IPsec
IPsec
TE
R
N
IPsec VPNs
AL
U
SE
O
N
LY
IPsec VPNs
LY
N
O
SE
U
The Meaning Behind VPNs
AL
VPNs are used to transport private network traffic over a public network infrastructure.
The term VPN has been used broadly in the networking industry for decades. For
instance, the networking industry has referred to X.25, Frame Relay, and ATM
infrastructures as VPN networks. As the Internet spread and as carriers and service
N
providers migrated all their service offerings to IP, new forms of VPNs emerged.
R
• Secure VPNs: These VPNs are IPsec VPNs, carrying payload over IP
securely. We will discuss these VPN types in this material.
• Combination of clear-text and secure VPNs: These VPNs are based on
Layer 3 VPNs, built on MPLS technology, and compounded with IPsec
security.
2
IPsec VPNs
LY
N
O
SE
U
Secure VPNs
AL
A network device that builds secure VPNs must be able to perform the following
actions:
• Encrypt the original packet so that it cannot be easily decoded should it
be intercepted on the public network;
N
This material focuses on end-to-end static IPsec VPNs. However, note that security
platforms running the Junos operating system also support end-to-site dynamic VPNs
and VPN establishment using the NetScreen Remote VPN client. See the Juniper
Networks technical documentation at http://www.juniper.net/techpubs for further
information on these features.
IN
3
IPsec VPNs
LY
N
O
SE
U
Security Concerns
AL
Three driving concerns exist for network security: confidentiality, integrity, and
authentication.
• Confidentiality: Online banking, credit card information, or a company’s
competitive information—how do we keep this information secure from
N
the man in the middle? We want information stored in such a way that if
someone were to capture this datagram, the information would appear
R
meaningless.
• Integrity: Even though the information might be secure and hidden,
TE
4
IPsec VPNs
LY
N
O
SE
U
Confidentiality—Data Encryption
AL
algorithm and encryption key. You can decrypt encrypted data in one of two ways:
• Symmetric key encryption: This method uses the same key for both
TE
The cipher strength depends on the key size; the larger the key, the more secure the
cipher output. The trade-off is in processing time—larger keys use more computational
cycles to encrypt and decrypt.
5
IPsec VPNs
LY
N
O
SE
U
Confidentiality—Symmetric Key Encryption
AL
Symmetric key encryption is the most straightforward form of encryption with the least
amount of overhead. We refer to it as symmetric because the key used to encrypt the
data is the same key used to decrypt the data. Thus, the same key must be known on
both sides of a connection.
N
Symmetric key sizes range from 40 bits–1024 bits. These keys are considered to be
very fast because they are not very long, and they are widely used for bulk data
R
encryption. However, because the key must be known to both the sender and the
receiver, key management is a problem when using symmetric keys.
TE
Examples of symmetric key encryption include Rivest Cipher 4 (RC4), Data Encryption
Standard (DES), Advanced Encryption Standard (AES), and Blowfish.
IN
6
IPsec VPNs
LY
N
O
SE
U
Public Key Encryption
AL
using the corresponding public key, and vice versa. The keys are mathematically
related such that it is almost impossible to derive one key out of another.
R
Public key sizes range from 512 to 2048 bits. Because of the large size, these keys
are extremely slow and generally not feasible for bulk data encryption. However, public
keys are widely used for user and device authentication (for example, digital
TE
7
IPsec VPNs
LY
N
O
SE
U
Integrity
AL
Now that we have the data encrypted as it traverses the Internet, we must ensure that
the data is not subject to modification along the way. Even though a novice hacker
might not be able to crack the encryption algorithm and key, the hacker can still wreak
havoc by modifying bits that the encrypted payload carries. If this modification
N
happens, the decrypted output does not match the original data. Who knows what the
consequences might be!
R
Hashing solves this problem by creating a fingerprint of the data, similar to a cyclic
redundancy check (CRC) checksum. Before data travels, it traverses a hashing engine
that produces a fixed-length hash output. It places the hash in a field in the packet
TE
along with the data before it travels over the network. The destination device takes the
same data and runs it through the same hashing algorithm, calculating its own hash.
The destination device then compares the hash that it calculated against the hash
carried in the packet. The same hash in both locations proves data integrity in transit.
IN
8
IPsec VPNs
LY
N
O
SE
U
One-Way Hash Algorithms
AL
input value that gives the same output. This property is necessary
because the purpose of hashing is to verify that the data has not
TE
changed.
To see how it is possible to create a one-way function, think of the example on the
slide, which shows a modulus operation. Given the value of 3, it is not possible to
determine the original value because an infinite range of possible answers exists.
IN
However, this example is not suitable as a real-world hash function because it does
not satisfy the collision-resistant requirement—a malicious person can change the
plaintext by any multiple of the modulus number and know that the hashed value
remains the same.
The most secure and widely used hash function is the Secure Hash Algorithm 1
(SHA-1). SHA-1 is preferred over Message Digest 5 (MD5), although MD5 is still widely
supported. These functions produce a fixed-length output that is useful when working
with IP packets because the overhead of transmitting the hash value is predictable.
9
IPsec VPNs
LY
N
O
SE
U
Integrity—The Hash Process
AL
10
IPsec VPNs
LY
N
O
SE
U
Source Authentication
AL
Encryption protects the packet contents from being viewed on the public network.
Hashing verifies that the data is unaltered. But how do you validate the source of the
data?
The software performs source authentication using the Hashed Message
N
Authentication Code (HMAC). The sender appends a secret preshared key to the data,
then performs the hash function. For hashes to successfully match, the receiver must
R
append the same key value to the data before performing the hash function. The key
itself never transmits along with the data.
TE
IN
11
IPsec VPNs
LY
N
O
SE
U
HMAC Authentication
AL
4. The receiver appends the preshared key to the data, then performs the
hash function.
TE
5. The receiver then compares the calculated hash value to the received
hash value. If the hash values match, the data is unaltered. If the hash
values do not match, either the data itself is corrupt, or the keys did not
match, meaning the source is invalid. Either way, the receiver discards
IN
the packet.
12
IPsec VPNs
LY
N
O
SE
U
Key Exchange
AL
usually means that keys rarely change, which is itself a potential security issue; given
a large enough sample, any code can be broken.
TE
Automating the key exchange process is a good idea, but we must overcome the
problem of sending keys across a public network. Anyone intercepting the key has the
ability to decode the data.
IN
The Solution
Whitfield Diffie and Martin Hellman developed a solution to this problem in 1970. The
Diffie-Hellman algorithm is a method whereby two parties can agree upon a secret key
known only to them. The strength of the technique is that it allows the participants to
create the secret value over an unsecured medium without exchanging the secret
value itself. This method also makes it impossible to perform reverse generation of
the secret if it is somehow intercepted.
13
IPsec VPNs
LY
N
O
SE
U
Diffie-Hellman Groups
AL
Diffie and Hellman proposed five groups of prime numbers and generator values to
use in their key exchange algorithm. Each group generates unique keys using a
combination of exponential and modulus calculations.
The Junos OS supports Diffie-Hellman (DH) Groups 1, 2, and 5. The larger the prime
N
Group 2 uses a 1024-bit prime number. Diffie-Hellman Group 5 uses a 1536-bit prime
number.
TE
You must configure both tunnel peers to use the same DH group; otherwise, the key
generation process fails.
IN
14
IPsec VPNs
LY
N
O
SE
U
The DH Key Exchange Process
AL
Using the same DH group, each Junos security platform creates unique public and
private keys. These keys are mathematically related by means of the DH algorithm.
The public key values exchange across the network. Each peer then runs its local
private key and the received public key value through the DH algorithm to compute a
N
common session key. The session key itself never passes across the network.
The session key is then used as the key for symmetric data encryption.
R
TE
IN
15
IPsec VPNs
LY
N
O
SE
U
IPsec Overview
AL
IPsec is a set of standards that defines how the encryption, validation, and
authentication methods we just discussed are actually implemented in networks.
IPsec works at Layer 3; it supports both unicast and multicast traffic.
N
R
TE
IN
16
IPsec VPNs
LY
N
O
SE
U
IPsec: A Two-Step Process
AL
We cover the first step—IPsec tunnel establishment using IKE—on the next several
pages.
TE
IN
17
IPsec VPNs
LY
N
O
SE
U
Step 1: Tunnel Establishment Using Internet Key Exchange
AL
• Encryption algorithm;
• Hash algorithm;
R
• Diffie-Hellman group.
Once IPsec peers negotiate these attributes, they secure future attribute exchanges
used to protect data. IKE exchanges authenticate using one of the following methods:
• Preshared keys;
IN
• Digital signatures; or
• Public key encryption.
IKE is preferable to manual keys in IPsec implementations because of the ease of
management and scalability.
18
IPsec VPNs
LY
N
O
SE
U
Security Associations
AL
A security association (SA) is a set of policies and keys used to protect information.
SAs establish upon the successful completion of IKE negotiations. An SA is uniquely
identified by the security parameter index (SPI) value, the tunnel destination address,
and the security protocol—Encapsulating Security Payload (ESP) or authentication
N
header (AH)—in use. The lifetime of an SA can be based on either a time value or a
value determined by the volume of traffic protected by the proposal.
R
TE
IN
19
IPsec VPNs
LY
N
O
SE
U
SA Database
AL
SAs are stored in a security association database. Each entry includes the name of
the particular VPN, the remote gateway IP address, the SPIs for each direction, the
agreed-upon security protocol, encryption, and authentication algorithms and keys.
N
R
TE
IN
20
IPsec VPNs
LY
N
O
SE
U
IKE Phases
AL
A single Phase 1 channel can establish multiple Phase 2 SAs or VPNs. If wanted, a
second Diffie-Hellman exchange can be performed during Phase 2 to negotiate a new
tunnel key. Because of the encryption on this exchange, it is named Perfect Forward
Secrecy (PFS).
IN
21
IPsec VPNs
LY
N
O
SE
U
IKE Phase 1: Main Mode
AL
IKE main mode is used when both tunnel peers have static IP addresses. The Phase 1
exchange determines the following attributes:
• Encryption algorithm;
N
• Hash algorithm;
• DH group; and
R
• Authentication method:
– Preshared keys;
TE
the locally configured peer IP address) and negotiate the parameters listed previously.
Both tunnel peers must have at least one configured matching proposal for Phase 1
exchange success.
The next two messages exchange Diffie-Hellman public key values and nonces
necessary to compute the shared key.
The last two messages send simple identification information using the negotiated
key; these messages validate that the key calculation was correct.
Continued on next page.
22
IPsec VPNs
LY
An IPsec SA proposal contains the following:
• Phase 1 authentication method (main mode or aggressive mode);
• DH group number;
N
• Encryption algorithm;
• Authentication algorithm; and
O
• Key lifetime.
For Message 3 and Message 4, the DH public values exchange to create a common
session key. Nonces, which are essentially random numbers, also exchange at this
SE
time for use as seeds for keys generated later.
After both sides exchange their DH public values, a key is created on each side to
encrypt the rest of the IKE Phase 1 messages. The session key is a result of the
exchanged public keys traveling to each partner.
U
Messages 5 and 6 use the pre-shared key in the HMAC algorithm.
AL
N
R
TE
IN
23
IPsec VPNs
LY
N
O
SE
U
IKE Phase 1: Aggressive Mode
AL
IKE aggressive mode is used when one of the tunnel peers has a dynamic IP address
that could be a remote end user dialing in to the Internet, or a remote site using DHCP
to acquire an IP address. (Main mode cannot be used because the first two messages
validate peer IP addresses. In the case of a dynamic host address, the peer cannot
N
first two messages negotiate policy and exchange DH public values and nonces. In
addition, the second message authenticates the responder; the ID hash is compared
with the locally configured peer ID.
TE
The third message authenticates the initiator and provides a proof of participation in
the exchange.
IN
24
IPsec VPNs
LY
N
O
SE
U
IKE Phase 2: Quick Mode
AL
• Optional DH group.
Upon successful completion of quick mode, user data encrypts between the
TE
configured IPsec peers. Both tunnel peers must have at least one matching proposal
configured for Phase 2 exchange success.
The result of Phase 2 is to create an IPsec VPN for user data to securely transmit
through the network.
IN
25
IPsec VPNs
LY
• Authentication algorithm;
• Key lifetime;
• Proxy ID (policy rule); and
N
• DH public keys (optional if using PFS).
Message 3 acknowledges information sent from quick mode Message 2 so that the
O
Phase 2 tunnel can establish.
SE
U
AL
N
R
TE
IN
26
IPsec VPNs
LY
N
O
SE
U
IPsec: A Two-Step Process—Step 2
AL
Now that we have covered the tunnel establishment step of the IPsec process, we
cover the next step—IPsec traffic processing. Once the IPsec tunnel establishes, the
devices are ready to send the payload using the IPsec attributes and protocols, which
ensure payload protection.
N
R
TE
IN
27
IPsec VPNs
LY
N
O
SE
U
Goal of IPsec Traffic Processing
AL
During the IPsec traffic processing step, the devices have one goal—to ensure traffic
protection. The most commonly used IPsec mode is ESP tunnel mode.
IPsec Modes
N
IPsec handles the payload using one of two modes—transport or tunnel. We discuss
R
IPsec Protocols
IPsec uses two protocols to ensure payload security—the AH protocol and the ESP
protocol. Again, we discuss each of these protocols in the next few pages.
IN
28
IPsec VPNs
LY
N
O
SE
U
IPsec Modes
AL
behind the gateway. In this method, end systems need not be aware of
the IPsec protocol suite. All encryption and decryption takes place on the
R
End systems should be aware of the IPsec protocol suite. They do all the
encryption and decryption of data.
IN
29
IPsec VPNs
LY
N
O
SE
U
IPsec Protocols
AL
Two protocols exist that IPsec can use to ensure payload security—AH protocol and
ESP:
• AH provides only data integrity, authentication, and antireplay services.
AH is identified by IP protocol number 51. It uses MD5 or SHA-1 to
N
rides directly on top of IP using protocol number 50. ESP uses symmetric
key algorithms like DES, triple Data Encryption Standard (3DES), or AES,
and hash methods like MD5 and SHA-1 to provide security services.
Antireplay services ensure that third parties cannot capture and
retransmit datagrams. By checking sequence numbers, a receiver can
IN
30
IPsec VPNs
LY
N
O
SE
U
Example: Tunnel Mode AH Packets
AL
AH authenticates only the immutable fields in the IP header. Fields like time to live
(TTL) and type of service (ToS) change during packet transit, so these fields do not
receive authentication. The new IP header contains protocol number 51, signifying AH.
The AH header contains the following items:
N
antireplay.
31
IPsec VPNs
LY
N
O
SE
U
Example: Tunnel Mode ESP Packets
AL
In tunnel mode, the ESP header inserts between the new IP header and the original IP
header. The new IP header contains protocol 50, representing ESP. The ESP header
contains the following information:
• SPI: An arbitrary 32-bit value that, in combination with the destination IP
N
antireplay.
The ESP trailer contains the following information:
• Padding/pad length: Depending on original data size, padding might be
required to fill the packet; and
IN
32
IPsec VPNs
LY
N
O
SE
U
Traffic Processing: Part 1
AL
Zone.
3. The Junos OS looks up the security policy. The traffic matches a tunnel
R
policy.
4. The original packet receives encryption.
TE
33
IPsec VPNs
LY
N
O
SE
U
Traffic Processing: Part 2
AL
This list is a continuation of the list from the previous page, describing the order of
traffic processing:
7. The corporate Junos security platform receives the encrypted packet.
N
8. The Junos OS looks up the incoming SPI in the local SA database. The
matching record contains encryption and authentication algorithms, and
keys.
R
9. The Junos OS compares the locally calculated hash with the received
hash.
TE
12. The Junos OS checks the associated security policy. It forwards the
packet if the tunnel policy exists for the packet.
34
IPsec VPNs
LY
N
O
SE
U
IPsec Processing Summary
AL
The slide provides a summary of all the steps of IPsec traffic processing.
N
R
TE
IN
35
IPsec VPNs
LY
N
O
SE
U
IPsec Implementation Methods
AL
policy. Because each tunnel requires its own negotiation process and a
separate pair of SAs, the use of policy-based IPsec VPNs can require
more resources than route-based IPsec VPNs.
TE
• Route-based VPNs: Unlike the process for policy-based IPsec VPNs, for
route-based IPsec VPNs, a policy refers to a destination address—not an
IPsec VPN tunnel. Because a destination address is used, route-based
VPNs are generally the best VPNs to use when a routing protocol
IN
36
IPsec VPNs
LY
N
O
SE
U
Elements of IPsec VPN Configuration:
AL
37
IPsec VPNs
LY
N
O
SE
U
Configuring IKE Phase 1 Parameters: Step A
AL
IKE Phase 1 configuration requires that you perform the following steps:
A. Configure IKE Phase 1 proposals;
B. Configure IKE policies and reference the proposals; and
N
38
IPsec VPNs
• standard:
– Proposal 1: preshared key, DH g2, 3DES, and SHA1
– Proposal 2: preshared key, DH g2, AES128, and SHA1
LY
N
O
SE
U
AL
N
R
TE
IN
39
IPsec VPNs
LY
N
O
SE
U
Configuring IKE Phase 1 Parameters: Step B
AL
The slide illustrates the syntax for Step B of IKE Phase 1 configuration, which is policy
configuration. For this step you must either refer to the preconfigured proposal from
Step A or use a system-defined proposal. Also, within the policy you must specify the
preshared key and mode of IKE—main or aggressive.
N
R
TE
IN
40
IPsec VPNs
LY
N
O
SE
U
Configuration of IKE Phase 1 Parameters: Step C
AL
The slide illustrates the last step of IKE Phase 1 configuration, which is gateway
configuration. In this step you must refer to the policy configured in the previous step,
define the peer address, and specify the outgoing interface. Optionally, you can
configure dead peer detection (DPD) to send a DPD request packet if the device does
N
not receive traffic from a peer for the number of seconds specified with the
interval option. You can also configure DPD to consider the peer unavailable after
a threshold number of interval periods is reached. For example, assume that the
R
interval value is 10 seconds and the threshold value is 5. If the device does not
receive traffic from a peer for 10 seconds, it sends a DPD request packet to it. The
TE
Junos security platform then considers the peer unavailable after five sequences of
waiting for 10 seconds.
IN
41
IPsec VPNs
LY
N
O
SE
U
Configuring IKE Phase 2 Parameters: Step A
AL
IKE Phase 2 configuration requires that you configure the following steps:
A. IKE Phase 2 proposals;
B. IKE Phase 2 policies; and
N
42
IPsec VPNs
LY
N
O
SE
U
AL
N
R
TE
IN
43
IPsec VPNs
LY
N
O
SE
U
Configuring IKE Phase 2 Parameters: Step B
AL
The slide illustrates the syntax for Step B of IKE Phase 2 configuration, which is policy
configuration. For this step, you must either refer to the preconfigured proposal from
Step A or use a system-defined proposal. Also, within the policy, you have the option to
configure PFS to use with the three supported groups of DH as the method for the
N
44
IPsec VPNs
LY
N
O
SE
U
Configuring IKE Phase 2 Parameters: Step C
AL
The slide illustrates the last step of IKE Phase 2 configuration, which is VPN
configuration. In this step, you must refer to the policy defined in the previous step, as
well as the gateway preconfigured in Step C of IKE Phase 1. If you are configuring a
route-based VPN, you must bind the st0.x interface to the VPN, as illustrated on the
N
slide. If you manually set up a tunnel, you must specify all the necessary attributes
manually. Should you choose to do so, you can set up all the necessary parameters
under the security ipsec vpn configuration stanza. The optional
R
45
IPsec VPNs
LY
N
O
SE
U
Applying IPsec—Policy-Based IPsec VPNs
AL
If you are implementing a policy-based IPsec VPN, you must apply the configured VPN
from within the security policy, as illustrated on the slide.
N
R
TE
IN
46
IPsec VPNs
LY
N
O
SE
U
Applying IPsec—Route-Based IPsec VPNs
AL
If you are implementing a route-based IPsec VPN, you must perform the following
steps:
1. Configure the secure tunnel interface (st0.x);
N
2. Configure a static route or enable dynamic routing that points to the st0.x
interface;
R
47
IPsec VPNs
LY
N
O
SE
U
Example: Creating Policy-Based IPsec VPNs Using IKE
AL
Consider the following example: you must implement a policy-based IPsec VPN
between two SRX Series Services Gateways named Edge and Remote, as illustrated
on the slide. A policy-based IPsec VPN implies that you must refer to the VPN tunnel
from within the policies at each end, as demonstrated on the slide.
N
R
TE
IN
48
IPsec VPNs
LY
N
O
SE
U
Example: Configuring IKE Phase 1 Parameters
AL
The slide illustrates the configuration of the following parameters for IKE Phase 1:
1. Proposal for IKE Phase 1: Recall that this step is optional, because you
can use the Junos predefined proposals (the choices are basic,
compatible, or standard). On the slide, we named the configured
N
that IKE Phase 1 will use—main mode, in this case. We referred to the
proposal ike-phase1-proposal, and we specified the preshared
key.
3. Gateway, called ike-phase1-gateway: Within the gateway stanza
IN
49
IPsec VPNs
LY
N
O
SE
U
Example: Configuring IKE Phase 2 Parameters for Policy-Based IPsec
VPNs
AL
The slide illustrates configuration of IKE Phase 2 parameters for our example. Our
configuration consists of the following:
1. A proposal for IKE Phase 2: Recall that this step is optional because you
N
can use the Junos predefined proposals (the choices are basic,
compatible, or standard). We named the configured proposal
R
50
IPsec VPNs
LY
N
O
SE
U
Monitoring Policy-Based IPsec VPNs
AL
Once you finish and commit all the configurations, you must ensure that the tunnels
are working properly by following the order of how IPsec works. First ensure that IKE
Phase 1 is working properly, then ensure that IKE Phase 2 is working properly. To
check that IKE Phase 1 functions properly, check whether the SAs are formed.
N
Similarly, you perform IKE Phase 2 checking by viewing the resulting SAs.
The slide illustrates both commands with the resulting outputs. Also, you can view the
R
IPsec statistics that specify the number of transit packet bytes that the device has
encrypted and decrypted.
TE
IN
51
IPsec VPNs
LY
N
O
SE
U
Example: Creating Route-Based IPsec VPNs Using IKE
AL
Consider another example: In this case you need to set up the IPsec tunnel using the
route-based method and IKE. Recall that a route-based VPN requires only one tunnel
between Junos security platforms, while a policy-based VPN sets up a tunnel for every
new flow.
N
You must ensure that both ends of the VPN tunnel have a secure tunnel interface
configured—in our case it is the st0.0 interface, with IP address 1.1.80.0/28.
R
Furthermore, you must ensure that each of the devices has a valid route referring to
the st0.0 interface. In our case we are using static route 0.0.0.0/0.
TE
IN
52
IPsec VPNs
LY
N
O
SE
U
Example: Configuring a Security Zone for a Route-Based IPsec VPN
AL
Once you configure interface st0.0, you must add it to the corresponding security
zone. In our case, we must add it to the Public security zone. Also note that
although the slide provides the configuration for the Edge device, you must also
repeat it for the Remote device.
N
R
TE
IN
53
IPsec VPNs
LY
N
O
SE
U
Example: Configuring IKE Phase 1 Parameters
AL
The slide illustrates the configuration of the following parameters for IKE Phase 1:
1. The proposal for IKE Phase 1: Recall that this step is optional because
you can use the Junos predefined proposals (the choices are basic,
compatible, or standard). We named the configured proposal
N
that IKE Phase 1 will use—the main mode, in this case. We referred to the
proposal ike-phase1-proposal, and we specified the preshared
key.
3. A gateway, called ike-phase1-gateway: Within the gateway stanza
IN
54
IPsec VPNs
LY
N
O
SE
U
Example: Configuring IKE Phase 2 Parameters for a Route-Based IPsec
VPN
AL
The slide illustrates configuration of IKE Phase 2 parameters for our example. Our
configuration consists of the following:
1. A proposal for IKE Phase 2: Recall that this step is optional, because you
N
can use the Junos predefined proposals (the choices are basic,
compatible, or standard). We named the configured proposal
R
55
IPsec VPNs
LY
N
O
SE
U
Monitoring a Route-Based IPsec VPN: Part 1
AL
Once you finish and commit all the configurations, you must ensure that the tunnels
work properly by following the order of how IPsec works. First ensure that IKE Phase 1
works properly, then ensure that IKE Phase 2 works properly. To check that IKE Phase
1 functions properly, you must check whether the SAs form. Similarly, you perform IKE
N
IPsec statistics that specify the number of transit packet bytes that the device
encrypts and decrypts.
TE
IN
56
IPsec VPNs
LY
N
O
SE
U
Monitoring a Route-Based IPsec VPN: Part 2
AL
One of the differentiating points of a route-based IPsec VPN is that it uses the st0
interface. Therefore, you can use the show interfaces st0.x command to view
whether the interface is up as well as how much information transits through it. If
there is a problem in establishing the route-based IPsec tunnel, the st0 interface is
N
not in the up state. The slide illustrates the results of the show interface st0
detail command for the Edge device.
R
TE
IN
57
IPsec VPNs
LY
N
O
SE
U
Monitoring a Route-Based IPsec VPN: Part 3
AL
The slide is the continuation of the show interfaces st0 detail command
from the previous slide. It provides statistical information for the st0 interface,
including flow input, flow output, and flow error statistics.
N
R
TE
IN
58
IPsec VPNs
LY
N
O
SE
U
Monitoring a Route-Based IPsec VPN: Part 4
AL
As we work with a route-based IPsec VPN, it is useful to check the routing table
entries, ensuring that an active route referring to the st0 interface exists. In our case,
the 0.0.0.0/0 default route, using interface st0.0 as its next hop, is active.
N
R
TE
IN
59
IPsec VPNs
LY
N
O
SE
U
Other IPsec VPN Monitoring Commands
AL
You can enable traceoptions to debug IKE Phase 1 and Phase 2. Also, you can
clear IKE Phase 1 and Phase 2 SAs and statistics using the clear security ike
and clear security ipsec operational commands.
N
R
TE
IN
60
IPsec VPNs
LY
N
O
SE
U
Common IPsec Configuration Problems
AL
You should be aware of the following common problems when configuring IPsec VPNs:
• Proposal mismatch: The IKE Phase 1 proposal lists configured on each
side do not agree. In this case, the initiator of the tunnel sees
retransmissions and a retransmission limit indicator. The problem is
N
61
62
IPsec VPNs
IN
TE
R
N
AL
U
SE
O
N
LY