CCNA Sec 02
CCNA Sec 02
• Keys.
• Encryption Methods.
• Stream Ciphers (cipher digit stream).
• A symmetric key cipher, where each bit of plaintext data to be encrypted is done 1 bit at a time against the bits
of the key.
• Block Ciphers.
• A symmetric key cipher that operates on a group of bits called a block.
• May take a 64-bit block of plain text and generate a 64-bit block of cipher text.
• Examples:
- Advanced Encryption Standard (AES)
- Triple Digital Encryption Standard (3DES)
- Blowfish
- Digital Encryption Standard (DES)
- International Data Encryption Algorithm (IDEA)
• Block ciphers may add padding in cases where there is not enough data to encrypt.
• Key algorithms.
• Symmetric.
• Uses the same key to encrypt the data and decrypt the data.
• Examples:
- DES
- 3DES
- AES
- IDEA
- RC2, RC4, RC5, RC6
- Blowfish
• Used for most of the data that we protect in VPNs today.
• Much faster to use a symmetrical encryption algorithm.
• The more difficult the key, the more stronger encryption.
• The minimum symmetric key length should be at least 128 bits.
• Asymmetric.
• An example of an asymmetric algorithm is public key algorithms.
• We use two different keys (key pair) that mathematically work together as a pair.
• These keys are the public key and the private key.
• We use asymmetric algorithms for things such as authenticating a VPN peer or generating keying material that
we could use for our symmetrical algorithms.
• Identity certificate.
• Similar to a root certificate, but it describes the client and contains the public key of the client.
• ASA’s Certificate.
• ASA uses a self-signed digital certificate by default.
• ---------------------------------------------------------------------------------------------------------------
• Generating a New Key Pair.
• ASA(config)# crypto key generate rsa label asa-pair1 modulus 1024 noconfirm
• Authenticating and Enrolling with a New CA via SCEP.
• ASA1(config)# crypto ca trustpoint asa-point1
• ASA1(config-ca-trustpoint)# keypair asa-pair1
• Specify what the certificate may be used for.
• ASA1(config-ca-trustpoint)# id-usage ssl-ipsec
• Specify whether or not the fully qualified domain name (fqdn) will be required.
• ASA1(config-ca-trustpoint)# no fqdn
• Specify the x.500 common name (CN).
• ASA1(config-ca-trustpoint)# subject-name CN=site3
• Specify where the CA server can be reached. HTTP must be running on the CA server.
• ASA1(config-ca-trustpoint)# enrollment url http://30.0.0.8/certsrv/mscep/mscep.dll
• Specify the password from CA server.
• ASDM conf.
• To add a CA certificate.
• ASDM, Device Management, Certificate Management, CA Certificates, Add
Fundamentals of IP Security
• IPSec.
• A Layer3 protocol provides confidentiality, data integrity, and authentication of the VPN.
• CA Server.
• CA# clock set 10:10:10 may 10 2016
• CA(config)# ntp master
• CA(config)# crypto key generate rsa general-keys exportable label pair1 modulus 1024
• So export that pair pair1 keys to that path and encrypt it with 3des, and protect with this password cisco
• CA(config)# ip http server
• CA(config)# crypto pki server internet
• CA(config-cs-server)# issuer-name CN=internet.test.local l=cairo c=egypt (location=cairo, country=egypt)
• CA(config-cs-server)# lifetime certificate 365 (1 year)
• CA(config-cs-server)# grant auto
• CA(config-cs-server)# no shutdown - then choose a password P@ssw0rd
• CA# show crypto pki server
----------------------------------------------------------------------------------
• CA Client.
• R1(config)# ntp server 1.1.1.2
• R1(config)# crypto key generate rsa modulus 1024 label pair1
• R1(config)# crypto pki trustpoint point1
• R1(config-trustpoint)# enrollment url http://1.1.1.2
• R1(config-trustpoint)# rsakeypair pair1
• R1(ca-trustpoint)# fqdn test.local [optional]
• R1(ca-trustpoint)# subject-name CN=Site1,o=test.local [optional]
• R1(ca-trustpoint)# password P@ssw0rd
• To request and install the ca certificate.
CCNA Sec Page 21
• To request and install the ca certificate.
• R(config)# crypto pki authenticate point1 , yes
• To request and install a certificate from that ca.
• R(config)# crypto pki enroll point1 , no , no , yes
• R# show crypto pki certificates
----------------------------------------------------------------------------------
• Configure the IKEv1 Phase 1 policy.
• ASDM > Wizards > VPN Wizards > Site-to-Site VPN Wizard .