Brksec 3005
Brksec 3005
and Algorithms
BRKSEC-3005
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
My Professional Life
• Belgian
• Iives in Aywaille (NOT Hawaii)
• Joined Cisco on January 1, 1997
• [email protected]
• Distinguished Engineer (TAC)
• Web Content, AAA, Firewalls, VPNs, IPTV
• Bit of everything (stuff nobody else
wanted)
• Made DMVPN, then FlexVPN
• Focus on Serviceability
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Agenda
• A Brief Introduction
• Hash and HMAC's
• Symmetric Encryption
• MODP: Multiplicative Group of Integers Modulo P
• ECC: Elliptic Curve Cryptography
• Performances and Security
• Practical Applications; IKEv2, SSL and PKI
• Attacks, Weaknesses & Self-Inflicted Pain
• Conclusion and Recommendations
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Introduction
An infinite number of mathematicians…
7 8 … Ok but you pay
upfront
6
Encryption Signatures
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Key Strength
Strong
Weak
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Attacker Strength
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
Algorithms Never Get Stronger
SHA-1
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Strength increases by steps
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Prevalent
AES-128-
CBC
DH-1024 RSA-1024
SHA-1
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Next Generation Encryption
AES-128- ECDSA-
128-bit ±30 years ECDH-P256 SHA-256
GCM P256
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
NGE higher security levels
AES-256- ECDSA-
Long term ECDH-P521 SHA-512
GCM P521
AES-192- ECDSA-
“Foreseeable future” ECDH-P384 SHA-384
GCM P384
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Next Generation Encryption
Authenticated
AES-GCM
Encryption
Authentication HMAC-SHA-2
Hashing SHA-2
Entropy SP800-90
TLSv1.2, IKEv2,
Protocols
IPsec, MACSec
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Hashes and
HMAC’s
Focus on SHA-2
What is a Cryptographic Hash Function
Hash
Legitimate Message
Function
Hash Fixed length output
Any Length Easy & Fast Fixed Length
Hash
Legitimate MesSage
Function
*!@#% Avalanche effect
Easy & Fast (small change in message, big change in hash)
Hash
Legitimate Message
Function
Hash Pre-image resistance
very hard (message can not be found from hash)
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
The Merkle–Damgård Construction
IV F F F ... F Fin H
Data …
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
MD-5 vs SHA-2 – Hash Functions
MD-5 SHA-2
(60 rounds) (64-80 rounds)
Reference: Wikipedia
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Rough Hash Algorithms Comparison
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Using a Hash or an HMAC
Alice Bob
Must send a message m
Goal: data does not get corrupted in transit
h, m Computes h'=HASH(m)
Computes h=HASH(m) Checks h' = h
If yes message is valid
if no message was damaged
Attacker could modify m
and recompute h Collision Resistance
Share pre-shared key k with Bob Share pre-shared key k with Alice
Must send a message m
Goal: Bob assured data comes from Alice
hmac, m
Computes hmac=HASH(m|k) Computes h'=HASH(m|k)
Checks h' = h
Attacker CAN NOT modify If yes message is valid
m and recompute h if no message was damaged
Unforgeability
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
SHA-1 Collisions with SHAttered
good.pdf bad.pdf
-SHAttered.io
d00bbe65d80f6d53d5c15da7c6b4f0a655c5a86a d00bbe65d80f6d53d5c15da7c6b4f0a655c5a86a
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
In practice, for PDF
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Applied hashing:
Blockchain & bitcoin &
…
Blockchain
class Block(object):
Block # 1 Block #2 def __init__(self, hashPrevBlock, payload):
self.hashPrevBlock = hashPrevBlock
(genesis block) self.payload = payload
self.timestamp = datetime.now()
self.Nonce = self.mine()
Timestamp Timestamp
Payload Payload def hash(self, Nonce=None):
Nonce Nonce
hashPrevBlock = None hashPrevBlock = H(#1) def mine(self):
def verify(self):
Timestamp
Payload
Nonce
hashPrevBlock = H(#2)
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
Mining
def mine(self):
# let's calculate hash until we have "0000" at the beginning
for nonce in range(1, 10000000):
attempt = self.hash(nonce)
if attempt.startswith("0000"): # Mathematical challenge (find hash that starts with x-number of 0’s
logger.debug("We found matching hash and we are setting it as Nonce: " + attempt)
self.Nonce = attempt
return self.Nonce
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
Symmetric Encryption
Algorithms:
One Time Pad & AES
One Time Pad
M 1 0 0 1 1 0 1 1 1 …
Pad 0 1 1 0 0 0 1 0 1 …
Cypher 1 1 1 1 1 0 0 1 0 …
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
One Time Pad - example
H E L L O message
7 4 11 11 14
+ 23 12 2 10 11 key
= 30 16 13 21 25 m+k
mod 26 4 16 13 21 25 (m+k) mod 26
E Q N V Z ciphertext
E Q N V Z ciphertext
4 16 13 21 25
- 23 12 2 10 11 key
= - 4 11 11 14 c-k
19
mod 26 7 4 11 11 14 (c-k) mod 26
H E L L O message
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Issue 1 – Key Length
H E L L O message
7 4 11 11 14
+ 23 12 2 10 11 key Key must have the same
size as message… Key
= 30 16 13 21 25 m+k exchange is a problem!
mod 26 4 16 13 21 25 (m+k) mod 26
E Q N V Z ciphertext
Select Carefully…
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Issue 2 – Key Re-use & Known Plain Text Attack
H E L L O known message
4 16 13 21 25 ciphertext
- 7 4 11 11 14 known message Conclusion: Attacker can
= -3 12 2 10 11 c-m compute the key easily
mod 26 23 12 2 10 11 (c - m) mod 26
DO NOT REUSE KEY !!
= KEY
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
AES – The Advanced Encryption Standard
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
AES: Individual Rounds
Input
Note: Last Round Is Slightly Different from the Rest of the Sub
Rounds (no Mix Columns) Bytes
Shift
Input
Rows
Key 1
Round 0
Mix
Key 2
Round 1 Columns
Key
Schedule
Output
Output
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
Block Cipher Mode of Operation (ECB, CBC, counter)
ENC
ENC
ENC
ENC
ENC
ENC
ENC
ENC
ENC
ENC
ENC
ENC
ENC
ENC
ENC
IV
6 5 4 3 9
One Time Pad
m= 1 2 3 1 4 depends on IV
Make IV unique to
c= 1 2 3 1 4 c= 5 9 1 5 3 c= 7 2 6 0 8 c= 5 6 3 9 7 ensure unique pad
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
AES GCM Fed from Initialization
Vector
Weak but
fast HMAC
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Modular Arithmetic
0
0
• Modulo is like a clock 0
1 1 1
0 1 2 3 4 5 6 7 8 9 10 11… mod 4 3 3 3
2
2
2
• bx mod n = r also written as bx ≡ r (mod n)
• b is the base
• x is the exponent
• n is the modulus
• r is the remainder
• Knowing b, x & n, it is very easy to compute r
• Knowing x, r & n, it is very difficult to compute b = x√ r mod n aka the RSA problem
• Knowing b, r & n, it is very difficult to compute x = logb(r) mod n aka the discrete log problem
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
Encryption with Modular Arithmetic
Alice Bob
Must send a private message m Selects three numbers n, d & e
n & e are public, d is secret
Takes n & e from Bob e, d are chosen such as ed ≡ 1 mod n
c
(we assume m < n)
Computes c = me mod n Computes m' = cd mod n
Attacker can not guess m m' = cd mod n
just knowing c, n and e = (me)d mod n
= med mod n
To decrypt, the attacker would = m1 mod n
need to compute m= d√ m' mod n =m
RSA Problem Bob has reversed the operation !!
Bob knows d but nobody else…
We have an encryption scheme
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Signature with Modular Arithmetic
Alice Bob
Selects three numbers n, d & e
n & e are public, d is secret
Attacker can not guess d e, d are chosen such as ed ≡ 1 mod n
just knowing m, n and e
Must send a signed message m
Takes n & e from Bob
c, m
Computes c = md mod n
(we assume m < n)
Computes m' = ce mod n
m' = ce mod n To forge the signature, the
= (md)e mod n attacker would need to compute
= mde mod n d = loge(m') mod n
= m1 mod n Discrete Logarithm Problem
= m mod n
=m Now how can we find such e, d and n ?
Bob must have sent the c,m
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
Regular Exponentiation –Dichotomy to reverse
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
MODP Exponentiation – dichotomy is broken
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Where Quantum Computers Come In
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Quantum computers in practice…
Schrödinger’s cat
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
About Prime Numbers
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
RSA keys – finding e,d,n | med ≡ m (mod n)
k φ(n)+1 k (n − (p+q−1)) +1
• d= =
e e
• Select e, small integer and k such that GCD(d, φ(n)) = 1 (i.e. d & φ(n) are co-prime)
• e is usually 3 or 65537
• adjust k to make d an integer
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
DH –Diffie-Hellman
Alice Bob
The group definition
Select a generator g and a modulus p
Pick a random number a Apub, (g, p)
Keep a secret!!
Compute Apub = ga mod p
Attacker can not guess a
Attacker can not guess b
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
DH is sensitive to a Man-in-the-Middle Attack
Apub Mpub
Mpub = gm mod p
Mpub Bpub
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
ECC
Elliptic Curve
Cryptography
What is an elliptic curve ?
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Elliptic Curve Addition O
P+Q
• Let P and Q be two points on the curve
P
• A line (P,Q) cuts the curve at a third point R
If the line is parallel to the Y axis, this point is O
Q
If the line is tangent to the curve, the tangent point is counted twice
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
The scalar multiplication n*P
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Fast Forward – the finite fields Fm & F2k 0
0
0
1 1 1
mod 4 3 3 3
• Remember… modulo arithmetic
• Galois Field = Finite Field 2
2
• Let E be an elliptic curve defined over a finite field Fm (modulo m): 2
• E(Fm):{∞} U {(x,y) in FmxFm | y2=x3+ax+b , a,b in Fm}
• E(Fm) is the set of points whose coordinates belong to FmxFm and satisfy the equation + point at infinity
• The set along group operations (+, x) seen before form an Abelian Group under multiplication a field.
• For cryptography, m should be a prime number
• It seems (seemed ?) more computationally efficient if m = 2k-1 yielding the notation F2k
• Multiplication supposed to be more efficient very important for ECDH and ECDS
• In this case, the Koblitz curve is used: y2 + xy = x3 + ax2 + 1 where a=0 or a=1
• For cryptography, k should be a prime number
• m should remain a prime – it would be called a Mersenne Prime
• There is debate about the actual security and efficiency of these curves!
• The order of a group G is the cardinality of that group written ord(G) or |G|.
• The order of a point P in a group G is the value n such that n*P = O written ord(p) or |p|
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Example Curve
E(F11): y2 = x3 + x +2
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Example on F31 – Complexity Increases
m = 25-1 = 31
E(F31): y2 = x3 + x +2
|E(F31)| = 24
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
The same on F127 – Complexity Further Increases
3*P = 2*P+P
|E(F127)| = 136
7*P
Easy to compute on Fm
n*P
Difficult problem :
Knowing E&P, what is n
for this point ?
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
ECDH – Elliptic Curve Diffie-Hellman
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
Representation of
P-256 from "NIST routines"
Elliptic Curves
• Elliptic curve domain parameters
• (p, a, b, G, n, h) for a curve over a prime field Fp
• (m, f(x), a, b, G, n, h) for a curve over a binary field F2m
• Where
• p is the prime modulus
• G is the generator (base point) of the curve
• n is the order of G. i.e n*G=O
• a, b are the coefficient of y2 + xy = x3 + ax + b (mod p)
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
A back door’ed PRNG: Dual EC DRBG
source: NIST 800-90A
Issue #1: extract too many bits –
only 16 bits to guess leads to s*Q.
Not a problem in itself…
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Performance and
Security
Comparisons
Security Level of Symmetric Crypto Algorithms
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
ECDH Gains in Security
The Table Below Shows the Comparable Key Lengths Required in DH/RSA as
Compared to ECC Based DH to Secure a Symmetric Key of a Given Length
80 163 1024
112 233 2048
128 283 3072
192 409 7680
256 571 15360
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Quantum Strength (for comparison)
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 73
IOS IKEv2 New Smart Defaults
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
IOS IKEv2 Smart Defaults Performance
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Rough Performance Comparison
128 bits 128 116MBps 130MBps - - - 4096 bits 136 /s 8.5K /s k283 1.6K /s 1K /s
192 bits 192 98.5 MBps 109 MBps - - - 7680 bits - - k409 723 /s 568 /s
256 bits 256 85 MBps 94 MBps - - - 15360 bits - - k571 348 /s 249 /s
Optimizations...
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
See Performances for Yourself 😀😀
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
Practical Use...
The Crypto Angle
Certificates – Just an example…
Version: 3 (0x2)
Serial Number: 302543474681041022 (0x432d9aff179d07e)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, O=Google Inc, CN=Google Internet Authority G2
Validity
Not Before: Dec 10 17:52:51 2015 GMT
Not After : Mar 9 00:00:00 2016 GMT
Subject: C=US, ST=California, L=Mountain View, O=Google Inc, CN=*.google.com
SHA-256 Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit) If r is an unknown secret integer (private key), this big number is r*G mod p.
pub:
04:b5:64:5b:fa:48:ed:b7:f5:57:ba:24:d4:cc:b0:d8:74:5d:a3:6f:90:6a:37:e6:df:d8:6f:46:71:6a:
09:e8:e3:64:b6:28:31:20:b4:9d:24:7f:6b:81:09:4b:b1:7d:3b:98:68:b5:4a:02:28:fe:b7:40:46:65:
5b:f6:9d:a0:38
ASN1 OID: prime256v1
NIST CURVE: P-256 This is a "named curve"
NIST Routines defines (p, a, b, G, n)
X509v3 extensions: [SKIPPED]
Basic Fields
Subject Name
Issuer Name
Validity
Public Key
Extensions
QR Public Key Non Critical
QR Signature Extensions
Signature
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
IKEv2
Initiator Responder
Proposed Security Suites, Ni, ga mod p (KEi)
KDF(gab, Nonces)SKEYSEED
SK_d, SK_ai, SK_ar, SK_ei, IDi, Certificate Chain, Auth,
SK_er, SK_pi, SK_pr TSi, TSr, Sai2
KDF(gab, Nonces)SKEYSEED
SK_d, SK_ai, SK_ar, SK_ei,
IDr, Auth, TSi, TSr, Sar2
SK_er, SK_pi, SK_pr
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Hash DRBG for Key Derivation and Authentication For post-quantum, see:
• draft-tjhai-ipsecme-hybrid-qske-ikev2
• draft-fluhrer-qr-ikev2
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
IPsec: ESP packet format
IPsec HMAC and Encryption keys independent of IKE sessions keys.
Sequence Number
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
SSL/TLS with Pre-Master Secret (no DH)
Client Server
Hello, Client Random, Proposed Security Suites (incl. DH)
PreMaster = DecServerPub(…)
Change Cipher Spec
KDF(PreMaster, randoms)
kmc, kms, ke
Client finished: PRF (dialog)
traffic
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
SSL/TLS with Ephemeral Diffie-Hellman
Client Server
Hello, Client Random, Proposed Security Suites (incl. DH)
PreMaster = gab
Master = PRF(PreMaster, randoms)
Kcm, Ksm, Kce, Kse, …
gb mod p
traffic
While TLS offers and recommends regular rekey, tickets span for the lifetime of
the application [Blackhat.com US-13-Daigniere-TLS-Secrets-Slides]
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
TLS Key Derivation and Authentication
P_hash(secret, seed) = HMAC_hash (secret, A(1) + seed) +
HMAC_hash (secret, A(2) + seed) +…
A() is defined as
A(0) = seed
Hash DRBG prf: A(i) = HMAC_hash(secret, A(i-1))
the conversation
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Recommendations
and Conclusion
Reassurance
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 89
Recommendations
• Protocols
• IKEv2 is cool – use it if you can (not always possible)
• Keep an eye on TLS1.3 for improvements
• Key Exchange
• Use PFS
• Prefer ECDH 263 bits for mid term security (~15 years) or MODP 3184 bits for 15+ years
• If MODP, use DH group >> 1024 (1536 or 2048 preferred).
• IKEv2: group 5 (~1500 bits) or better
• TLS 1.2: FIX YOUR SERVERS!! https://weakdh.org/sysadmin.html
• Upgrade to TLS 1.3 whenever possible (still draft)
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 90
Reputedly Safe Elliptic Curves
source: http://safecurves.cr.yp.to
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 91
Some Random Software… FlexVPN (IOS)
IKEv2 Profile
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 97
A Short Bibliography
• NIST SP 800-90A : Recommendations for Random Number Generation Using Deterministic Random Bit Generators
• NIST SP 800-38D : Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC
• NIST SP 800-56A (R2): Pair-Wise Key Establishment Schemes Using Discrete Logarithm Cryptography (i.e. DH, ECDH + key derivation methods)
• NIST 800-131Ar1: Transitions: Recommendations fro Transitioning the Use of Cryptographic Algorithms and Key Lengths
• NIST FIPS 186-4: Digital Signature Standard (DSS) (DSA, RSA (PKCS#1), ECDSA,…)
• Transcript Collision Attacks: Breaking authentication in TLS, IKE and SSH: http://www.mitls.org/downloads/transcript-collisions.pdf
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 98
Related Sessions
• BRKSEC-3054 – IOS FlexVPN Remote Access, IoT and Site-to-Site advanced Crypto VPN Designs
• Piotr Kupisiewicz
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Continue your education
Demos in the
Walk-in labs
Cisco campus
BRKSEC-3005 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Thank you