Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1
• Crypto
• VPN
• Simple Lab
2
1. Describe the purpose and operation of VPNs
2. Differentiate between the various types of VPNs
3. Describe the IPSec protocol and its basic functions
4. Differentiate between AH and ESP
5. Describe the IKE protocol and modes
6. Describe the five steps of IPSec operation
3
Business Partner
with a Cisco Router
Mobile Worker
with a Cisco
VPN Client
VPN
Internet Firewall
SOHO with a Cisco
DSL Router
Corporate
WAN
VPN
Network
4
IPSec
VPN
Internet
IPSec
SOHO with a Cisco DSL
Router
5
Business Partner Remote-access
with a Cisco Router
VPNs
Mobile Worker
with a Cisco
VPN Client
CSA
MARS
VPN
SOHO with a Internet Firewall
Site-to-Site VPN
IP
VPNs WAN S
VPN
Iron Port CSA
Regional branch with CSA CSA CSACSA
a VPN enabled CSA
Cisco ISR router
Web Email
Server Server DNS
6
Business Partner
with a Cisco
Router Hosts send and receive normal
TCP/IP traffic through a VPN gateway
CSA
MARS
VP
N
SOHO with a Internet Firewall
Cisco DSL
Router
Site-to-Site VPN
IP
VPNs WAN S
VPN
Iron CSA
Port
Regional branch with CSA CS
CSA
a VPN enabled CS A CS
A A
Cisco ISR router
Web Email
Server Server DNS
7
Remote-access
VPNs
Mobile Worker
with a Cisco
VPN Client CSA
MARS
Internet Firewall
VPN
IPS
Web Email
Server Server DNS
8
SSL IPSec
Applications Web-based applications, file All IP-based applications are
sharing, email (if not using full available to the user. The
client). With the full experience is like being on the
AnyConnect client, all IP-based local network.
applications, similar to IPsec,
are available.
9
SSL IPSec
Authentication Moderate, one-way or two- Strong, two-way
way authentication using shared
authentication. secrets or digital certificates.
Overall Security Moderate. Any device can Strong. Only specific devices
initially with specific configurations,
connect. such as a VPN client, can
connect.
10
Remote Site Central Site
Internet
Intranet
Remote User
Extranet
• Flexible platform • VPN infrastructure for
• Resilient clustering contemporary
• Clientless applications
• AnyConnect • Integrated web-based
management
11
Main Site
Business Partner
with a Cisco Router IPsec Perimeter
Router
Legacy ASA
Concentrator Firewall
POP
Regional Office with a ASA
Cisco ASA Firewall
12
Diffie-Hellman DH7
13
Least secure Most secure
Key length:
- 56-bits
Key length:
- 56-bits (3 times)
Key lengths:
-128-bits
Diffie-Hellman DH7
-192 bits
-256-bits
Key length:
- 160-bits
14
Least secure Most secure
Key length:
- 128-bits
Key length:
Diffie-Hellman - 160-bits) DH7
15
Diffie-Hellman DH7
16
Diffie-Hellman DH7
17
Authentication Header
R1 All data is in plaintext.
R2
18
R1 R2
Host A Host B
10.0.1.3 10.0.2.3
19
R1 R2
Host A Host B
Negotiate IKE Proposals 10.0.2.3
10.0.1.3
Policy 10 Policy 15
DES DES
MD5 MD5
pre-share IKE Policy Sets pre-share
DH1 DH1
lifetime lifetime
Policy 20
3DES
SHA
pre-share
DH1
lifetime
20
Establish DH Key
Private value, XA Private value, XB
Alice Public value, YA Public value, YB
Bob
YA = g XA mod p YB = gXB mod p
YA
YB
XA XB
(YB ) mod p = K (YA ) mod p = K
A DH exchange is performed to establish keying material.
21
Authenticate Peer
Remote Office Corporate Office
Internet
HR
Servers
Peer
Authentication
22
R1 R2
Host A Host B
10.0.1.3 10.0.2.3
23
R1 R2
Host A Host B
24
10.0.1.3 R1 R2 10.0.2.3
25
Site 1 AH
Site 2
ESP
10.0.1.0/24 IKE 10.0.2.0/24
10.0.2.3
10.0.1.3 R1 R2
Internet
S0/0/0 S0/0/0
172.30.1.2 172.30.2.2
• Ensure that protocols 50 (ESP), 51 (AH) and UDP port 500 (ISAKMP)
traffic are not blocked by incoming ACLs on interfaces used by IPsec.
26
AH
ESP
Site 1 IKE Site 2
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2 10.0.2.3
Internet
S0/0/0 S0/0/0
172.30.1.2 172.30.2.2
27
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2 10.0.2.3
Internet
Site 1 Site 2
Policy 110
DES
MD5 Tunnel
Preshare
86400
DH1
router(config)#
crypto isakmp policy priority
Defines the parameters within the IKE policy
R1(config)# crypto isakmp policy 110
R1(config–isakmp)# authentication pre-share
R1(config–isakmp)# encryption des
R1(config–isakmp)# group 1
R1(config–isakmp)# hash md5
R1(config–isakmp)# lifetime 86400
28
Default
Parameter Keyword Accepted Values Description
Value
des
56-bit Data Encryption Standard
3des Triple DES
Message encryption
encryption aes 128-bit AES des
algorithm
aes 192 192-bit AES
256-bit AES
aes 256
sha SHA-1 (HMAC variant) Message integrity
hash sha
md5 MD5 (HMAC variant) (Hash) algorithm
29
10.0.1.0/24 10.0.2.0/24
10.0.1.3
R1 R2 10.0.2.3
Internet
Site 1 Site 2
R1(config)# R2(config)#
crypto isakmp policy 100 crypto isakmp policy 100
hash md5 hash md5
authentication pre-share authentication pre-share
! !
crypto isakmp policy 200 crypto isakmp policy 200
hash sha hash sha
authentication rsa-sig authentication rsa-sig
! !
crypto isakmp policy 300 crypto isakmp policy 300
hash md5 hash md5
authentication pre-share authentication rsa-sig
30
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2 10.0.2.3
Internet
Site 1 Site 2
Policy 110
Preshare
3DES Tunnel
SHA
DH2
43200
R2 must have an ISAKMP policy
configured with the same parameters.
R1(config)# crypto isakmp policy 110 R2(config)# crypto isakmp policy 100
R1(config–isakmp)# authentication pre-share R2(config–isakmp)# authentication pre-share
R1(config–isakmp)# encryption 3des R2(config–isakmp)# encryption 3des
R1(config–isakmp)# group 2 R2(config–isakmp)# group 2
R1(config–isakmp)# hash sha R2(config–isakmp)# hash sha
R1(config–isakmp)# lifetime 43200 R2(config–isakmp)# lifetime 43200
31
router(config)#
crypto isakmp key keystring address peer-address
router(config)#
crypto isakmp key keystring hostname hostname
Parameter Description
This parameter specifies the PSK. Use any combination of alphanumeric characters
keystring up to 128 bytes. This PSK must be identical on both peers.
peer-
This parameter specifies the IP address of the remote peer.
address
This parameter specifies the hostname of the remote peer.
hostname This is the peer hostname concatenated with its domain name (for example,
myhost.domain.com).
32
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2 10.0.2.3
Internet
Site 1 Site 2
R1(config)# crypto isakmp policy 110
R1(config–isakmp)# authentication pre-share
R1(config–isakmp)# encryption 3des
R1(config–isakmp)# group 2
R1(config–isakmp)# hash sha
R1(config–isakmp)# lifetime 43200
R1(config-isakmp)# exit
R1(config)# crypto isakmp key cisco123 address 172.30.2.2
R1(config)#
Note:
R2(config)# crypto isakmp policy 110
• The keystring cisco1234 matches. R2(config–isakmp)# authentication pre-share
R2(config–isakmp)# encryption 3des
• The address identity method is R2(config–isakmp)# group 2
specified. R2(config–isakmp)# hash sha
R2(config–isakmp)# lifetime 43200
• The ISAKMP policies are compatible.
R2(config-isakmp)# exit
• Default values do not have to be R2(config)# crypto isakmp key cisco123 address 172.30.1.2
configured. R2(config)#
33
router(config)#
crypto ipsec transform–set transform-set-name
transform1 [transform2] [transform3]]
Description
Command
This parameter specifies the name of the transform set
transform-set-name
to create (or modify).
Type of transform set. You may specify up to four
"transforms": one Authentication Header (AH), one
transform1,
Encapsulating Security Payload (ESP) encryption, one
transform2, transform3
ESP authentication. These transforms define the IP
Security (IPSec) security protocols and algorithms.
34
Host A Host B
R1 172.30.1.2 R2
Internet
10.0.1.3 10.0.2.3
172.30.2.2
1
transform-set ALPHA transform-set RED
esp-3des 2 esp-des
tunnel tunnel
3
4
transform-set BETA transform-set BLUE
esp-des, esp-md5-hmac 5 esp-des, ah-sha-hmac
tunnel 6 tunnel
7
35
Host A
R1
Internet
Outbound
Encrypt
Traffic
Bypass (Plaintext)
Permit Inbound
Traffic
Bypass
Discard (Plaintext)
36
Site 1 Site 2
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2
10.0.2.3
Internet
S0/0/0 S0/0/0
172.30.1.2 172.30.2.2
router(config)#
access-list access-list-number [dynamic dynamic-name [timeout minutes]]{deny |
permit} protocol source source-wildcard destination destination-wildcard
[precedence precedence] [tos tos] [log]
This option specifies which traffic to protect by cryptography based on the protocol,
protocol such as TCP, UDP, or ICMP. If the protocol is IP, then all traffic IP traffic that matches
that permit statement is encrypted.
If the ACL statement is a permit statement, these are the networks, subnets, or hosts
source and destination between which traffic should be protected. If the ACL statement is a deny statement,
then the traffic between the specified source and destination is sent in plaintext.
37
Site 1 Site 2
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2 10.0.2.3
Internet
S0/0/0 S0/0/0
172.30.1.2 172.30.2.2
S0/1
38
Site 1 Site 2
R1 R2
Internet
10.0.1.3 10.0.2.3
39
router(config)#
crypto map map-name seq-num ipsec-manual
Defines the name assigned to the crypto map set or indicates the name of the crypto
map-name
map to edit.
seq-num The number assigned to the crypto map entry.
ipsec-manual Indicates that ISAKMP will not be used to establish the IPsec SAs.
ipsec-isakmp Indicates that ISAKMP will be used to establish the IPsec SAs.
(Default value) Indicates that CET will be used instead of IPsec for protecting the
cisco
traffic.
(Optional) Specifies that this crypto map entry references a preexisting static crypto
dynamic map. If this keyword is used, none of the crypto map configuration commands are
available.
(Optional) Specifies the name of the dynamic crypto map set that should be used as
dynamic-map-name
the policy template.
40
Command Description
Used with the peer, pfs, transform-set, and security-association
set commands.
security-association
Sets SA lifetime parameters in seconds or kilobytes.
lifetime
match address [access- Identifies the extended ACL by its name or number. The value should match
the access-list-number or name argument of a previously defined IP-extended
list-id | name] ACL being matched.
41
Site 1 Site 2
10.0.1.0/24 10.0.2.0/24
R1 R2
10.0.1.3 10.0.2.3
Internet
S0/0/0
172.30.2.2
R3
S0/0/0
172.30.3.2
42
Site 1 Site 2
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2
10.0.2.3
Internet
S0/0/0 S0/0/0
172.30.1.2 172.30.2.2
MYMAP
router(config-if)#
43
Show Command Description
show crypto map Displays configured crypto maps
44
Site 1 Site 2
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2
10.0.2.3
Internet
S0/0/0 S0/0/0
172.30.1.2 172.30.2.2
router#
show crypto map
Displays the currently configured crypto maps
R1# show crypto map
Crypto Map “MYMAP" 10 ipsec-isakmp
Peer = 172.30.2.2
Extended IP access list 110
access-list 102 permit ip host 10.0.1.3 host 10.0.2.3
Current peer: 172.30.2.2
Security association lifetime: 4608000 kilobytes/3600 seconds
PFS (Y/N): N
Transform sets={ MYSET, }
45
Site 1 Site 2
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2
10.0.2.3
Internet
S0/0/0 S0/0/0
router# 172.30.1.2 172.30.2.2
46
Site 1 Site 2
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2
10.0.2.3
Internet
S0/0/0 S0/0/0
172.30.1.2 172.30.2.2
47
Site 1 Site 2
10.0.1.0/24 10.0.2.0/24
10.0.1.3 R1 R2
10.0.2.3
Internet
S0/0/0 S0/0/0
172.30.1.2 172.30.2.2
48
router#
debug crypto isakmp
1d00h: ISAKMP (0:1): atts are not acceptable. Next payload is 0 1d00h: ISAKMP (0:1); no
offers accepted!
1d00h: ISAKMP (0:1): SA not acceptable!
1d00h: %CRYPTO-6-IKMP_MODE_FAILURE: Processing of Main Mode failed with peer at 172.30.2.2
49
50
• Integrated security and routing
• Browser-based full network SSL VPN access
SSL VPN
Internet
Headquarters
SSL VPN
Tunnel
Workplace
Resources
51
52
53
54
• Negotiates tunnel parameters
• Establishes tunnels according to set parameters
• Automatically creates a NAT / PAT and associated ACLs
• Authenticates users by usernames, group names,
and passwords
• Manages security keys for encryption and decryption
• Authenticates, encrypts, and decrypts data through the tunnel
55
56
57
• Packet Tracer labs up on Moodle
58
• Test Week
• Covers content of all 5 weeks
• ~10 questions on each week
• Pass – 70% for Certificate of Completion
59