Advanced IPSec
Advanced IPSec
SEC-A04
SEC-A04
Associated Sessions
VVT-2003 IP Telephony Security NMS-D02 Managing Security Technologies
SEC-A04
Recommended Reading
Peripheral Reading Enhanced IP Services for Cisco Networks
ISBN: 1578701066
Check the recommended Reading flyer at the Cisco Company Store books at 20% to 30% discount and dont forget to claim your free book!
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
Prerequisites
You should be familiar with IPSec You may have configured IPSec already Some basic GRE/Routing knowledge wont hurt
SEC-A04
Agenda
General Design Considerations DMVPN Overview DMVPN Advanced Design DMVPN Details DMVPN example Deployments IOS CA SSL vs IPSec VPN
SEC-A04
GENERAL CONSIDERATIONS
SEC-A04
Scalability
The head-end design must scale to support future load requirements Consider integrated verses purposedefined devices Routing, resilience, load balancing, and the WAN connection are all key factors
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
SEC-A04
MeshPartial
Compared to hub and spoke topology, more direct spoke to spoke communications
MeshFull
Scaling issues: IPSec tunnels grow exponentially as number of sites increases Difficult to provision
SEC-A04
DMVPN OVERVIEW
SEC-A04
10
What is DMVPN ?
Dynamic Multipoint VPN It is GRE, NHRP and IPSec mix NHRP allows the peers to have dynamic addresses (Dial, DSL,) with GRE / IPSec tunnels The backbone is a hub and spoke topology It allows direct spoke to spoke tunneling by auto leveling to a partial mesh
SEC-A04
11
SEC-A04
13
192.168.1.1/24
Spoke A
Spoke B
192.168.2.1/24
10.0.0.1
10.0.0.1
SEC-A04
14
15
Spoke B .1 192.168.2.0/24
Web .37
10.0.0.1 172.17.0.1 (*) 10.0.0.12 172.16.2.1 192.168.1.0/24 172.16.1.1 (l) 192.168.2.0/24 192.168.2.37/32 172.16.2.1 ??? 192.168.0.0/24 192.168.1.0/24 192.168.2.0/24 10.0.0.1 Conn. 10.0.0.12
10.0.0.1 172.17.0.1 (*) 10.0.0.11 172.16.1.1 192.168.1.0/24 192.168.1.25/32 172.16.1.1 ??? 192.168.2.0/24 172.16.2.1 (l) 192.168.0.0/24 192.168.1.0/24 192.168.2.0/24 10.0.0.1 10.0.0.11 Conn.
16
SEC-A04
SEC-A04
17
Routing
Dynamic routing protocols
Encryption peers
Finding, mapping and authenticating
Management
Deploying, Monitoring, and Maintaining
SEC-A04
18
Network Design
Hub-and-spoke
All VPN traffic must go via hub Hub bandwidth and CPU utilization limit VPN Number of tunnels = O(n)
19
Hubs can be interconnected directly over physical links, mGRE tunnels or p-pGRE tunnels. Hub routers may pass routing information for DMVPN network through any of these paths.
SEC-A04
20
Hub routers must exchange routing information for DMVPN network through mGRE tunnel interfaces. Hub routers point to other hub routers as NHSs in a daisy-chain or pair wise fashion
Used for forwarding NHRP packets and data packets while dynamic spoke-spoke tunnels are being created
SEC-A04
21
DMVPN IP networks
IP routing updates only traverse hub-and-spoke tunnels IP data packets traverse both hub-and-spoke and direct dynamic spoke-spoke tunnels Routing protocol doesnt monitor state of spoke-spoke tunnels
SEC-A04
22
Finding/Mapping Peers
Two layers of IP addresses
VPN layer, IP infrastructure (NBMA) layer
Authenticating peers
Pre-shared keys, certificates
SEC-A04
23
24
OSPF
Okay for hub-and-spoke, maximum of 2 hubs for spoke-spoke Less control, medium overhead, faster convergence
RIP
Okay for hub-and-spoke and spoke-spoke Okay control, medium overhead, slower convergence
ODR
Good for hub-and-spoke (non-split tunneling), no spoke-spoke Less control, low overhead, slower convergence, most scalable
BGP
Okay for hub-and-spoke and spoke-spoke Good control, lower overhead, slower convergence, static neighbor configuration
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
25
Dynamic Spoke-spoke
EIGRP
no ip split-horizon eigrp <as> no ip next-hop-self eigrp <as> no auto-summary
OSPF
ip ospf network point-multipoint
RIP
no ip split-horizon
OSPF
ip ospf network broadcast ip ospf priority (2(hub)|0(spoke))
ODR
distribute-list <acl> out
RIP
no ip split-horizon no auto-summary
BGP
Hub is route reflector next-hop self
BGP
Hub is route reflector
SEC-A04
26
Authenticating Peers
Pre-shared keys Hub-and-spoke only Wildcard pre-shared keys Insecure Certificates
Certificate Authority/Server (CA/CS) Certificate distributionenrollment Manual (terminal, tftp), Automatic (SCEP) Some requirements for use Accurate timeNTP, SNTP Check for revocationcrl optional
SEC-A04
27
28
DMVPN DETAILS
SEC-A04
29
SEC-A04
30
31
Terminology pause
The tunnel address is the ip address defined on the tunnel interface The NBMA (Non-Broadcast Multiple Access) address is the ip address used as tunnel source (or destination) Example on router A, one configures interface Ethernet0/0 ip address 172.16.0.1 255.255.255.0 interface Tunnel0 ip address 10.0.0.1 255.0.0.0 tunnel source Ethernet0/0 [] 10.0.0.1 is router A's tunnel address 172.16.0.1 is router A's NBMA address
SEC-A04
32
NHRP Registration
Dynamically register spokes VPN to NBMA address mapping with hub (NHS).
NHRP Resolutions
Dynamically resolve remote spokes VPN to NBMA mapping to build spoke-spoke tunnels. CEF switching Forwarded along NHS path (spoke hub hub) Process switching Forwarded along routed path (spoke hub hub spoke)
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
33
SEC-A04
34
NHRP Functionality
Address mapping/resolution
Next Hop Client (NHC) registration with Next Hop Server (NHS) Resolution of VPN to NBMA mapping Routing: NHRP: destination VPN IP next-hop NBMA address
VPN IP next-hop
Short-cut forwarding
Single hop instead of multiple hops across NBMA network NHRP Resolution requests/replies forwarded via NHS
SEC-A04
35
Encrypted
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
Encrypted
36
SEC-A04
37
CEF switching
IP Next-hop from routing table Next-hop Next-hop hub spoke data packets via hub data packets direct
Data packets via hub while spoke-spoke tunnel is coming up, then direct
SEC-A04
38
SEC-A04
39
40
41
42
Encrypted
SEC-A04
43
NHRP Res. Request NHRP Res. Request NHRP Res. Reply IKE Initialization IKE Initialization
IKE/IPsec Established
Encrypted
SEC-A04
44
10.0.0.11 10.0.0.12
192.168.1.1/24
Spoke A
Spoke B
192.168.2.1/24
10.0.0.1 10.0.0.12
10.0.0.1 10.0.0.11
IPsec SA Table
show crypto ipsec sa { | include Tag|peer|spi|endpt }
SEC-A04
46
Spoke A
SEC-A04
47
Spoke A
SEC-A04
48
Spoke A
Spoke1#sho crypto map Crypto Map "Tunnel0-head-0" 65536 ipsec-isakmp Profile name: vpnprof SA lifetime: 4608000 KB/3600 s, PFS (Y/N): N ,Transform sets={trans1, } Crypto Map "Tunnel0-head-0" 65537 ipsec-isakmp, PROFILE INSTANCE. Peer = 172.17.0.1, access-list permit gre host 172.16.1.2 host 172.17.0.1 SA lifetime: 4608000 KB/3600 s, PFS (Y/N): N, Transform sets={trans1, } Crypto Map "Tunnel0-head-0" 65538 ipsec-isakmp, PROFILE INSTANCE. Peer = 172.16.2.2, access-list permit gre host 172.16.1.2 host 172.16.2.2 SA lifetime: 4608000 KB/3600 s, PFS (Y/N): N, Transform sets={trans1, }
SEC-A04
49
Spoke A
SEC-A04
50
Spoke A
SpokeA# show ip route C C D C D S* 172.16.1.0/30 is directly connected, Serial1/0 10.0.0.0/24 is directly connected, Tunnel0 192.168.0.0/24 [90/297372416] via 10.0.0.1, 00:42:34, Tunnel0 192.168.1.0/24 is directly connected, Ethernet0/0 192.168.2.0/24 [90/297321216] via 10.0.0.12, 00:42:34, Tunnel0 0.0.0.0/0 [1/0] via 172.16.1.1
SEC-A04
51
SEC-A04
52
SEC-A04
53
SEC-A04
54
.1
.37 Web
192.168.2.0/24
.1 192.168.1.0/24
Spoke A .25
...
= Dynamic&Temporary Spoke-to-spoke IPsec tunnels
55
PC
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
..
56
OSPF Routing
SEC-A04
57
OSPF Routing
SEC-A04
58
OSPF Routing
SEC-A04
OSPF Routing
SEC-A04
Hub 2
C C C O O
172.17.0.4/30 is directly connected, Serial1/0 10.0.0.0/24 is directly connected, Tunnel0 192.168.0.0/24 is directly connected, Ethernet0/0 192.168.1.0/24 [110/115] via 10.0.0.11, 00:42:02, Tunnel0 192.168.2.0/24 [110/115] via 10.0.0.12, 00:42:02, Tunnel0 ... S* 0.0.0.0/0 [1/0] via 172.17.0.6
SEC-A04
61
Spoke B
C 172.16.2.0.0/30 is directly connected, Serial1/0 C 10.0.0.0/24 is directly connected, Tunnel0 O IA 192.168.0.0/24 [110/110] via 10.0.0.1, 00:53:14, Tunnel0 O 192.168.1.0/24 [110/110] via 10.0.0.11, 00:53:14, Tunnel0 C 192.168.2.0/24 is directly connected, Ethernet0/0 ... S* 0.0.0.0/0 [1/0] via 172.16.2.2
SEC-A04
62
Hub 2
SEC-A04
63
Spoke B
SEC-A04
64
Hub redundancy
Must lose both before spoke isolated
SEC-A04
65
DMVPN Multi-hub
Redundancy, Scaling NHRP Resolution Forwarding
SEC-A04
66
SEC-A04
67
68
DMVPN Multi-Hub
Single DMVPN Multi-hub, Single mGRE tunnel on all nodes
.2 .3 Physical: 172.17.0.5 Tunnel0: 10.0.0.2 .1 Physical: 172.17.0.9 Tunnel0: 10.0.0.3 192.168.0.0/24
.1 192.168.3.0/24
.1 192.168.1.0/24
Spoke A
...
Spoke B .1 192.168.2.0/24
69
SEC-A04
..
EIGRP Routing
SEC-A04
70
EIGRP Routing
SEC-A04
71
EIGRP Routing
SEC-A04
72
EIGRP Routing
SEC-A04
73
EIGRP Routing
SEC-A04
74
EIGRP Routing
SEC-A04
75
Hub1
10.0.0.2/32, NBMA addr: 172.17.0.5 (stat, auth, used) 10.0.0.3/32, NBMA addr: 172.17.0.9 (dyn, auth, uniq, reg) 10.0.0.11/32, NBMA addr: 172.16.1.2 (dyn, auth, uniq, reg) 10.0.0.13/32, NBMA addr: 172.16.3.2 (no-socket) (dyn, router) 10.0.0.1/32, NBMA addr: 172.17.0.1 (dyn, auth, uniq, reg) 10.0.0.3/32, NBMA addr: 172.17.0.9 (stat, auth, used) 10.0.0.11/32, NBMA addr: 172.16.1.2 (no-socket) (dyn, router) 10.0.0.12/32, NBMA addr: 172.16.2.2 (dyn, auth, uniq, reg) 10.0.0.1/32, NBMA addr: 172.17.0.1 (stat, auth, used) 10.0.0.2/32, NBMA addr: 172.17.0.5 (dyn, auth, uniq, reg) 10.0.0.11/32, NBMA addr: 172.16.1.2 (no-socket) (dyn, router) 10.0.0.13/32, NBMA addr: 172.16.3.2 (dyn, auth, uniq, reg)
Hub 2
Hub 3
SEC-A04
76
Spoke A
10.0.0.1/32, Tunnel0 created 1d10h, never expire Type: static, Flags: authoritative used NBMA address: 172.17.0.1 10.0.0.13/32, Tunnel0 created 00:00:12, expire 00:04:18 Type: dynamic, Flags: router used NBMA address: 172.16.3.2 10.0.0.3/32, Tunnel0 created 1d10h, never expire Type: static, Flags: authoritative used NBMA address: 172.17.0.9 10.0.0.11/32, Tunnel0 created 00:00:54, expire 00:03:36 Type: dynamic, Flags: router NBMA address: 172.16.1.2
Spoke C
SEC-A04
77
Daisy-chaining
Currently fragilelose one hub and cant create new dynamic spoke-spoke tunnels
Consider setting up smaller regional DMVPN networks interconnected with dedicated high speed physical links
Probably will give better performance then cross-country spoke-spoke dynamic tunnels
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
78
SLB will load each hub smoothly. SLB is fine tunable. Dynamic GRE w/ NHRP Dynamic routing on a hub with IGP Dynamic routing to core with BGP
Spoke 1 Spoke 2
Spoke 3
SEC-A04
79
Routing
Use EIGRP for routing between hub (MWAM) and spoke Use BGP for routing between hubs
SEC-A04
80
MFSC
MWAM
VLAN 100 10.1.1.0
P h y s i c a l
I n t e r f a c e s
SLB
VIP 172.18.7.32
.2 .3
.1
.1
.4 .5 .6 .7
SEC-A04
81
SLB
SEC-A04
...
! interface Vlan10 ip address 10.1.0.1 255.255.255.0 crypto map cm ! interface Vlan11 no ip address crypto connect vlan 10 ! interface Vlan100 ip address 10.1.1.1 255.255.255.0
SEC-A04
83
SEC-A04
EIGRP Routing
SEC-A04
85
86
87
MANAGEMENT
SEC-A04
88
SEC-A04
89
Security
Public Key Infrastructure
PKI-AAA Integration Auto Enrolment Multiple Trust Points Secure RSA Private Key
Network Integration
DMVPN
Dynamic Addressing for Spoke-to-Hub On-Demand Spoke-toSpoke Tunnels
Management
Touchless Provisioning (ISC)
Bootstrap PKI Certificates Dynamic Addressing and Call Home Policy Push for IPsec, QoS, Firewall, IDS, NAT, Routing Hub-and-spoke, full and partial mesh topologies
V3PN
QoS VoIP Video Multicast
Enterprise Aggregation
Cisco 37xx, 72xx series
Resiliency
Self-Healing and Load Balancing
Scalability
Full Mesh up to 1000 Sites
SEC-A04
SEC-A04
91
Automatic CA enrolment for PKI certificates Dedicated management tunnel facilitates outsourcing of management Per-user or per-group configuration policies Email notification on spoke events: config change, or policy audit violations
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
92
CA Servers
IOS Certificate Server - bootstrap certificate Production CA Server - certificate for data tunnels
93
QoS provisioning NAT configuration deployment PKI-based end-to-end authentication and audit checks
94
Network-based IPsec
IOS Router
SEC-A04
PIX Appliance
VPN 3000
IDS
SEC-A04
95
Bootstrap in the corporate network requires less end-user intervention EzSDD provides total automatic device deployment without initial bootstrapping home routers in the corporate network
SEC-A04
96
SEC-A04
97
Deployment in Action
1.
Linux, MAC, MS-Windows PC WLAN/TKIP
Remote routers call home and management tunnel is set up. Management server authenticates remote router using certificate authority and AAA servers. Management server pushes policy including new certificate. Remote router establishes primary data tunnel, access to corporate resources. Secondary tunnel established, stays active for instant failover. When required, remote router establishes direct spoke-tospoke tunnel with other authorized remotes and torn down after use.
98
2.
On-Demand Peer 1. Call Home 6. On-Demand Tunnel
3.
ISP
5. Secondary Tunnel 4. Data Tunnel
4.
5.
2. Authenticate
Internal Network
2004 Cisco Systems, Inc. All rights reserved.
6.
SEC-A04
SEC-A04
99
Summary
DMVPN is used today We have a couple of x00(0) nodes networks deployed Customers are having the SLB Design in production Add spokes without touching the headend Routing for resiliency
Presentation_ID
100
SEC-A04
101
Can be in automatic mode (always grant a certificate to all requests) or manual Storage of certs & crl is either flash, or (T)FTP server Implemented with other security features:
VPN Cisco IOS Firewall
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
102
Deployment Considerations
Cisco IOS Hypertext Transfer Protocol (HTTP) server must be enabled Small deployments use internal HTTP server for revocation database External server is used for certificate revocation list (CRL)
HTTP, Lightweight Directory Access Protocol (LDAP), Online Certificate Status Protocol (OCSP) External revocation server strongly recommended for large deployments
SEC-A04
103
Head End
Certificate Enrollment and VPN Tunnels
SEC-A04
Head end router are configured for Cisco IOS Certificate Server and VPN Connections CRL distribution is carried by external HTTP or LDAP server HTTP must be enabled and exposed to public internet for enrollment and CRL requests Cisco IOS Firewall features may be employed for private network security
105
VPN Tunnels
Certificate Enrollment
Remote Sites
SEC-A04
crypto pki server MY_SCEP database level names database url disk0: issuer-name cn=Homer Simpson,o=PowerPlant,c=com grant auto % This will cause all certificate requests to be automatically granted. Are you sure you want to do this? [yes/no]: yes cdp-url http://192.168.0.3/disk0/MY_SCEP.crl no shutdown
SEC-A04
106
30 30 30 30
crypto ca trustpoint MY_SCEP enrollment url http://192.168.0.3:80 serial-number subject-name cn=Kwik-E-Mart,o=PowerPlant,c=com auto-enroll 90 crypto ca authenticate MY_SCEP
SEC-A04
108
109
SEC-A04
110
Provides low-cost solution, which is easy to configure and deploy Interoperates with other security and VPN functions in Cisco IOS Software
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
111
SEC-A04
112
IPSec VPN
Tunneled connection, allowing installed system applications to operate same as when in office No browser dependency Access control less granularwide open or limited to certain internal hosts or subnets IT department often maintains complementary applications on PC like Anti-Virus and Personal FW software Strong authentication desirable
SEC-A04
114
IPSec VPN
PROS
Full Network access Same as office experience Wide application availability
SSL VPN
CONS
Dependency on Active X or Java for non browser-enabled access More limited application availability Browser specific support
IPSec VPN
CONS
Manual software deployment Most appropriate for corporate managed PCs No support for proxy server traversal
BEST OF BOTH WORLDS IS HAVING THE FLEXIBILITY TO CONNECT USERS WITH EITHER IPSEC OR SSL, DEPENDING ON SPECIFIC REQUIREMENTS
SEC-A04
115
Firewall Traversal
SSL VPN
HTTPS (TCP 443) HTTP (TCP 80) (If HTTP redirection desired)
THE PORTS AND PROTOCOLS LISTED MUST BE OPEN FOR A REMOTE USER TO BE ABLE TO CONNECT SUCCESSFULLY; HTTPS (TCP 443) WILL BE OPEN THROUGH MOST NETWORKS WHILE THE PROTOCOLS REQUIRED FOR IPSEC MAY NOT BE OPEN BY DEFAULT ON A NETWORK THAT OUTBOUND PERFORMS FILTERING
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
IPSec VPN
Standard IPSec
ESP (Protocol 50) IKE (UDP 500)
116
117
Deployment Example
Using IPSec and SSL VPN to Reach Diverse User Populations
Supply Partner Extranet Account Manager Mobile User IP/Internet VPN Doctor at Home Unmanaged Desktop
IPSEC VPN
ENGINEERMany servers/apps, needs native app formats, VoIP, frequent access, long connect times ACCOUNT MANAGERDiverse apps, homegrown apps, always works from enterprisemanaged desktop
118
Central Site
SEC-A04
Thin Client
Port Forwarding via Java/ActiveX Enhanced Client Delivered from concentrator
Thick Client
Persistent Full Tunneling or Nailed Client Delivered from concentrator
SEC-A04
119
SEC-A04
120
HTTP Requests
protocol://user:password@host:port/path?query
https://user:password@chost:cport/protocol/flags/host/path?query
121
Requires detailed application knowledge Delivers HTML look-and-feel Expands use to some non-web applications
CIFS (NT and Active Directory file sharing)
SEC-A04
122
Delivered via Java/ActiveX from concentrator Some system permissions may be required Maintains native application look-and-feel Works with predictable non-web applications
Generally outbound, TCP-based, with static port(s) Telnet, SMTP, POP3
SEC-A04
123
Port Forwarding
HTTPS connection to concentrator Client Workstation HOSTS Web Browser Java Applet Protocol connection to remote server Concentrator
Client Program
Remote Server
SEC-A04
124
Port Forwarding
Local Port Destination Protocol
1100
sun.test.com:22
SSH
1101
sun2.test.com:22
SSH
1102
mail.test.com:110
POP3
1103
mail.test.com:25
SMTP
127.0.0.1:1100; Host File Is Not Modified If Host File Can be Modified: Applet Listens on Server.test.com:22; where server.test.com Is Mapped to 127.0.0.x (x Is Greater than 1, Determined at Run Time)
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
125
SEC-A04
126
Authenticated against
RADIUS LDAP Active Directory (AD)
SEC-A04
127
SEC-A04
128
ACLs
The following ACL allows access to all resources within the company, but denies access to resources outside the company
permit url http://*.company.com permit url https://*.company.com permit url cifs://*.company.com permit url pop3://*.company.com permit url imap4://*.company.com permit url smtp://*.company.com
SEC-A04
129
Endpoint Control
Determine trust of the end system
Is it a corporate machine?
Endpoint cleanup
Can I remove confidential info?
SEC-A04
130
Protect data delivered to systems with suspect complianceany files downloaded, content, or cookie information would not remain on system after connection complete
SEC-A04
2004 Cisco Systems, Inc. All rights reserved.
131
Downloaded files
SEC-A04
132
SEC-A04
133
TWINGO SECURITY FEATURES Prevents digital leakage Protects against malicious code Protects user privacy Is easy to implement and manage
SEC-A04
134
All processes on the Virtual Secure Desktop are monitored and can be controlled All hard-disk (file or registry) are redirected to the vault
All processes on the Virtual Secure Desktop are killed Secure vault is closed and password is lost At this time, it is not possible to recover any information
Sanitization of the vault Implementation of the Department of Defense clearing and sanitizing standard DOD 5220.22-M
135
SEC-A04
SEC-A04
136
Housekeeping
Dont forget to complete your evaluations - you can access them on-line via Schedule Builder! Visit the World of Next Generation Solutions on Level -01! You can collect your session printouts at the
Print Center on Level -01
Please remember this is a No Smoking venue! Please switch off your mobile phones! Please remember to wear your badge at all times including the Party!
SEC-A04
137
138