Professional Documents
Culture Documents
MindCert Cisco IPsec MindMap PDF
MindCert Cisco IPsec MindMap PDF
Visit us www.mindcert.com
IKE Phase One
Router(config)#crypto isakmp enable Enable ISAKMP Step 1
ISAKMP is enabled by default Provides security services at the IP layer
Define the ISAKMP policy A framework of services
3DES Adds security to the upper
layers in the OSI model By Implementing a new set of headers
DES
Definition
128-bit Encryption One SA is required per direction
1932-bit AES Utilizes Security Associations (SA) A router to router IPsec VPN
will use two SA's One in each direction
256-bit
MD5
Hash AH
SHA Authentication Header
1 Step 2 Provides
SHA Hash Not compliant with NAT As NAT changes the IP Header
RSA-Sig Authentication Two Frame Formats The will break AH authentication
Defaults
ESP
768-bit 1
DH Group IP Protocol 50
Confidentiality Encryption
One Day 86400 Seconds Provides
SA Lifetime Integrity
Origin Authentication
Router(config)#crypto isakmp identity {address | hostname} Configure the ISAKMP Identity method
Original datagram is placed in the
IP Address Encapsulating Security Payload encrypted ESP payload
Options Step 3 Tunnel Mode Cannot detect tampering whilst delivered
Hostname
Uses encrypted ESP headers
Although payload is fully secure
IP Address Default Supports
Keeps the existing IP header and
IKE Phase Two encrypts the original payload
Identifies which transform set to use transform-set Typically used in Remote Access VPNs
Key Exchange Two Modes
set Step 6 Slower but more secure Six way packet exchange
Use PFS or not pfs
IKE has two phases
Main Mode Can respond to peers that use
Lifetime Set SA parameters aggressive mode
security-association Cisco devices use main mode
Crypto maps pull together various Uses Diffie-Hellman (DH) to create the secure channel
parts used to set up the IPsec SAs IKE negotiates the IPsec SAs and generates
All entries are pre-configured Static the required key material for IPsec
Transform set and all other IPsec
Entries are configured dynamically as Types parameters are agreed at Phase Two
the result of IPsec negotiation Dynamic Reinitiates to refresh the SA
Quick Mode
One Mode
IKE Phase Two
Crypto Maps are applied to the interface where the
traffic leaves and enters a router PFS
You must apply the crypto map both Apply the Crypto Map If enabled, occurs at IKE Phase Two
Perfect Forward Secrecy
the the physical and logical interface
Carries out a new DH exchange with
when using GRE tunnels
each Quick Mode