Internet Protocol Security (IPSec) is described in this section.
IPSec (Internet Protocol Security) is a suite of protocols that provides security to Internet communications at the IP layer. The most common current use of IPSec is to provide a Virtual Private Network (VPN), either between two locations (gateway-to-gateway) or between a remote user and an enterprise network (host-to-gateway); it can also provide end-to-end, or host-to-host, security.
This mode is a route based, which means that to be encrypted, the interesting traffic is routed via a specific path. A Tunnel interface is created at the routing table. The interesting traffic is routed over the tunnel interface.
This mode is referred to as Policy-based. The interesting traffic is defined at the IPsec policy. Since there is no additional IP interface created specifically for the tunnel source, the IPsec policy must define both the interesting traffic source/ destination and the network interfaces source/ destination.
To access VPN screens, go to .
Screen Objective | This screen allows the user to configure the VPN Global Configuration. |
Navigation |
|
Fields |
|
Buttons |
|
IPSec involves many component technologies and encryption methods. Yet IPSec's operation can be broken down into five main steps:
IKE phase 1 occurs in two modes: main mode and aggressive mode.
When a distributed operational network uses public transport links for the inter-site connectivity, the traffic must be encrypted to ensure its confidentiality and its integrity. Such Virtual VPN connection is executed over an IPSec encrypted link. An IPSec policy determines the ‘interesting traffic’ i.e. the type or subset of the customer traffic to be encrypted.
Internet Security Association and Key Management Protocol (ISAKMP) defines procedures and packet formats to establish, negotiate, modify and delete Security Associations (SA). A SA is a relationship between two or more entities that describes how the entities will utilize security services to communicate securely. In endpoint-to-endpoint Transport Mode, both end points of the IP connection implement IPSec.
Internet Key Exchange (IKE) protocol is a component of IPSec used for performing mutual authentication and establishing and maintaining Security Associations (SAs) (RFC 7296)
Once an IKE negotiation is successfully completed, the peers have established two pairs of one-way (inbound and outbound) SAs. Since IKE always negotiates pairs of SAs, the term "SA" is generally used to refer to a pair of SAs (e.g., an "IKE SA" or an "IPSec SA" is in reality a pair of one-way SAs). The first SA, the IKE SA, is used to protect IKE traffic. The second SA provides IPSec protection to data traffic between the peers and/or other devices for which the peers are authorized to negotiate. It is called the IPSec SA in IKEv1 and, in the IKEv2 RFCs, it is referred to variously as a CHILD_SA, a child SA, and an IPSec SA.
The basic purpose of IKE phase 1 is to authenticate the IPSec peers and to set up a secure channel between the peers to enable IKE exchanges. IKE phase 1 performs the following functions:
IKE Phase 1 occurs in two modes: main mode and aggressive mode.
To authenticates and protect the identities of the IPSec peer, the encryption algorithms are as follows:
Diffie and Hellman Key Exchange
Diffie and Hellman (DH) describe a method for two parties to agree upon a shared secret number, called ZZ, in such a way that the secret will be unavailable to eavesdroppers. This method requires that both the sender and recipient of a message have key pairs (private and public). By combining one's private key and the other party's public key, both parties can compute the same shared secret number ZZ.
For example, let’s identify the communicating parties as party A and party B. Prior to their communication, the parties agree between them on a large prime number p, and a generator (or base) g (where 0 < g < p).
Party A chooses a secret integer xa (her private key) and then calculates ya = g ^ xa mod p (which is her public key). Party B chooses a private key xb, and calculates his public key in the same way as yb = g ^ xb mod p.
Both parties then send each other their public keys. Both parties know their public keys but not their private keys because calculating them is a hard mathematical problem (known as the discrete logarithm problem). However, they can calculate:
ZZ = g ^ (xb * xa) mod p = (yb ^ xa) mod p = (ya ^ xb) mod p, where ZZ is their shared secret as defined by X9.42. For more details, refer to RFC 2631 [8].
Any eavesdropper who was listening in on the communication knows p, g, and both parties public keys ya and yb. But the eavesdropper will be unable to calculate the shared secret from these values.
This secret number can then be converted into cryptographic keying material (KM). The KM is typically used as a key-encryption key to encrypt (wrap) a content-encryption key which is in turn used to encrypt the message data (the VPN GRE traffic).This key is kept secret and never exchanged over the insecure channel.
The DH groups are identified by the length of the keys in bits. The larger the key (higher group id) the higher is the security but as well the resources required are higher and the user should consider performance degradation.
The Exchange Modes in which IKE Phase 1 occurs are 2 types: Main and Aggressive.
In Aggressive mode, the negotiation is quicker as the session is completed in only 3 messages. The disadvantage is in that the identity of the peers is not protected.
The weakness of using the aggressive mode is that both sides have exchanged information before there's a secure channel.
A negotiated shared IPSec Phase 2 policy includes:
A replay attack is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. It is an attempt to subvert security by someone who records legitimate communications and repeats them in order to impersonate a valid user, and to disrupt or cause negative impact for legitimate connections.
IPSec provides anti-replay protection against an attacker who duplicates encrypted packets with the assignment of a monotonically increasing sequence number to each encrypted packet. The receiving IPSec endpoint keeps track of which packets it has already processed on the basis of these numbers with the use of a sliding window of all acceptable sequence numbers.
This section lists off some details of how ACK packets work with theimplementation of IPSec.
Screen Objective | This screen allows the user to configure the VPN Policy Configuration. |
Navigation |
|
Fields |
|
Fields (cont) |
|
Fields (cont) |
|
Fields (cont) |
|
Fields (cont) |
|
Buttons |
|
Screen Objective | This screen allows the user to configure the VPN Global Configuration. |
Navigation |
|
Fields | The displayed counters are:
|