2003 Cisco Systems Inc All rights 2003 reserved

  • Slides: 159
Download presentation
© 2003, Cisco Systems, Inc. All rights © 2003, reserved. Cisco Systems, Inc. All

© 2003, Cisco Systems, Inc. All rights © 2003, reserved. Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -1 1

Module 6 Router Site-to-site VPN © 2003, Cisco Systems, Inc. All rights reserved. FNS

Module 6 Router Site-to-site VPN © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -2

Learning Objectives Upon completion of this chapter, the student will be able to perform

Learning Objectives Upon completion of this chapter, the student will be able to perform the following tasks: • Configure a Cisco router for IKE using pre-shared keys. • Configure a Cisco router for IPSec using pre-shared keys. • Verify the IKE and IPSec configuration. • Explain the issues regarding configuring IPSec manually and using RSA encrypted nonces. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -3

Learning Objectives Upon completion of this chapter, the student will be able to complete

Learning Objectives Upon completion of this chapter, the student will be able to complete the following tasks: • Identify the CA vendor products that support Cisco VPN products. • Configure a Cisco router for CA support. • Configure a Cisco router for IKE using RSA signatures. • Configure a Cisco router for IPSec using RSA signatures. • Verify the IKE and IPSec configuration. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -4

Overview This module primarily covers the Virtual Private Network (VPN) protocols available in Cisco

Overview This module primarily covers the Virtual Private Network (VPN) protocols available in Cisco IOS routers. A VPN provides the same network connectivity for remote users over a public infrastructure, as they would have over a private network. However, before allowing a user to access a network, certain measures must be taken to ensure authenticity, data integrity, and encryption. In this module, the student will learn about each of these measures and also will be provided with an introduction to the two basic VPN types: Remote Access and LAN-to. LAN. This module will focus on LAN-to-LAN (or site-tosite) VPN. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -5

Key terms • VPN • GRE • L 2 TP • IPSec • Digital

Key terms • VPN • GRE • L 2 TP • IPSec • Digital Certificates • Hash • Encryption © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -6

Virtual Private Networks © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

Virtual Private Networks © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -7

VPN Definition Virtual private network (VPN)—an encrypted connection between private networks over a public

VPN Definition Virtual private network (VPN)—an encrypted connection between private networks over a public network such as the Internet © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -8

Cisco’s VPN Portfolio Summary © 2003, Cisco Systems, Inc. All rights reserved. FNS 1.

Cisco’s VPN Portfolio Summary © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -9

Remote Access VPNs © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

Remote Access VPNs © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -10

Site-to-Site VPNs Site-to-Site VPN—Extension of classic WAN © 2003, Cisco Systems, Inc. All rights

Site-to-Site VPNs Site-to-Site VPN—Extension of classic WAN © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -11

Site-to-Site VPNs—Cisco Routers © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

Site-to-Site VPNs—Cisco Routers © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -12

VPN Technology Options © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

VPN Technology Options © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -13

GRE © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -14

GRE © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -14

IOS Cryptosystem © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6

IOS Cryptosystem © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -15

Diffie-Hellman (DH) Key Exchange Terry public key B + private key A shared secret

Diffie-Hellman (DH) Key Exchange Terry public key B + private key A shared secret key (BA) Key = Key Alex public key A + private key B shared secret key (AB) Protocol Messages Data Traffic Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars Decrypt 4 eh. IDx 67 NMop 9 e. R U 78 IOPot. VBn 45 TR © 2003, Cisco Systems, Inc. All rights reserved. Decrypt Internet Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars 4 eh. IDx 67 NMop 9 e. R U 78 IOPot. VBn 45 TR FNS 1. 0— 6 -16

Diffie-Hellman Key Exchange Peer A Peer B 1. Generate large integer p. Send p

Diffie-Hellman Key Exchange Peer A Peer B 1. Generate large integer p. Send p to Peer B. Receive q. Generate g. 1. Generate large integer q. Send q to Peer A. Receive p. Generate g. 2. Generate private key XA 2. Generate private key XB 3. Generate public key YA = g ^ XA mod p 3. Generate public key YB = g ^ XB mod p 4. Send public key YA 4. Send public key YB 5. Generate shared secret number ZZ = YB^ XA mod p 5. Generate shared secret number ZZ = YA^ XB mod p 6. Generate shared secret key from ZZ (56 -bit for DES, 168 -bit for 3 DES) © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -17

RSA Encryption Local Remote Key Remote’s public key Pay to Terry Smith $100. 00

RSA Encryption Local Remote Key Remote’s public key Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars Remote’s private key Decrypt Encrypt Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars KJklze. Aid. Jfdlwiej 47 Dl. Itfd 578 MNSb. Xo. E © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -18

Encryption Algorithms Key Encryption key Pay to Terry Smith $100. 00 One Hundred and

Encryption Algorithms Key Encryption key Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars Key Decryption key Decrypt Encrypt Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars 4 eh. IDx 67 NMop 9 e. R U 78 IOPot. VBn 45 TR Encryption algorithms • DES • 3 DES • AES © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -19

Data Integrity Yes, I am Alex Jones Internet Pay to Terry Smith $100. 00

Data Integrity Yes, I am Alex Jones Internet Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars 4 eh. IDx 67 NMop 9 Pay to Alex Jones $1000. 00 One Thousand xx/100 Dollars 12 ehq. Px 67 NMo. X Match = No changes No match = Alterations © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -20

Hashed Message Authentication Codes (HMAC) Local Remote Received message Variable-length input message Pay to

Hashed Message Authentication Codes (HMAC) Local Remote Received message Variable-length input message Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars Shared secret key Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars 1 Hash function 4 eh. IDx 67 NMop 9 Shared secret key Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars 4 eh. IDx 67 NMop 9 2 4 eh. IDx 67 NMop 9 Message + hash © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -21

HMAC Algorithms Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars HMAC

HMAC Algorithms Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars HMAC algorithms • HMAC-MD 5 Hash function • HMAC-SHA-1 4 eh. IDx 67 NMop 9 © 2003, Cisco Systems, Inc. All rights reserved. Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars 4 eh. IDx 67 NMop 9 FNS 1. 0— 6 -22

Digital Signatures Remote Local Pay to Terry Smith $100. 00 One Hundred and xx/100

Digital Signatures Remote Local Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars 4 eh. IDx 67 NMop 9 Encryption algorithm Private key Internet Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars 4 eh. IDx 67 NMop 9 Decryption algorithm Hash Match Hash Public key Hash algorithm Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -23

IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -24

IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -24

What Is IPSec? Main site Business partner with a Cisco router IPSec POP Regional

What Is IPSec? Main site Business partner with a Cisco router IPSec POP Regional office with a PIX Firewall SOHO with a Cisco ISDN/DSL router Perimeter router VPN Concentrator Mobile worker with a Cisco VPN Client on a laptop computer PIX Firewall Corporate • IPSec acts at the network layer protecting and authenticating IP packets – Framework of open standards - algorithm independent – Provides data confidentiality, data integrity, and origin authentication © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -25

IPSec Security Services • Confidentiality • Data integrity • Origin authentication • Anti-replay protection

IPSec Security Services • Confidentiality • Data integrity • Origin authentication • Anti-replay protection © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -26

Confidentiality (Encryption) This quarterly report does not look so good. Hmmm. . y ff

Confidentiality (Encryption) This quarterly report does not look so good. Hmmm. . y ff b 15% so Server ng rni Ea Internet © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -27

Peer Authentication Remote office Corporate Office Internet HR servers Peer authentication methods: • Pre-shared

Peer Authentication Remote office Corporate Office Internet HR servers Peer authentication methods: • Pre-shared keys • RSA signatures • RSA encrypted nonces © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -28

Pre-Shared Keys Local Peer Auth. Key Remote Router + ID Information Auth. Key Hash

Pre-Shared Keys Local Peer Auth. Key Remote Router + ID Information Auth. Key Hash + ID Information Hash Internet Authenticating hash (Hash_I) © 2003, Cisco Systems, Inc. All rights reserved. Computed hash (Hash) = Received hash (Hash_I) FNS 1. 0— 6 -29

RSA Signatures Remote Local + ID Auth. key Information + ID Information Hash Private

RSA Signatures Remote Local + ID Auth. key Information + ID Information Hash Private key Digital signature Hash_I 2 Hash 1 Encryption algorithm Digital cert Hash + Digital signature © 2003, Cisco Systems, Inc. All rights reserved. Internet = Decryption algorithm Public key Hash_I Digital cert FNS 1. 0— 6 -30

RSA Encrypted Nonces Local Peer Auth. key Remote Router + ID Information Auth. key

RSA Encrypted Nonces Local Peer Auth. key Remote Router + ID Information Auth. key Hash + ID Information Hash Internet Authenticating hash (Hash_I) © 2003, Cisco Systems, Inc. All rights reserved. Computed hash (Hash_I) = Received hash (Hash_I) FNS 1. 0— 6 -31

IPSec Security Protocols © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

IPSec Security Protocols © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -32

Modes of Use—Tunnel versus Transport Mode © 2003, Cisco Systems, Inc. All rights reserved.

Modes of Use—Tunnel versus Transport Mode © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -33

Modes of Use—Tunnel versus Transport Mode IP HDR Data Transport mode IP HDR ESP

Modes of Use—Tunnel versus Transport Mode IP HDR Data Transport mode IP HDR ESP HDR Data ESP Trailer Auth Encrypted Authenticated Tunnel mode New IP HDR ESP HDR IP HDR Data ESP Trailer Auth Encrypted Authenticated © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -34

Tunnel Mode Remote office Corporate office Internet HR servers Tunnel mode Corporate office Home

Tunnel Mode Remote office Corporate office Internet HR servers Tunnel mode Corporate office Home office Internet HR servers Tunnel mode © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -35

IPSec Protocol—Framework IPSec Framework Choices: IPSec Protocol ESP +AH Encryption DES 3 DES Authentication

IPSec Protocol—Framework IPSec Framework Choices: IPSec Protocol ESP +AH Encryption DES 3 DES Authentication MD 5 SHA Diffie-Hellman DH 1 DH 2 © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -36

Five Steps of IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1.

Five Steps of IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -37

Step 1—Interesting Traffic Host A Router A 10. 0. 1. 3 Router B Apply

Step 1—Interesting Traffic Host A Router A 10. 0. 1. 3 Router B Apply IPSec Host B 10. 0. 2. 3 Bypass IPSec Discard © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -38

Step 2—IKE Phase 1 Host A Router A IKE Phase 1: main mode exchange

Step 2—IKE Phase 1 Host A Router A IKE Phase 1: main mode exchange 10. 0. 1. 3 Host B Router B 10. 0. 2. 3 Negotiate the policy Diffie-Hellman exchange Verify the peer identity © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -39

IKE Transform Sets Host A Router B Negotiate IKE Proposals 10. 0. 1. 3

IKE Transform Sets Host A Router B Negotiate IKE Proposals 10. 0. 1. 3 Transform 10 DES MD 5 pre-share DH 1 lifetime IKE Policy Sets Host B 10. 0. 2. 3 Transform 15 DES MD 5 pre-share DH 1 lifetime Transform 20 3 DES SHA pre-share DH 1 lifetime • Negotiates matching IKE transform sets to protect IKE exchange © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -40

Diffie-Hellman Key Exchange Terry public key B + private key A shared secret key

Diffie-Hellman Key Exchange Terry public key B + private key A shared secret key (BA) Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars = Key Decrypt Encrypt 4 eh. IDx 67 NMop 9 e. R U 78 IOPot. VBn 45 TR © 2003, Cisco Systems, Inc. All rights reserved. Key Alex public key A + private key B shared secret key (AB) Internet Pay to Terry Smith $100. 00 One Hundred and xx/100 Dollars 4 eh. IDx 67 NMop 9 e. R U 78 IOPot. VBn 45 TR FNS 1. 0— 6 -41

Authenticate Peer Identity Remote office Corporate office Internet HR servers Peer authentication methods •

Authenticate Peer Identity Remote office Corporate office Internet HR servers Peer authentication methods • Pre-shared keys • RSA signatures • RSA encrypted nonces © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -42

Step 3—IKE Phase 2 Host A Router A 10. 0. 1. 3 © 2003,

Step 3—IKE Phase 2 Host A Router A 10. 0. 1. 3 © 2003, Cisco Systems, Inc. All rights reserved. Router B Negotiate IPSec security parameters Host B 10. 0. 2. 3 FNS 1. 0— 6 -43

IPSec Transform Sets Host A Router B Negotiate transform sets 10. 0. 1. 3

IPSec Transform Sets Host A Router B Negotiate transform sets 10. 0. 1. 3 Host B 10. 0. 2. 3 Transform set 30 Transform set 55 ESP 3 DES SHA Tunnel Lifetime Transform set 40 ESP DES MD 5 Tunnel Lifetime © 2003, Cisco Systems, Inc. All rights reserved. IPSec Transform Sets • A transform set is a combination of algorithms and protocols that enact a security policy for traffic. FNS 1. 0— 6 -44

Security Association © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6

Security Association © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -45

Security Association Lifetime Data-based © 2003, Cisco Systems, Inc. All rights reserved. Time-based FNS

Security Association Lifetime Data-based © 2003, Cisco Systems, Inc. All rights reserved. Time-based FNS 1. 0— 6 -46

Step 4—IPSec Session Host A Router B Host B IPSec session • SAs are

Step 4—IPSec Session Host A Router B Host B IPSec session • SAs are exchanged between peers. • The negotiated security services are applied to the traffic. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -47

Step 5—Tunnel Termination Host A Router B Host B IPSec tunnel • A tunnel

Step 5—Tunnel Termination Host A Router B Host B IPSec tunnel • A tunnel is terminated – By an SA lifetimeout – If the packet counter is exceeded • Removes IPSec SA © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -48

Site-to-Site VPN using Pre-shared Keys © 2003, Cisco Systems, Inc. All rights reserved. FNS

Site-to-Site VPN using Pre-shared Keys © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -49

Tasks to Configure IPSec Encryption Task 1—Prepare for IKE and IPSec. Task 2—Configure IKE.

Tasks to Configure IPSec Encryption Task 1—Prepare for IKE and IPSec. Task 2—Configure IKE. Task 3—Configure IPSec. Task 4—Test and Verify IPSec. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -50

Task 1—Prepare for IKE and IPSec © 2003, Cisco Systems, Inc. All rights reserved.

Task 1—Prepare for IKE and IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -51

Task 1—Prepare for IKE and IPSec Step 1—Determine IKE (IKE phase one) policy. Step

Task 1—Prepare for IKE and IPSec Step 1—Determine IKE (IKE phase one) policy. Step 2—Determine IPSec (IKE phase two) policy. Step 3—Check the current configuration. show running-configuration show crypto isakmp policy show crypto map Step 4—Ensure the networks without encryption. ping Step 5—Ensure access lists are compatible with IPSec. show access-lists © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -52

Step 1—Determine IKE (IKE Phase One) Policy Determine the following policy details: Ö Key

Step 1—Determine IKE (IKE Phase One) Policy Determine the following policy details: Ö Key distribution method Ö Authentication method Ö IPSec peer IP addresses and hostnames Ö IKE phase 1 policies for all peers - Encryption algorithm - Hash algorithm - IKE SA lifetime Goal: Minimize misconfiguration. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -53

IKE Phase One Policy Parameters Parameter Stronger Encryption Algorithm DES 3 -DES Hash Algorithm

IKE Phase One Policy Parameters Parameter Stronger Encryption Algorithm DES 3 -DES Hash Algorithm MD 5 SHA-1 Authentication Method Pre-share RSA Encryption RSA Signature Key Exchange D-H Group 1 D-H Group 2 IKE SA Lifetime 86400 seconds <86400 seconds © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -54

IKE Policy Example Site 1 Site 2 Router. A 10. 0. 1. 3 Internet

IKE Policy Example Site 1 Site 2 Router. A 10. 0. 1. 3 Internet Router. B B A E 0/1 172. 30. 1. 2 E 0/1 172. 30. 2. 2 10. 0. 2. 3 Site 2 Parameter Site 1 Encryption Algorithm DES Hash Algorithm MD 5 Authentication Method Pre-shared keys Key Exchange 768 -bit D-H IKE SA Lifetime 86400 seconds Peer IP Address 172. 30. 2. 2 172. 30. 1. 2 © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -55

Step 2—Determine IPSec (IKE Phase Two) Policy Determine the following policy details: Ö IPSec

Step 2—Determine IPSec (IKE Phase Two) Policy Determine the following policy details: Ö IPSec algorithms and parameters for optimal security and performance Ö Transforms and, if necessary, transform sets Ö IPSec peer details Ö IP address and applications of hosts to be protected Ö Manual or IKE-initiated SAs Goal: Minimize misconfiguration. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -56

IPSec Transforms Supported in Cisco IOS Software Cisco IOS software supports the following IPSec

IPSec Transforms Supported in Cisco IOS Software Cisco IOS software supports the following IPSec transforms: Router. A(config)# crypto ipsec transform-set-name ? ah-md 5 -hmac AH-HMAC-MD 5 transform ah-sha-hmac AH-HMAC-SHA transform esp-3 des ESP transform using 3 DES(EDE) cipher (168 bits) esp-des ESP transform using DES cipher (56 bits) esp-md 5 -hmac ESP transform using HMAC-MD 5 auth esp-sha-hmac ESP transform using HMAC-SHA auth esp-null ESP transform w/o cipher © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -57

IPSec Policy Example Site 1 Site 2 Router. A 10. 0. 1. 3 Internet

IPSec Policy Example Site 1 Site 2 Router. A 10. 0. 1. 3 Internet Router. B B A E 0/1 172. 30. 1. 2 E 0/1 172. 30. 2. 2 10. 0. 2. 3 Policy Site 1 Site 2 Transform set ESP-DES, Tunnel Peer hostname Router. B Router. A Peer IP address 172. 30. 2. 2 172. 30. 1. 2 Hosts to be encrypted 10. 0. 1. 3 10. 0. 2. 3 Traffic (packet) type to be encrypted TCP SA establishment ipsec-isakmp © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -58

Identify IPSec Peers Cisco router Remote user with Cisco VPN Client Cisco PIX Firewall

Identify IPSec Peers Cisco router Remote user with Cisco VPN Client Cisco PIX Firewall Cisco router Other vendor’s IPSec peers © 2003, Cisco Systems, Inc. All rights reserved. CA server FNS 1. 0— 6 -59

Step 3—Check Current Configuration Site 1 Site 2 Router. A 10. 0. 1. 3

Step 3—Check Current Configuration Site 1 Site 2 Router. A 10. 0. 1. 3 router# Internet A 172. 30. 1. 2 Router. B B 172. 30. 2. 2 10. 0. 2. 3 show running-config • View router configuration for existing IPSec policies. router# show crypto isakmp policy • View default and any configured IKE phase one policies. Router. A# show crypto isakmp policy Default protection suite encryption algorithm: DES - Data Encryption Standard (56 bit keys) hash algorithm: Secure Hash Standard authentication method: Rivest-Shamir-Adleman Signature Diffie-Hellman Group: #1 (768 bit) lifetime: 86400 seconds, no volume limit © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -60

Step 3—Check Current Configuration (cont. ) Site 1 Site 2 Router. A 10. 0.

Step 3—Check Current Configuration (cont. ) Site 1 Site 2 Router. A 10. 0. 1. 3 Internet A 172. 30. 1. 2 Router. B B 172. 30. 2. 2 10. 0. 2. 3 router# show crypto map • View any configured crypto maps. Router. A# show crypto map Crypto Map "mymap" 10 ipsec-isakmp Peer = 172. 30. 2. 2 Extended IP access list 102 access-list 102 permit ip host 172. 30. 1. 2 host 172. 30. 2. 2 Current peer: 172. 30. 2. 2 Security association lifetime: 4608000 kilobytes/3600 seconds PFS (Y/N): N Transform sets={ mine, } © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -61

Step 3—Check Current Configuration (cont. ) Site 1 Site 2 Router. A 10. 0.

Step 3—Check Current Configuration (cont. ) Site 1 Site 2 Router. A 10. 0. 1. 3 Internet Router. B B A 172. 30. 1. 2 172. 30. 2. 2 10. 0. 2. 3 router# show crypto ipsec transform-set • View any configured transform sets. Router. A# show crypto ipsec transform-set mine Transform set mine: { esp-des } will negotiate = { Tunnel, }, © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -62

Step 4—Ensure the Network Works Cisco Router. B 172. 30. 2. 2 Remote user

Step 4—Ensure the Network Works Cisco Router. B 172. 30. 2. 2 Remote user with Cisco Unified VPN client Cisco PIX Firewall Cisco router Cisco Router. A 172. 30. 1. 2 Other vendor’s IPSec peers CA server Router. A# ping 172. 30. 2. 2 © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -63

Step 5—Ensure Access Lists are Compatible with IPSec IKE AH ESP Site 1 Router.

Step 5—Ensure Access Lists are Compatible with IPSec IKE AH ESP Site 1 Router. A 10. 0. 1. 3 Internet A E 0/1 172. 30. 1. 2 Site 2 Router. B B E 0/1 172. 30. 2. 2 10. 0. 2. 3 Router. A# show access-lists access-list 102 permit ahp host 172. 30. 2. 2 host 172. 30. 1. 2 access-list 102 permit esp host 172. 30. 2. 2 host 172. 30. 1. 2 access-list 102 permit udp host 172. 30. 2. 2 host 172. 30. 1. 2 eq isakmp • Ensure protocols 50 and 51, and UDP port 500 traffic are not blocked at interfaces used by IPSec. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -64

Task 2—Configure IKE © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

Task 2—Configure IKE © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -65

Task 2—Configure IKE Step 1—Enable or disable IKE. crypto isakmp enable Step 2—Create IKE

Task 2—Configure IKE Step 1—Enable or disable IKE. crypto isakmp enable Step 2—Create IKE policies. crypto isakmp policy Step 3—Configure pre-shared keys. crypto isakmp key Step 4—Verify the IKE configuration. show crypto isakmp policy © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -66

Step 1—Enable or Disable IKE Site 1 Site 2 Router. A 10. 0. 1.

Step 1—Enable or Disable IKE Site 1 Site 2 Router. A 10. 0. 1. 3 Internet A 172. 30. 1. 2 Router. B B 172. 30. 2. 2 10. 0. 2. 3 router(config)# [no] crypto isakmp enable Router. A(config)# no crypto isakmp enable Router. A(config)# crypto isakmp enable • Globally enables or disables IKE at your router. • IKE is enabled by default. • IKE is enabled globally for all interfaces at the router. • Use the no form of the command to disable IKE. • An ACL can be used to block IKE on a particular interface. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -67

Step 2—Create IKE Policies Site 1 Site 2 Router. A 10. 0. 1. 3

Step 2—Create IKE Policies Site 1 Site 2 Router. A 10. 0. 1. 3 Internet A 172. 30. 1. 2 Router. B B 172. 30. 2. 2 10. 0. 2. 3 router(config)# crypto isakmp policy priority • Defines an IKE policy, which is a set of parameters used during IKE negotiation. • Invokes the config-isakmp command mode. Router. A(config)# crypto isakmp policy 110 © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -68

Create IKE Policies with the crypto isakmp Command Site 1 Site 2 Router. A

Create IKE Policies with the crypto isakmp Command Site 1 Site 2 Router. A 10. 0. 1. 3 Router. B Internet B A Policy 110 DES MD 5 Pre-Share 86400 172. 30. 2. 2 10. 0. 2. 3 Tunnel router(config)# crypto isakmp policy priority • Defines the parameters within the IKE policy 110. Router. A(config)# crypto Router. A(config-isakmp)# © 2003, Cisco Systems, Inc. All rights reserved. isakmp policy 110 authentication pre-share encryption des group 1 hash md 5 lifetime 86400 FNS 1. 0— 6 -69

IKE Policy Negotiation Site 1 Site 2 Router. A 10. 0. 1. 3 A

IKE Policy Negotiation Site 1 Site 2 Router. A 10. 0. 1. 3 A Internet Router. B B 10. 0. 2. 3 Router. A(config)# Router. B(config)# crypto isakmp policy 100 hash md 5 authentication pre-share crypto isakmp policy 200 authentication rsa-sig hash sha crypto isakmp policy 300 authentication pre-share hash md 5 crypto isakmp policy 100 hash md 5 authentication pre-share crypto isakmp policy 200 authentication rsa-sig hash sha crypto isakmp policy 300 authentication rsa-sig hash md 5 • The first two policies in each router can be successfully negotiated while the last one can not. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -70

Step 3—Configure ISAKMP Identity Site 1 Site 2 Router. A 10. 0. 1. 3

Step 3—Configure ISAKMP Identity Site 1 Site 2 Router. A 10. 0. 1. 3 Internet Router. B B A 172. 30. 1. 2 172. 30. 2. 2 10. 0. 2. 3 router(config)# crypto isakmp identity {address | hostname} • Defines whether ISAKMP identity is done by IP address or hostname. • Use consistently across ISAKMP peers. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -71

Step 3—Configure Pre-Shared Keys Site 1 Site 2 Router. A 10. 0. 1. 3

Step 3—Configure Pre-Shared Keys Site 1 Site 2 Router. A 10. 0. 1. 3 Internet A Pre-shared key Cisco 1234 Router. B B 10. 0. 2. 3 172. 30. 2. 2 router(config)# crypto isakmp keystring address peer-address router(config)# crypto isakmp keystring hostname Router. A(config)# crypto isakmp key cisco 1234 address 172. 30. 2. 2 • Assigns a keystring and the peer address. • The peer’s IP address or host name can be used. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -72

Step 4—Verify the IKE Configuration Site 1 Site 2 Router. A 10. 0. 1.

Step 4—Verify the IKE Configuration Site 1 Site 2 Router. A 10. 0. 1. 3 Internet A Router. B B 10. 0. 2. 3 Router. A# show crypto isakmp policy Protection suite of priority 110 encryption algorithm: DES - Data Encryption Standard (56 bit keys). hash algorithm: Message Digest 5 authentication method: Pre-Shared Key Diffie-Hellman group: #1 (768 bit) lifetime: 86400 seconds, no volume limit Default protection suite encryption algorithm: DES - Data Encryption Standard (56 bit keys). hash algorithm: Secure Hash Standard authentication method: Rivest-Shamir-Adleman Signature Diffie-Hellman group: #1 (768 bit) lifetime: 86400 seconds, no volume limit • Displays configured and default IKE policies. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -73

Task 3—Configure IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

Task 3—Configure IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -74

Task 3—Configure IPSec Step 1—Configure transform set suites. crypto ipsec transform-set Step 2—Configure global

Task 3—Configure IPSec Step 1—Configure transform set suites. crypto ipsec transform-set Step 2—Configure global IPSec SA lifetimes. crypto ipsec security-association lifetime Step 3—Create crypto access lists. access-list © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -75

Task 3—Configure IPSec (cont. ) Step 4—Create crypto maps. crypto map Step 5—Apply crypto

Task 3—Configure IPSec (cont. ) Step 4—Create crypto maps. crypto map Step 5—Apply crypto maps to interfaces. interface serial 0 crypto map © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -76

Step 1—Configure Transform Set Suites © 2003, Cisco Systems, Inc. All rights reserved. FNS

Step 1—Configure Transform Set Suites © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -77

Configure Transform Sets Site 1 Site 2 Router. A 10. 0. 1. 3 A

Configure Transform Sets Site 1 Site 2 Router. A 10. 0. 1. 3 A Mine esp-des Tunnel Internet Router. B B 10. 0. 2. 3 router(config)# crypto ipsec transform-set-name transform 1 [transform 2 [transform 3]] router(cfg-crypto-trans)# Router. A(config)# crypto ipsec transform-set mine des • A transform set is a combination of IPSec transforms that enact a security policy for traffic. • Sets are limited to up to one AH and up to two ESP transforms. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -78

Transform Set Negotiation Site 1 Site 2 Router. A 10. 0. 1. 3 Internet

Transform Set Negotiation Site 1 Site 2 Router. A 10. 0. 1. 3 Internet Router. B B A 10. 0. 2. 3 transform-set 10 esp-3 des tunnel transform-set 40 esp-des tunnel transform-set 20 esp-des, esp-md 5 -hmac tunnel transform-set 50 esp-des, ah-sha-hmac tunnel transform-set 30 esp-3 des, esp-sha-hmac tunnel transform-set 60 esp-3 des, esp-sha-hmac tunnel Match • Transform sets are negotiated during IKE phase two. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -79

Step 2—Configure Global IPSec Security Association Lifetimes © 2003, Cisco Systems, Inc. All rights

Step 2—Configure Global IPSec Security Association Lifetimes © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -80

The crypto ipsec securityassociation lifetime Command Site 1 Site 2 Router. A 10. 0.

The crypto ipsec securityassociation lifetime Command Site 1 Site 2 Router. A 10. 0. 1. 3 A Internet Router. B B 10. 0. 2. 3 router(config)# crypto ipsec security-association lifetime {seconds | kilobytes} Router. A(config)# crypto ipsec security-association lifetime 86400 • Configures global IPSec SA lifetime values used when negotiating IPSec security associations. • IPSec SA lifetimes are negotiated during IKE phase two. • Can optionally configure interface specific IPSec SA lifetimes in crypto maps. • IPSec SA lifetimes in crypto maps override global IPSec SA lifetimes. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -81

Global Security Association Lifetime Examples Router. A(config)# crypto ipsec security-association lifetime kilobytes 1382400 Router.

Global Security Association Lifetime Examples Router. A(config)# crypto ipsec security-association lifetime kilobytes 1382400 Router. A(config)# crypto ipsec security-association lifetime seconds 2700 • When a security association expires, a new one is negotiated without interrupting the data flow. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -82

Step 3—Create Crypto ACLs © 2003, Cisco Systems, Inc. All rights reserved. FNS 1.

Step 3—Create Crypto ACLs © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -83

Purpose of Crypto Access Lists Site 1 Router. A Internet A Outbound traffic Encrypt

Purpose of Crypto Access Lists Site 1 Router. A Internet A Outbound traffic Encrypt Bypass (clear text) Permit Bypass Inbound traffic Discard (clear text) • Outbound—Indicate the data flow to be protected by IPSec. • Inbound—filter out and discard traffic that should have been protected by IPSec. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -84

Extended IP Access Lists for Crypto Access Lists Site 1 Site 2 Router. A

Extended IP Access Lists for Crypto Access Lists Site 1 Site 2 Router. A Internet B A 10. 0. 1. 3 10. 0. 1. 0 Router. B Encrypt 10. 0. 2. 3 10. 0. 2. 0 router(config)# access-list-number [dynamic-name [timeout minutes]] {deny | permit} protocol source-wildcard destination-wildcard [precedence][tos tos] [log] Router. A(config)# access-list 110 permit tcp 10. 0. 1. 0 0. 0. 0. 255 10. 0. 2. 0 0. 0. 0. 255 • Define which IP traffic will be protected by crypto. • Permit = encrypt / Deny = do not encrypt. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -85

Configure Symmetrical Peer Crypto Access Lists Site 1 Site 2 Router. A 10. 0.

Configure Symmetrical Peer Crypto Access Lists Site 1 Site 2 Router. A 10. 0. 1. 3 Internet A E 0/1 172. 30. 1. 2 Router. A(config)# access-list 110 permit tcp 10. 0. 1. 0 0. 0. 0. 255 10. 0. 2. 0 0. 0. 0. 255 Router. B B E 0/1 172. 30. 2. 2 10. 0. 2. 3 Router. B(config)# access-list 101 permit tcp 10. 0. 2. 0 0. 0. 0. 255 10. 0. 1. 0 0. 0. 0. 255 • You must configure mirror image ACLs. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -86

Step 4—Create Crypto Maps © 2003, Cisco Systems, Inc. All rights reserved. FNS 1.

Step 4—Create Crypto Maps © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -87

Purpose of Crypto Maps Crypto maps pull together the various parts configured for IPSec,

Purpose of Crypto Maps Crypto maps pull together the various parts configured for IPSec, including • Which traffic should be protected by IPSec. • The granularity of the traffic to be protected by a set of SAs. • Where IPSec-protected traffic should be sent. • The local address to be used for the IPSec traffic. • What IPSec type should be applied to this traffic. • Whether SAs are established (manually or via IKE). • Other parameters needed to define an IPSec SA. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -88

Crypto Map Parameters Site 1 Site 2 Router. A 10. 0. 1. 3 Router.

Crypto Map Parameters Site 1 Site 2 Router. A 10. 0. 1. 3 Router. B Internet B A 10. 0. 2. 3 Crypto maps define the following: • The access list to be used. • Remote VPN peers. • Transform-set to be used. • Key management method. • Security-association lifetimes. © 2003, Cisco Systems, Inc. All rights reserved. Crypto map Encrypted traffic Router interface FNS 1. 0— 6 -89

Configure IPSec Crypto Maps Site 1 Site 2 Router. A 10. 0. 1. 3

Configure IPSec Crypto Maps Site 1 Site 2 Router. A 10. 0. 1. 3 Internet Router. B A B 10. 0. 2. 3 router(config)# crypto map-name seq-num ipsec-manual crypto map-name seq-num ipsec-isakmp [dynamic-map-name] Router. A(config)# crypto map mymap 110 ipsec-isakmp • Use a different sequence number for each peer. • Multiple peers can be specified in a single crypto map for redundancy. • One crypto map per interface © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -90

Example Crypto Map Commands Site 1 10. 0. 1. 3 Site 2 Router. A

Example Crypto Map Commands Site 1 10. 0. 1. 3 Site 2 Router. A Router. B A B Internet 172. 30. 2. 2 10. 0. 2. 3 Router. C B Router. A(config)# crypto map Router. A(config-crypto-map)# 172. 30. 3. 2 mymap 110 ipsec-isakmp match address 110 set peer 172. 30. 2. 2 set peer 172. 30. 3. 2 set pfs group 1 set transform-set mine set security-association lifetime 86400 • Multiple peers can be specified for redundancy. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -91

Step 5—Apply Crypto Maps to Interfaces © 2003, Cisco Systems, Inc. All rights reserved.

Step 5—Apply Crypto Maps to Interfaces © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -92

Applying Crypto Maps to Interfaces Site 1 Site 2 Router. A Internet B A

Applying Crypto Maps to Interfaces Site 1 Site 2 Router. A Internet B A 10. 0. 1. 3 E 0/1 172. 30. 1. 2 Router. B 10. 0. 2. 3 E 0/1 172. 30. 2. 2 mymap router(config-if)# crypto map-name Router. A(config)# interface ethernet 0/1 Router. A(config-if)# crypto map mymap • Apply the crypto map to outgoing interface • Activates the IPSec policy © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -93

IPSec Configuration Examples Site 1 Site 2 Router. A 10. 0. 1. 3 Internet

IPSec Configuration Examples Site 1 Site 2 Router. A 10. 0. 1. 3 Internet A E 0/1 172. 30. 1. 2 Router. A# show running config crypto ipsec transform-set mine esp-des ! crypto map mymap 10 ipsec-isakmp set peer 172. 30. 2. 2 set transform-set mine match address 110 ! interface Ethernet 0/1 ip address 172. 30. 1. 2 255. 0 no ip directed-broadcast crypto map mymap ! access-list 110 permit tcp 10. 0. 1. 0 0. 0. 0. 255 10. 0. 2. 0 0. 0. 0. 255 © 2003, Cisco Systems, Inc. All rights reserved. Router. B B E 0/1 172. 30. 2. 2 10. 0. 2. 3 Router. B# show running config crypto ipsec transform-set mine esp-des ! crypto map mymap 10 ipsec-isakmp set peer 172. 30. 1. 2 set transform-set mine match address 101 ! interface Ethernet 0/1 ip address 172. 30. 2. 2 255. 0 no ip directed-broadcast crypto map mymap ! access-list 101 permit tcp 10. 0. 2. 0 0. 0. 0. 255 10. 0. 1. 0 0. 0. 0. 255 FNS 1. 0— 6 -94

Task 4—Test and Verify IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS

Task 4—Test and Verify IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -95

Task 4—Test and Verify IPSec • Display your configured IKE policies. show crypto isakmp

Task 4—Test and Verify IPSec • Display your configured IKE policies. show crypto isakmp policy • Display your configured transform sets. show crypto ipsec transform set • Display the current state of your IPSec SAs. show crypto ipsec sa © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -96

Task 4—Test and Verify IPSec (cont. ) • Display your configured crypto maps. show

Task 4—Test and Verify IPSec (cont. ) • Display your configured crypto maps. show crypto map • Enable debug output for IPSec events. debug crypto ipsec • Enable debug output for ISAKMP events. debug crypto isakmp © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -97

The show crypto isakmp policy Command Site 1 Site 2 Router. A 10. 0.

The show crypto isakmp policy Command Site 1 Site 2 Router. A 10. 0. 1. 3 Internet A Router. B B 10. 0. 2. 3 router# show crypto isakmp policy Router. A# show crypto isakmp policy Protection suite of priority 110 encryption algorithm: DES - Data Encryption Standard (56 bit keys). hash algorithm: Message Digest 5 authentication method: Rivest-Shamir-Adleman Encryption Diffie-Hellman group: #1 (768 bit) lifetime: 86400 seconds, no volume limit Default protection suite encryption algorithm: DES - Data Encryption Standard (56 bit keys). hash algorithm: Secure Hash Standard authentication method: Rivest-Shamir-Adleman Signature Diffie-Hellman group: #1 (768 bit) lifetime: 86400 seconds, no volume limit © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -98

The show crypto ipsec transform-set Command Site 1 Site 2 Router. A 10. 0.

The show crypto ipsec transform-set Command Site 1 Site 2 Router. A 10. 0. 1. 3 Internet A E 0/1 172. 30. 1. 2 Router. B B E 0/1 172. 30. 2. 2 10. 0. 2. 3 router# show crypto ipsec transform-set Router. A# show crypto ipsec transform-set Transform set mine: { esp-des } will negotiate = { Tunnel, }, • View the currently defined transform sets. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -99

The show crypto ipsec sa Command Site 1 Site 2 Router. A 10. 0.

The show crypto ipsec sa Command Site 1 Site 2 Router. A 10. 0. 1. 3 router# Internet A E 0/1 172. 30. 1. 2 Router. B B E 0/1 172. 30. 2. 2 10. 0. 2. 3 show crypto ipsec sa Router. A# show crypto ipsec sa interface: Ethernet 0/1 Crypto map tag: mymap, local addr. 172. 30. 1. 2 local ident (addr/mask/prot/port): (172. 30. 1. 2/255. 255/0/0) remote ident (addr/mask/prot/port): (172. 30. 2. 2/255. 255/0/0) current_peer: 172. 30. 2. 2 PERMIT, flags={origin_is_acl, } #pkts encaps: 21, #pkts encrypt: 21, #pkts digest 0 #pkts decaps: 21, #pkts decrypt: 21, #pkts verify 0 #send errors 0, #recv errors 0 local crypto endpt. : 172. 30. 1. 2, remote crypto endpt. : 172. 30. 2. 2 path mtu 1500, media mtu 1500 current outbound spi: 8 AE 1 C 9 C © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -100

The show crypto map Command Site 1 Site 2 Router. A 10. 0. 1.

The show crypto map Command Site 1 Site 2 Router. A 10. 0. 1. 3 Internet Router. B B A E 0/1 172. 30. 1. 2 E 0/1 172. 30. 2. 2 10. 0. 2. 3 router# show crypto map • View the currently configured crypto maps. Router. A# show crypto map Crypto Map "mymap" 10 ipsec-isakmp Peer = 172. 30. 2. 2 Extended IP access list 102 access-list 102 permit ip host 172. 30. 1. 2 host 172. 30. 2. 2 Current peer: 172. 30. 2. 2 Security association lifetime: 4608000 kilobytes/3600 seconds PFS (Y/N): N Transform sets={ mine, } © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -101

debug crypto Commands router# debug crypto ipsec • Displays debug messages about all IPSec

debug crypto Commands router# debug crypto ipsec • Displays debug messages about all IPSec actions. router# debug crypto isakmp • Displays debug messages about all ISAKMP actions. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -102

Crypto System Error Messages for ISAKMP %CRYPTO-6 -IKMP_SA_NOT_AUTH: Cannot accept Quick Mode exchange from

Crypto System Error Messages for ISAKMP %CRYPTO-6 -IKMP_SA_NOT_AUTH: Cannot accept Quick Mode exchange from %15 i if SA is not authenticated! • ISAKMP SA with the remote peer was not authenticated. %CRYPTO-6 -IKMP_SA_NOT_OFFERED: Remote peer %15 i responded with attribute [chars] not offered or changed • ISAKMP peers failed protection suite negotiation for ISAKMP. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -103

Overview of Configuring IPSec Manually © 2003, Cisco Systems, Inc. All rights reserved. FNS

Overview of Configuring IPSec Manually © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -104

Setting Manual Keys with security-association Commands router(config-crypto-map)# set security-association inbound|outbound ah spi hex-key-string set

Setting Manual Keys with security-association Commands router(config-crypto-map)# set security-association inbound|outbound ah spi hex-key-string set security-association inbound|outbound esp spi cipher hex-key-string [authenticator hex-key-string] • Specifies inbound or outbound SA. • Sets Security Parameter Index (SPI) for the SA. • Sets manual AH and ESP keys: – ESP key length is 56 bits with DES, 168 with 3 DES. – AH HMAC key length is 128 bits with MD 5, 160 bits with SHA. • SPIs should be reciprocal for IPsec peer. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -105

Overview of Configuring IPSec for RSA Encrypted Nonces © 2003, Cisco Systems, Inc. All

Overview of Configuring IPSec for RSA Encrypted Nonces © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -106

Tasks to Configure IPSec for RSA Encryption Task 1—Prepare for IPSec. Task 2—Configure RSA

Tasks to Configure IPSec for RSA Encryption Task 1—Prepare for IPSec. Task 2—Configure RSA keys. Task 3—Configure IKE. Task 4—Configure IPSec. Task 5—Test and verify IPSec. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -107

Task 2—Configure RSA Keys Step 1—Plan for RSA keys. Step 2—Configure the router’s host

Task 2—Configure RSA Keys Step 1—Plan for RSA keys. Step 2—Configure the router’s host name and domain name. hostname ip domain-name Step 3—Generate RSA keys. crypto key generate rsa usage keys © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -108

Task 2—Configure RSA Keys (cont. ) Step 4—Enter peer RSA public keys. crypto key

Task 2—Configure RSA Keys (cont. ) Step 4—Enter peer RSA public keys. crypto key pubkey-chain rsa addressed-key address named-key name key-string © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -109

Task 2—Configure RSA Keys (cont. ) Step 5—Verify key configuration. show crypto key mypubkey

Task 2—Configure RSA Keys (cont. ) Step 5—Verify key configuration. show crypto key mypubkey rsa show crypto key pubkey-chain rsa Step 6—Manage RSA keys. crypto key zeroize rsa © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -110

Digital Certificates © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6

Digital Certificates © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -111

Site-to-Site IPSec Using Digital Certificates © 2003, Cisco Systems, Inc. All rights reserved. FNS

Site-to-Site IPSec Using Digital Certificates © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -112

Configure CA Support Tasks • Task 1—Prepare for IKE and IPSec • Task 2—Configure

Configure CA Support Tasks • Task 1—Prepare for IKE and IPSec • Task 2—Configure CA support • Task 3—Configure IKE • Task 4—Configure IPSec • Task 5—Test and verify IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -113

Task 1—Prepare for IKE and IPSec © 2003, Cisco Systems, Inc. All rights reserved.

Task 1—Prepare for IKE and IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -114

Task 1—Prepare for IPSec • Step 1—Plan for CA support. • Step 2—Determine IKE

Task 1—Prepare for IPSec • Step 1—Plan for CA support. • Step 2—Determine IKE (IKE phase one) policy. • Step 3—Determine IPSec (IKE phase two) policy. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -115

Task 1—Prepare for IPSec (cont. ) • Step 4—Check the current configuration. show running-config

Task 1—Prepare for IPSec (cont. ) • Step 4—Check the current configuration. show running-config show crypto isakmp policy show crypto map • Step 5—Ensure the networks without encryption. ping • Step 6—Ensure access lists are compatible with IPSec. show access-lists © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -116

Step 1—Plan for CA Support © 2003, Cisco Systems, Inc. All rights reserved. FNS

Step 1—Plan for CA Support © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -117

Step 1—Plan for CA Support Planning includes the following steps: Ö Determine the type

Step 1—Plan for CA Support Planning includes the following steps: Ö Determine the type of CA server used and the requirements of the CA server. Ö Identify the CA server’s IP address, host name, and URL. Ö Identify the CA server’s administrator contact information. Goal: Be ready for CA support configuration. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -118

Determine CA Server Details Site 1 Router. A A 10. 0. 1. 0 Site

Determine CA Server Details Site 1 Router. A A 10. 0. 1. 0 Site 2 Router. B Internet E 0/1 172. 30. 1. 2 B E 0/1 172. 30. 2. 2 10. 0. 2. 0 CA 172. 30. 1. 51 vpnca Parameter Type of CA server CA Server Win 2000 host name vpnca IP address 172. 30. 1. 51 URL Administrator contact © 2003, Cisco Systems, Inc. All rights reserved. vpnca. cisco. com 1 -800 -555 -1212 FNS 1. 0— 6 -119

Step 2—Determine IKE (IKE Phase One) Policy Determine the following policy details: Ö Key

Step 2—Determine IKE (IKE Phase One) Policy Determine the following policy details: Ö Key distribution method Ö Authentication method Ö Identify IPSec peer IP addresses and host names Ö Identify IKE phase one policies for all peers - Encryption algorithm - Hash algorithm - IKE SA lifetime Goal: Minimize misconfiguration © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -120

IKE Phase 1 Policy Parameters Strong Parameter Stronger Encryption Algorithm DES 3 -DES Hash

IKE Phase 1 Policy Parameters Strong Parameter Stronger Encryption Algorithm DES 3 -DES Hash Algorithm MD 5 SHA-1 Authentication Method Pre-share RSA Encryption RSA Signature Key Exchange D-H Group 1 D-H Group 2 IKE SA Lifetime 86400 seconds <86400 seconds © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -121

IKE Policy Example Site 1 Site 2 Router. B Router. A 10. 0. 1.

IKE Policy Example Site 1 Site 2 Router. B Router. A 10. 0. 1. 3 A Internet E 0/1 172. 30. 1. 2 B E 0/1 172. 30. 2. 2 10. 0. 2. 3 Site 2 Parameter Site 1 Encryption Algorithm DES Hash Algorithm MD 5 Authentication Method RSA Signatures Key Exchange 768 -bit D-H IKE SA Lifetime 86400 seconds Peer IP Address 172. 30. 2. 2 172. 30. 1. 2 © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -122

CA Support Overview © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

CA Support Overview © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -123

Cisco IOS CA Support Standards Cisco IOS supports the following CA components: • Internet

Cisco IOS CA Support Standards Cisco IOS supports the following CA components: • Internet Key Exchange (IKE) • Public-Key Cryptography Standard #7 (PKCS #7) • Public-Key Cryptography Standard #10 (PKCS #10) • RSA keys • X. 509 v 3 certificates • CA interoperability © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -124

Simple Certificate Enrollment Protocol (SCEP) • Cisco-sponsored IETF draft • Lightweight protocol to support

Simple Certificate Enrollment Protocol (SCEP) • Cisco-sponsored IETF draft • Lightweight protocol to support certificate life cycle operations on the PIX Firewall • Uses PKCS #7 and #10 • Transaction-oriented request and response protocol • Transport mechanism independent • Requires manual authentication during enrollment © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -125

CA Servers Interoperable with Cisco Routers • See www. cisco. com for the latest

CA Servers Interoperable with Cisco Routers • See www. cisco. com for the latest listing of supported CA servers. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -126

Enroll a Device with a CA Configure CA Support Generate Keys Request CA/RA Cert

Enroll a Device with a CA Configure CA Support Generate Keys Request CA/RA Cert Generate CA/RA Cert Authenticate CA/RA Download CA/RA Certificate Request Generate ID Cert Verify ID Cert Download ID Cert © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -127

Task 2—Configure CA Support © 2003, Cisco Systems, Inc. All rights reserved. FNS 1.

Task 2—Configure CA Support © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -128

Cisco IOS CA Configuration Procedure Step 1—Manage the NVRAM memory usage (optional). Step 2—Set

Cisco IOS CA Configuration Procedure Step 1—Manage the NVRAM memory usage (optional). Step 2—Set the router’s time and date. clock timezone clock set Step 3—Configure the router’s host name and domain name. hostname ip domain-name Step 4—Generate an RSA key pair. crypto key generate rsa usage keys Step 5—Declare a CA. crypto ca trustpoint name © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -129

Cisco IOS CA Configuration Procedure (cont. ) Step 6—Authenticate the CA. crypto ca authenticate

Cisco IOS CA Configuration Procedure (cont. ) Step 6—Authenticate the CA. crypto ca authenticate name Step 7—Request your own certificate. crypto ca enroll name Step 8—Save the configuration copy running-config startup-config Step 9—Monitor and maintain CA interoperability (optional). crypto ca trustpoint name Step 10—Verify the CA support configuration. show crypto ca certificates show crypto key mypubkey | pubkey-chain © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -130

Step 1—Manage NVRAM Memory Usage (Optional) • Types of certificates stored on a router

Step 1—Manage NVRAM Memory Usage (Optional) • Types of certificates stored on a router – The router’s own identity certificate – The CA’s root certificate – RA certificate(s) (CA vendor specific) • The number of CRLs stored on a router – One if the CA does not support an RA – Multiple CRL if the CA supports an RA © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -131

Step 2—Set the Router’s Time and Date router(config)# clock timezone hours [minutes] • Sets

Step 2—Set the Router’s Time and Date router(config)# clock timezone hours [minutes] • Sets the router’s timezone and offset from UTC Router. A(config)# clock timezone cst -5 router# clock set hh: mm: ss day month year clock set hh: mm: ss month day year • Sets the router’s time and date Router. A# clock set 23: 59 31 december 2001 © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -132

Step 3—Add CA Server Entry to Router Host Table Site 1 Router. A A

Step 3—Add CA Server Entry to Router Host Table Site 1 Router. A A 10. 0. 1. 0 Site 2 Router. B Internet 172. 30. 1. 2 B 172. 30. 2. 2 10. 0. 2. 0 CA 172. 30. 1. 51 router(config)# hostname • Specifies a unique name for the router(config)# hostname Router. A router(config)# ip domain-name • Specifies a unique domain name for the router Router. A(config)# ip domain-name xyz. com © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -133

Step 3—Add CA Server Entry to Router Host Table (cont. ) Site 1 Router.

Step 3—Add CA Server Entry to Router Host Table (cont. ) Site 1 Router. A A 10. 0. 1. 0 172. 30. 1. 2 Site 2 Router. B Internet B 172. 30. 2. 2 10. 0. 2. 0 CA 172. 30. 1. 51 vpnca router(config)# ip host name address 1 [address 2. . . address 8] • Defines a static host name-to-address mapping for the CA server • This step is necessary if the domain name is not resolvable Router. A(config)# ip host vpnca 172. 30. 1. 51 © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -134

Step 4—Generate an RSA Key Pair Site 1 Router. A A Site 2 Router.

Step 4—Generate an RSA Key Pair Site 1 Router. A A Site 2 Router. B Internet B 10. 0. 2. 0 10. 0. 1. 0 CA router(config)# crypto key generate rsa usage-keys • Using the keyword usage-keys generates two sets of RSA keys: – Use one key set for RSA signatures. – Use one key set for RSA encrypted nonces. Router. A(config)# crypto key generate rsa usage-keys © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -135

Step 4—Generate RSA Keys (Example Output) Router. A(config)# crypto key generate rsa The name

Step 4—Generate RSA Keys (Example Output) Router. A(config)# crypto key generate rsa The name for the keys will be: router. cisco. com Choose the size of the key modulus in the range of 360 to 2048 for your Signature Keys. Choosing a key modulus greater than 512 may take a few minutes. How many bits in the modulus [512]: 512 Generating RSA keys. . . [OK] Router. A# show crypto key mypubkey rsa % Key pair was generated at: 23: 58: 59 Key name: Router. A. cisco. com Usage: General Purpose Key Data: 305 C 300 D 06092 A 86 4886 F 70 D 01010105 CCDB 8784 19 AE 1 CD 8 95 B 30953 1 EDD 30 D 1 C 929 A 25 E 521688 A 1 295907 F 4 E 98 BF 920 © 2003, Cisco Systems, Inc. All rights reserved. UTC Dec 31 2000 00034 B 00 30480241 00 A 9443 B 62 FDACFB 380219 D 6 4636 E 015 4 D 7 C 6 F 33 4 DC 1 F 6 E 0 6 A 81 CE 57 28 A 21116 E 3020301 0001 FNS 1. 0— 6 -136

Step 5—Declare a Certification Authority Site 1 Router. A A 10. 0. 1. 0

Step 5—Declare a Certification Authority Site 1 Router. A A 10. 0. 1. 0 172. 30. 1. 2 Site 2 Router. B Internet B 172. 30. 2. 2 10. 0. 2. 0 CA 172. 30. 1. 51 vpnca router(config)# crypto ca trustpoint name Router. A(config)# crypto ca trustpoint vpnca Router. A(ca-trustpoint)# • Specifies the desired CA server name • Puts you in the ca-trustpoint configuration mode © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -137

Step 5—Commands to Declare a Certification Authority Router. A(config)# crypto ca trustpoint vpnca Router.

Step 5—Commands to Declare a Certification Authority Router. A(config)# crypto ca trustpoint vpnca Router. A(ca-trustpoint)# ? ca trustpoint configuration commands: crl CRL option default Set a command to its defaults enrollment Enrollment parameters exit Exit from certificate authority identity entry mode no Negate a command or set its defaults query Query parameters Router. A(ca-trustpoint)# enrollment ? http-proxy HTTP proxy server for enrollment mode ra Mode supported by the Certicicate Authority retry Polling parameters url CA server enrollment URL © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -138

Step 5—Declare a Certification Authority (Example) Site 1 Router. A A 10. 0. 1.

Step 5—Declare a Certification Authority (Example) Site 1 Router. A A 10. 0. 1. 0 172. 30. 1. 2 Site 2 Router. B Internet B 172. 30. 2. 2 10. 0. 2. 0 CA 172. 30. 1. 51 vpnca Router. A(config)# crypto ca trustpoint vpnca Router. A(ca-trustpoint)# enrollment url http: //vpnca/certsrv/mscep. dll Router. A(ca-trustpoint)# enrollment mode ra Router. A(ca-trustpoint)# exit • Specifies the URL for the CA server • This is the minimum configuration to declare a CA © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -139

Step 6—Authenticate the Certification Authority Site 1 Router. A Site 2 Router. B Internet

Step 6—Authenticate the Certification Authority Site 1 Router. A Site 2 Router. B Internet A B 10. 0. 2. 0 10. 0. 1. 0 Get CA/RA Cert CA/RA Dnld CA/RA Fingerprint xxxx aaaa zzzz bbbb CA 172. 30. 1. 51 vpnca CA/RA Fingerprint xxxx aaaa zzzz bbbb Compare router(config)# crypto ca authenticate name Router. A(config)# crypto ca authenticate vpnca • Manually authenticate the CA’s public key by contacting the CA administrator to compare the CA certificate’s fingerprint © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -140

Step 7—Request Your Own Certificate Site 1 Router. A Site 2 Router. B Internet

Step 7—Request Your Own Certificate Site 1 Router. A Site 2 Router. B Internet A B 10. 0. 2. 0 10. 0. 1. 0 Enroll Request + password ID Cert Dnld CA 172. 30. 1. 51 vpnca router(config)# crypto ca enroll name Router. A(config)# crypto ca enroll vpnca • Request signed ID certificate from CA/RA © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -141

Step 8—Save the Configuration Site 1 Router. A A 10. 0. 1. 0 172.

Step 8—Save the Configuration Site 1 Router. A A 10. 0. 1. 0 172. 30. 1. 2 Site 2 Router. B Internet B 172. 30. 2. 2 10. 0. 2. 0 CA 172. 30. 1. 51 vpnca Router. A# copy running-config startup-config • Saves the router’s running configuration to NVRAM. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -142

Step 9—Monitor and Maintain CA Interoperability The following steps are optional, depending on your

Step 9—Monitor and Maintain CA Interoperability The following steps are optional, depending on your particular requirements: • Request a CRL. • Delete your router’s RSA keys. • Delete certificates from the configuration. • Delete the peer’s public keys. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -143

Step 10—Verify the CA Support Configuration Site 1 Router. A A 10. 0. 1.

Step 10—Verify the CA Support Configuration Site 1 Router. A A 10. 0. 1. 0 172. 30. 1. 2 Site 2 Router. B Internet B 172. 30. 2. 2 10. 0. 2. 0 CA 172. 30. 1. 51 vpnca router# show crypto ca certificates • View any configured CA/RA certificates router# show crypto key mypubkey | pubkey-chain rsa • View RSA keys for your router and other IPSec peers enrolled with a CA © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -144

CA Support Configuration Example Router. A# show running-config ! hostname Router. A ! ip

CA Support Configuration Example Router. A# show running-config ! hostname Router. A ! ip domain-name cisco. com ! crypto ca trustpoint mycaserver enrollment mode ra enrollment url http: //vpnca: 80 query url ldap: //vpnca crl optional crypto ca certificate chain entrust certificate 37 C 6 EAD 6 30820299 30820202 A 0030201 02020437 C 6 EAD 630 0 D 06092 A 864886 F 7 0 D 010105 (certificates concatenated) © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -145

Task 3—Configure IKE © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

Task 3—Configure IKE © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -146

Task 3—Configure IKE Step 1—Enable or disable IKE: crypto isakmp enable Step 2—Create IKE

Task 3—Configure IKE Step 1—Enable or disable IKE: crypto isakmp enable Step 2—Create IKE policies: crypto isakmp policy Step 3—Set IKE identity: crypto isakmp identity Step 4—Test and verify IKE configuration: show crypto isakmp policy show crypto isakmp sa © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -147

Step 2—Create IKE Policies Site 1 Router. A A Site 2 Router. B Internet

Step 2—Create IKE Policies Site 1 Router. A A Site 2 Router. B Internet B 10. 0. 2. 0 10. 0. 1. 0 CA 172. 30. 1. 51 vpnca Router. A(config)# crypto isakmp policy 110 Router. A(config-isakmp)# authentication rsa-sig Router. A(config-isakmp)# encryption des Router. A(config-isakmp)# group 1 Router. A(config-isakmp)# hash md 5 Router. A(config-isakmp)# lifetime 86400 © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -148

Task 4—Configure IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0—

Task 4—Configure IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -149

Steps to Complete Task 4—Configure IPSec Step 1—Configure transform set suites. crypto ipsec transform-set

Steps to Complete Task 4—Configure IPSec Step 1—Configure transform set suites. crypto ipsec transform-set Step 2—Configure global IPSec SA lifetime. crypto ipsec security-association lifetime Step 3—Create crypto access lists. access-list © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -150

Task 4—Configure IPSec (cont. ) Step 4—Create crypto maps. crypto map Step 5—Apply crypto

Task 4—Configure IPSec (cont. ) Step 4—Create crypto maps. crypto map Step 5—Apply crypto maps to interfaces. interface ethernet 0/1 crypto map © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -151

Task 5—Test and Verify IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS

Task 5—Test and Verify IPSec © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -152

Completing Task 5—Test and Verify IPSec • Display your configured IKE policies. show crypto

Completing Task 5—Test and Verify IPSec • Display your configured IKE policies. show crypto isakmp policy • Display your configured transform sets. show crypto ipsec transform set • Display the current state of your IPSec SAs. show crypto ipsec sa © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -153

Completing Task 5—Test and Verify IPSec (cont. ) • Display your configured crypto maps.

Completing Task 5—Test and Verify IPSec (cont. ) • Display your configured crypto maps. show crypto map • Enable debug output for IPSec events. debug crypto ipsec • Enable debug output for ISAKMP events. debug crypto isakmp © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -154

Completing Task 5—Test and Verify IPSec (cont. ) • Enable debug output for CA

Completing Task 5—Test and Verify IPSec (cont. ) • Enable debug output for CA events. debug crypto key-exchange debug crypto pki {messages|transactions} © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -155

Summary © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -156

Summary © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -156

Summary • Define the detailed crypto IKE and IPSec security policy before beginning configuration.

Summary • Define the detailed crypto IKE and IPSec security policy before beginning configuration. • Ensure router access lists permit IPSec traffic. • IKE policies define the set of parameters used during IKE negotiation. • Transform sets determine IPSec transform and mode. • Crypto access lists determine traffic to be encrypted. • Crypto maps pull together all IPSec details and are applied to interfaces. • Use show and debug commands to test and troubleshoot. • IPSec can also be configured manually or using encrypted nonces. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -157

Summary • Define the detailed crypto CA, IKE, and IPSec security policy before beginning

Summary • Define the detailed crypto CA, IKE, and IPSec security policy before beginning configuration. • Ensure you can contact your CA administrator before beginning configuration. • Configure CA details before configuring IKE. • Manually verify the CA certificate with the CA administrator. Each CA server supported by Cisco IOS software has a slightly different configuration process. • Use the RSA signatures authentication method for IKE when using CA support. • The IPSec configuration process is the same as that used for pre-shared and RSA encrypted nonces authentication. © 2003, Cisco Systems, Inc. All rights reserved. FNS 1. 0— 6 -158

© 2003, Cisco Systems, Inc. All rights reserved. 159

© 2003, Cisco Systems, Inc. All rights reserved. 159