Intro To RSA
Intro To Diffie-Hellman
What Is A VPN?
VPN Terminology
PKI Standards
IPsec
Site-To-Site VPNs
Crypto ACLs
Intro To GRE
If you want to read more about these techniques once you're done with
your CCNA Security exam, there are quite a few good non-Cisco-centric
books available today, and Wikipedia has some great entries on these
techniques as well.
Here's a link to the Wikipedia page on the Enigma Machine, used in World
War II to create "unbreakable" ciphers:
http://en.wikipedia.org/wiki/Enigma_machine
You don't have to read the page for the CCNA Security exam, but take a
few minutes to check out the pictures!
It's not possible to list every cipher available today, but let's take a quick
look at just a few, starting with the substitution cipher. Basic substitution
ciphers are rather easy to break, since the pattern is simple and easy to
detect - a given letter is represented in the cipher by the same character
every time.
For example, the letter "E" could be represented by the pound sign (#) in
a simple substitution cipher. Since the letter "E" is one of the most
commonly used letters in any transmission, it would be relatively easy to
figure out what the pound sign indicates - and you just go from there! A
good cryptologist or decryption software program can break a substitution
cipher in a matter of minutes.
More complex ciphers are based on the Caesar Cipher, a simple but
effective encryption technique. All letters in the clear-text data are
substituted with a letter "X" positions down from the original letter. For
example, a shift of 4 would result in "A" being substituted with the letter
"E", and so forth.
By itself, that is simple to crack, but more effective ciphers such as the
Vigenere cipher use multiple Caesar ciphers to encrypt data. Since the
Vigenere ciphers uses multiple substitution alphabets, it is said to be a
polyalphabetic cipher.
Some people find ciphers interesting, while others.... do not. For those of
you who'd like to learn more about these ciphers, I've included some
Wikipedia links at the end of this section. They're not required reading for
the CCNA Security exam, but I do recommend you take just a few
minutes to check out the illustrations and see how these ciphers operate!
Symmetric algorithms use one single key for both encryption and
decryption.
Asymmetric algorithms use one key to encrypt data and a separate
key to decrypt the same data. The actual key exchange is built into
the operation of asymmetric algorithms.
You might think that two keys are always better than one, but that's not
quite the case. One of the strongest algorithms in operation today, the
Advanced Encryption Standard (AES), is a symmetric algorithm.
These two algorithm types are not mutually exclusive; for example, the
Diffie-Hellman asymmetric algorithm can be used as a key exchange
protocol for symmetric algorithms.
RSA
The letters RSA stand for the originators of this algorithm (Ron Rivest, Adi
Shamir, and Len Adelman). Regarding this asymmetric encryption
algorithm, Wikipedia notes:
RSA uses two keys, one public and the other private
To read much more about RSA, visit the RSA Wikipedia page:
http://en.wikipedia.org/wiki/RSA
A few DH notes:
For CCNA Security exam purposes and the VPN discussions in this
section, that first point is of particular interest.
There are two different versions of the Secure Hash Algorithm. The first,
SHA-1, creates a 160-bit message digest. SHA-1 is the more commonly
used of the two variations, but in 2005 some security issues were
detected in SHA-1. That's when SHA-2 came along.
What's A VPN?
VPNs are often referred to as tunnels. We can apply security rules and
policies to this tunnel without applying them to other WAN
communications. In the following exhibit, a VPN has been created
between two routers. Security policies can be enforced on the VPN
between those two routers without affecting any WAN communications
involving the bottom router.
VPNs offer three vital functions, all of which are important in today's
networks. Note that two of these occur at the receiver, and one at the
sender. Data origin authentication allows the receiver to guarantee the
source of the packet.
Encryption is just that - the sender encrypts the packets before sending
them. If an intruder picks them off the wire, they will have no meaning.
Integrity is the receiver's ability to ensure that the data was not affected or
altered in any fashion as it traveled across the VPN.
There are three different protocols we can use to create this tunnel.
Originally defined in RFC 1701, Generic Routing Encapsulation enables a
Cisco router to encapsulate a packet in an IP header. When the packet
reaches the remote router, the header is stripped off. GRE's drawback is
that there's no encryption scheme, and that's a pretty big drawback.
VPN Terminology
Data Integrity means that the recipient of the data can guarantee that the
received data is the same as the transmitted data - in short, that the data
was not altered during transport.
After A and C are done with their conversation, the Intruder starts a
conversation with C, pretending to be A. When C asks for proof of
identity, the Intruder submits A's ID, and C will accept it.
Anti-replay protection can use several different methods of defeating such
an attack, including the one-time use of tokens for the proof of identity or
by using sequence numbers; a repeated sequence number will be
rejected.
The Data Encryption Standard (DES) was developed in 1976, and a few
problems have developed with DES since then.
The main issue is that the key used by DES to encrypt data is only 56 bits
in size. (A key is a random string of binary digits.) Thirty years ago, that
was fine, but then again floppy disks used to be the largest storage unit
any of us needed! Depending on which documentation you read, DES
keys can be broken in any time frame from 24 hours to ten minutes.
DES can uses both block and stream ciphers. The block ciphers used by
DES are Electronic Code Book (ECB) and Cipher Block Chaining (CBC).
The real issue is that each 64-bit plaintext block will be encrypted by the
same 56-bit key. That issue does not exist with CBC, since every
plaintext block has an XOR (Exclusive OR) operation run against it with
the previous ciphertext lock before it's encrypted. Here's how the CBC
works (illustration courtesy of Wikipedia)
Triple DES (TDES) is just what it sounds like - the DES encryption
procedure is run three times, with three different 56-bit DES keys. That's a
total of 168 bits, but the effective security provided is considered to be
only 112 bits.
Once your end users start using VPNs - especially when they can "VPN
in" from home, rather than coming to the office anytime they need access
to network resources - you're going to quickly realize you need a single,
scalable "gatekeeper", and one such solution is a Public Key
Infrastructure (PKI).
Basically, the CA is the big cheese of the PKI. The term often associated
with a CA is "trusted third party", and by that we mean that the CA is
trusted by all parties involved, and the CA is also considered an
independent, nonpartisan entity.
Now that the CA has verified Dan and Bob, public key encryption can be
put into use. In this example, Dan will send an email to Bob using PKE.
Dan will actually use Bob's public key to encrypt the message. The email
is then sent to Bob, who will use his private key to de-encrypt the email.
E-commerce website also use CAs as a trusted third party to help prove
to potential customers that they are who they say they are. For example,
you'll find this SSL certificate on every e-commerce page on my website,
with the name of the site scrolling across the image:
Note the phrase "click to verify". When you do so, the following certificate
is displayed in another window:
Take it from me - you really have to prove to your CA that you are who you
are before they'll issue a certificate!
This information is more than enough for most, but if you want even more
information on the chain of CAs involved, you can click on Repository.
IPsec runs at L3 of the OSI model. In comparison, SSL and SSH run
from L4 - L7.
The officially spelling is "IPsec", not "IPSec", but since you see it
both ways in most network documentation and possibly on your
CCNA exam, you'll see it spelled both ways in this section
The IPsec suite is an open-standard suite, and here are the members of
this suite:
The Encapsulating Security Payload (ESP) does just that - as you can
see from the IPSec packet illustration, there is an ESP Header and ESP
Trailer surrounding, or encapsulating, the data. ESP offers all of the
following:
Comparing AH and ESP, you might be wondering why you'd ever choose
AH over ESP. Here are a few things to consider:
ESP is more processor-intensive than AH. If your data does not require
data confidentiality, AH may meet all your requirements.
Both ESP and AH can be run in one of two modes - Tunnel Mode and
Transport Mode. In Tunnel mode, the entire IPSec process is
transparent to the end hosts; specialized IPSec gateway devices handle
the IPSec workload.
The tunnel mode process encrypts the entire IP packet, and then that
encrypted packet is placed into another IP packet. That encapsulating
packet will have the IP addresses configured on the tunnel endpoints, and
it's those tunnel IP addresses that will be used to route the packet.
Transport mode encrypts the IP payload, but the IPSec header is inserted
directly after the IP header in the packet. As a result:
Basic IPSec operation is much like running PPP over ISDN. We're even
going to use some of the same terms! (If you haven't done that before,
don't worry, we'll go through the key exchange process step by step.)
Before we take a broad overview of how IPSec works, there's one more
term we need to discuss - the Internet Key Exchange, or IKE.
Defined in RFC 2409, IKE has a lot to do! IKE must negotiate the
parameters of the communication channel, authenticate both endpoints,
handle the exchange of public keys, and manage the keys afterwards.
IKE is a two-phase process, and there are three phases we need to know
about. (Yeah, I know. Stick with me here!)
This phase will result in a Security Association being created for the
ISAKMP process itself - an IKE SA. A Security Association is simply
a contract between two hosts as to the IPSec parameters that will be used
for communications between the two.
IPSec doesn't just start working by itself - like ISDN, it requires interesting
traffic to be sent by a host. This interesting traffic initializes the IPSec
process. Just as we used access lists to define interesting traffic with
ISDN, a crypto access-list will define interesting traffic for our VPN. We'll
configure one later in this section.
The routers will now enter IKE Phase I. Assuming we're running Main
mode, there will be six messages overall. The initiator will first transmit
proposals for the encryption and authentication schemes to be used. At
this point, IKE's looking for an ISAKMP policy that's a match at both
endpoints.
In the second exchange of IKE Phase I, the devices will exchange Diffie-
Hellman public keys; from this point on, the rest of the negotiation is
encrypted.
The initiator and recipient authenticate each other in the third exchange of
Phase I, using an encrypted form of their IP addresses. The IKE SA is
then established and Phase II can begin. At this point, we have an
ISAKMP tunnel (or ISAKMP session) established, and an IPSec tunnel
can now be built in Phase 2.
If we had chosen to run IKE in Aggressive Mode, this would have been a
three-message process.
The initiator packets everything needed for the SA negotiation in the first
message, including its Diffie-Hellman public key.
IKE Phase 2 has one mode, Quick mode. This is also a three-message
process. The initiator proposes parameters for the IPSec SA, the
recipient responds with a list of acceptable parameters, and the initiator
then transmits a message that lets the responder know that message 2
was received and processed. This message is called proof of liveness.
With the IPSec SA in place, we have an IPSec tunnel, and the hosts can
now exchange data.
Once the data exchange is complete, the tunnel can be torn down. This
tunnel termination can be configured to occur after a certain number of
bytes have passed through the tunnel, or perhaps after the tunnel have
been up for a certain number of seconds. But what if traffic is flowing
through the tunnel at the same time the tunnel's supposed to be torn
down? No fear - a new Security Association can be agreed upon while
the existing one is still in place.
Before configuring the IKE policy, make sure ISAKMP is enabled with the
crypto isakmp enable command. It's supposed to be on by default, but
we all know how that is!
R1(config)#crypto isakmp enable
To display the current IKE policies, run show crypto isakmp policy.
R1#show crypto isakmp policy
We're not going to use the default, however. We'll create a custom policy
with the crypto isakmp policy command. Policies can be assigned
priorities, as shown below by IOS Help. The lower the number, the higher
the priority, with 1 being the highest priority. There is no default.
R1(config)#crypto isakmp policy ?
<1-10000> Priority of protection suite
R1(config-isakmp)#authentication pre-share
The options for encryption are DES, AES, and 3DES (TDES). The default
is DES. We'll use 3DES.
R1(config-isakmp)#encryption ?
3des Three key triple DES
aes AES - Advanced Encryption Standard.
des DES - Data Encryption Standard (56 bit keys).
R1(config-isakmp)#encryption 3des
R1(config-isakmp)#group
The hash algorithm will be either MD5 or SHA. The default is SHA, so
we'll set the policy to MD5.
R1(config-isakmp)#hash ?
md5 Message Digest 5
sha Secure Hash Standard
R1(config-isakmp)#hash md5
R1(config-isakmp)#lifetime 42400
show crypto isakmp policy displays both policies on the router - the
default and the one we just wrote.
The exact same policy has been configured on R3. R1 and R3 are on the
same Serial segment, 172.12.12.0 /24, with their router number as the
last octet.
R3(config)#crypto isakmp policy 100
R3(config-isakmp)#hash md5
R3(config-isakmp)#lifetime 42400
R3(config-isakmp)#group 5
R3(config-isakmp)#authentication pre-share
R3(config-isakmp)#encryption 3des
When IKE Phase 1 negotiation begins, the initiator sends its policies to
the receiver. The receiver will then attempt to find a match for that policy
among its own policies, and the receiver starts this search with its lowest
numbered policy.
If that policy doesn't match, the receiver checks its next lowest numbered
policy. It's vital to remember that just because the first policy comparison
doesn't result in a match, the recipient will continue to search for a
match.
In the following example, R2 checks its own policies for a match with the
policy sent by the initiator, R1. R2 begins with its lowest-numbered policy,
100. That policy requires SHA and the incoming policy names MD5, so
there's no match.
R2 then checks its Policy 200, which requires DES, and that does not
match the incoming policy. Policy 300 matches all the
requirements, so the negotiation is successful.
You'd think that all five values would have to match for the negotiation to
be successful, but that's not quite true. Here's a list of the parameters
and what has to happen for successful negotiation.
Since our policies referred to preshared keys, we better create them! The
crypto isakmp key command does this. Along with the key itself, the IP
address of the remote peer must be configured.
R3#
IPSec SA Lifetimes
The default lifetime of an IPSec SA is 1 hour, but IOS Help reveals that the
command that changes this value on a global basis sets the IPSec SA
lifetime in seconds. Always use IOS Help to double-check the measuring
unit in use by any given command. The below command sets this value to
30 minutes (1800 seconds). The SA lifetime can also be based on
volume.
Remember way back when I mentioned that interesting traffic triggers the
IPSec process? We're finally getting to the part of IPSec that identifies
this interesting traffic - crypto access lists.
Crypto ACLs are used to define the traffic that is protected by IPSec.
While most of the Crypto ACLs you write will be configured to affect
outbound traffic, they can also be configured to affect inbound traffic.
Outbound crypto ACLs identify the traffic to be secured by IPSec, and
traffic not named by the crypto ACL will be sent in clear text.
Inbound crypto ACLs can identify traffic that should have been protected
by IPSec, but wasn't. Such traffic will be discarded.
Extended ACLs can serve as Crypto ACLs, but there's a major difference
in operation between the two.
From personal experience, I can tell you that the hardest part of writing
Crypto ACLs for IPSec peers is making sure they're symmetrical. Let's
use the following network to show you what I mean.
To have traffic on R1's ethernet segment protected by IPSec if it's
destined for the ethernet segment on R2, R1's ACL will look like this:
access-list 123 permit ip 172.10.1.0 0.0.0.255 172.10.5.0 0.0.0.255
We don't want the two ACLs to be an exact copy of each other - rather,
we need them to be mirror images, exact reverses of each other.
Once the Crypto ACLs are written, it's time to apply them to the
appropriate interfaces. That's just one purpose of a Crypto Map. Let's
look at the basic command to write a Crypto Map along with some
options, courtesy of IOS Help.
R3(config)#crypto map CCNP ?
<1-65535> Sequence to insert into crypto map entry
client Specify client configuration settings
isakmp Specify isakmp configuration settings
isakmp-profile Specify isakmp profile to use
local-address Interface to use for local address for this crypto map
R3(config)#int s0/1
R3(config-if)#crypto map CCNP
R3(config-if)#
*Mar 1 04:10:12.260: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
Before sending interesting traffic to start the entire process, we'll enable
debug crypto ipsec on R3 to allow us to see the details of the SA
negotiations. Near the bottom of the debug output, you can see that two
separate unidirectional SAs have been built.
R3#debug crypto ipsec
Crypto IPSEC debugging is on
R3#ping 172.12.12.1
By running show crypto isakmp sa, we can see that the SA is in place and
is active.
R2#show crypto isakmp sa
dst src state conn-id slot status
172.12.123.1 172.12.123.2 QM_IDLE 1 0 ACTIVE
To let you see what the IPSec process looks like when the SA expires, I
left the debug running until the one we built in this chapter expired.
sa_spi= 0x877193DD(2272367581),
sa_trans= ah-md5-hmac , sa_conn_id= 2004,
(identity) local= 172.12.123.2, remote= 172.12.123.1,
*Jun 7 00:50:10.090: IPSec: Flow_switching Deallocated flow for sibling
8000000
This is particularly true with IPSec, because three primary IPSec protocols
use ports that must not be blocked by ACLs:
Make sure your network's ACLs are not inadvertently blocking these ports
and protocol numbers anywhere you have IPSec running.
From the Create VPN Window that will appear by default, select Create
Site-To-Site VPN and then Launch the selected task. Always take a few
minutes to read SDM's great descriptions, especially when you're studying
for a certification exam.
The next window gives you the option of Quick Setup or the Step-by-Step
Wizard. In this lab, we'll select the Step-by-Step Wizard.
the type of peer for this VPN connection (typically "peer with static IP
address") and the IP address for that peer
IKE policy details - there are default IKE policies to choose from, but
you can't configure or change the details of these policies
In the next window, we're prompted for an IKE proposal. We could accept
the default proposal, but here I'll click Add to create a new IKE policy.
Here are the values we'll set in this proposal.
The new policy appears in the IKE Proposal window. Here's a real-world
tip for you - even though you just created that new policy, the default
policy will still be highlighted. Be sure to highlight the new policy before
clicking Next.
The next window is our Transform Set window. Again, we have a default
we can choose, and we'll do that in the next lab, but here I'll click Add to
add a new Transform Set.
Here's the Transform Set we'll use in this lab.
No extra charge for the reminder of the difference between Tunnel and
Transport mode! :)
After clicking OK and then Next, that Transform Set is selected. On the
next screen, we've got to decide what traffic will use this VPN. I've
entered it manually here, but you can also write an ACL to perform this
task.
Earlier in this section, I mentioned that each router in a VPN must have a
mirror image of the other's configuration, not an exact copy. This can be
a little tricky at the CLI, but in SDM we simply use the Generate Mirror
button at the very bottom of the Edit Site To Site VPN screen.
Since this is a lab, I'll defy SDM's warning and paste that config to the
peer. After doing so, we do need to do one more thing on the peer - apply
the crypto map to the interface!
Branch(config)#int fast 0/1
Branch(config-if)#crypto map SDM_CMAP_1
Branch(config-if)#
03:51:49: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON
Back in SDM, I clicked Test Tunnel on the Edit Site To Site VPN window,
and the tunnel is up.
Here's the output of show crypto ipsec sa on the SDM router. When you
see packet encaps and decaps, you're in business.
HQ#show crypto ipsec sa
interface: FastEthernet0/1
Crypto map tag: SDM_CMAP_1, local addr 10.2.1.1
protected vrf: (none)
local ident (addr/mask/prot/port): (172.31.1.0/255.255.255.0/0/0)
remote ident (addr/mask/prot/port): (10.10.10.0/255.255.255.0/0/0)
current_peer 10.2.1.2 port 500
PERMIT, flags={origin_is_acl,}
#pkts encaps: 29, #pkts encrypt: 29, #pkts digest: 29
#pkts decaps: 29, #pkts decrypt: 29, #pkts verify: 29
The latest IOS versions can't handle all multicast traffic, however.
Multicast traffic generated by OSPF and EIGRP can't be carried by basic
IPSec - we've got to run a combination of IPSec and GRE, commonly
called GRE over IPSec.
By combining GRE and IPSec, each protocol helps to compensate for the
other's limitation:
IPSec adds data integrity and confidentiality that GRE does not offer
GRE offers the ability to carry routing protocol traffic, which IPSec
does not offer
Why call it "GRE over IPSec" rather than "IPSec over GRE"? Because
the GRE encapsulation happens first, and then that encapsulation is
encapsulated again, by IPSec. In effect, we have a GRE tunnel inside an
IPSec tunnel.
Our old friends tunnel mode and transport mode are still around as well.
Interestingly enough, Cisco's website recommends the use of transport
mode over tunnel mode with GRE over IPSec. Using transport mode
results in less total overhead, and we're all in favor of that!
To review -
Just as with a site-to-site VPN, the crypto ACL indicates the traffic to
be encrypted
GRE over IPSec allows the transmission of dynamic routing protocol
multicast traffic
Whether you use the CLI or SDM, always make sure to apply the
crypto map to the interface!
Hey, that's enough talking about GRE over IPSec. Let's configure it with
SDM!
As always, we'll start by clicking the Configure button, and from there
choose VPN.
From the main VPN window, we'll select Site-to-Site VPN. The Site-to-
Site VPN window gives us two main choices:
When I choose the GRE over IPSec option, this illustration is shown.
After clicking Launch the selected task, we're given some reminders of
why we're using GRE - good review material for your exam, too!
The next screen asks us for some required GRE-over-IPSec information,
namely the tunnel source and destination and the address of the tunnel
itself. Note that for the source, we can specify either the interface or the
IP address, where the only option for destination is the IP address.
Did you notice the Details button in the previous screen? Clicking that
gives you quite a bit of information regarding that interface. We don't
have any of these features on this interface, but if we did, it's good
information to have in mind for the tunnel config.
Now back to the config! We're not going to create a backup tunnel, but
the next screen gives us the option to do so.
The next window prompts us for the pre-shared key or to indicate the use
of digital certificates.
The next window is the IKE Proposal selection area, and we'll accept the
default IKE policy.
The next window is the Transform Set selection area, and we'll accept the
default there as well.
We're then prompted to identify the routing protocol that will run over the
tunnel.
For EIGRP, for example, I'd suggest working with the delay option rather
than the other metrics as it's easier to get the result you want. With static
routing, you could alter the AD of the routes with the distance option.
We now have the option of tunneling all traffic, or using Split Tunneling to
send select traffic through the tunnel. We'll enable ST here and configure
traffic destined for 10.0.0.0 /8 to use the tunnel.
Real-world note: By default, using Split Tunneling with NAT and PAT on
the same router can cause problems. Cisco's website offers several
solutions to this issue, should you run into that problem in the real world.
At this point, the VPN is down, since we haven't configured the other side
of it!
We need an exact reverse of this configuration - a mirror image - to place
on the downstream router. SDM has a great tool to create this mirror at
the verrrrrry bottom of the screen - the Generate Mirror button!
Real-world note: If you can't find something in SDM, always look at the
very bottom of the screen.
After clicking Generate Mirror, we get that mirror configuration, along with
warnings about how this config should be used only as a guide and
should not be pasted into the remote router.
Since we're in a lab environment, I'm going to do just what they told me
not to do, and save this config and then paste it into the downstream
router.
After copying that config to the downstream router, I applied that crypto
map to the physical interface and created a tunnel interface manually:
interface Tunnel0
ip address 10.1.1.2 255.255.255.0
ip mtu 1420
tunnel source FastEthernet0/1
tunnel destination 10.2.1.1
Going back to the original router, the Edit Site-to-Site VPN screen shows
the VPN is now up.
It's Not On Your CCNA Security Exam, But It's Everywhere In Real-
World Networks. Read, And Enjoy!
Sounds easy enough! Seriously, the real benefit of Easy VPN is that
security policies written at the Server level can then be pushed out to
Clients. As a result, the Clients have the most up-to-date policies without
the network admins - that's you and me - having to visit them individually.
Quite a few different Cisco devices can act as Easy VPN Servers. I will not
list each here, but here are the more common ones:
The Easy VPN Remote device can be a Cisco router, PIX, or VPN
concentrator as well. "Easy VPN Remote" devices are often referred to
as "Easy VPN Clients", and that's how I'll refer to them for the rest of this
video. For your exam and when reading Cisco documentation, remember
that "Remote" and "Client" refer to the same device.
The basics of the VPN construction will look familiar at this point! First, the
Client will send ISAKMP proposals to the Server, and the Server responds
with the acceptance of a matching proposal. After the policy acceptance,
the ISAKMP SA is in place.
The next step is a little different from what we've seen in other VPNs. The
Server will now send a challenge to the Client, prompting the Client to
send a username and password to the Server.
We'll take a closer look at RADIUS and TACACS in another section, but
keep in mind that we can use these security protocols in addition to local
authentication.
Once the Client has successfully authenticated, the process enters Mode
configuration. At this stage, the Client requests the necessary
configuration details from the Server.
Split tunneling allows the Client to have a secure tunnel to the Server and
simultaneous non-secure connections to other networks.
After RRI, we're almost there! IPSec Quick Mode then negotiates the
IPSec SA, and we're all set.
We'll start our Easy VPN server config by clicking the VPN button in the
Configure section of SDM.
You'll see a list of topics under "VPN", and we'll select Easy VPN Server.
The description screen shows the following. Note the prerequisite task.
There's a link to enable AAA on that screen, so I'll click that. Note that the
Enable Easy VPN button is grayed out since AAA is not yet enabled.
After clicking the enable AAA link, we're presented with this message:
Welcome to the Easy VPN Server Wizard! Good exam review material on
this screen as well!
The Transform Set selection window is next, and we'll accept the default
there as well.
The next window prompts us for the group authorization method, and we'll
use local authentication only.
I like the summary description here. Actually, if you don't have a RADIUS
or TACACS server in your network, the local database is the only option
you have!
The Add Group Policy window opens to the following tab, and you can
see the information I entered for yourself. Note the pre-shared key
appears as a series of asterisks.
We'll enable Split Tunneling, which is disabled by default. When I clicked
that check box, the Enter the protected subnets selection window
enabled. I'll click Add and enter the 10.0.0.0 network with a wildcard
mask of 0.255.255.255.
The policy has been added.
At the bottom of this screen, note that you can specify an idle timer for the
tunnel.
After clicking Finish at the bottom of that screen, the commands are
delivered to the router, and the Easy VPN Server side of the configuration
is complete!
I'll enter the IP address of the Easy VPN Server, along with the group
name and password (which again appears only as a series of asterisks).
You can also test the connection from the Server side. Go to the Edit
Easy VPN Server screen....
.. and at the very bottom of the screen, select Test Easy VPN Server.
Click Start in the Troubleshooting VPN screen, and you'll get check marks
when all is well. If something isn't well, you'll get some great information
on the issue here. This is the first place I check when a VPN
configuration isn't working correctly.
You'll also receive the following confirmation that all is well.
Let's look at an SDM screen we haven't visited yet - the Monitor screen.
Just click the Monitor button at the top of SDM, and you're there.
This screen has buttons on the left-hand side as well. Naturally, we'll
select VPN Status.
The IPSec Tunnels tab verifies that the tunnel is up.
The Easy VPN Server tab verifies it as well, along with the number of
encrypted and decrypted packets.
The IKE SA tab shows the SA is in QM_IDLE mode, which is just what we
want!
Hot Spots And Gotchas
Data Confidentiality
Data Integrity
Data Origin Authentication
Anti-Replay Attack Protection
Tunnel Mode:
Transport Mode:
For the SA state, we want to see QM_IDLE as we did in one of our labs.
Two common messages indicating a configuration problem:
IKE Main Mode uses six packets, Aggressive Mode uses three.
In IKE Main Mode, the initiating party sends all of its policies to the remote
party. When the remote party receives those policies, it looks through its
own policies for a match to one of those it received.
The Diffie-Hellman protocol allows a set of peers to create and exchange
a shared secret key even though the connection between the two is
currently unsecured.
At the very beginning of the DH process, the two parties must agree on a
non-secret numeric value.
Split Tunneling allows some traffic to be protected via the tunnel and other
traffic to use an unencrypted connection. As we saw in SDM, Split
Tunneling is disabled by default.
Asymmetric Algorithms:
Symmetric Algorithms:
SDM VPNs
Quick Mode vs. Step-by-Step Wizard: Quick Mode will use default IKE
policies and transform sets. You'll still be prompted for information
regarding the origination and termination points of the VPN, the IP
address of the remote peer, and other basic VPN information.