Deploying and Managing Enterprise Ipsec Vpns
Deploying and Managing Enterprise Ipsec Vpns
Deploying and Managing Enterprise Ipsec Vpns
2.2.2.2
1.1.1.1 10.1.2.0/24
10.1.1.0/24 Internet
10.1.3.0/24
3.3.3.3
2.2.2.2
1.1.1.1 10.1.2.0/24
10.1.1.0/24 Internet
10.1.3.0/24
3.3.3.3
2.2.2.2
1.1.1.1 10.1.2.0/24
10.1.1.0/24 Internet
10.1.3.0/24
3.3.3.3
2.2.2.2
1.1.1.1 10.1.2.0/24
10.1.1.0/24 Internet
10.1.3.0/24
3.3.3.3
interface serial 0
crypto map IPSEC
!
ip route 10.0.0.0 255.0.0.0 serial 0
?
1.1.1.1
Remote Office
?
Internet
Frame Relay
2.2.2.2
1.1.1.1 ?
? Internet
?
3.3.3.3
2.2.2.2
tunnel 2002 ?
1.1.1.1
? Internet
tunnel 2003
?
3.3.3.3
2.2.2.2
tunnel 2002 ?
1.1.1.1
? Internet
tunnel 2003
?
3.3.3.3
? Internet
tunnel 2003
?
10.99.2.0/24 3.3.3.3
tunnel 2003
?
10.99.2.0/24 3.3.3.3
int serial 0
ip address 1.1.1.1 255.255.255.252
crypto map IPSEC
!
ip route 2.2.2.2 255.255.255.255 serial 0
ip route 3.3.3.3 255.255.255.255 serial 0
!
router ospf 1
network 10.0.0.0 0.255.255.255 area 1
• IPsec Management
Internet
• N * (N-1) / 2 tunnels
• Scaling issues with provisioning and routing
protocols
(....future Cisco features may help here...)
SEC-210 © 2002, Cisco Systems, Inc. All rights reserved. 24
Dynamic Multipoint VPN (DMVPN)
12.2(13)T
Dynamic
(or static)
public
10.1.2.1
IP addresses
10.1.2.0
Spoke 255.255.255.0
10.1.1.1
10.1.1.0
255.255.255.0
MPLS-VPN/
Frame Relay
X(config)#
crypto dynamic-map DYN 10
set transform-set ESP-3DES-SHA
match address 100
!
crypto map IPSEC 99 ipsec-isakmp dynamic discover
!
access-list 100 permit ip 10.1.1.0 0.0.0.255 10.0.0.0
0.255.255.255
SEC-210 © 2002, Cisco Systems, Inc. All rights reserved. 28
IPsec Migration Today
0. - -
1. IPsec -
2. IPsec IPsec
- all encrypted -
0. - -
1. passive -
2. passive passive
3. active passive
4. active active
• IPsec Management
HE-2
Remote VPN
10.1.5.0 Internet Head-End Corporate
Intranet
VPN
HE-1
VPN
Clien
t Head-End
HE-2
R1
Internet Corporate
S2
Intranet
P1 Hello HE-1
S1 Hello Hello
• DPD compatibility :
IOS 12.2(8)T and later
Pix 6.0 and later
VPN 3000 3.0 and later
1.1.1.2 HE-2
Remote
X Internet Head-End Corporate
Intranet
1.1.1.1
HE-1
HE-2
Remote
X Internet Head-End
Corporate
Intranet
HE-1
• Supported on IOS
• HSRP address used as tunnel endpoint
• Active device terminates IPsec tunnel
• In the event of failure, standby device takes
over (SAs will be renegotiated)
SEC-210 © 2002, Cisco Systems, Inc. All rights reserved. 36
High Availability with IPsec and HSRP+
1.1.1..3
HE-2
Remote Internet
X Corporate
Intranet
HE-1
interface Ethernet1/0
ip address 1.1.1.1 255.255.255.248
crypto map IPSEC 10
match address 10 standby 1 ip 1.1.1.3
set peer 1.1.1.3 standby 1 priority 200
set transform-set ESP-3DES-
SHA standby 1 preempt
standby 1 name VPNHA
standby 1 track Ethernet1/1 150
crypto map VPN redundancy VPNHA
who should I
send traffic to
for 10.1.5.0 ?
HE-2
Remote
10.1.5.0 Internet Head-End
Corporate
Intranet
HE-1
HE-2
Remote
X Internet Head-End
Corporate
Intranet
2.2.2.2
HE-1
HE-1
tunnel 2 HE-2
Remote
Internet Head-End
Corporate
Intranet
tunnel 1 HE-1
Remote :
!
int tunnel 1 HE-1 HE-2
...... ! !
ip ospf cost 10 int tunnel 1 int tunnel 2
..... ...... ......
! ip ospf cost 10 ip ospf cost 10
int tunnel 2 ..... .....
......
ip ospf cost 20
......
HSRP+ (RRI)
DPD(RRI)
PIX Failover DPD (RRI) DPD
HSRP+ (RRI)
DPD(RRI)
3000 DPD (RRI) DPD
• IPsec Management
www.evilhackers.com
NAT for Internet
traffic
No NAT for
corporate traffic
SEC-210 © 2002, Cisco Systems, Inc. All rights reserved. 46
Split Tunneling
• IPsec Management
VPN Termination
Focused Layer
Stateless L3 4–7 Analysis
Filtering (IKE, ESP) VPN
L4–L7 Stateful
DMZ Inspection and Filtering
Nothing To See DoS Mitigation
(crypto-wise)
Management Centers
(MCs) for
VPN Routers
Pix Firewall
IDS Sensors
Number of tunnels
Status/Performance of tunnels
Performance threshold violations