IPsec.pdf

(57 KB) Pobierz
IP SEC
packetlife.net
Protocols
Encryption Algorithms
Type
Key Length (Bits)
Strength
Internet Security Association and Key Management
Protocol (ISAKMP)
A framework for the negotiation and management of
security associations between peers (traverses UDP/500)
Internet Key Exchange (IKE)
Responsible for key agreement using asymmetric
cryptography
Encapsulating Security Payload (ESP)
Provides data encryption, data integrity, and peer
authentication; IP protocol 50
Authentication Header (AH)
Provides data integrity and peer authentication, but not data
encryption; IP protocol 51
DES Symmetric 56
Weak
3DES Symmetric 168
Medium
AES Symmetric
128/192/256
Strong
RSA Asymmetric
1024+
Strong
Hashing Algorithms
Length (Bits)
Strength
MD5 128
Medium
SHA-1 160
Strong
IKE Phases
Phase 1
A bidirectional ISAKMP SA is established
between peers to provide a secure management
channel (IKE in main or aggressive mode)
Phase 1.5 (optional)
Xauth can optionally be implemented to enforce
user authentication
Phase 2
Two unidirectional IPsec SAs are established for
data transfer using separate keys (IKE quick
mode)
IPsec Modes
Original
Packet
L2
IP
TCP/UDP
Transport
Mode
L2
IP
ESP/AH
TCP/UDP
Tunnel
Mode
L2
New IP
ESP/AH
IP
TCP/UDP
Transport Mode
The ESP or AH header is inserted behind the IP header; the
IP header can be authenticated but not encrypted
Tunnel Mode
A new IP header is created in place of the original; this
allows for encryption of the entire original packet
Terminology
Data Integrity
Secure hashing (HMAC) is used to ensure data
has not been altered in transit
Data Confidentiality
Encryption is used to ensure data cannot be
intercepted by a third party
Configuration
ISAKMP Policy
crypto isakmp policy 10
encryption aes 256
hash sha
authentication pre-share
group 2
lifetime 3600
Data Origin Authentication
Authentication of the SA peer
Anti-replay
Sequence numbers are used to detect and
discard duplicate packets
Hash Message Authentication Code (HMAC)
A hash of the data and secret key used to
provide message authenticity
Diffie-Hellman Exchange
A shared secret key is established over an
insecure path using public and private keys
ISAKMP Pre-Shared Key
crypto isakmp key 1 MySecretKey address 10.0.0.2
IPsec Transform Set
crypto ipsec transform-set MyTS esp-aes 256 esp-sha-hmac
mode tunnel
IPsec Profile
crypto ipsec profile MyProfile
set transform-set MyTS
Troubleshooting
show crypto isakmp sa
Virtual Tunnel Interface
interface Tunnel0
ip address 172.16.0.1 255.255.255.252
tunnel source 10.0.0.1
tunnel destination 10.0.0.2
tunnel mode ipsec ipv4
tunnel protection ipsec profile MyProfile
show crypto isakmp policy
show crypto ipsec sa
show crypto ipsec transform-set
debug crypto {isakmp | ipsec}
by Jeremy Stretch
v2.0
1016647072.011.png 1016647072.012.png 1016647072.013.png 1016647072.014.png 1016647072.001.png 1016647072.002.png 1016647072.003.png 1016647072.004.png 1016647072.005.png 1016647072.006.png 1016647072.007.png 1016647072.008.png 1016647072.009.png 1016647072.010.png
Zgłoś jeśli naruszono regulamin