VPNCH01
VPNCH01
CHAPTER
1
Business partner
with Cisco Router
Main Site
Perimeter
VPN Router
Regional office
with PIX Firewall
Mobile worker with Corporate
Cisco Secure VPN
SOHO with Cisco Client on laptop
ISDN/DSL Router computer
Cisco Secure Intrusion Detection System (CSIDS) and Cisco Secure Scanner
Can be used to monitor and audit the security of the VPN.
Cisco Secure Policy Manager and Cisco Works 2000Provide VPN-wide system
management.
These components can all be seen in Figure 1-2.
Cisco IOS
Router
VPN Perimeter
Router
CSIDS
Sensor
PIX
PIX VPN
Firewall
Firewall Concentrator
CS VPN
Client
Cisco IOS Router
PIX Firewall
VPN 3000 Concentrator
Cisco Secure VPN Client Corporate
Cisco Secure IDS CS ACS CS Scanner
Cisco Secure Scanner
Cisco Secure ACS for AAA CSIDS
Cisco Secure Policy Manager Director
Cisco Works 2000 CSPM
CW2K
The main Cisco VPN product offerings are discussed in more detail in Chapter 2, Cisco
VPN Family of Products.
IPSec acts at the network layer, protecting and authenticating IP packets between a PIX
Firewall and other participating IPSec devices (peers), such as other PIX Firewalls, Cisco
routers, the Cisco Secure VPN Client, the VPN 3000 Concentrator series, and other IPSec-
compliant products.
IPSec enables the following Cisco IOS VPN features:
Data confidentialityThe IPSec sender can encrypt packets before transmitting
them across a network.
Data integrityThe IPSec receiver can authenticate packets sent by the IPSec sender
to ensure that the data has not been altered during transmission.
Data origin authenticationThe IPSec receiver can authenticate the source of the
IPSec packets sent. This service is dependent upon the data integrity service.
AntireplayThe IPSec receiver can detect and reject replayed packets.
IPSec Overview
IPSec is a framework of open standards that provides data confidentiality, data integrity,
and data authentication between participating peers at the IP layer. IPSec can be used to
protect one or more data flows between IPSec peers. IPSec is documented in a series of
Internet RFCs, all available at http://www.ietf.org/html.charters/ipsec-charter.html. The
overall IPSec implementation is guided by Security Architecture for the Internet
Protocol, RFC 2401. IPSec consists of the following two main protocols:
Authentication Header (AH)
Encapsulating Security Payload (ESP)
IPSec also uses other existing encryption standards to make up a protocol suite, which are
explained in the next sections.
IPSec has several standards that are supported by Cisco IOS and the PIX Firewall.
IP Security Protocol
Authentication Header (AH)
Encapsulating Security Payload (ESP)
Data Encryption Standard (DES)
Triple DES (3DES)
Diffie-Hellman (D-H)
Message Digest 5 (MD5)
Secure Hash Algorithm-1 (SHA-1)
SecureVPN.book Page 9 Thursday, November 15, 2001 6:35 PM
Router A Router B
All data in clear text
The AH function is applied to the entire datagram except for any mutable IP header fields
that change in transit: for example, Time to Live (TTL) fields that are modified by the
routers along the transmission path. AH works as follows:
Step 1 The IP header and data payload is hashed.
Step 2 The hash is used to build a new AH header, which is appended to the
original packet.
SecureVPN.book Page 10 Thursday, November 15, 2001 6:35 PM
Step 4 The peer router hashes the IP header and data payload, extracts the
transmitted hash from the AH header, and compares the two hashes. The
hashes must match exactly. Even if one bit is changed in the transmitted
packet, the hash output on the received packet will change and the AH
header will not match.
This process can be seen in Figure 1-4.
Hash Hash
Authentication Authentication
data (00ABCDEF) data (00ABCDEF)
IP HDR AH Data
Router A Router B
Router A Router B
Data payload is encrypted
NOTE Deciding whether to use AH or ESP in a given situation might seem complex, but it can be
simplified to a few rules, as follows. When you want to make sure that data from an
authenticated source gets transferred with integrity and does not need confidentiality, use
the AH protocol. If you need to keep data private (confidentiality), then you must use ESP.
ESP will encrypt the upper-layer protocols in transport mode and the entire original IP
datagram in tunnel mode so that neither are readable from the wire. However, ESP can now
also provide authentication for the packets. This situation is covered later in this chapter in
the ESP Tunnel Versus Transport Mode section.
DES Algorithm
DES uses a 56-bit key, ensuring high-performance encryption. DES is used to encrypt and
decrypt packet data. DES turns clear text into ciphertext with an encryption algorithm. The
decryption algorithm on the remote end restores clear text from ciphertext. Shared secret
keys enable the encryption and decryption.
Diffie-Hellman (D-H)
Diffie-Hellman (D-H) is a public-key cryptography protocol. It allows two parties to
establish a shared secret key used by encryption algorithms (DES or MD5, for example)
over an insecure communications channel. D-H is used within IKE to establish session
keys. 768-bit and 1024-bit D-H groups are supported in the Cisco routers and PIX Firewall.
The 1024-bit group is more secure because of the larger key size.
NOTE IKE is synonymous with Internet Security Association Key Management Protocol
(ISAKMP) in Cisco router or PIX Firewall configurations.
SecureVPN.book Page 13 Thursday, November 15, 2001 6:35 PM
A Tunnel mode
B Tunnel mode
C Tunnel mode
Alices PC HR
Servers
D Transport mode
Figure 1-6 illustrates situations where a tunnel or a transport mode is used. Tunnel mode is
most commonly used between gateways or from an end station to a gateway. The gateway
acts as a proxy for the hosts behind it. Transport mode is used between end stations or
between an end station and a gateway, if the gateway is being treated as a host; for example,
in an encrypted Telnet session from a workstation to a router, the router is the actual
destination.
SecureVPN.book Page 14 Thursday, November 15, 2001 6:35 PM
Using Figure 1-6, consider some examples of when to use tunnel or transport mode.
Example ATunnel mode is most commonly used to encrypt traffic between secure
IPSec gateways, such as between the Cisco router and the PIX Firewall, as shown in
Example A in Figure 1-6. The IPSec gateways proxy IPSec for the devices behind
them, such as Alices PC and the HR servers in the figure. In Example A, Alice
connects to the HR servers securely through the IPSec tunnel set up between the
gateways.
Example BTunnel mode is also used to connect an end station running IPSec
software, such as the Cisco Secure VPN Client, to an IPSec gateway, as shown in
Example B.
Example CIn Example C, tunnel mode is used to set up an IPSec tunnel between
the Cisco router and a server running IPSec software. Note that Cisco IOS software
and the PIX Firewall set tunnel mode as the default IPSec mode.
Example DTransport mode is used between end stations supporting IPSec or
between an end station and a gateway if the gateway is being treated as a host. In
Example D, transport mode is used to set up an encrypted Telnet session from Alices
PC running Cisco Secure VPN Client software to terminate at the PIX Firewall,
enabling Alice to remotely configure the PIX Firewall securely.
IP HDR Data
Transport mode
IP HDR AH Data
Tunnel mode
In tunnel mode, the entire original header is authenticated, a new IP header is built, and the
new IP header is protected in the same way as the IP header in transport mode.
AH is incompatible with Network Address Translation (NAT) because NAT changes the
source IP address, which will break the AH header and cause the packets to be rejected by
the IPSec peer.
IP HDR Data
Transport mode
Tunnel mode
New IP HDR ESP HDR IP HDR Data ESP Trailer ESP Auth
Encrypted
Authenticated
When ESP is used in tunnel mode, the original IP header is well protected because the
entire original IP datagram is encrypted. With an ESP authentication mechanism, the
original IP datagram and the ESP header are included; however, the new IP header is not
included in the authentication.
When both authentication and encryption are selected, encryption is performed first, before
authentication. One reason for this order of processing is that it facilitates rapid detection
and rejection of replayed or bogus packets by the receiving node. Before decrypting the
packet, the receiver can detect the problem and potentially reduce the impact of denial-of-
service attacks.
ESP can also provide packet authentication with an optional field for authentication. Cisco
IOS software and the PIX Firewall refer to this service as ESP HMAC. Authentication is
SecureVPN.book Page 16 Thursday, November 15, 2001 6:35 PM
calculated after the encryption is done. The current IPSec standard specifies SHA-1 and
MD5 as the mandatory HMAC algorithms.
The main difference between the authentication provided by ESP and that provided by AH
is the extent of the coverage. Specifically, ESP does not protect any IP header fields unless
those fields are encapsulated by ESP (tunnel mode). Figure 1-9 illustrates the fields
protected by ESP HMAC.
Router Router
IPSec Transforms
An IPSec transform specifies a single IPSec security protocol (either AH or ESP) with its
corresponding security algorithms and mode. Some example transforms include the
following:
The AH protocol with the HMAC with MD5 authentication algorithm in tunnel mode
is used for authentication.
The ESP protocol with the 3DES encryption algorithm in transport mode is used for
confidentiality of data.
The ESP protocol with the 56-bit DES encryption algorithm and the HMAC with SHA
authentication algorithm in tunnel mode is used for authentication and confidentiality.
Transform Sets
A transform set is a combination of individual IPSec transforms designed to enact a specific
security policy for traffic. During the ISAKMP IPSec security association negotiation that
occurs in IKE phase 2 quick mode, the peers agree to use a particular transform set for
protecting a particular data flow. Transform sets combine the following IPSec factors:
Mechanism for payload authenticationAH transform
Mechanism for payload encryptionESP transform
IPSec mode (transport versus tunnel)
SecureVPN.book Page 17 Thursday, November 15, 2001 6:35 PM
Transform sets equal a combination of an AH transform, an ESP transform, and the IPSec
mode (either tunnel or transport mode).
DES Encryption
The components of DES encryption are as follows:
Encryption and decryption algorithms
Matching shared secret keys on each peer
Input clear text data to be encrypted
At the core of DES is the encryption algorithm. A shared secret key is input to the
algorithm. Clear text data is fed into the algorithm in fixed-length blocks and is converted
to ciphertext. The ciphertext is transmitted to the IPSec peer using ESP. The peer receives
the ESP packet, extracts the ciphertext, runs it through the decryption algorithm, and
outputs clear text identical to that input on the encrypting peer. The DES encryption
algorithm can be seen in action in Figure 1-10. In Figure 1-10, a preshared key is in use.
SecureVPN.book Page 18 Thursday, November 15, 2001 6:35 PM
Key Key
NOTE Diffie-Hellman is very important because the shared secret key is used to encrypt data using
the secret key encryption algorithms specified in the IPSec security associations, such as
DES or MD5.
Step 3 Each peer generates a public D-H key. The local private key is combined
with the prime number p and the primitive root g in each peer to generate
a public key: Ya for Peer A and Yb for Peer B. The formula for Peer A is
Ya =g^Xa mod p. The formula for Peer B is Yb =g^Xb mod p. The
exponentiation is computationally expensive. The ^ character denotes
exponentiation (g^Xa is g to the Xa power); mod denotes modulus.
Step 4 The public keys Ya and Yb are exchanged in public.
SecureVPN.book Page 20 Thursday, November 15, 2001 6:35 PM
Step 5 Each peer generates a shared secret number (ZZ) by combining the
public key received from the opposite peer with its own private key. The
formula for Peer A is ZZ=(YbXa) mod p. The formula for Peer B is
ZZ=(YaXb) mod p. The ZZ values are identical in each peer. Anyone
who knows p or g, or the D-H public keys, cannot guess or easily
calculate the shared secret value largely because of the difficulty in
factoring large prime numbers.
Step 6 Shared secret keys are derived from the shared secret number ZZ for use
by DES or HMACs.
A shared secret key that is used to encrypt data using an encryption algorithm
(DES, MD5, and so on)The shared secret key is derived from Diffie-Hellman key
generation.
HMAC
The fundamental hash algorithms used by IPSec are the cryptographically secure MD5 and
SHA-1 hash functions. Hashing algorithms have evolved into HMACs, which combine the
proven security of hashing algorithms with additional cryptographic functions. The hash
produced is encrypted with the senders private key, resulting in a keyed checksum as
output.
In Figure 1-12, the hash function takes as input the variable-length clear text data that needs
to be authenticated and a private key. The private key length is the same as that of the output
of the hash. The HMAC algorithm is run, with a resultant fixed-length checksum as output.
This checksum value is sent with the message as a signature. The receiving peer runs an
HMAC on the same message data that was input at the sender, using the same private key,
and the resultant hash is compared with the received hash, which should exactly match.
SecureVPN.book Page 21 Thursday, November 15, 2001 6:35 PM
Clear Message
Variable-length Shared
input message secret key
Hash
Function
Hashed Checksum
HMAC-MD5-96
The HMAC-MD5-96 (also known as HMAC-MD5) encryption technique is used by IPSec
to ensure that a message has not been altered. HMAC-MD5 uses the MD5 hash developed
by Ronald Rivest of the Massachusetts Institute of Technology and RSA Data Security
Incorporated and is described in RFC 1321.
HMAC-MD5 uses a 128-bit secret key. It produces a 128-bit authenticator value. This
128-bit value is truncated to the first 96 bits. Upon sending, the truncated value is stored
within the authenticator field of AH or ESP-HMAC. Upon receipt, the entire 128-bit value
is computed, and the first 96 bits are compared to the value stored in the authenticator field.
MD5 alone has recently been shown to be vulnerable to collision search attacks. This attack
and other currently known weaknesses of MD5 do not compromise the use of MD5 within
HMAC, as no known attacks against HMAC-MD5 have been proven. HMAC-MD5 is
recommended where the superior performance of MD5 over SHA-1 is important.
HMAC-SHA-1-96
The HMAC-SHA-1-96 (also known as HMAC-SHA-1) encryption technique is used by
IPSec to ensure that a message has not been altered. HMAC-SHA-1 uses the SHA-1
specified in FIPS-190-1, combined with HMAC (as per RFC 2104), and is described in
RFC 2404.
SecureVPN.book Page 22 Thursday, November 15, 2001 6:35 PM
HMAC-SHA-1 uses a 160-bit secret key. It produces a 160-bit authenticator value. This
160-bit value is truncated to the first 96 bits. Upon sending, the truncated value is stored
within the authenticator field of AH or ESP-HMAC. Upon receipt, the entire 160-bit value
is computed and the first 96 bits are compared to the value stored in the authenticator field.
SHA-1 is considered cryptographically stronger that MD5, yet it takes more CPU cycles to
compute. HMAC-SHA-1 is recommended where the slightly superior security of SHA-1
over MD5 is important.
IKE Overview
IKE negotiates the IPSec security associations (SAs). This process requires that the IPSec
systems first authenticate themselves to each other and establish ISAKMP, or IKE, shared
keys.
In phase one, IKE creates an authenticated secure channel between the two IKE peers that
is called the IKE Security Association. The Diffie-Hellman key agreement is always
performed in this phase.
In phase two, IKE negotiates the IPSec security associations and generates the required key
material for IPSec. The sender offers one or more transform sets that are used to specify an
allowed combination of transforms with their respective settings. The sender also indicates
the data flow to which the transform set is to be applied. The sender must offer at least one
transform set. The receiver then sends back a single transform set, which indicates the
mutually agreed-on transforms and algorithms for this particular IPSec session. A new
Diffie-Hellman agreement can be done in phase two, or the keys can be derived from the
phase one shared secret.
Figure 1-13 shows the role that IKE takes in the IPSec VPN creation process.
NOTE A security association (SA) is a relationship between two or more entities that describes
how the entities will use security services to communicate securely. SAs are covered in
detail later in this chapter in the IPSec Security Associations section.
SecureVPN.book Page 23 Thursday, November 15, 2001 6:35 PM
IKE Overview 23
ISAKMP ISAKMP
ISAKMP session
Alice Bob
IKE authenticates the peer and the IKE messages between the peers during IKE phase one.
Phase one consists of main mode or aggressive mode. Potential peers in an IPSec session
must authenticate themselves to each other before IKE can proceed. Peer authentication
occurs during the main mode exchange during IKE phase one. The IKE protocol is very
flexible and supports multiple authentication methods as part of the phase one exchange.
The two entities must agree on a common authentication protocol through a negotiation
process. IKE phase one has three methods to authenticate IPSec peers in Cisco products,
which are as follows:
Preshared keysA key value entered into each peer manually (out of band) used to
authenticate the peer
RSA signaturesUse a digital certificate authenticated by an RSA signature
RSA encrypted noncesUse RSA encryption to encrypt a nonce value (a random
number generated by the peer) and other values
A common value used by all authentication methods is the peer identity (ID), which helps
identify the peer. Some ID values used are as follows:
IP address of the peer (four octets), such as 172.30.2.2
Fully qualified domain name (FQDN), such as [email protected]
Preshared Keys
With preshared keys, the same preshared key is configured on each IPSec peer. IKE peers
authenticate each other by computing and sending a keyed hash of data that includes the
preshared key. If the receiving peer is able to create the same hash independently using its
preshared key, it knows that both peers must share the same secret, thus authenticating the
SecureVPN.book Page 24 Thursday, November 15, 2001 6:35 PM
other peer. Preshared keys are easier to configure than manually configuring IPSec policy
values on each IPSec peer. However, preshared keys do not scale well because each IPSec
peer must be configured with the preshared key of every other peer with which it will
establish a session.
RSA Signatures
The RSA signatures method uses a digital signature, where each device digitally signs a set
of data and sends it to the other party. RSA signatures use a CA to generate a unique identity
digital certificate that is assigned to each peer for authentication. The identity digital
certificate is similar in function to the preshared key, but provides much stronger security.
RSA is a public-key cryptosystem used by IPSec for authentication in IKE phase 1. RSA
was developed in 1977 by Ronald Rivest, Adi Shamir, and Leonard Adelman.
The initiator and the responder to an IKE session using RSA signatures send their own ID
value (IDi, IDr), their identity digital certificate, and an RSA signature value consisting of
a variety of IKE values, all encrypted by the negotiated IKE encryption method (DES or
3DES).
RSA Encryption
The RSA-encrypted nonces method uses the RSA encryption public key cryptography
standard. The method requires that each party generates a pseudorandom number (a nonce)
and encrypt it in the other partys RSA public key. Authentication occurs when each party
decrypts the other partys nonce with a local private key (and other publicly and privately
available information) and then uses the decrypted nonce to compute a keyed hash. This
system provides for deniable transactions. That is, either side of the exchange can plausibly
deny that it took part in the exchange. Cisco IOS software is the only Cisco product that
uses RSA encrypted nonces for IKE authentication. RSA encrypted nonces use the RSA
public key algorithm.
specification. X.509 version 3 defines the data structure for certificates and is the standard
that Cisco supports. Figure 1-14 identifies some key points of CA operation.
CA Server CA Server
Internet
Host A Host B
Router A Router B
IPSec Tunnel
Host A Host B
Router A Router B
Main Mode
Main mode has three two-way exchanges between the initiator and receiver.
First exchangeThe algorithms and hashes used to secure the IKE communications
are agreed upon in matching IKE SAs in each peer.
Second exchangeThis exchange uses a Diffie-Hellman exchange to generate
shared secret keying material used to generate shared secret keys and to pass nonces,
which are random numbers sent to the other party, signed, and returned to prove their
identity.
Third exchangeThis exchange verifies the other sides identity. The identity value
is the IPSec peers IP address in encrypted form. The main outcome of main mode is
matching IKE SAs between peers to provide a protected pipe for subsequent protected
ISAKMP exchanges between the IKE peers. The IKE SA specifies values for the IKE
exchange: the authentication method used, the encryption and hash algorithms, the
Diffie-Hellman group used, the lifetime of the IKE SA in seconds or kilobytes, and
the shared secret key values for the encryption algorithms. The IKE SA in each peer
is bidirectional.
Aggressive Mode
In the aggressive mode, fewer exchanges are done and with fewer packets. In the first
exchange, almost everything is squeezed into the proposed IKE SA values, the Diffie-
Hellman public key, a nonce that the other party signs, and an identity packet, which can be
used to verify the initiators identity through a third party. The receiver sends everything
back that is needed to complete the exchange. The only thing left is for the initiator to
SecureVPN.book Page 28 Thursday, November 15, 2001 6:35 PM
confirm the exchange. The weakness of using the aggressive mode is that both sides have
exchanged information before there is a secure channel. Therefore, it is possible to sniff
the wire and discover who formed the new SA. However, aggressive mode is faster than
main mode.
Step 2 is shown in Figure 1-17.
IKE SA IKE SA
DES IKE Phase 1 DES
MD5 MD5
preshare preshare
DH1 DH1
lifetime lifetime
Quick mode is also used to renegotiate a new IPSec SA when the IPSec SA lifetime expires.
Base quick mode is used to refresh the keying material used to create the shared secret key
based on the keying material derived from the Diffie-Hellman exchange in phase one.
Host A Host B
Router A Router B
IPSec Tunnel
Host A Host B
Router A Router B
IPSec Tunnel
NOTE The nomenclature gets a little confusing at times, because SAs are used for more than just
IPSec. For example, IKE SAs describe the security parameters between two IKE devices.
A separate pair of IPSec SAs are set up for AH and ESP transform. Each IPSec peer agrees
to set up SAs consisting of policy parameters to be used during the IPSec session. The SAs
are unidirectional for IPSec so that peer 1 will offer peer 2 a policy. If peer 2 accepts this
policy, it will send that policy back to peer 1. This establishes two one-way SAs between
the peers. Two-way communication consists of two SAs, one for each direction.
Each SA consists of values such as destination address, a security parameter index (SPI),
the IPSec transforms used for that session, security keys, and additional attributes such as
IPSec lifetime. The SAs in each peer have unique SPI values that will be recorded in the
Security Parameter Databases of the devices. The Security Parameter Database is set up in
dynamic random-access memory (DRAM) and contains parameter values for each SA. An
example of these values is shown in Figure 1-20.
SecureVPN.book Page 31 Thursday, November 15, 2001 6:35 PM
Key 7572CA49F7632946
An IPSec transform in Cisco IOS specifies either an AH or an ESP protocol and its
corresponding algorithms and mode (transport or tunnel). The Cisco Secure VPN Client
uses the concept of security policies to specify the same parameters. Transforms, transform
sets, and the corresponding security policies of the Cisco Secure VPN Client are explained
in detail in Chapter 12, Scaling Cisco IPSec-Based VPNs.
Figure 1-21 contains an actual example of SA parameters for two IPSec peers: R1 and R2.
Remember that each IPSec SA is unidirectional, and the SA parameters must match on each
IPSec peer. The SA parameters are configured by the system administrator and are stored
in the SA database. Table 1-1 contains a description of the parameters shown in Figure
1-21.
R1 R2
The SAs between IPSec peers enable the configured IPSec policy. When a system sends a
packet that requires IPSec protection, it looks up the SA in its database, applies the
specified processing, and then inserts the SPI from the SA into the IPSec header. When the
IPSec peer receives the packet, it looks up the SA in its database by destination address and
SPI, and then processes the packet as required. In summary, the SA is a statement of the
negotiated security policy between two devices. Figure 1-22 shows an example of differing
policies between peers.
Tunnel Mode
AH-HMAC-SHA
PFS 50
Router B
Router A
Transport Mode
ESP-DES-HMAC-MD5
PFS 15
Client
Cisco IOS Routers for Preshared Keys Site-to-Site and 4, Configuring Cisco IOS Routers
for CA Site-to-Site.
n Transmit out
IOS Each packet Encrypt? access-list 1xx permit
interface
Select traffic with access-lists
y
IPsec
crypto ipsec transform-
Once per IPsec SA (between
y Encrypt packet set
source and destination) IPsec
and transmit crypto map <name>
SA?
Keys
n
IKE with access-lists Negotiate crypto isakmp policy
Once per IKE SA y IPsec SA over crypto isakmp identity
(between two peers) IKE IKE SA crypto key generate
SA? crypto key pubkey-chain
n
Negotiate
n IKE SA with
Authen.
other peer
with CA?
y
CA
crypto ca identity
Authentication
Create own public/private keys crypto ca authenticate
Once per private/public crypto ca enroll
Get CAs public
key pair crypto ca crl request
Get certificate for own public key
NOTE Remember, IKE is synonymous with ISAKMP in Cisco router or PIX Firewall
configurations.
Step 3 If the SA has already been established by manual configuration using the
crypto ipsec transform-set and crypto map commands or has been
previously set up by IKE, the packet is encrypted based on the policy
specified in the crypto map and is transmitted out of the interface.
Step 4 If the SA has not been established, Cisco IOS software checks to see if
an IKE SA has been configured and set up.
Step 5 If the IKE SA has been set up, the IKE SA governs negotiation of the
IPSec SA as specified in the IKE policy configured by the crypto isakmp
policy command, the packet is encrypted by IPSec, and it is transmitted.
Step 6 If the IKE SA has not been set up, Cisco IOS software checks to see if
certification authority (CA) has been configured to establish an IKE
policy.
Step 7 If CA authentication is configured with the various crypto ca commands,
the router uses public and private keys previously configured, obtains the
CAs public certificate, gets a certificate for its own public key, and then
uses the key to negotiate an IKE SA, which in turn is used to establish an
IPSec SA to encrypt and transmit the packet.
CA Support Overview
With a CA, you do not need to configure keys among all of the encrypting IPSec peers.
Instead, you individually enroll each participating peer with the CA and request a
certificate. When this has been accomplished, each participating peer can dynamically
authenticate all of the other participating routers. To add a new IPSec peer to the network,
you only need to configure that new peer to request a certificate from the CA, instead of
making multiple key configurations with all the other existing IPSec peers.
This section presents an overview of how CA support works.
CA servers are responsible for managing certificate requests and issuing certificates to
participating IPSec network devices. These services provide centralized key management
for the participating devices. CAs simplify the administration of IPSec network devices so
that IPSec keys do not have to be manually configured on each peer. You can use a CA with
a network containing multiple IPSec-compliant devices, such as PIX Firewalls, Cisco
routers, the Cisco VPN 3000 Concentrator series, the Cisco Secure VPN Client, and other
vendors IPSec products, as shown in Figure 1-24.
SecureVPN.book Page 35 Thursday, November 15, 2001 6:35 PM
CA Support Overview 35
CA server
other devices need modification. When the new device attempts an IPSec connection,
certificates are automatically exchanged and the device can be authenticated. Without CA
interoperability, devices could not use CAs when deploying IPSec. CAs provide a
manageable, scaleable solution for IPSec networks.
Digital Signatures
The digital signature provides a form of digital credentials that authenticate the identity of
the sending party, whoever that may be. In other words, digital signatures are used to link
data with the holder of a specific private key and consist of the following:
At the local end, a private key is used to encrypt the hash.
At the remote end:
The hash is produced by running the original message through a hash
algorithm.
The hash that was appended to the original message is decrypted using the
senders public key.
If the hashes match, the message is signed by a private key.
Only a specific private key could have produced the digital signature.
Figure 1-25 shows the digital signature process.
Local Remote
4ehiDx67NMop9 4ehiDx67NMop9
Match
Encryption
Decryption Hash
Algorithm
Algorithm
Private Hash
Key Public
Hash Key
Algorithm
CA Support Overview 37
A key pair has no intrinsic ties to any person or entity. It could be sourced from Alice, Tom,
or Harry Hacker masquerading as Alice or Tom. A solution is necessary to reliably tie a
person or entity to a key pair. Digital signatures provide a way to guarantee the source of
the message. The solution is digital signatures and digital certificates.
Digital signaturesTie a message to a senders private key. The hash can only be
decrypted by the senders public key.
Digital certificatesBind a person or entity to a private key.
Certificate-Based Authentication
Digital certificates are used to authenticate users. They can be used to identify a person, a
company, or a server. They are the equivalent of a digital passport or drivers license. The
following example and Figure 1-26 illustrate how this works.
Step 1 Users A and B register separately with the CA.
Certificate Authority
Trusted Third Party
Request Request
Certificate Issue Certificate
Certificates
Tom Harry
Tom
Digital
Harry Certificates
CAs
CAs hold the key to the public key infrastructure (PKI). A CA is a trusted third party whose
job is to certify the authenticity of users to ensure that you are who you say you are.
Authenticity is guaranteed by the CA digital signature created with the CA private key. You
can verify a digital signature using the CA public key. Only the CA public key can decrypt
the digital certificate. The job of a CA is to
Create certificates
Administer certificates
Revoke invalid certificates
The CA can be a corporate network administrator or a recognized third party. Trusted
sources supported by the Cisco VPN 3000 Concentrator Series include the following:
Entrust
GTE Cybertrust
Network Associates PGP
Baltimore
Microsoft
Verisign
Some CAs also use a Registration Authority (RA) to provide certificate enrollment
services. An RA is server software that acts as a proxy for the CA, providing essential CA
functions, such as certificate enrollment and distribution.
SecureVPN.book Page 39 Thursday, November 15, 2001 6:35 PM
Summary 39
PKI
PKI is the set of hardware, software, people, policies, and procedures needed to create,
manage, store, distribute, and revoke digital certificates. PKI makes it possible to generate
and distribute keys within a secure domain and enables CAs to issue keys and associated
certificate and certificate revocation lists (CRLs) in a secure manner. There are two PKI
models, as shown in the following list and Figure 1-27.
Central authority
All certificates are signed by a single authority.
All certificates can be checked with that CAs public key.
Hierarchical authority
The ability to sign a certificate is delegated through a hierarchy. The top of
the hierarchy is the root CA. It signs certificates for subordinate authorities.
Subordinate CAs sign certificates for lower-level CAs.
To validate a users certificate, the certificate must be validated up through
the chain of authority.
Root CA
Central
Root CA
Subordinate
CA
Jane Phil
Summary
This chapter provided a very detailed overview of VPNs with a concentration on using
IPSec as a VPN technology. It started by covering the various VPN components such as the
Cisco Secure PIX Firewall, Cisco routers, and the Cisco VPN Concentrator. It then covered
the technicalities of IPSec and the components that make up IPSec.
SecureVPN.book Page 40 Thursday, November 15, 2001 6:35 PM
The chapter covered the five-step process of IPSec VPN establishment that includes IKE
phase one and IKE phase two.
The chapter finished by looking at IPSec security associations (SAs) and also provided an
overview of the certificate authority (CA) process.
Now that you have a foundation of knowledge on IPSec and VPN terminology, the next
chapter looks at the individual VPN components and the configuration challenges that each
one brings.
Review Questions
1 What are the three types of VPNs?
4 You configure an IPSec transform set to use AH. Is the data payload encrypted?
5 You want to establish an extranet VPN over the Internet. Which type of IPSec mode
(transport or tunnel) would be the best solution in this scenario?
6 Which is the most secure encryption algorithm: DES, 3DES, or Diffie-Hellman?
7 Step one of configuring IPSec is defining interesting traffic. What Cisco IOS feature
do you use to define this?
8 With preshared keys, can each of the keys be different or must each be the same (have
the same value as the others public key)?
9 What is used to relay the shared key to the VPN peer?
10 IKE peers authenticate themselves using one of four methods. What are these four
methods?