Académique Documents
Professionnel Documents
Culture Documents
Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
VPN Services ZOOM
Technologies
Data Integrity
Authentication
Anti-Replay
Tunneling
Copyright
Copyright Zoom Technologies
Zoom Technologies
Routers
Firewall
VPN concentrator
Servers
Copyright
Copyright Zoom Technologies
Zoom Technologies
VPN Types ZOOM
Technologies
Remote-access
Client-initiated
Site-to-site
Intranet
Extranet
Copyright
Copyright Zoom Technologies
Zoom Technologies
Head Office
IP
/
Internet
RAS
Copyright
Copyright Zoom Technologies
Zoom Technologies
Site to Site ZOOM
Technologies
Head Office
Intranet
Branch Office
IP
/
Internet
Business Partner
Extranet
Copyright
Copyright Zoom Technologies
Zoom Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
Tunneling Protocols ZOOM
Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
Generic Routing Encapsulation ZOOM
Technologies
2.2.2.3 IP 61.0.0.5
Data 192.168.1.10
Data 192.168.1.10
192.168.2.20192.168.2.20 /
Data 192.168.1.10 192.168.2.20
192.168.1.10
Internet
192.168.2.20
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
IPSec VPN
IPSec ZOOM
Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
NO
User Data Encryption
YES
NO
GRE / L2TP IP Unicast
YES
IPSec Send
Copyright
Copyright Zoom Technologies
Zoom Technologies
IPSec Mode ZOOM
Technologies
IPSec modes:
Tunnel Mode
Tunnel mode creates a new additional IP header with data
encryption
Transport mode
just encrypt data without adding new IP header
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
IPSec Protocols
Negotiation protocol
IKE
Security Protocol
ESP
AH
Copyright
Copyright Zoom Technologies
Zoom Technologies
Encryption
DES
3DES
AES
Hash
MD5
SHA
Authentication
Pre-share key
Username/Password
OTP
Password Protection (Diffie-Hellman for password exchange)
DH Group 1
DH Group 2
DH Group 5
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
Negotiation of SA characteristics
Copyright
Copyright Zoom Technologies
Zoom Technologies
IKE Negotiation ZOOM
Technologies
Branch X
2600 Head Office
Policy 1
Encryption: 3DES 3800
Hash: SHA IP Policy 1
Authentication: Pre Share
DH 2 / Encryption: AES
Hash: SHA
Policy 2 Internet Authentication: Pre Share
Encryption: DES DH 2
Hash: MD5 Policy 2
Authentication: Pre Share Branch Y Encryption: 3DES
DH 2
2500 Hash: SHA
Policy 1 Authentication: Pre Share
Encryption: DES DH 2
Hash: MD5 Policy 3
Authentication: Pre Share
Encryption: DES
DH 2
Hash: MD5
Authentication: Pre Share
DH 2
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
ESP and AH
ESP protocol ID 50
Transport Mode L2 IP Header ESP Head TCP / UDP Head DATA ESP Tail ESP Auth
New IP
Tunnel Mode L2 ESP Head IP Head TCP / UDP Head DATA ESP Tail ESP Auth
Header
Copyright
Copyright Zoom Technologies
Zoom Technologies
AH protocol ID 51
Tunnel Mode L2 New IP Header AH Head IP Head TCP / UDP Head DATA
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
MD5
Message digest v. 5
SHA-1
Secure hash algorithm
Copyright
Copyright Zoom Technologies
Zoom Technologies
IP IP
Header Header
DATA DATA
Key IP Key
/
Internet
12A9BE 12A9BE
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
NAT traversal:
Copyright
Copyright Zoom Technologies
Zoom Technologies
Head Office
VPN Server
IP
ISP Router /
NAT
Internet
PC
Private IP
Tunnel Mode L2 IP Header ESP Head IP Head TCP / UDP Head DATA ESP Tail
Tunnel L2 IP Header UDP Head ESP Head IP Head TCP / UDP Head DATA ESP Tail
Copyright
Copyright Zoom Technologies
Zoom Technologies
Mode Configuration ZOOM
Technologies
Head Office
VPN Server
IP
ISP Router /
NAT
Internet
Tunnel L2 IP Head UDP Head ESP Head IP Head TCP / UDP Head DATA ESP Tail
Copyright
Copyright Zoom Technologies
Zoom Technologies
Xauth ZOOM
Technologies
Head Office
VPN Server
IP
ISP Router /
NAT
Internet
AAA Server
X Authetication for
PC
verify user in Domain
Private IP
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
Asymmetric Encryption Algorithm ZOOM
Technologies
Example: RSA
Copyright
Copyright Zoom Technologies
Zoom Technologies
56 1024
168 2048
128 3072
192 7680
256 15,360
Copyright
Copyright Zoom Technologies
Zoom Technologies
Symmetric Encryption: DES ZOOM
Technologies
Block cipher: Works on 64-bit data block, (last bit of each byte
used for parity).
Copyright
Copyright Zoom Technologies
Zoom Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
Symmetric Encryption: AES ZOOM
Technologies
Strong encryption
Copyright
Copyright Zoom Technologies
Zoom Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
Site-to-Site
IPSec VPN Operations
Phase 1
Negotiate a bidirectional SA
Phase 1.5
Xauth
Mode config
Phase 2
IPSec SAs/SPIs
Copyright
Copyright Zoom Technologies
Zoom Technologies
Five Steps of IPsec ZOOM
Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
Step 2: IKE Phase 1 ZOOM
Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
Diffie-Hellman Key Exchange ZOOM
Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
Preshared keys
RSA signatures
Copyright
Copyright Zoom Technologies
Zoom Technologies
Step 3: IKE Phase 2 ZOOM
Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
A transform set is a
combination of algorithms
and protocols that enact a
security policy for traffic.
Copyright
Copyright Zoom Technologies
Zoom Technologies
Step 4: IPsec Session ZOOM
Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
By an SA lifetime timeout
IPsec SA is removed
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
Configuring IPsec
Copyright
Copyright Zoom Technologies
Zoom Technologies
What Is Cisco SDM? ZOOM
Technologies
ACL editor
Copyright
Copyright Zoom Technologies
Zoom Technologies
Copyright
Copyright Zoom Technologies
Zoom Technologies
ZOOM
Technologies
ZOOM
ZOOM
Technologies