Ads 468x60px

Configuring-Site-To-Site-VPN WS5100

1. Use case
          Branch office locations can take advantage of centralized services hosted at the corporate office.
          This may include access to business applications that require per site license or database services that require user management or IT services that require standard implementation across all branches.
          We will discuss a topology where Radius service is being provided by the corporate and accessed by all branch offices.


   Topology details
          SW1 is the WS5100 switch at the corporate office providing RADIUS service to all branch offices.
          SW2 is the WS5100 switch at the corporate office used to terminate VPN connections from all branch offices.
          SW3 is the WS5100 switch at a branch office.
          SW4 is the WS5100 switch used to simulate a public network. It is simply being used as a router.
          Vlan100 is being used by the wireless clients at the branch office (SW3). Network address is 192.168.100.x/24
          Vlan2 is being used by the corporate office to provide services. Network address is 192.168.2.x/24
          VPN tunnel is established between Vlan64 interface of SW3 and Vlan32 interface of SW2. This makes them VPN peers!

Interface IP addresses


Configuring Site-To-Site VPN using Web GUI
          In the next few slides we will go through the VPN configuration on the branch office switch - SW3.
          Details about the configuration are introduced in a slide preceding the web snapshot.
          Here we begin. Next slide shows the switch summary screen. Important thing to note is the firmware version number and IP address of the switch which is being configured.


Security ACL’s or Crypto ACL’s    

          Security ACLs are needed to define the traffic that needs to go over the tunnel. Traffic can be defined based on source and destination host IP address (or network address using subnet masks).
          If the traffic matching this definition is encountered a VPN tunnel will be opened and traffic will go through the tunnel. For this reason, this traffic is also termed as the “interesting traffic”.
          First step is to create an ACL. We will create an extended ACL and give a meaningful name “HSACL” (for hotspot ACL).

          Second step is to add rules to the ACL. We will define any IP and ICMP traffic originating from 192.168.100.x network and going to 192.168.2.x network as interesting.
          We will also add a unicast destination address of 192.168.2.226 which is the remote RADIUS server. This is strictly not necessary because we already covered the entire 192.168.2.x network in our first definition.


Configuring Security->IKE settings
          Internet Key Exchange (IKE) is a protocol that is used by IPsec to negotiate security parameters. Without IKE a user would need to manually specify the security parameters at all the VPN peers.
          IKE provides greater flexibility and improved security because encryption keys can change during a session.
          IKE protocol has two phases. Phase 1 will authenticate the VPN peer with which a tunnel is to be established. At the end of Phase 1 a secure tunnel is created so that Phase 2 negotiations can take place in a secure context. Phase 2 negotiations will setup security parameters for the actual data transfer through the tunnel at both the peers.

Defining VPN peer
          In the configuration tab, click Add to create a VPN peer. Specify the IP address and use a pre-shared secret for the initial authentication. Having pre-shared key as the authentication type makes the configuration simpler but this approach may not scale for larger networks.
          Aggressive mode will use fewer frames for exchange and hence it is faster. However, some of the information is sent prior to the secure context being established so it is less secure.
          Click Ok to add the peer. Table will display the newly added peer.
Adding an IKE policy
          Next step is to add a new IKE policy. We click Add in the IKE policies tab,  assign it a priority number and choose the algorithms for encryption, data integrity, authentication type, security association life time and DH group value. It is mandatory that these configuration settings be the same on the other peer.
          Select the desired lifetime in seconds. Larger lifetime will eliminate the need for fast re-key. Shorter lifetime will increase CPU computations.
          Select the DH group identifier. This is used by the IPsec peers to derive a shared secret without actually transmitting the identifier itself. Larger the identifier more secure the process of deriving a shared secret.
          Click Ok to add the new policy. Table will display the newly added policy.





Security->IPsec VPN
          So far we have configured the ACL’s that define the traffic to be tunneled and the encryption and authentication parameters configured for the IKE protocol which helps the VPN peers to negotiate in a secure context.
          In this page we will configure the security parameters that apply to the actual data that is to be transferred over the tunnel.
ESP and AH Protocols
          AH stands for Authentication Header.
          ESP stands for Encapsulating Security Payload.
          IPSec uses both AH and ESP to provide data integrity and data confidentiality.
          AH does not provide any data confidentiality (encryption). It only provides data integrity (authentication).
          ESP on the other hand provides encryption and also has an option of authentication.
          A transform set is a combination of security protocols and algorithms.
          We can have different transform sets to protect different traffic flows.
          Click Add in the configuration tab.
          Assign a name to this transform and pick authentication type and encryption type.
          For site to site VPN transform set mode is tunnel.
          Click Ok. Table will display the newly added transform set.







Crypto Maps.
          Crypto map is the glue that binds all the configuration that we have done so far – ACL’s, VPN peer and transform set.
          Click on the Crypto Maps tab.
          In the Crypto Map Entires sub-tab, click Add to create a new crypto map entry.
          Assign a Seq # (sequence number). The sequence number determines its priority among the other crypto maps. The lower the number, the higher the priority.
          Assign the crypto map a Name to differentiate from others with similar configurations.
          Select a security association (SA) lifetime value in seconds and Kilobytes which when expired forces a renegotiation of the SA.
          From the ACL ID drop down menu, select the HSACL that was configured earlier.
          In the Peers textbox, add the peer IP address that was configured earlier.
          Select the transform set that was configured earlier and click OK. Table displays the newly added crypto map entry.

          Peers and Transform Set tabs also get updated.



Configure the peer
          This completes the VPN configuration on one of the peers. Repeat the steps on the other peer taking care that shared secrets, algorithm choices are the same.
          Take care to correctly substitute the IP address in the ACL configuration and peer IP address in the IKE settings as well as the transform set.
Key points to remember.
          IPSec VPN involves multiple protocols like IKE, ESP and AH.
          IKE sets up the security context for the negotiation of the security association for actual data encryption and integrity.
          It is important to configure the VPN peers with the same algorithms, protocols, mode options and shared secrets.

0 nhận xét:

Post a Comment