Chapter 8: Implementing Virtual Private Networks
Chapter Outline
Section 8.1: VPNs
Topic 8.1.1: VPN Overview
Introducing VPNs
Layer 3 IPsec VPNs
Topic 8.1.2: VPN Technologies
Two Types of VPNs
Components of Remote-Access VPNs
Components of Site-to-Site VPNs
Section 8.2: IPsec VPN Components and Operation
Topic 8.2.1: Introducing IPsec
IPsec Technologies
Confidentiality
Confidentiality (Cont.)
Integrity
Authentication
Authentication (Cont.)
Secure Key Exchange
Topic 8.2.2: IPsec Protocols
IPsec Protocol Overview
Authentication Header
Authentication Header (Cont.)
ESP
ESP Encrypts and Authenticates
Transport and Tunnel Modes
Transport and Tunnel Modes (Cont.)
Topic 8.2.3: Internet Key Exchange
The IKE Protocol
Phase 1 and 2 Key Negotiation
Phase 2: Negotiating SAs
Section 8.3: Implementing Site-to-Site IPsec VPNs with CLI
Topic 8.3.1: Configuring a Site-to-Site IPsec VPN
IPsec Negotiation
IPsec Negotiation (Cont.)
Site-to-Site IPsec VPN Topology
IPsec VPN Configuration Tasks
Existing ACL Configurations
Existing ACL Configurations (Cont.)
Introduction to GRE Tunnels
Topic 8.3.2: ISAKMP Policy
The Default ISAKMP Policies
Syntax to Configure a New ISAKMP Policy
XYZCORP ISAKMP Policy Configuration
Configuring a Pre-Shared Key
Configuring a Pre-Shared Key (Cont.)
Topic 8.3.3: IPsec Policy
Define Interesting Traffic
Define Interesting Traffic (Cont.)
Configure IPsec Transform Set
Configure IPsec Transform Set (Cont.)
Topic 8.3.4: Crypto Map
Syntax to Configure a Crypto Map
Syntax to Configure a Crypto Map (Cont.)
XYZCORP Crypto Map Configuration
XYZCORP Crypto Map Configuration (Cont.)
Apply the Crypto Map
Topic 8.3.5: IPsec VPN
Send Interesting Traffic
Verify ISAKMP and IPsec Tunnels
Verify ISAKMP and IPsec Tunnels (Cont.)
Section 8.4: Summary
Instructor Resources
4.03M
Categories: internetinternet softwaresoftware

Implementing virtual private networks. (Chapter 8)

1. Chapter 8: Implementing Virtual Private Networks

CCNA Security v2.0

2. Chapter Outline

8.0 Introduction
8.1 VPNs
8.2 IPsec VPN Components and
Operations
8.3 Implementing Site-to-Site
IPsec VPNs with CLI
8.4 Summary
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
2

3. Section 8.1: VPNs

Upon completion of this section, you should be able to:
• Describe VPNs and their benefits.
• Compare site-to-site and remote-access VPNs.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
3

4. Topic 8.1.1: VPN Overview

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
4

5. Introducing VPNs

VPN Benefits:
• Cost Savings
• Security
• Scalability
• Compatibility
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
5

6. Layer 3 IPsec VPNs

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
6

7. Topic 8.1.2: VPN Technologies

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
7

8. Two Types of VPNs

Remote-Access VPN
Site-to-Site VPN
Access
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
8

9. Components of Remote-Access VPNs

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
9

10. Components of Site-to-Site VPNs

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
10

11. Section 8.2: IPsec VPN Components and Operation

Upon completion of this section, you should be able to:
• Describe the IPsec protocol and its basic functions.
• Compare AH and ESP protocols.
• Describe the IKE protocol.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
11

12. Topic 8.2.1: Introducing IPsec

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
12

13. IPsec Technologies

IPsec Framework
© 2013 Cisco and/or its affiliates. All rights reserved.
IPsec Implementation
Examples
Cisco Public
13

14. Confidentiality

with Encryption:
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
14

15. Confidentiality (Cont.)

Encryption Algorithms:
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
15

16. Integrity

Hash Algorithms
Security of Hash Algorithms
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
16

17. Authentication

Peer Authentication Methods
PSK
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
17

18. Authentication (Cont.)

RSA
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
18

19. Secure Key Exchange

Diffie-Hellman Key Exchange
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
19

20. Topic 8.2.2: IPsec Protocols

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
20

21. IPsec Protocol Overview

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
21

22. Authentication Header

AH Protocols
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
22

23. Authentication Header (Cont.)

Router Creates Hash and Transmits
to Peer
Peer Router Compares Recomputed
Hash to Received Hash
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
23

24. ESP

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
24

25. ESP Encrypts and Authenticates

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
25

26. Transport and Tunnel Modes

Apply ESP and AH in Two Modes
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
26

27. Transport and Tunnel Modes (Cont.)

ESP Tunnel Mode
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
27

28. Topic 8.2.3: Internet Key Exchange

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
28

29. The IKE Protocol

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
29

30. Phase 1 and 2 Key Negotiation

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
30

31. Phase 2: Negotiating SAs

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
31

32. Section 8.3: Implementing Site-to-Site IPsec VPNs with CLI

Upon completion of this section, you should be able to:
• Describe IPsec negotiation and the five steps of IPsec configuration.
• Configure the ISAKMP policy.
• Configure the IPsec policy.
• Configure and apply a crypto map.
• Verify the IPsec VPN.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
32

33. Topic 8.3.1: Configuring a Site-to-Site IPsec VPN

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
33

34. IPsec Negotiation

IPsec VPN Negotiation:
Step 1 - Host A sends
interesting traffic to Host B.
IPsec VPN Negotiation:
Step 2 - R1 and R2
negotiate an IKE Phase 1
session.
IPsec VPN Negotiation:
Step 3 - R1 and R2
negotiate an IKE Phase
2 session.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
34

35. IPsec Negotiation (Cont.)

IPsec VPN Negotiation:
Step 4 - Information is
exchanged via IPsec tunnel.
IPsec VPN Negotiation:
Step 5 - The IPsec
tunnel is terminated.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
35

36. Site-to-Site IPsec VPN Topology

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
36

37. IPsec VPN Configuration Tasks

XYZCORP Security Policy
Configuration Tasks
Encrypt traffic with AES 256 and SHA
1. Configure the ISAKMP policy for IKE Phase 1
Authentication with PSK
2. Configure the IPsec policy for IKE Phase 2
Exchange keys with group 24
3. Configure the crypto map for IPsec policy
ISAKMP tunnel lifetime is 1 hour
4. Apply the IPsec policy
IPsec tunnel uses ESP with a 15-min. lifetime
5. Verify the IPsec tunnel is operational
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
37

38. Existing ACL Configurations

ACL Syntax for
IPsec Traffic
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
38

39. Existing ACL Configurations (Cont.)

Permitting Traffic for IPsec Negotiations
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
39

40. Introduction to GRE Tunnels

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
40

41. Topic 8.3.2: ISAKMP Policy

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
41

42. The Default ISAKMP Policies

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
42

43. Syntax to Configure a New ISAKMP Policy

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
43

44. XYZCORP ISAKMP Policy Configuration

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
44

45. Configuring a Pre-Shared Key

The crypto isakmp key Command
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
45

46. Configuring a Pre-Shared Key (Cont.)

Pre-Shared Key Configuration
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
46

47. Topic 8.3.3: IPsec Policy

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
47

48. Define Interesting Traffic

The IKE Phase 1 Tunnel Does Not Exist Yet
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
48

49. Define Interesting Traffic (Cont.)

Configure an ACL to Define Interesting Traffic
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
49

50. Configure IPsec Transform Set

The crypto ipsec transform-set Command
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
50

51. Configure IPsec Transform Set (Cont.)

The crypto ipsec transform-set Command
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
51

52. Topic 8.3.4: Crypto Map

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
52

53. Syntax to Configure a Crypto Map

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
53

54. Syntax to Configure a Crypto Map (Cont.)

Crypto Map Configuration Commands
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
54

55. XYZCORP Crypto Map Configuration

Crypto Map Configuration:
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
55

56. XYZCORP Crypto Map Configuration (Cont.)

Crypto Map Configuration:
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
56

57. Apply the Crypto Map

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
57

58. Topic 8.3.5: IPsec VPN

© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
58

59. Send Interesting Traffic

Use Extended Ping to Send Interesting Traffic
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
59

60. Verify ISAKMP and IPsec Tunnels

Verify the ISAKMP Tunnel is Established
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
60

61. Verify ISAKMP and IPsec Tunnels (Cont.)

Verify the IPsec Tunnel is Established
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
61

62. Section 8.4: Summary

Chapter Objectives:
• Explain the purpose of VPNs.
• Explain how IPsec VPNs operate.
• Configure a site-to-site IPsec VPN, with pre-shared key authentication,
using the CLI.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
62

63.

Thank you.

64. Instructor Resources

• Remember, there are
helpful tutorials and user
guides available via your
NetSpace home page.
(https://www.netacad.com)
1
2
• These resources cover a
variety of topics including
navigation, assessments,
and assignments.
• A screenshot has been
provided here highlighting
the tutorials related to
activating exams, managing
assessments, and creating
quizzes.
© 2013 Cisco and/or its affiliates. All rights reserved.
Cisco Public
64
English     Русский Rules