IPSec Basics Handouts
IPSec Basics Handouts
APNIC eLearning:
2.0
Introduction
Presenter/s
8/30/16
Overview
Virtual Private Networks
What is IPsec?
Benefits of IPsec
IPsec Architecture and Components
Setting up an IPsec VPN tunnel
Tunnel and Transport Mode
VPN Protocols
8/30/16
IPsec
Provides Layer 3 security (RFC 2401)
Transparent to applications (no need for integrated IPSec support)
IPsec Standards
RFC 4301 The IP Security Architecture
Defines the original IPsec architecture and elements common to both AH
and ESP
RFC 4302
RFC 4303
RFC 2408
ISAKMP
RFC 5996
RFC 4835
8/30/16
Benefits of IPsec
Confidentiality
By encrypting data
Integrity
Routers at each end of a tunnel calculates the checksum or hash
value of the data
Authentication
Signatures and certificates
All these while still maintaining the ability to route through existing IP
networks
IPsec is designed to provide interoperable, high quality, cryptographicallybased security for IPv4 and IPv6 - (RFC 2401)
Benefits of IPsec
Data integrity and source authentication
Data signed by sender and signature is verified by the recipient
Modification of data can be detected by signature verification
Because signature is based on a shared secret, it gives source
authentication
Anti-replay protection
Optional; the sender must provide it but the recipient may ignore
Key management
8/30/16
Destination
Source
Network Layer - IPsec
IPsec Architecture
AH
Security
Protocols
Authentication Header
ESP
Encapsulating Security
Payload
IKE
10
8/30/16
11
ISAKMP
Internet Security Association and Key Management
Protocol
Used for establishing Security Associations (SA) and
cryptographic keys
Only provides the framework for authentication and key
exchange, but key exchange independent
Key exchange protocols
Internet Key Exchange (IKE)
Kerberized Internet Negotiation of Keys (KINK)
12
8/30/16
13
14
8/30/16
Overview of IPSec
1
IPsec Peer
IPsec Peer
2
IKE Phase 1
IKE Phase 2
3
IPsec Tunnel
Secured traffic exchange
4
15
16
8/30/16
IKE Modes
Mode
Description
Main mode
Aggressive Mode
Quick Mode
17
Phase II
Establishes a secure channel between computers intended for the
transmission of data (IPsec SA)
Using quick mode
18
8/30/16
19
Initiator
Responder
Internet
Negotiate
IKE Policy
Authenticated
DH Exchange
Protect IKE
Peer Identity
(Encrypted)
20
10
8/30/16
21
22
11
8/30/16
Validate
message 1
Responder
Validate
message 2
Internet
6
Validate
message 3
23
IPsec Modes
Tunnel Mode
Entire IP packet is encrypted and becomes the data component of a
new (and larger) IP packet.
Frequently used in an IPsec site-to-site VPN
Transport Mode
IPsec header is inserted into the IP packet
No new packet is created
Works well in networks where increasing a packets size could cause
an issue
Frequently used for remote-access VPNs
24
12
8/30/16
Without IPsec
Payload
IP
TCP
IP
IPsec
Header Header Header
Transport Mode
IPsec
Payload
IP
TCP
New IP IPsec
Header Header Header Header
Payload
Tunnel Mode
IPsec
25
Without AH
With AH
Original
IP Header
TCP/UDP
Original
IP Header
AH
Header
Data
TCP/UDP
Data
26
13
8/30/16
Before applying
ESP:
Original
IP Header
TCP/UDP
After applying
ESP:
Original
IP Header
ESP
Header
Data
TCP/UDP
Data
ESP
Trailer
ESP
Authentication
Encrypted
Authenticated
27
Before applying
AH:
Original
IP Header
TCP/UDP
After applying
AH:
New
IP Header
AH
Header
Data
Original
IP Header
Data
28
14
8/30/16
Before applying
ESP:
Original
IP Header
TCP/UDP
After applying
ESP:
New
IP Header
ESP
Header
Data
Original
IP Header
TCP/UDP
Data
ESP
Trailer
ESP
Authentication
Encrypted
Authenticated
29
30
15
8/30/16
Configuring IPsec
Step 1: Configure the IKE Phase 1 Policy (ISAKMP Policy)
crypto isakmp policy [priority]
Configuring IPsec
Step 5: Creating map with name
16
8/30/16
IPsec Layout
Encrypted session
Public Network
R1
R2
Router Configuration
crypto isakmp policy 1
authentication pre-share
Phase 1 SA
encryption aes
hash sha
Encryption and
authentication
group 5
crypto isakmp key Training123 address 172.16.11.66
!
Phase 2 SA
17
8/30/16
Router Configuration
int fa 0/1
crypto map LAB-VPN
Apply to an
outbound interface
Exit
!
access-list 101 permit ip 172.16.16.0
0.0.0.255 172.16.20.0 0.0.0.255
Define interesting
VPN traffic
18
8/30/16
Questions
Please remember to fill out the
feedback form
https://www.surveymonkey.com/r/a
pnic-20160831-eL1
37
19
8/30/16
Thank You!
END OF SESSION
39
20