1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture CCNA security partner - Chapter 13: IPsec Fundamentals

34 58 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 34
Dung lượng 608,73 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

This chapter covers the role and operational impact of IPsec’s main components and its modes of operation in various scenarios. It provides a detailed description of the phases of IPsec connectivity. It also provides an overview of IPv6 VPNs.

Trang 1

© 2012 Cisco and/or its affiliates All rights reserved 1

Chapter 13 IPsec Fundamentals

Trang 2

© 2012 Cisco and/or its affiliates All rights reserved 2

This chapter addresses the protocols and algorithms that IPsec uses and the different security services that IPsec provides

• Analyzes the architecture of the IPsec protocol

• Details the role and operational impact of IPsec’s main components

• Describes IPsec modes of operation in various scenarios

• Describes the phases of IPsec connectivity

• Describes the role and component of IKE

• Provides an overview of the operations of IPv6 VPNs

Contents

Trang 3

© 2012 Cisco and/or its affiliates All rights reserved 3

• An IP Security (IPsec) virtual private network (VPN) is an essential tool for providing a secure network for business communication

• IPsec works at the network layer, protecting and authenticating IP

packets between participating IPsec devices (peers)

• IPsec is not bound to any specific encryption, authentication, or security algorithms or keying technology

• IPsec is a framework of open standards

IPsec Framework

Trang 4

© 2012 Cisco and/or its affiliates All rights reserved 4

Trang 5

© 2012 Cisco and/or its affiliates All rights reserved 5

• The following are some of the encryption algorithms and key lengths

that VPNs use:

– Date Encryption Standard (DES)

– Advanced Encryption Standard (AES)

– Rivest, Shamir, and Adleman (RSA)

– Software-Optimized Encryption Algorithm (SEAL) algorithm

Encryption Algorithms

Trang 6

© 2012 Cisco and/or its affiliates All rights reserved 6

• Encryption algorithms, such as DES and 3DES, require a symmetric

shared-secret key to perform encryption and decryption

• You can use email, courier, or overnight express to send the

shared-secret keys to the administrators of the devices

• But the easiest key-exchange method is a public-key exchange method between the encrypting and decrypting devices

The method has two variants:

• The Diffie-Hellman (DH) key agreement

• ECDH is a variant of the DH protocol using elliptic curve cryptography

(ECC) It is part of the Suite B standards

Key Exchange: Diffie-Hellman

Trang 7

© 2012 Cisco and/or its affiliates All rights reserved 7

• DH19: 256-bit ECDH key

• DH20: 384-bit ECDH key

• DH24: 2048-bit ECDH key

Diffie-Hellman Group

Trang 8

© 2012 Cisco and/or its affiliates All rights reserved 8

• VPN data is typically transported over the public Internet Potentially,

this data could be intercepted and modified

• To guard against this problem, you can use a data-integrity algorithm

• Three common HMAC algorithms:

– HMAC-Message Digest 5 (HMAC-MD5)

– HMAC-Secure Hash Algorithm 1 (HMAC-SHA-1)

– HMAC-Secure Hash Algorithm 2 (HMAC-SHA-2)

Data Integrity

Trang 9

© 2012 Cisco and/or its affiliates All rights reserved 9

• When you are conducting business long distance, it is necessary to

know who is at the other end of the phone, email, or fax

• The same is true of VPN networks

• The device on the other end of the VPN tunnel must be authenticated

before the communication path is considered secure

– Preshared keys

– RSA signatures

– RSA encrypted nonces

– Elliptic Curve Digital Signature Algorithm (ECDSA)

Authentication

Trang 10

© 2012 Cisco and/or its affiliates All rights reserved 10

IPsec Framework Components

Trang 11

© 2012 Cisco and/or its affiliates All rights reserved 11

IPsec Protocol

Trang 12

© 2012 Cisco and/or its affiliates All rights reserved 12

AH Authentication and Integrity

Trang 13

© 2012 Cisco and/or its affiliates All rights reserved 13

• ESP provides confidentiality by encrypting the payload

• It supports a variety of symmetric encryption algorithms

• The lowest common algorithm for IPsec is 56-bit DES

• Cisco products also support the use of 3DES and especially AES for

stronger encryption

Encapsulating Security Payload

Trang 14

© 2012 Cisco and/or its affiliates All rights reserved 14

ESP Protocol

Trang 15

© 2012 Cisco and/or its affiliates All rights reserved 15

Encapsulation with Tunnel Mode and Transport

Mode

Trang 16

© 2012 Cisco and/or its affiliates All rights reserved 16

• IPsec implements a VPN solution using an encryption process that

involves the periodic changing of encryption keys

• IPsec uses the IKE protocol to authenticate a peer computer and to

generate encryption keys

• IKE negotiates a security association (SA), which is an agreement

between two peers engaging in an IPsec exchange and consists of all

the required parameters necessary to establish successful

communication

• An IPsec peer accepting incoming IKE requests listens on UDP port 500

IKE Protocol

Trang 17

© 2012 Cisco and/or its affiliates All rights reserved 17

IPsec uses the IKE protocol to provide these functions:

• Negotiation of SA characteristics

• Automatic key generation

• Automatic key refresh

• Manageable manual configuration

IKE Functions

Trang 18

© 2012 Cisco and/or its affiliates All rights reserved 18

• There are two versions of the IKE protocol: IKEv1 and IKEv2

• IKEv2 was created to overcome some of the limitations of IKEv1 IKEv2 provides the following enhancements:

• Simplicity, by requiring fewer transactions to establish security associations A simplified initial exchange of messages reduces latency and increases

connection establishment speed.

• Stronger security, through DoS protection and other functions.

• Reliability, by using sequence numbers, acknowledgements, and error

correction.

• Flexibility, through support for Extensible Authentication Protocol (EAP) as a

method for authenticating VPN endpoints.

• Mobility, by using the IKEv2 Mobility and Multihoming Protocol (MOBIKE)

extension This enhancement allows mobile users to roam and change IP

addresses without disconnecting their IPsec session.

IKE version

Trang 19

© 2012 Cisco and/or its affiliates All rights reserved 19

Visual Representation of IKEv1 and

IPsec Tunnels Being Built from the

Ground Up

Trang 20

© 2012 Cisco and/or its affiliates All rights reserved 20

• Main mode

• Aggressive mode

• Quick mode

IKEv1 Modes

Trang 21

© 2012 Cisco and/or its affiliates All rights reserved 21

• IKE Phase 1: Two IPsec peers perform the initial negotiation of SAs In

this phase, the SA negotiations are bidirectional; data may be sent and

received using the same encryption key

• IKE Phase 2: SAs are negotiated by the IKE process ISAKMP on behalf

of other services, such as IPsec, that need encryption key material for

operation Quick mode negotiates the IKE Phase 2 SAs In this phase, the SAs that IPsec uses are unidirectional; therefore, a separate key

exchange is required for each data flow

IKEv1 Phases

Trang 22

© 2012 Cisco and/or its affiliates All rights reserved 22

IKEv1 Phase 1

Trang 23

© 2012 Cisco and/or its affiliates All rights reserved 23

Main mode has three two-way exchanges between the initiator and

receiver:

• First exchange: Peers negotiate and agree on the algorithms and hashes that will be used to secure the IKE communications

• Second exchange: DH generates public and private values The peers

exchange their public values, and the result is a shared secret The

shared-secret key is used to generate all the other encryption and

authentication keys

• Third exchange: The identity of the other side is verified The main

outcome of main mode is a secure communications path for subsequent exchanges between the peers

Main Mode

Trang 24

© 2012 Cisco and/or its affiliates All rights reserved 24

• Aggressive mode, as explained earlier, compresses the IKE SA

negotiation phases into a total of three messages

• Negotiation is quicker, and the initiator and responder IDs pass in

plaintext

Aggressive Mode

Trang 25

© 2012 Cisco and/or its affiliates All rights reserved 25

IKEv1 Phase 1, First Exchange: Policy Is Negotiated

Trang 26

© 2012 Cisco and/or its affiliates All rights reserved 26

IKEv1 Phase 1, Second Exchange: DH Key

Exchange

Trang 27

© 2012 Cisco and/or its affiliates All rights reserved 27

As mentioned earlier, there are four data origin authentication methods

of a message encrypted with its private key as proof of its identity

• RSA encrypted nonces: Nonces are random numbers that are generated

by each peer and then encrypted and exchanged between peers The two nonces are used during the peer-authentication process

• ECDSA signatures: Exchange of certificates ECDSA certificates are

smaller than RSA signatures of similar cryptographic strength, resulting in improved communications efficiency ECDSA is available with Suite B

IKEv1 Phase 1, Third Exchange: Authenticate Peer

Identity

Trang 28

© 2012 Cisco and/or its affiliates All rights reserved 28

• Negotiates IPsec security parameters, known as IPsec transform sets

• Establishes IPsec SAs

• Periodically renegotiates IPsec SAs to ensure security

• Optionally, performs an additional DH exchange to generate IPsec SA

keys that have no relation to the IKE keys Generating IPsec keys from

scratch for the purpose of IPsec SAs is referred to as Perfect Forward

Secrecy (PFS), which is described after IKEv2 quick mode

IKEv1 Phase 2

Trang 29

© 2012 Cisco and/or its affiliates All rights reserved 29

• In IKEv2, there is a simplified initial exchange of messages that,

compared to IKEv1, reduces latency and increases the connection

establishment speed

• The IKEv2 base specification includes all the functionality of IKEv1 as

well as additional functionality

• It preserves most of the features of version 1, including the two

negotiation phases

IKE Version 2

Trang 30

© 2012 Cisco and/or its affiliates All rights reserved 30

IKEv2: A Simplified Approach

Trang 31

© 2012 Cisco and/or its affiliates All rights reserved 31

IKEv1 Versus IKEv2

Trang 32

© 2012 Cisco and/or its affiliates All rights reserved 32

• IPsec is mandatory for IPv6

• IPsec is native to IPv6

• Includes built-in confidentiality, integrity, authentication, and antireplay

• Offers flexibility and low overhead through extension headers

• The IPsec framework and behavior are the same as IPsec for IPv4

• Strong encryption (Suite B) and mobility enhancements (IKEv2) are key

in IPv6

• Only site-to-site tunnel mode VPNs are supported in Cisco IOS as of

version 15.1

IPv6 VPNs

Trang 33

© 2012 Cisco and/or its affiliates All rights reserved 33

IPsec Services for Transitioning to IPv6

Trang 34

© 2012 Cisco and/or its affiliates All rights reserved.

© 2012 Cisco and/or its affiliates All rights reserved.

Ngày đăng: 30/01/2020, 12:43

TỪ KHÓA LIÊN QUAN