IPSEC
IPSEC consist of multiple protocols:
Encryption algorithm:
HASH Algorithm:
IPSEC Phase:
IPSEC modes:
IPSEC configuration template:
Troubleshooting
show crypto isakmp sa
show crypto isakmp policy
show crypto ipsec sa
show crypto ipsec transform-set
debug crypto {isakmp | ipsec}
Terminology:
| Internet Security Association and Key Management Protocol (ISAKMP) | A framework for the negotiation and management of security associations between peers (traverses UDP/500) |
| Internet Key Exchange (IKE) | Responsible for key agreement using asymmetric cryptography |
| Encapsulating Security Payload (ESP) | Provides data encryption, data integrity, and peer authentication; IP protocol 50 |
| Authentication Header (AH) | Provides data integrity and peer authentication, but not data encryption; IP protocol 51 |
Encryption algorithm:
| Type | Key Length (Bits) | Strength | |
| DES | Symmetric | 56 | Weak |
| 3DES | Symmetric | 168 | Medium |
| AES | Symmetric | 128/192/256 | Strong |
| RSA | Asymmetric | 1024+ | Strong |
HASH Algorithm:
| Length (Bits) | Strength |
| MD5 128 | Medium |
| SHA-1 160 | Strong |
IPSEC Phase:
| Phase 1 | A bidirectional ISAKMP SA is established between peers to provide a secure management channel (IKE in main or aggressive mode) |
| Phase 1.5 (optional) | Xauth can optionally be implemented to enforce user authentication |
| Phase 2 | Two unidirectional IPsec SAs are established for data transfer using separate keys (IKE quick mode) |
IPSEC modes:
| Transport Mode | The ESP or AH header is inserted behind the IP header the IP header can be authenticated but not encrypted |
| Tunnel Mode | A new IP header is created in place of the original this allows for encryption of the entire original packet |
IPSEC configuration template:
| ISAKMP Policy
crypto isakmp policy 10 encryption aes 256 hash sha authentication pre-share group 2 lifetime 3600 |
| ISAKMP Pre-Shared Key
crypto isakmp key 1 SECRET_KEY address 10.1.1.1 |
| IPsec Transform Set crypto ipsec transform-set MyTS esp-aes 256 esp-sha-hmac mode tunnel |
| IPsec Profile
crypto ipsec profile MyProfile set transform-set MyTS |
| Virtual Tunnel Interface
interface Tunnel0 ip address 172.16.0.1 255.255.255.252 tunnel source 10.0.0.1 tunnel destination 10.0.0.2 tunnel mode ipsec ipv4 tunnel protection ipsec profile MyProfile |
Troubleshooting
show crypto isakmp sa
show crypto isakmp policy
show crypto ipsec sa
show crypto ipsec transform-set
debug crypto {isakmp | ipsec}
Terminology:
| Data Integrity | Secure hashing (HMAC) is used to ensure data has not been altered in transit |
| Data Confidentiality | Encryption is used to ensure data cannot be intercepted by a third party |
| Data Origin Authentication | Authentication of the SA peer |
| Anti-replay | Sequence numbers are used to detect and discard duplicate packets |
| Hash Message Authentication Code (HMAC) | A hash of the data and secret key used to provide message authenticity |
| Diffie-Hellman Exchange | A shared secret key is established over an insecure path using public and private keys |
Comments
Post a Comment