's private encryption key creating a digital signature. The digital signature and a digital certificate are forwarded to the remote device. The public encryption key for

decrypting the signature is included in the digital certificate. The remote device verifies the digital signature by decrypting it using the public encryption key. The result is hash_I.

• Next, the remote device independently creates hash_I from stored information. If the calculated hash_I equals the decrypted hash_I, the local device is authenticated. After the

remote device authenticates the local device, the authentication process begins in the opposite direction and all steps are repeated from the remote device to the local device.

Page 29: © 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 29

Diffie-Hellman

Secure Key Exchange

DH7


Recommended