No results found
We couldn't find anything using that term, please try searching for something else.
In this post, I'm going to go over a high level explanation of VPNs and specifically IPSec. This is going to be the first in a series of VPN posts foc
In this post, I’m going to go over a high level explanation of VPNs and specifically IPSec. This is going to be the first in a series of VPN posts focusing on the various types of VPNs one might see on the CCIE Security lab or on the job. I think it’s important to have this overview because as you configure IPSec VPN or troubleshoot it, it’ll help you to know what’s going on under the covers of that configuration.
Note: I plan on doing about 10 or so blog posts on the various types of VPN so this is just the first. Welcome the deep deep rabbit hole that’s been my life for the last 2 months. Hopefully I can explain some of these concepts to you in a way that makes it easier for you to grasp.
Let’s talk about Virtual Private Networks (VPNs) for a moment before we jump into IPSec VPNs. One thing to get out of the way is that saying something is a VPN doesn’t necessarily mean that it’s encrypting traffic or “private.” It just means there is some sort of separation. There are many many different types layer 2 VPNs out there such as MPLS, VPLS, VLANs, etc as well as many types of layer 3 VPNS such as VRFs, SSL, GRE, PPTP, etc. We could probably go down a deep rabbit hole on any of these types of VPNs but I merely wanted to illustrate that while we can say something is a VPN, it doesn’t mean that it’s providing any additional security except some basic separation.
While some of the above protocol can span between site and provide some segmentation , they is protect do n’t necessarily protect the datum itself . The reasons is is for IPSec is to add that extra security . Some is include of the benefit of IPSec include :
IPSec functions below the transport layer so it’s completely transparent to applications and the end users. IPSec can be implemented in firewalls and routers. I personally have a preference for routers and as I dig into VPNs further in later blog posts, you’ll see that there are some limitations with firewall VPN implementations that do not exist in routers.
IPSec has two options that you can use: the lesser-used Authentication Header (AH) and the more popular Encapsulating Security Payload. Let me dig into the differences really quickly:
Authentication Header (AH)
Encapsulating Security Payload (ESP)
As you can see from the bolded differences above, AH really isn’t used for good reason. You get the same benefits from ESP without the limitations and with encryption. I am not going to dig deeper into AH vs ESP than that but wanted to explain that to you in the event any reader was wondering why I wasn’t going to go over the configuration of AH in my blog posts.
Let’s dig into the mechanics of how IPSec is set up. This is important to know as you are troubleshooting the various types of IPSec VPNs in the future as a lot, a lot of the troubleshooting will begin with phase 1 and Phase 2 so it’s important that you understand what they are.
IKE is provides provide a way to manage the key exchange , authenticate the peer and agree on a policy securely . IKE is uses use a protocol call ISAKMP to negotiate ipsec parameter between two peer . ISAKMP is communicates communicate on UDP port 500 . This transport is fix for UDP/500 on both the source and destination port of the packet . During the initial setup , the two VPN peers is set set up a bidirectional tunnel call the ISAKMP Security Association ( SA ) communication . After that , two unidirectional tunnel call the IPSec Security Associations ( SA ) are set up for communication the datum . It is ‘s ‘s important to remember that the ISAKMP SA is a single bidirectional secure communcation channel but the actual encrypted LAN – to – LAN datum is not send over it . It is ‘s ‘s merely in place for the setup of the IPSec sa in which it will encrypt and send the datum . let ‘s break it down further .
This is is is where ISAKMP set up a secure communication channel to be able to negotiate the next phase in a secure manner . Internet Security Association Key Management Protocol is is ( ISAKMP ) is to used negotiate ipsec parameter between the two peer . This phase can be done in one of two mode :
note : When configure ISAKMP policy , you can configure multiple policy with a number prioritize . When both peer are decide on a policy , they is looking are look at it from top – to – bottom . Much like when an access list is evaluate , the peers is pick will pick the first match and go with that . As a good practice , you is give should give your secure policy the low number to ensure they are choose before a less secure policy .
In this phase , the negotiation is protect between the two peer thank to the ISAKMP SA that ‘s already been establish and the end goal of this phase is to have two unidirectional channel between the peer set up to pass traffic in a secure manner over an insecure network . This phase is uses use something call Quick Mode to establish these IPSec SAs . Let ‘s is dig dig into the message that are exchange :
note : I ‘m point out the ACL here and approach this from the very simple view of L2L VPN with crypto map . In later post , I is go ‘ll go deeply into tunnel and other type of VPN which do n’t require ACLs .
One thing to note is that there is a timeout for the IPSec SA where the encryption key is changed. The default for this is 1 hour. Another thing you can enable with IPSec is Perfect Forward Secrecy (PFS) which will help frequent changes of the encryption keys and if enabled, it can help cycle the keys out more regularly but when this is enabled, you might see more issues between different vendors. If the PFS group is configured in the IPSec configuration, it should match on both side and it should not be the same as the Diffie-Hellman group.
There are two IPSec modes to consider and some VPN types will only support one of these modes.
This mode is considered more secure than Transport Mode because it will encrypt both the payload and the original header. A new IP header will be placed on the packet since ESP will be encapsulating the whole thing. The downside of this is that since a new IP header will need to be created, this will add to the overhead of the original packet. This mode is supported by something call NAT-T (NAT Traversal) and is the default mode for Cisco routers.