Implementation of Gre Over Ipsec VPN Enterprise Network Based On Cisco Packet Tracer
Implementation of Gre Over Ipsec VPN Enterprise Network Based On Cisco Packet Tracer
Implementation of Gre Over Ipsec VPN Enterprise Network Based On Cisco Packet Tracer
Abstract—Along with the increasing prominence of network communication line between two or more enterprises
security problem, VPN (Virtual Private Network, VPN) Intranet located in different parts to connect the Internet, is
technology provides a solution of economic remote access for just like establishing a special line. But it doesn’t need to
the enterprise. As the IPSec protocol is able to provide the build a real physical line like optical cable. Enterprises only
highest level of security, using IPSec VPN to build security have to hire local special data line and connect it to the local
Intranet has become a trend. Since the IPSec (Internet Internet, so that the institutions can transmit information to
Protocol Security) does not support the encryption of multicast each other.
and broadcast packet, GRE (Generic Routing Encapsulation) Through the integrated use of Internet technology, access
tunnel is needed to encapsulate multicast and broadcast
of interview technology, encryption technology, and certain
packets to unicast packet. By encrypting the GRE with IPSec,
the data security is guaranteed and the problem of VPN
user management mechanism, the user can make use of the
scalability is solved. existing public Internet to safely, securely, and undisturbedly
interview the remote internal network resources. Compared
Keywords-VPN; GRE; Intranet; IPSec; IKE with the traditional private network, VPN technology greatly
reduces the cost. It is convenient, safe, standard, and
becomes the main technology in achieving enterprises’
I. INTRODUCTION cross-regional secure network interconnection. VPN can be
Enterprise informatization is the only way for the divided into three categories: (1)Internal virtual network
development of all enterprises, especially large enterprises. (Intranet VPN): the safe connection between the
These enterprises are characterized in large scale, with more headquarters and branches; (2) Remote Access to virtual
than one division or branch. Information exchange is needed network (Remote Access VPN): employees’ remote access
among them, some of which involves the enterprise's to the company network server. Generally, it should have
business secrets. If the enterprise information is transmitted encryption, identity authentication, filtering, and other
through the Internet, there will be many problems in safety. functions; (3) Enterprises expanding virtual network
The Internet has the advantage of cheapness, but it is not safe, (Extranet VPN): providing security for the enterprise's
while, by contrast, leased line is safe, but more expensive. business partners, suppliers and customers, mainly ensuring
Then, how to ensure the confidentiality and integrity of the data not being modified in the process of transmission
information exchange between the headquarters and the and protecting the network resources from external damage.
divisions of the enterprises? How to make the cost of VPN mainly adopts two technologies: tunnel and security
connection not as high as that of leased line? In order to technology. Current tunnel technology is mainly supported
solve this problem, the VPN (Virtual Private Network) was by three kinds of protocol: PPTP, L2TP and IPsec. The main
born. It is not only secure, but also low-cost. VPN mission of tunnel technology is completing the secondary
technology provides a solution of safe and cheap remote encapsulation of IP packets in order to realize the
access for enterprises. The secure enterprise virtual private transmission of enterprise’s private address on the public
network was established in the Internet by using IPSec Internet. To ensure the security of transmission, a secure
security tunnel. Thereby the communication could means of encryption shloud be used to ensure the privacy
effectively guarantee the security of enterprises. and integrity of the data. Security technology mainly
includes MPPE, IPSec and other encryption algorithm. IPsec
II. GRE OVER IPSEC VPN provides security services in IP aspects. On the tunnel and
encryption technology, IPSec has already become a widely-
A. Brief Introduction of VPN used and open VPN security protocols, which ensures the
VPN (Virtual Private Network) is a kind of technology interoperability running between the TCP/IP protocol and the
that uses public network to build the special private network, VPN. IPsec defines a set of standard protocols to protect the
and it is the "line in the line". Data is spread through a secure privacy and integrity and supports a series of encryption
"encrypted tunnel" in the public network. Building a special algorithm like DES 、3 DES. It checks the integrity of the
143
VPN switches support static tunnel for failure recovery addresses can access the company's DNS server and FTP
function, and its secure IP service gateway can realize the server. Establishment of VPN between sites is called for
load balancing between multiple routing paths and multiple between the head office in Beijing and the Shanghai filiale.
switches. Besides, in the connection, the VPN client will By establishing GRE tunnel, two agencies manage to
communicate with each other. Because GRE protocol itself
automatically select the backbone node of this area which is
can not encrypt and package the data, we configure IPSec to
set in the communication list, and automatically choose protect the GRE message.
other VPN switches according to the list settings when the
regional node fails, so as to achieve the purpose of the C. Network topology
connection. The whole network structure is divided into three large
5) Effective Management: The split channel blocks, namely Beijing head office networks, Shanghai
characteristic of VPN switches provides the supports of filiale networks and the Internet. Two enterprise networks
visiting the Internet, Extranet and local network for IPSec are both connected to the Internet network. In order to
client at the same time. This technology can set permissions, complete the experiment, the network topology is designed
as shown in Figure 1: Router1 is the egress router of Beijing
allow users’ access, such as local print and file sharing,
head office, Router 4 is the egress router of the Shanghai
direct Internet and secure outside network. This filiale, Router2 and Router3 are routers of
characteristic makes it possible for users to use the network telecommunication department, and they are used to simulate
resources rationally and conveniently under the safety the Internet network. Terminal equipment are connected in
condition, both secure and flexible. Routing protocols are the internal network of the head office in Beijing and
needed by the multiple users and complex routings to make Shanghai filiale to test the network connectivity. DNS server
the entire web address management convenient and and FTP server are placed in the enterprise network.
effective. With the help of RIP & OSPF, VPN devices’ Experimental topology construction: build a network
connection and extension are as routers, which is suitable topology diagram as shown in Figure 1 in the simulation
for the continuous expansion of network. What’s more, the software Cisco Packet Tracer, including four 2811 routers,
two 2960 switches, two PCs and four servers.
dynamic routing protocol can be supported in the encrypted
tunnel. Managers can manage the remote node through the
management of software and remote configuration .
III. DESIGN PRINCIPLES
144
2) Host IP configuration for Shanghai filiale: IP address R4(config)#interface serial0/0/1
of PC2 is set to: 222.17.245.2, subnet mask is 255. 255. 255. R4(config-if)#ip address 52.1.1.2 255.255.255.0
0, and the gateway is 222.17.245.1. R4(config-if)#no shutdown
IP address of DNS Server2 is set to: 222.17.245.3, R4(config-if)#exit
subnet mask is 255. 255. 255. 0, and the gateway is 222.17. R4(config)#interface fastethernet0/0
245.1. R4(config-if)#ip address 222.17.245.1 255.255.255.0
IP address of FTP Server2 is set to: 222.17.245.4, subnet R4(config-if)#no shutdown
mask is 255. 255. 255. 0, and the gateway is 222.17. 245.1. R4(config-if)#exit
R4(config)#ip route 0.0.0.0 0.0.0.0 52.1.1.1
IV. CONFIGURE ROUTER 2) Establish IKE strategy
R4(config)#crypto isakmp policy 10
A. Configure Router 1 R4(config-isakmp)#hash md5
1) Configure IP addresses R4(config-isakmp)#authentication pre-share
R1(config)#interface serial0/0/1 R4(config-isakmp)#lifetime 86400
R1(config-if)#ip address 188.128.5.1 255.255.255.0 R4(config-isakmp)#group 5
R1(config-if)#no shutdown 3) Configure preshared key, and create ACL
R1(config-if)#exit R4(config)#crypto isakmp key 13876694751 address
R1(config)#interface fastethernet0/0 188.128.5.1
R1(config-if)#ip address 222.17.244.1 255.255.255.0 R4(config)#access-list 110 permit ip 222.17.245.0
R1(config-if)#no shutdown 0.0.0.255 222.17.244.0 0.0.0.255
R1(config-if)#exit 4) Define transform set
R1(config)#ip route 0.0.0.0 0.0.0.0 188.128.5.2 R4(config)#crypto ipsec transform-set test esp-3des esp-
2) Establish IKE strategy md5-hmac
R1(config)#crypto isakmp enable 5) Configure crypto mapping table
R1(config)#crypto isakmp policy 10 R4(config)#crypto map chong-map 10 ipsec-isakmp
R1(config-isakmp)#hash md5 R4(config-crypto-map)#set peer 188.128.5.1
R1(config-isakmp)#authentication pre-share R4(config-crypto-map)#set transform-set test
R1(config-isakmp)#lifetime 86400 R4(config-crypto-map)#match address 110
R1(config-isakmp)#group 5 6) Apply encrypted mapping table to physical interfaces
R1(config-isakmp)#exit R4(config)#interface serial0/0/1
3) Configure preshared key, and create ACL (IKE R4(config-if)#crypto map chong-map
parameters) 7) Configure logical interfaces of the tunnel
R1(config)#crypto isakmp key 13876694751 address R4(config-if)#ip add 192.168.1.2 255.255.255.0
52.1.1.2 R4(config-if)#tunnel source serial0/0/1
R1(config)#access-list 110 permit ip 222.17.244.0 R4(config-if)#tunnel destination 188.128.5.1
0.0.0.255 222.17.245.0 0.0.0.255 R4(config-if)#exit
4) Define transform set (IPSec parameters) R4(config)#access-list 110 permit gre host 52.1.1.2 host
R1(config)#crypto ipsec transform-set test esp-3des esp- 188.128.5.1
md5-hmac C. Simulate WAN-WAN on Router 2 and Router 3
5) Configure crypto mapping table respectively
R1(config)#crypto map chong-map 10 ipsec-isakmp
R1(config-crypto-map)#set peer 52.1.1.2 1) on Router 2
R1(config-crypto-map)#set transform-set test Route2(config)#hostname R2
R1(config-crypto-map)#match address 110 R2(config)#interface serial0/0/0
6) Apply encrypted mapping table to interfaces R2(config-if)#ip add 198.96.6.1 255.255.255.0
R1(config)#interface serial0/0/1 R2(config-if)#no shutdown
R1(config-if)#crypto map chong-map R2(config-if)#exit
R2(config)#interface serial0/0/1
7) Configure logical interfaces of the tunnel
R2(config-if)#ip add 188.128.5.2 255.255.255.0
R1(config)#interface tunnel0
R2(config-if)#clock rate 64000
R1(config-if)#ip address 192.168.1.1 255.255.255.0
R2(config-if)#no shutdown
R1(config-if)#tunnel source serial0/0/1
R2(config-if)#exit
R1(config-if)#tunnel destination 52.1.1.2
R2(config)#ip route 52.1.1.0 255.255.255.0 198.96.6.2
R1(config-if)#exit
R1(config)#access-list 110 permit gre host 188.128.5.1 2)on Router 3
host 52.1.1.2 R3(config)# interface serial0/0/0
R3(config-if)#ip add 198.96.6.2 255.255.255.0
B. Configure Router 4 R3(config-if)#clock rate 64000
1) Configure IP addresses R3(config-if)#no shut
145
R3(config-if)#exit [4] Grembowski T, Lien R, Gaj K et al. Comparative analysis of the
R3(config)# interface serial0/0/1 hardware implementations of hash functions sha-1 and sha-512. In
Proc. the 5th Int. Information Security Conference, Brazil, September
R3(config-if)#ip add 52.1.1.1 255.255.255.0 3-October 2, 2002, pp.75-89.
R3(config-if)#clock rate 64000 [5] WANG C, Lo C, Lee M, et al. A network security processor design
R3(config-if)#no shutdown based on an integrated SoC design and test platform [C]//Proc.
R3(config-if)#exit IEEE/ACM Design Automation Conf. (DAC'06), IEEE Press,
R3(config)#ip route 188.128.5.0 255.255.255.0 2006:490-495.
198.96.6.1 [6] China Core C * Core310 User Guide [R]. ChinaCore Inc. [EB/OL].
(2004). http: //www. china-core, corn/data/ summary/C310_datasheet
V. VERIFY THE RESULTS chinese, pdf.
[7] WANG Haixin, BAI Guoqiang, CHEN Hongyi. Zodiac: system
Wen completed, they can be tested on the client. Use architecture implementation of a high performance network seeurity
PC1 to ping PC2, namely ping each other between private processor [C]// Proc IEEE International Conference on Application-
networks, which theoretically can access, and then ping IP Specific Systems, Architectures and Processors (ASAP'08), IEEE
address of analog public network, which doesn't make sense Press, 2008:91 - 96.
theoretically, testifying that an analog public network just [8] Verbauwhede I, Scheaumont P, Kuo H. Design and performance
testing of a 2.29 Gb/s Rijndael processor [J]. IEEE Journal of Solid-
provides a physical link for the tunnel. Input the command State Circuits, 2002, 28(3): 569 - 572.
on a router 1 to verify the results.
[9] CHEN Gang, BAI Gguoqiang, CHEN Hongyi. A high-performance
R1#show ip route elliptic curve cryptographic processor for general curves over GF(p)
C 188.128.5.0 is directly connected, Serial0/0/1 based on a systolic arithmetic unit [J]. IEEE Transactions on Circuits
C 192.168.1.0/24 is directly connected, Tunnel0 and Systems II-express briefs, 2007, 54(5): 412-416.
C 222.17.244.0/24 is directly connected, FastEthernet0/0 [10] Chou W. Inside SSL: accelerating secure transactions [J]. IT
S* 0.0.0.0/0 [1/0] via 188.128.5.2 Professional, 2002, 4(5) : 37 - 41.
R1#show interface tunnel 0 [11] Onuki A, Takeuchi K, Inada T et al. A realization of theoretical
Tunnel0 is up, line protocol is up (connected) maximum performance in IPSec on gigabit Ethernet. IEEJ
Transactions on Electronics, Information and Systems, 2004, 124-
Hardware is Tunnel C(8): 1533-1537.
Internet address is 192.168.1.1/24 [12] Dandalis A, Prasanna V K, Rolim J D P. An adaptive cryptographic
MTU 17916 bytes, BW 100 Kbit/sec, DLY 50000 usec, engine for IPSec architectures. In Proc. IEEE Symposium on Field-
reliability 255/255, txload 1/255, rxload 1/255 Programmable Custom Computing Machines, USA, April 17-19,
Encapsulation TUNNEL, loopback not set 2000, pp.132-141.
Keepalive not set [13] Castanier F, Ferrante A, Piuri V. A packet scheduling algorithm for
Tunnel source 188.128.5.1 (Serial0/0/1), destination IPSec multi-accelerator based systems. In Proc. the 15th IEEE
International Conference on Application-Specific Systems,
52.1.1.2 Architectures and Processors (ASAP 2004), USA, Sept. 27-29, 2004,
Tunnel protocol/transport GRE/IP pp.387-397.
[14] Niemann J G, Porrmann M, Ruckert U. A scalable parallel SoC
VI. CONCLUSIONS architecture for network processors. In Proe. IEEE Computer Society
With the development of modern enterprises, the Annual Symposium on VLSI 2005 ( ISVLSI 2005): New Frontiers in
VLSI Design, USA, May 11-12, 2005, pp.311-313.
establishment of branch offices, the formation of remote
clients, more and more users need to establish the connection [15] Ariga S, Nagahashi K, Minami M et al. Performance evaluation of
data transmission using IPSec over IPv6 networks. In Proc. INET
with enterprise Intranet. Combined with GRE, the IPSEC 2000, Yokohama, Japan, USA, July 18-21, 2000, pp.200-202.
virtual private network (VPNS) can provide enterprises with [16] Caldera J, Niz D D, Nakagawa J. Performance analysis of IPSec and
safe, low-cost and extensible network services without IKE for mobile IP on wireless environments. Information Networking
affecting the existing communications. Achieve the real Institute, Carnegie Mellon University, http://www.cs.cmu.edu/-
minimum investment and maximum communication. Along dionisio/ipSec-wmip.doc.
with the increasingly important of network security, it can [17] Elkeelany O, Matalgah M M, Sheikh K Pet al. Performance analysis
believe that the application of GRE Over IPsec VPN will be of IPSec protocol: Encryption and authentication. In Proc. IEEE
International Conference on Communications (ICC 2002), New York,
more extensive. USA, April-May, 2002, pp.1164-1168.
REFERENCES [18] Kent S, Atkinson R. Security architecture for the Internet protocol.
RFC 2401, November 1998.
[1] Kang Y K, Kim D W, Kwon T Wet al. An efficient implementation of [19] Kent S, Atkinson R. Security architecture for the Internet protocol.
hash function processor for IPSEC. In Proc. 3rd IEEE Asia-Pacific RFC 4301, December, 2005.
Conf. ASIC, Taipei, Aug. 6-8, 2002, pp.93-96.
[20] Madson C, Glenn R. The use of HMAC-MD5-96 within ESP and AH.
[2] Schaumont P R, Kuo H, Verbauwhede I M. Unlocking the design RFC 2403, November 1998.
secrets of a 2.29 Gb/s Rijndael processor. In Proc. 39th ACM/IEEE
Design Automation Conference (DAC 2002), USA, June 10-14, 2002, [21] Madson C, Glenn R. The use of HMAC-SHA-1-96 within ESP and
pp.634-639. AH. RFC 2404, November 1998.
[3] Chang H C, Chen C C, Lin C F. XScale hardware acceleration on [22] Madson C, Doraswamy N. The ESP DES-CBC cipher algorithm with
cryptographic algorithms for IPSec applications. In Proc. explicit IV. RFC 2405, November 1998
International Conference on Inforrnation Technology ( ITCC 2005),
USA, April 4-6, 2005, pp.592-597.
146