




版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、IPsec VPNsIPsec Components and IPsec VPN FeaturesIPsec OverviewWhat Is IPsec?IPsec is an IETF standard that employs cryptographic mechanisms on the network layer:IPsec是IETF的標(biāo)準(zhǔn),其在網(wǎng)絡(luò)層使用加密機(jī)制實(shí)現(xiàn):Authentication of every IP packet IP報(bào)文的認(rèn)證Verification of data integrity for each packet為每一個(gè)數(shù)據(jù)包提供數(shù)據(jù)完整性的保證Confid
2、entiality of packet payload對(duì)數(shù)據(jù)進(jìn)行機(jī)密性的保護(hù)What Is IPsec? (Cont.)Consists of open standards for securing private communicationsIPsec由一系列的開(kāi)放標(biāo)準(zhǔn)組成,用于保護(hù)秘密的通信。Scales from small to very large networks不管是小型的網(wǎng)絡(luò)還是大型的網(wǎng)絡(luò)都可以實(shí)施IPsec技術(shù)。Is available in Cisco IOS software version 11.3(T) and laterIs included in PIX Fire
3、wall version 5.0 and laterIPsec Security FeaturesIPsec is the only standard Layer 3 technology that provides:Confidentiality 機(jī)密性Data integrity 數(shù)據(jù)完整性Authentication 認(rèn)證Replay detection 反重放檢測(cè)IPsec ProtocolsIPsec uses three main protocols to create a security framework:Internet Key Exchange (IKE):Provide
4、s framework for negotiation of security parametersEstablishment of authenticated keysEncapsulating Security Payload (ESP):Provides framework for encrypting, authenticating, and securing of dataAuthentication Header (AH):Provides framework for authenticating and securing of dataIPsec HeadersIPsec ESP
5、 provides the following:Authentication and data integrity (MD5 or SHA-1 HMAC) with AH and ESPConfidentiality (DES, 3DES, or AES) only with ESPPeer AuthenticationPeer authentication methods:Username and password OTP (Pin/Tan) (one time password) Biometric (生物特征)Preshared keysDigital certificatesInter
6、net Key ExchangeInternet Key ExchangeIKE solves the problems of manual and unscalable implementation of IPsec by automating the entire key exchange process:Negotiation of SA characteristicsAutomatic key generationAutomatic key refreshManageable manual configurationIKE PhasesPhase 1:Authenticate the
7、peersNegotiate a bidirectional SAMain mode or aggressive modePhase 1.5:XauthMode configPhase 2:IPsec SAs/SPIsQuick modeIKE ModesIKE: Other FunctionsIKE: Other FunctionsDead peer detection (DPD):BidirectionalSent on periodic intervalsSender must receive a reply or disconnectIKE keepalives are unidire
8、ctional and are sent every 10 seconds.NAT traversal:Defined in RFC 3947Encapsulates IPsec packet in UDP packetMode config (Push Config) and Xauth (User Authentication)IPsec and NAT: The ProblemIPsec NAT TraversalNeed NAT traversal with IPsec over TCP/UDP:NAT traversal detection NAT traversal decisio
9、nUDP encapsulation of IPsec packetsUDP encapsulated process for software enginesMode ConfigurationMechanism used to push attributes to IPsec VPN clientsEasy VPNDynamically updated:Central services and security policyOffload VPN function from local devicesClient and network extension modeCentralized
10、control:Configuration and security policy pushed at the time of the VPN tunnel establishmentXauthMechanism used for user authentication for VPN clientsESP and AHESP and AHIPsec protocols:ESP or AHESP uses IP protocol number 50AH uses IP protocol number 51IPsec modes:Tunnel or transport modeTunnel mo
11、de creates a new additional IP headerThe Message is concatenated with a symmetric key ESP and AH HeaderESP allows encryption and authenticates the original packet.AH authenticates the whole packet (including the header) and does not allow encryption.AH Authentication and IntegrityESP ProtocolProvide
12、s confidentiality with encryptionProvides integrity with authenticationTunnel and Transport ModeMessage Authentication and Integrity CheckMessage Authentication andIntegrity Check Using HashA MAC is used for message authentication and integrity check.Hashes are widely used for this purpose (HMAC).Co
13、mmonly Used Hash FunctionsMD5 provides 128-bit output.SHA-1 provides 160-bit output (only first 96 bits used in IPsec).SHA-1 is computationally slower than MD5, but more secure.Symmetric vs. Asymmetric Encryption AlgorithmsSymmetric vs. AsymmetricEncryption AlgorithmsSymmetric algorithm:Secret key c
14、ryptographyEncryption and decryption use the same keyTypically used to encrypt the content of a messageExamples: DES, 3DES, AESAsymmetric algorithm:Public key cryptographyEncryption and decryption use different keysTypically used in digitalcertification and key managementExample: RSAKey Lengths of S
15、ymmetric vs.Asymmetric Encryption AlgorithmsSymmetric Key LengthAsymmetric Key Length80102411220481283072192768025615,360Comparable key lengths required for asymmetric keys compared to symmetric keysSecurity Level of Cryptographic AlgorithmsSecurity LevelWork FactorAlgorithmsWeakO(240)DES, MD5Legacy
16、O(264)RC4, SHA-1BaselineO(280)3DESStandardO(2128)AES-128, SHA-256HighO(2192)AES-192, SHA-384UltraO(2256)AES-256, SHA-512Symmetric Encryption: DESSymmetric key encryption algorithmBlock cipher: Works on 64-bit data block, uses 56-bit key (last bit of each byte used for parity)Mode of operation: Apply
17、 DES to encrypt blocks of dataSymmetric Encryption: 3DES168-bit total key lengthMode of operation decides how to process DES three timesNormally: encrypt, decrypt, encrypt3DES requires more processing than DESSymmetric Encryption: AESFormerly known as RijndaelSuccessor to DES and 3DESSymmetric key b
18、lock cipherStrong encryption with long expected lifeAES can support 128-, 192-, and 256-bit keys; 128-bit key is considered safeAsymmetric Encryption: RSABased on Diffie-Hellman key exchange (IKE) principlesPublic key to encrypt data, and to verify digital signaturesPrivate key to decrypt data, and
19、to sign with a digital signaturePerfect for insecure communication channelsDiffie-Hellman Key ExchangeDiffie-Hellman Key Exchange (Cont.)PKI EnvironmentPKI Environment Certificate AuthorityThe trust basis of a PKI systemVerifies user identity, issues certificates by binding identity of a user to a p
20、ublic key with a digital certificateRevokes certificates and publishes CRLIn-house implementation or outsourcingX.509 v3 CertificatePKI Message ExchangePKI CredentialsHow to store PKI credentials:RSA keys and certificatesNVRAMeToken:Cisco 871, 1800, 2800, 3800 Series routerCisco IOS Release 12.3(14)
21、T image Cisco USB eTokenA k9 imageSummaryIPsec provides a mechanism for secure data transmission over IP networks.The IKE protocol is a key management protocol standard used in conjunction with the IPsec standard. IKE has some additional functions: DPD, NAT traversal, encapsulation in UDP packet, co
22、nfig mode, and Xauth.The two IP protocols used in the IPsec standard are ESP and AH.For message authentication and integrity check, an HMAC is used. The two types of encryption are symmetric encryption and asymmetric encryption. PKI provides customers with a scalable, secure mechanism for distributi
23、ng, managing, and revoking encryption and identity information in a secured data network. IPsec VPNsSite-to-Site IPsec VPN OperationSite-to-Site IPsec VPN OperationsFive Steps of IPsecStep 1: Interesting TrafficStep 2: IKE Phase 1IKE Policy Negotiates matching IKE transform sets to protect IKE excha
24、ngeDiffie-Hellman Key ExchangeAuthenticate Peer IdentityPeer authentication methods:Preshared keysRSA signaturesRSA encrypted noncesStep 3: IKE Phase 2Negotiates IPsec security parameters, IPsec transform setsEstablishes IPsec SAsPeriodically renegotiates IPsec SAs to ensure securityOptionally, perf
25、orms an additional Diffie-Hellman exchangeIPsec Transform SetsA transform set is a combination of algorithms and protocols that enact a security policy for traffic.Security AssociationsSA database:Destination IP addressSPIProtocol (ESP or AH)Security policy database:Encryption algorithmAuthenticatio
26、n algorithmModeKey lifetimeSA LifetimeData transmitted-basedTime-basedStep 4: IPsec SessionSAs are exchanged between peers.The negotiated security services are applied to the traffic. Step 5: Tunnel TerminationA tunnel is terminated by one of the following:By an SA lifetime timeoutIf the packet coun
27、ter is exceededIPsec SA is removedConfiguring IPsecConfiguration Steps forSite-to-Site IPsec VPNEstablish ISAKMP policyConfigure IPsec transform setConfigure crypto ACLConfigure crypto mapApply crypto map to the interfaceConfigure interface ACLSite-to-Site IPsec Configuration: Phase 1Site-to-Site IP
28、sec Configuration: Phase 1Site-to-Site IPsec Configuration: Phase 2Site-to-Site IPsec Configuration: Phase 2Site-to-Site IPsec Configuration: Apply VPN ConfigurationSite-to-Site IPsec Configuration:Apply VPN ConfigurationSite-to-Site IPsec Configuration: Interface ACLSite-to-Site IPsec Configuration
29、:Interface ACLWhen filtering at the edge, there is not much to see:IKE: UDP port 500ESP and AH: IP protocol numbers 50 and 51, respectivelyNAT transparency enabled:UDP port 4500TCP (port number has to be configured)Router1#show access-listsaccess-list 102 permit ahp host 172.16.172.10 host 172.16.171.20access-list 102 permit esp host 172.16.172.10 host 172.16.171.20access-list 102 permit udp host 172.16.172.10 host 172.
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 全面擴(kuò)充2025年VB考試范圍試題及答案
- 數(shù)字化轉(zhuǎn)型下的工作規(guī)劃計(jì)劃
- 湖北省武漢市江漢區(qū)度第一期期2025年數(shù)學(xué)七下期末教學(xué)質(zhì)量檢測(cè)試題含解析
- 山東省萊蕪市萊城區(qū)腰關(guān)中學(xué)2025年數(shù)學(xué)七下期末考試模擬試題含解析
- 小班環(huán)保知識(shí)宣傳與實(shí)踐計(jì)劃
- 企業(yè)品牌建設(shè)的階段性總結(jié)計(jì)劃
- 2025年軟件設(shè)計(jì)師考試戰(zhàn)略與試題及答案
- 2024年云南省投資促進(jìn)局下屬事業(yè)單位真題
- 2024年西藏自治區(qū)教育廳下屬事業(yè)單位真題
- 2024年上饒師范學(xué)院輔導(dǎo)員考試真題
- 2025年巴中發(fā)展控股集團(tuán)限公司招聘高頻重點(diǎn)提升(共500題)附帶答案詳解
- 課題申報(bào)書(shū):新中國(guó)成立以來(lái)人民幣圖像的國(guó)家形象視覺(jué)構(gòu)建研究
- 年產(chǎn)10萬(wàn)噸高鹽稀態(tài)發(fā)酵醬油車(chē)間設(shè)計(jì)
- 2024-2030年中國(guó)對(duì)苯二甲酸工業(yè)市場(chǎng)發(fā)展前景調(diào)研及投資戰(zhàn)略分析報(bào)告
- 《護(hù)理心理學(xué)》試題及參考答案(四)
- T-CBDA 70-2023 中小型體育館室內(nèi)裝飾裝修技術(shù)規(guī)程
- 社區(qū)食堂租賃合同樣本
- DB52T 1657-2022 磷石膏模盒通 用技術(shù)要求
- 2024年中級(jí)注冊(cè)安全工程師《安全生產(chǎn)管理》真題及答案
- 2024年居間合作備忘錄:雙方協(xié)商達(dá)成
- 廚房食材驗(yàn)收標(biāo)準(zhǔn)
評(píng)論
0/150
提交評(píng)論