SlideShare a Scribd company logo
1 of 55
Deploying and Managing Enterprise IPsec VPNs Ken Kaminski Cisco Systems Consulting Systems Engineer – Security/VPN Northeast [email_address]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IPsec -  more than just crypto !
[object Object],[object Object],[object Object],Agenda
Product Function Matrix Site-to-Site Role Remote Access Role IOS PIX 3000 Scales for large deployments PDM 2.0 includes VPN management Primary Role Full fledged remote access solution With recent addition of Cisco VPN Client now supported with good feature set Not recommended for large-scale use due to lack of QOS, SLA monitoring, and multiprotocol routing Integrated firewall and VPN device Primary Role Full fledged Site-to-Site
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic IPsec Example Internet 10.1.1.0/24 10.1.2.0/24 ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1.1.1.1 2.2.2.2 10.1.3.0/24 3.3.3.3
Basic IPsec Example ,[object Object],[object Object],[object Object],[object Object],[object Object],Internet 10.1.1.0/24 10.1.2.0/24 1.1.1.1 2.2.2.2 10.1.3.0/24 3.3.3.3
Basic IPsec Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Internet 10.1.1.0/24 10.1.2.0/24 1.1.1.1 2.2.2.2 10.1.3.0/24 3.3.3.3
Basic IPsec Example ,[object Object],[object Object],[object Object],[object Object],[object Object],Internet 10.1.1.0/24 10.1.2.0/24 1.1.1.1 2.2.2.2 10.1.3.0/24 3.3.3.3
Basic IPsec Summary ,[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPsec Remote Access (EzVPN)  Internet Head office 1.1.1.1 ? ? ,[object Object],[object Object],[object Object],[object Object],[object Object],IOS PIX VPN 3K VPN Client IOS PIX VPN 3002
IPsec Remote Access (EzVPN)  Internet Head office 1.1.1.1 ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],IOS Pix VPN 3K
EzVPN Configuration example Internet Head office 1.1.1.1 ? ? Remote Office crypto ipsec client ezvpn hw-client group engineering-1 key secret mode client peer 1.1.1.1 ! interface Ethernet1 description connected to INTERNET ip address ....... crypto ipsec client ezvpn hw-client
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPsec/GRE : Scalable Site-to-site VPNs Internet Frame Relay ,[object Object],[object Object],[object Object]
IPsec/GRE Example Internet ? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],1.1.1.1 2.2.2.2 3.3.3.3 ? ? Same as without GRE
IPsec/GRE Example IPsec Policy (Phase II) crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac mode transport access-list 102 permit gre host 1.1.1.1 host 2.2.2.2 access-list 103 permit gre host 1.1.1.1 host 3.3.3.3 Internet ? 1.1.1.1 2.2.2.2 3.3.3.3 ? ? tunnel 2003 tunnel 2002
IPsec/GRE Example crypto map IPSEC 20 ipsec-isakmp set peer 2.2.2.2 match address 102 set transform-set ESP-3DES-SHA crypto map IPSEC 30 ipsec-isakmp set peer 3.3.3.3 match address 103 set transform-set ESP-3DES-SHA Internet ? 1.1.1.1 2.2.2.2 3.3.3.3 ? ? tunnel 2003 tunnel 2002
IPsec/GRE Example Internet ? int tunnel 2002 ip address 10.99.1.1 255.255.255.0 tunnel source serial 0 tunnel destination 2.2.2.2 crypto map IPSEC int tunnel 2003 ip address 10.99.2.1 255.255.255.0 tunnel source serial 0 tunnel destination 3.3.3.3 crypto map IPSEC 1.1.1.1 2.2.2.2 3.3.3.3 ? ? tunnel 2003 10.99.2.0/24 tunnel 2002 10.99.1.0/24
IPsec/GRE Example int serial 0 ip address 1.1.1.1 255.255.255.252 crypto map IPSEC ! ip route 2.2.2.2 255.255.255.255 serial 0 ip route 3.3.3.3 255.255.255.255 serial 0 !  router ospf 1 network  10.0.0.0 0.255.255.255 area 1 Internet ? 1.1.1.1 2.2.2.2 3.3.3.3 ? ? tunnel 2003 10.99.2.0/24 tunnel 2002 10.99.1.0/24
IPsec/GRE Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Site-to-Site Full Mesh Internet  ,[object Object],[object Object],[object Object]
Dynamic Multipoint VPN (DMVPN) 12.2(13)T ,[object Object],[object Object],[object Object],[object Object],[object Object]
Dynamic Multipoint VPN - DMVPN Spoke Dynamic (or static) public  IP addresses 10.100.1.0 255.255.255.0 10.1.1.0 255.255.255.0 10.1.1.1 10.100.1.1 = Dynamic & Permanent spoke-to-hub IPsec tunnels Static   public IP address 10.1.2.0 255.255.255.0 10.1.2.1 130.25.13.1   12.2(13)T = Dynamic&Temporary Spoke-to-spoke IPsec tunnels
Full Mesh :Tunnel Endpoint Discovery (TED) MPLS-VPN/ Frame Relay ,[object Object],[object Object],[object Object],[object Object]
TED Example Alice Bob IP: A to B X Y Z Clive X(config)# crypto dynamic-map DYN 10 set transform-set ESP-3DES-SHA match address 100 ! crypto map IPSEC 99 ipsec-isakmp dynamic discover ! access-list 100 permit ip 10.1.1.0 0.0.0.255 10.0.0.0 0.255.255.255 A to B must be protected No SA -> Send Probe IKE A to B (proxy X) IKE Y to X Traffic to B must be protected No SA -> Block &Answer probe
IPsec  Migration  Today 1.  IPsec  - t ime 0.  -  - - no communication possible - 2.  IPsec  IPsec - all encrypted - Problem : Migration to IPsec in large networks
IPSEC  Passive  M ode 1.  passive  - 2.  passive  passive 3.  active  passive 4.  active  active t ime 0.  -  - - now all router are on passive - - now all router are running normal IPsec - 12.2(13)T # crypto ipsec optional
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
High-Availability  Design ,[object Object],[object Object],[object Object],[object Object],Head-End Remote HE-2 HE-1 Internet Corporate Intranet 10.1.5.0 VPN VPN
Dead Peer Detection (IKE keepalives) ,[object Object],[object Object],[object Object],[object Object],S1 Head-End R1 HE-2 HE-1 Internet Corporate Intranet S2 P1 VPN Client Hello Hello Hello
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Dead Peer Detection vs IKE keepalives
High Availability with Dead Peer Detection  Head-End Remote HE-2 HE-1 Internet Corporate Intranet X crypto map IPSEC 10 match address 10 set peer 1.1.1.1 set peer 1.1.1.2 set transform-set ESP-3DES-SHA 1.1.1.1 1.1.1.2
IPsec and HSRP+  ,[object Object],[object Object],[object Object],[object Object],Head-End Remote HE-2 HE-1 Internet Corporate Intranet X
High Availability with IPsec and HSRP+  Remote HE-2 HE-1 Internet Corporate Intranet X 1.1.1..3 crypto map IPSEC 10 match address 10 set peer 1.1.1.3 set transform-set ESP-3DES-SHA interface Ethernet1/0  ip address  1.1.1.1  255.255.255.248  standby 1 ip  1.1.1.3 standby 1 priority 200  standby 1 preempt  standby 1 name VPNHA   standby 1 track Ethernet1/1 150  crypto map VPN  redundancy VPNHA
Reverse Route Injection (RRI)  ,[object Object],[object Object],[object Object],Head-End Remote HE-2 HE-1 Internet Corporate Intranet 10.1.5.0 who should I send traffic to for 10.1.5.0 ?
Reverse Route Injection Example  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Head-End Remote HE-2 HE-1 Internet Corporate Intranet X 2.2.2.2
RRI In Action ,[object Object],Head-End Remote Internet 10.1.5.0/24 P S ,[object Object],[object Object],(2) Router P RRI:“I can reach 10.1.5.0” (3) 10.1.5.0/24 via P (8) 10.1.5.0/24 via S (5) Secondary Active (6) New SA Established To Secondary Sending IKE Keepalives (7) Router S RRI:“I can reach 10.1.5.0” = Unscheduled Immediate Memory Initialization Routine (4)
High Availability with IPsec/GRE ,[object Object],[object Object],[object Object],[object Object],[object Object],Head-End Remote HE-2 HE-1 Internet Corporate Intranet
High Availability with IPsec/GRE Head-End Remote HE-2 HE-1 Internet Corporate Intranet Remote : ! int tunnel  1 ...... ip ospf cost 10 ..... ! int tunnel 2 ...... ip ospf cost 20 ...... tunnel 1 tunnel 2 HE-1 ! int tunnel  1 ...... ip ospf cost 10 ..... HE-2 ! int tunnel  2 ...... ip ospf cost 10 .....
Local/Geographical Failover/Load-Balancing ,[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],High Availability Summary Remote Device Head-end Device IOS PIX 3000 IOS PIX Failover 3000 RP DPD (RRI) HSRP+ (RRI) DPD DPD(RRI)  DPD DPD DPD(RRI) DPD(RRI) HSRP+  (RRI) DPD (RRI) HSRP+ (RRI) DPD (RRI)
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Split Tunneling Internet Split-Tunneling Enabled VPN Client www.evilhackers.com VPN HW No NAT for corporate traffic NAT for Internet traffic
Split Tunneling  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPN Device with separate Firewall To WAN Edge To Campus VPN Termination L4–L7 Stateful Inspection and Filtering DoS Mitigation Focused Layer 4–7 Analysis Nothing To See (crypto-wise) Stateless L3 Filtering (IKE, ESP) VPN DMZ
Agenda ,[object Object],[object Object],[object Object]
VPN Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPN Management Applications ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VPN/Security Management Solution 2.1 ,[object Object],[object Object],[object Object],[object Object]
VMS 2.1 / Router MC ,[object Object],[object Object],[object Object],[object Object]
VMS 2.1 / VPN Monitor ,[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Chapter 19 : single-area ospf
Chapter 19 : single-area ospfChapter 19 : single-area ospf
Chapter 19 : single-area ospf
teknetir
 

What's hot (19)

ACI MultiPod Config Guide
ACI MultiPod Config GuideACI MultiPod Config Guide
ACI MultiPod Config Guide
 
05 06 ike
05   06 ike05   06 ike
05 06 ike
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
CCNP Switching Chapter 9
CCNP Switching Chapter 9CCNP Switching Chapter 9
CCNP Switching Chapter 9
 
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner MaiaIpv6 Security with Mikrotik RouterOS by Wardner Maia
Ipv6 Security with Mikrotik RouterOS by Wardner Maia
 
Openstack Quantum Security Groups Session
Openstack Quantum Security Groups SessionOpenstack Quantum Security Groups Session
Openstack Quantum Security Groups Session
 
Chapter 19 : single-area ospf
Chapter 19 : single-area ospfChapter 19 : single-area ospf
Chapter 19 : single-area ospf
 
CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5CCNA 2 Routing and Switching v5.0 Chapter 5
CCNA 2 Routing and Switching v5.0 Chapter 5
 
SSL Web VPN
SSL Web VPNSSL Web VPN
SSL Web VPN
 
CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10CCNA 2 Routing and Switching v5.0 Chapter 10
CCNA 2 Routing and Switching v5.0 Chapter 10
 
CCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRPCCNAv5 - S3: Chapter 7 EIGRP
CCNAv5 - S3: Chapter 7 EIGRP
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 
CCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCPCCNAv5 - S2: Chapter10 DHCP
CCNAv5 - S2: Chapter10 DHCP
 
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and ConfigurationCCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
CCNAv5 - S2: Chapter2 Basic Switching Concepts and Configuration
 
CCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospfCCNAv5 - S2: Chapter 8 single area ospf
CCNAv5 - S2: Chapter 8 single area ospf
 
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
02 - IDNOG04 - Sheryl Hermoso (APNIC) - IPv6 Deployment at APNIC
 
CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7CCNA 2 Routing and Switching v5.0 Chapter 7
CCNA 2 Routing and Switching v5.0 Chapter 7
 
CCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing ConceptsCCNAv5 - S2: Chapter4 Routing Concepts
CCNAv5 - S2: Chapter4 Routing Concepts
 

Viewers also liked

Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
Grand View Research
 
Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01
slavenvvv
 
LAN Diagram Sample 2015
LAN Diagram Sample 2015LAN Diagram Sample 2015
LAN Diagram Sample 2015
Glenn MacKie
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2
Irsandi Hasan
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
Chandan Jha
 

Viewers also liked (20)

VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
IP-VPNs IPsec
IP-VPNs IPsecIP-VPNs IPsec
IP-VPNs IPsec
 
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
MPLS IP VPN Services Market Analysis, Size, Share, Growth To 2020 by Grand Vi...
 
Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01Ciscorouterasavpnserver 100218045815-phpapp01
Ciscorouterasavpnserver 100218045815-phpapp01
 
Media converter
Media converterMedia converter
Media converter
 
LAN Diagram Sample 2015
LAN Diagram Sample 2015LAN Diagram Sample 2015
LAN Diagram Sample 2015
 
Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)Report File On Virtual Private Network(VPN)
Report File On Virtual Private Network(VPN)
 
Network Diagram Templates by Creately
Network Diagram Templates by CreatelyNetwork Diagram Templates by Creately
Network Diagram Templates by Creately
 
Creating a network diagram
Creating a network diagramCreating a network diagram
Creating a network diagram
 
CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2CCNA Exploration 3 - Chapter 2
CCNA Exploration 3 - Chapter 2
 
Protocole IKE/IPsec
Protocole IKE/IPsecProtocole IKE/IPsec
Protocole IKE/IPsec
 
What Is VPN
What Is VPNWhat Is VPN
What Is VPN
 
Ipsec
IpsecIpsec
Ipsec
 
CCNA Industrial Training Presentation
CCNA Industrial Training PresentationCCNA Industrial Training Presentation
CCNA Industrial Training Presentation
 
Ipsec
IpsecIpsec
Ipsec
 
Bandwidth Presentation
Bandwidth PresentationBandwidth Presentation
Bandwidth Presentation
 
The Project's Network Diagram
The Project's Network DiagramThe Project's Network Diagram
The Project's Network Diagram
 
VPN (virtual Private Network)
VPN (virtual Private Network)VPN (virtual Private Network)
VPN (virtual Private Network)
 
Chapter 2 LAN redundancy
Chapter 2   LAN  redundancyChapter 2   LAN  redundancy
Chapter 2 LAN redundancy
 

Similar to Vpn(4)

Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
angelitoh11
 
I psec tunnel vs transport mode
I psec tunnel vs transport modeI psec tunnel vs transport mode
I psec tunnel vs transport mode
IT Tech
 
Ip sec vpn with dynamic routing mikrotik and cisco - mikro-tik wiki
Ip sec vpn with dynamic routing   mikrotik and cisco - mikro-tik wikiIp sec vpn with dynamic routing   mikrotik and cisco - mikro-tik wiki
Ip sec vpn with dynamic routing mikrotik and cisco - mikro-tik wiki
Huy Eav
 

Similar to Vpn(4) (20)

Configuring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A PixConfiguring Ip Sec Between A Router And A Pix
Configuring Ip Sec Between A Router And A Pix
 
rpsec-4 (1).ppt
rpsec-4 (1).pptrpsec-4 (1).ppt
rpsec-4 (1).ppt
 
Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)Nxll18 vpn (s2 s gre & dmvpn)
Nxll18 vpn (s2 s gre & dmvpn)
 
Eigrp authentication
Eigrp authenticationEigrp authentication
Eigrp authentication
 
Vpn
VpnVpn
Vpn
 
I psec tunnel vs transport mode
I psec tunnel vs transport modeI psec tunnel vs transport mode
I psec tunnel vs transport mode
 
SREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
SREcon Europe 2016 - Full-mesh IPsec network at Hosted GraphiteSREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
SREcon Europe 2016 - Full-mesh IPsec network at Hosted Graphite
 
SAS (Secure Active Switch)
SAS (Secure Active Switch)SAS (Secure Active Switch)
SAS (Secure Active Switch)
 
Ip sec vpn with dynamic routing mikrotik and cisco - mikro-tik wiki
Ip sec vpn with dynamic routing   mikrotik and cisco - mikro-tik wikiIp sec vpn with dynamic routing   mikrotik and cisco - mikro-tik wiki
Ip sec vpn with dynamic routing mikrotik and cisco - mikro-tik wiki
 
GREAT MINDS
GREAT MINDSGREAT MINDS
GREAT MINDS
 
Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000Deploying Carrier Ethernet features on ASR 9000
Deploying Carrier Ethernet features on ASR 9000
 
Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000Deploying Carrier Ethernet Features on Cisco ASR 9000
Deploying Carrier Ethernet Features on Cisco ASR 9000
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6
 
[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting[오픈소스컨설팅] Linux Network Troubleshooting
[오픈소스컨설팅] Linux Network Troubleshooting
 
6lowpan
6lowpan6lowpan
6lowpan
 
Day 11 eigrp
Day 11 eigrpDay 11 eigrp
Day 11 eigrp
 
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPNLISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
LISP + GETVPN as alternative to DMVPN+OSPF+GETVPN
 
Westermo WeOS Multicast Tunneling
Westermo WeOS Multicast TunnelingWestermo WeOS Multicast Tunneling
Westermo WeOS Multicast Tunneling
 
Multicloud connectivity using OpenNHRP
Multicloud connectivity using OpenNHRPMulticloud connectivity using OpenNHRP
Multicloud connectivity using OpenNHRP
 
Router Defense - BRUcon 2010
Router Defense - BRUcon 2010Router Defense - BRUcon 2010
Router Defense - BRUcon 2010
 

Recently uploaded

Recently uploaded (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Vpn(4)

  • 1. Deploying and Managing Enterprise IPsec VPNs Ken Kaminski Cisco Systems Consulting Systems Engineer – Security/VPN Northeast [email_address]
  • 2.
  • 3.
  • 4. Product Function Matrix Site-to-Site Role Remote Access Role IOS PIX 3000 Scales for large deployments PDM 2.0 includes VPN management Primary Role Full fledged remote access solution With recent addition of Cisco VPN Client now supported with good feature set Not recommended for large-scale use due to lack of QOS, SLA monitoring, and multiprotocol routing Integrated firewall and VPN device Primary Role Full fledged Site-to-Site
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. EzVPN Configuration example Internet Head office 1.1.1.1 ? ? Remote Office crypto ipsec client ezvpn hw-client group engineering-1 key secret mode client peer 1.1.1.1 ! interface Ethernet1 description connected to INTERNET ip address ....... crypto ipsec client ezvpn hw-client
  • 15.
  • 16.
  • 17.
  • 18. IPsec/GRE Example IPsec Policy (Phase II) crypto ipsec transform-set ESP-3DES-SHA esp-3des esp-sha-hmac mode transport access-list 102 permit gre host 1.1.1.1 host 2.2.2.2 access-list 103 permit gre host 1.1.1.1 host 3.3.3.3 Internet ? 1.1.1.1 2.2.2.2 3.3.3.3 ? ? tunnel 2003 tunnel 2002
  • 19. IPsec/GRE Example crypto map IPSEC 20 ipsec-isakmp set peer 2.2.2.2 match address 102 set transform-set ESP-3DES-SHA crypto map IPSEC 30 ipsec-isakmp set peer 3.3.3.3 match address 103 set transform-set ESP-3DES-SHA Internet ? 1.1.1.1 2.2.2.2 3.3.3.3 ? ? tunnel 2003 tunnel 2002
  • 20. IPsec/GRE Example Internet ? int tunnel 2002 ip address 10.99.1.1 255.255.255.0 tunnel source serial 0 tunnel destination 2.2.2.2 crypto map IPSEC int tunnel 2003 ip address 10.99.2.1 255.255.255.0 tunnel source serial 0 tunnel destination 3.3.3.3 crypto map IPSEC 1.1.1.1 2.2.2.2 3.3.3.3 ? ? tunnel 2003 10.99.2.0/24 tunnel 2002 10.99.1.0/24
  • 21. IPsec/GRE Example int serial 0 ip address 1.1.1.1 255.255.255.252 crypto map IPSEC ! ip route 2.2.2.2 255.255.255.255 serial 0 ip route 3.3.3.3 255.255.255.255 serial 0 ! router ospf 1 network 10.0.0.0 0.255.255.255 area 1 Internet ? 1.1.1.1 2.2.2.2 3.3.3.3 ? ? tunnel 2003 10.99.2.0/24 tunnel 2002 10.99.1.0/24
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Dynamic Multipoint VPN - DMVPN Spoke Dynamic (or static) public IP addresses 10.100.1.0 255.255.255.0 10.1.1.0 255.255.255.0 10.1.1.1 10.100.1.1 = Dynamic & Permanent spoke-to-hub IPsec tunnels Static public IP address 10.1.2.0 255.255.255.0 10.1.2.1 130.25.13.1 12.2(13)T = Dynamic&Temporary Spoke-to-spoke IPsec tunnels
  • 27.
  • 28. TED Example Alice Bob IP: A to B X Y Z Clive X(config)# crypto dynamic-map DYN 10 set transform-set ESP-3DES-SHA match address 100 ! crypto map IPSEC 99 ipsec-isakmp dynamic discover ! access-list 100 permit ip 10.1.1.0 0.0.0.255 10.0.0.0 0.255.255.255 A to B must be protected No SA -> Send Probe IKE A to B (proxy X) IKE Y to X Traffic to B must be protected No SA -> Block &Answer probe
  • 29. IPsec Migration Today 1. IPsec - t ime 0. - - - no communication possible - 2. IPsec IPsec - all encrypted - Problem : Migration to IPsec in large networks
  • 30. IPSEC Passive M ode 1. passive - 2. passive passive 3. active passive 4. active active t ime 0. - - - now all router are on passive - - now all router are running normal IPsec - 12.2(13)T # crypto ipsec optional
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. High Availability with Dead Peer Detection Head-End Remote HE-2 HE-1 Internet Corporate Intranet X crypto map IPSEC 10 match address 10 set peer 1.1.1.1 set peer 1.1.1.2 set transform-set ESP-3DES-SHA 1.1.1.1 1.1.1.2
  • 36.
  • 37. High Availability with IPsec and HSRP+ Remote HE-2 HE-1 Internet Corporate Intranet X 1.1.1..3 crypto map IPSEC 10 match address 10 set peer 1.1.1.3 set transform-set ESP-3DES-SHA interface Ethernet1/0 ip address 1.1.1.1 255.255.255.248 standby 1 ip 1.1.1.3 standby 1 priority 200 standby 1 preempt standby 1 name VPNHA standby 1 track Ethernet1/1 150 crypto map VPN redundancy VPNHA
  • 38.
  • 39.
  • 40.
  • 41.
  • 42. High Availability with IPsec/GRE Head-End Remote HE-2 HE-1 Internet Corporate Intranet Remote : ! int tunnel 1 ...... ip ospf cost 10 ..... ! int tunnel 2 ...... ip ospf cost 20 ...... tunnel 1 tunnel 2 HE-1 ! int tunnel 1 ...... ip ospf cost 10 ..... HE-2 ! int tunnel 2 ...... ip ospf cost 10 .....
  • 43.
  • 44.
  • 45.
  • 46. Split Tunneling Internet Split-Tunneling Enabled VPN Client www.evilhackers.com VPN HW No NAT for corporate traffic NAT for Internet traffic
  • 47.
  • 48.
  • 49. VPN Device with separate Firewall To WAN Edge To Campus VPN Termination L4–L7 Stateful Inspection and Filtering DoS Mitigation Focused Layer 4–7 Analysis Nothing To See (crypto-wise) Stateless L3 Filtering (IKE, ESP) VPN DMZ
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 55.