GET VPN - Knowledge Base
GET VPN - Knowledge Base
Base
Home
GET VPN
BGP
Data Center
GET (Group Encrypted Transport) VPN is a VPN
Docker
GPON
technology which introduces the concept to eliminate point-
Hadoop
to-point tunnels (site-to-site VPN) and associated overlay
IP Multicast
routing (DMVPN) since it relies on WAN routing. It enables
IPv6 any-to-any VPN connectivity using a group IPSec security
IS-IS paradigm.
Juniper-JUNOS
L2VPN In addition to IPSec, the following are the building blocks
LAN for GET VPN solution:
Link Aggregation
LTE Notes 1. Group Domain Of Interpretation (GDOI)
MPLS
NAT GDOI is a group key management protocol used to provide
Network Automation a set of IPSec keys to a group of IOS devices called Group
Networking Members (GM) that wish to communicate securely i.e.
DataScience
GDOI is run between a GM and a Key Server (KS). These
OAM
OSPF
keys are periodically refreshed on all devices using a
PBB
process called rekey.
PPP
QoS GDOI is a "Phase 2" protocol which is protected by "Phase 1
Security Security Association (SA)". IKE Phase 1 remains the same
Traffic Engineering as in traditional IPSec. All Group Members authenticate
VPLS themselves using IKE to the device providing keys (called a
VPN Key Server) which is statically configured for all Group
Python Members. All IKE authentication methods are supported -
Pre-Shared Keys (PSK) or RSA-Signature (PKI) or RSA-
Attachments
Encryption.
a) GDOI SA
b) SA KEK which follows the SA payload
c) SA TEK which follows the SA payload
d) Key Download Array (KD)
e) Sequence Number (SEQ)
f) Proof of Possession (POP)
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 2/22
1/25/2018 GET VPN - Knowledge Base
5. Rekeying
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 3/22
1/25/2018 GET VPN - Knowledge Base
Note
GET VPN is not suitable to run over Internet since it reuses the
original IP header as Tunnel IP header. This can cause end-to-end
routing issues as the traffic from Private network will not be able to
reach the remote end.
Hence, GET VPN is best suited for Private infrastructure like MPLS VPN
or VPLS.
i) GROUPKEY-PULL Exchange
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 5/22
1/25/2018 GET VPN - Knowledge Base
Sample Scenario
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 6/22
1/25/2018 GET VPN - Knowledge Base
KS GDOI Configuration
crypto ipsec transform-set GDOI_TS esp-3des esp-md5-hmac
!
crypto ipsec profile GDOI_PROFILE
set transform-set GDOI_TS
set security-association lifetime seconds 3600 ! Indicates how long
IPSec SAs remain valid before they are renegotiated (can be set to
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 8/22
1/25/2018 GET VPN - Knowledge Base
default)
!
crypto gdoi group GDOI_GROUP
identity number 123 ! Group SA identifier
server local ! Indicates this is a Key Server
!
! Rekey configuration
rekey retransmit 60 number 2 ! Indicates if a change is made on
KS, rekey messages will be sent in 60 seconds, twice..default is 10
seconds, 2 times.
rekey lifetime seconds 86400 ! Indicates how often to rekey (can
be set to default- 24 hours)
rekey transport unicast
rekey authentication mypubkey rsa GDOI_KEYS ! Specifies the keys to
be used for a rekey to GDOI GMs
!
! Configuring Security Policies
sa ipsec 1
profile GDOI_PROFILE ! Use IPSec Profile configured
above
match address ipv4 ACL ! Indicates interesting traffic to
be encrypted
replay time window-size 5 ! Anti-replay window-size is set to
5
!
address ipv4 1.1.1.1 ! Use this address to source rekey
packets
!
!
GM Configuration
Verification
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 10/22
1/25/2018 GET VPN - Knowledge Base
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 11/22
1/25/2018 GET VPN - Knowledge Base
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 12/22
1/25/2018 GET VPN - Knowledge Base
IKE_R_MM3
!--- Both peers now authenticate each other using Messages 5 and 6
!
*Jun 28 23:46:51.919: ISAKMP (1003): received packet from 11.11.11.11
dport 848 sport 848 Global (R) MM_KEY_EXCH
*Jun 28 23:46:51.923: ISAKMP:(1003):Input = IKE_MESG_FROM_PEER,
IKE_MM_EXCH
*Jun 28 23:46:51.927: ISAKMP:(1003):Old State = IKE_R_MM4 New State =
IKE_R_MM5
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 13/22
1/25/2018 GET VPN - Knowledge Base
next-payload : 8
type : 1
address : 1.1.1.1
protocol : 17
port : 500
length : 12
*Jun 28 23:46:52.003: ISAKMP:(1003):Total payload length: 12
*Jun 28 23:46:52.007: ISAKMP:(1003): sending packet to 11.11.11.11
my_port 848 peer_port 848 (R) MM_KEY_EXCH
*Jun 28 23:46:52.011: ISAKMP:(1003):Sending an IKE IPv4 Packet.
*Jun 28 23:46:52.015: ISAKMP:(1003):Input = IKE_MESG_INTERNAL,
IKE_PROCESS_COMPLETE
*Jun 28 23:46:52.019: ISAKMP:(1003):Old State = IKE_R_MM5 New State =
IKE_P1_COMPLETE
!---- Once IKE Phase 1 is completed, GDOI protocol starts. The GM-1
sends a Register message to KS for group-identity 123
!
*Jun 28 23:46:52.291: ISAKMP (1003): received packet from 11.11.11.11
dport 848 sport 848 Global (R) GDOI_IDLE
*Jun 28 23:46:52.295: ISAKMP: set new node 847121871 to GDOI_IDLE
*Jun 28 23:46:52.303: ISAKMP:(1003): processing HASH payload. message ID
= 847121871
*Jun 28 23:46:52.307: ISAKMP:(1003): processing NONCE payload. message
ID = 847121871
!---- The KS sends the second GDOI message- PUSH message. It carries the
policy for the group-identity, and KEK and TEK policy
*Jun 28 23:46:52.319: ISAKMP:(1003): sending packet to 11.11.11.11
my_port 848 peer_port 848 (R) GDOI_IDLE
*Jun 28 23:46:52.323: ISAKMP:(1003):Sending an IKE IPv4 Packet.
*Jun 28 23:46:52.327: ISAKMP:(1003):Node 847121871, Input =
IKE_MESG_FROM_PEER, IKE_GDOI_EXCH
*Jun 28 23:46:52.327: ISAKMP:(1003):Old State = GDOI_KS_LISTEN New
State = GDOI_KS_AWAIT_ACK
!---- KS now sends the Key Download GDOI message carrying the KEK and
TEK Keys for policies distributed earlier
*Jun 28 23:46:52.591: ISAKMP:(1003): sending packet to 11.11.11.11
my_port 848 peer_port 848 (R) GDOI_IDLE
*Jun 28 23:46:52.595: ISAKMP:(1003):Sending an IKE IPv4 Packet.
*Jun 28 23:46:52.599: ISAKMP:(1003):deleting node 847121871 error TRUE
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 14/22
1/25/2018 GET VPN - Knowledge Base
reason ""
*Jun 28 23:46:52.603: ISAKMP:(1003):Node 847121871, Input =
IKE_MESG_FROM_PEER, IKE_GDOI_EXCH
*Jun 28 23:46:52.603: ISAKMP:(1003):Old State = GDOI_KS_AWAIT_ACK New
State = GDOI_KS_AWAIT_ACK
IPSec SA Number : 1
IPSec SA Rekey Lifetime: 3600 secs
Profile Name : GDOI_PROFILE
Replay method : Time Based
Replay Window Size : 5
SA Rekey
Remaining Lifetime : 508 secs
ACL Configured : access-list ACL
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 15/22
1/25/2018 GET VPN - Knowledge Base
Rekeys received
Cumulative : 1
After registration : 1
Rekey Acks sent : 1
KEK POLICY:
Rekey Transport Type : Unicast
Lifetime (secs) : 83284
Encrypt Algorithm : 3DES
Key Size : 192
Sig Hash Algorithm : HMAC_AUTH_SHA
Sig Key Length (bits) : 1024
information on GM.
Rekey Messages
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 17/22
1/25/2018 GET VPN - Knowledge Base
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 19/22
1/25/2018 GET VPN - Knowledge Base
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 20/22
1/25/2018 GET VPN - Knowledge Base
ipsec identities
protocol : 0
src port : 0
dst port : 0
*Jun 28 23:59:45.787: GDOI:INFRA:(GDOI_GROUP:0):Crypto gdoi exact match:
ks ace
ace src addr : 192.168.0.0
ace dst addr : 192.168.0.0
ace src mask addr : 0.0.255.255
ace dst mask a
*Jun 28 23:59:45.791: GDOI:INFRA:(GDOI_GROUP:0):Crypto gdoi exact match:
ks ace
ace protocol : 256
ace src port : 0
ace dst port : 0
*Jun 28 23:59:45.795: GDOI:INFRA:(GDOI_GROUP:0):crypto exact match ace
number : 1
Further reading:
1. http://www.securemulticast.org/msec2_ietf51_gd
2. http://www.wr-mem.com/?p=307
3. http://www.cisco.com/en/US/prod/collateral/ios
Comments
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 21/22
1/25/2018 GET VPN - Knowledge Base
Sign in | Recent Site Activity | Report Abuse | Print Page | Powered By Google Sites
https://sites.google.com/site/amitsciscozone/home/ipsec/get-vpn 22/22