Professional Documents
Culture Documents
Chapter 11 - Ipsec VPN and SSL VPN
Chapter 11 - Ipsec VPN and SSL VPN
HCSA-NGFW 2022
1 Concept of VPN
Contents
2 IPsecVPN
3 Policy-based IPsecVPN
4 Route-based IPsecVPN
5 SSLVPN
Concept of VPN
Virtural Private Network
- Helps an enterprise quickly start new services and connect its branches
around the world
www.hillstonenet.com
VPN Implementation
Branch Headquarters
A X Y
B
Confidentiality
• Hides and secures data in WAN
Integrity
• Ensures the data is not tampered
Authentication
• Verifies whether the data source is trusted
www.hillstonenet.com
Confidentiality
• Ensures data confidentiality by encryption
• Data encryption is reversible
• Data encryption and decryption by secret keys
- Symm
- etric (secret) key
- Asymmetric (public) key
www.hillstonenet.com
Symmetric Key
• Operates fast, suitable for encryption of large amount of data
• Typical key length: 40 bits to 1024 bits
• Example: DES, 3DES, AES
Sender Receiver
1 Original data
+ Encrypted data +
Encrypted data
3 Original data
www.hillstonenet.com
www.hillstonenet.com | Hillstone Confidential
Asymmetric Key (Public Key)
• Slower than encryption with symmetric keys
• Typical key length: 512 bits to 2048 bits
Sender Receiver
Pub Pub
1
Original data
+ Pub Encrypted data
+ Priv
2 4
3
Original data
Encrypted data
www.hillstonenet.com
www.hillstonenet.com | Hillstone Confidential
Integrity
• Hash algorithm is widely used to provide data integrity service
• Algorithm example
– MD5, SHA
• MD5 provides 128-bit output
• SHA provides 160-bit output
www.hillstonenet.com
One-Way Hash Procedure
Sender Receiver
Data Hash
Data
2 Data Hash
1 HASH algorithm
4
HASH algorithm
Data Hash
Hash 5 Hash
比对哈希值是否一致
Compare the hash values
www.hillstonenet.com
Authentication
• Verifies data by authenticating the data source
www.hillstonenet.com
Hash Calculation with a Secret Key
Sender Receiver
Data Hash
Data
Hash Key 3
2 Data
1 HASH algorithm Hash
Hash key
4 HASH algorithm
Data Hash
Hash 5 Hash
比对哈希值是否一致
Compare the hash values
www.hillstonenet.com
www.hillstonenet.com | Hillstone Confidential
SA(Security Association )
• IPSec includes Authentication Headers (AH), Encapsulating Security Payload (ESP),
Internet Key Exchange (IKE) and some authentication methods and encryption algorithms.
IKE is used to negotiate the AH and ESP password algorithm and put the necessary key of
the algorithm to the right place. This IKE negotiation is called SA (Security Association).
www.hillstonenet.com
IPsec VPN
IPsec VPN Topology
Internet
E0/1 E0/2
trust dmz
192.168.10.0/24 192.168.20.0/24
www.hillstonenet.com
IPSec VPN
• VPN is classified according to the data driver type:
- Policy-based
- Route-based
Server
LAN
Internet
Site1 Site2
www.hillstonenet.com
Configuration Steps of IPSec VPN
• IKE VPN adopts the auto negotiation method. The configurations of IKE VPN
include:
• Step 1: Configure IKE VPN
– Configure Phase 1 proposal (optional)
– Configure ISAKMP gateway
– Configure Phase 2 proposal (optional)
– Configure IPSec Tunnel
www.hillstonenet.com
Configuring IPSec VPN - Phase 1 Proposal
Network > VPN > IPSec VPN > P1 Proposal, click 『 New 』
CLI:
isakmp proposal p1-name
authentication {pre-share/rsa-sig}
encryption {3des/des/aes/aes192/aes256}
hash {sha/md5}
group {1/2/5/14/15/16}
lifetime <300-86400>
www.hillstonenet.com
Configuring IPSec VPN - Phase 2 Proposal
Network > VPN > IPSec VPN > P2 Proposal, click 『 New 』
CLI:
ipsec proposal p2-name
protocol {esp/ah}
encryption {3des/des/aes/aes-192/aes-256 /null}
hash {md5/sha/null}
group {no pfs/1/2/5/14/15/16}
lifetime <180-86400>
www.hillstonenet.com
Configuring IPSec VPN P1- Peer ISAKMP Gateway
(WebUI)
Network > VPN > IPSec VPN > VPN Peer List,click『New』
www.hillstonenet.com
Configuring IPSec VPN - Peer ISAKMP Gateway (CLI)
www.hillstonenet.com
Configuring IPSec VPN P2 - Tunnel (WebUI)
Network > VPN > IPSec VPN > IKE VPN List,click『New』
www.hillstonenet.com
Configuring IPSec VPN Tunnel (CLI)
CLI:
tunnel ipsec tunnel-name auto
mode tunnel
isakmp-peer peer-name
ipsec-proposal p2-name
id {auto | local ip-address/mask remote ip-address/mask service service-name}
auto-connect
Note:
1、id is the LAN subnet address for both sides, which is the object that VPN need to protect.
2、Need to enable the auto-connect, otherwise the VPN connection will not be triggered actively
www.hillstonenet.com
Policy-based IPsecVPN
Create Address Book
• Create the local and peer LAN address book in advance.
www.hillstonenet.com
Configure a policy (WebUI):
• Local to peer action: “Tunnel”
• Peer to local action:“From tunnel”
• Select“Bi-directional policy”will create
bidirectional policies automatically
www.hillstonenet.com
Configure a policy (CLI)
• Create outbound policy
policy-global
rule top from local to remote service any tunnel tunnel-name
www.hillstonenet.com
Create SNAT Rule
Policy > NAT > SNAT>, click 『new』 to create a No NAT rule, and put at top position.
www.hillstonenet.com
Policy-Based IPSecVPN Configuration Steps
1. Create address entry of protected data flow
2. Set the phase 1 ISAKMP proposal
3. Create phase 1 ISAKMP peer instance
4. Set the phase 2 IPSec proposal
5. Create phase 2 IPSecVPN instance
6. Use policy to call IPSec instance, put this policy at top position
7. Create no NAT SNAT rule and put at top position.
www.hillstonenet.com
Route-based IPsecVPN
Create Address Book
• Create the local and peer LAN address book in advance.
www.hillstonenet.com
Create a tunnel interface
Network > Interface, click『New』to create a “Tunnel Interface”
www.hillstonenet.com
Create Destination Route(WEBUI)
Network > Routing > Destination Route, click『New』to create access route to peer side
www.hillstonenet.com
Create Policy
• Create permit policy
- Create a policy with the action of permit based on the zone that the tunnel interface is
bound to.
- If the access is bidirectional, you should add an inbound policy. The inbound policy can be
configured by exchanging the source and destination zones
www.hillstonenet.com
Route-based VPN (CLI)
• Create Tunnel interface
interface tunnelNumber
zone VPNHub
tunnel IPSec tunnel-name
• Create route entry
ip vrouter trust-vr
ip route A.B.C.D/M tunnelNumber
• Create inbound and outbound policies
policy-global
rule top from local to remote service any permit
rule top from remote to local service any permit
www.hillstonenet.com
Route-Based IPSecVPN Configuration Steps
1. Create address entry of protected data flow
2. Set the phase 1 ISAKMP proposal
3. Create phase 1 ISAKMP peer instance
4. Set the phase 2 IPSec proposal
5. Create phase 2 IPSecVPN instance
6. Create tunnel interface and call IPSec instance
7. Create VPN route
8. Create the policy to permit traffic between tunnel interface and LAN zone
www.hillstonenet.com
Check VPN Status (WebUI)
Network > VPN >IPSec VPN, click 『Configuration』button,select IPSec VPN Monitor from the list
www.hillstonenet.com
Check VPN Status(CLI)
1. Check P1 ISAKMP SA
SG-6000# show isa sa
Total: 1
================================================================================
Cookies Gateway Port Algorithms Lifetime
--------------------------------------------------------------------------------
4964a49b7e~ 100.1.1.1 500 pre-share md5/3des 85733
================================================================================
2. Check P2 IPSec SA, bidirectional for both outbound and inbound, the success status is Active
www.hillstonenet.com
SSLVPN
SSL VPN – Remote access to Intranet
Internet
WAN Interface
E0/4:200.0.0.10/24
Server/Database
www.hillstonenet.com
SSL VPN Introduction
• Functions
– Remote secure access, SSLVPN also called SCVPN in Hillstone
• Elements
– PC host / Mobile host
– Local/Radius/LDAP/AD/Tacacs+ authentication server
www.hillstonenet.com
SSL VPN Client
• Functions of SSL VPN server
– Accepting connections from the clients
– Assigning IP addresses, DNS server addresses, and WIN server addresses to SSL VPN clients
– Authenticating and authorizing SSL VPN clients
– Encrypting and forwarding IPSec data
• SSL VPN Client Access
– Client: Hillstone Security Connect
• SSL VPN Client Download
– Hillstone official website: https://www.hillstonenet.com/more/services/product-downloads/
www.hillstonenet.com
Configuring SSL VPN
Network > VPN > SSL VPN,Click『New』to create SSL VPN, select the AAA server.
Support local and 3rd party AAA server
www.hillstonenet.com
Configuring SSL VPN – Access Interface
Specify an SSL VPN service interface and a service port , configure a tunnel interface and an address pool, and then
click Next.
www.hillstonenet.com
Configuring SSL VPN – Tunnel Interface
• The tunnel interface and
address pool must be in the
same IP address segment
without overlap.
• Must set IP for SSLVPN
tunnel interface because
this IP is the gateway IP for
client
www.hillstonenet.com
Configuring SSL VPN – Address Pool
www.hillstonenet.com
Configuring SSL VPN – Tunnel Route
Click『Tunnel Route』
• Tunnel route specify the server access after client connected with SSLVPN server
www.hillstonenet.com
Configuring SSL VPN – Policy
• Configure SSLVPN permit policy:
- SSL VPN tunnel interface bound to zone VPNHub, need to permit the access to server zone
www.hillstonenet.com
Questions
1. What types of VPN does a Hillstone device support?
2. How to configure site2site IPSec VPN, what are the steps?
3. There are two negotiation modes on P1 ISAKMP configuration, what are the
difference?
4. What are the requirements of address pool when configuring SSL VPN?
www.hillstonenet.com
LAB
E0/1
E0/2
L3-trust FW1 L3-untrust
192.168,1.254/24
192.168.13.1/24
DHCP Pool: 192.168.3.10-20
E0/2 E0/1
E0/3 L3-untrust L3-trust
PC1 L3-untrust 192.168.13.3/24 192.168.2.254/24
182.168.12.1/24
192.168.1.1
E0/1 E0/2
L3-untrust E0/3 FW3
L3-trust PC2
182.168.12.2/24 192.168.23.2/24 L3-untrust 192.168.2.1/24
192.168.23.3/24
X
FW2
www.hillstonenet.com
Thanks