1.2 1. LAN - To - LAN VPN Using Crypto Maps
1.2 1. LAN - To - LAN VPN Using Crypto Maps
c
Manual Encryption Key
A Common Key, which exists on both sides, is used to encrypt and decrypt
data.
If the same key is used to send a lotc of data, the intruder in the middle can
collect the data and run it against the Brute Force Dictionary Attack to
reverse engineer the key by match the combination of the characters with
words in the dictionary.
Dynamic Key Generation
To counter this, you need to frequently change the key for encryption and
decryption.
This potentially can be done manually, but it is very cumbersome to do.
c
A mechanism was developed to generate the Key on a frequent basis
automatically.
This mechanism is known as Diffie Hellman.
The purpose of DH is to generate a Key for Data Encryption on a frequent
basis. The default on a Cisco Router is every 3600 seconds. [ 1 hours ].
Each device generates its own key.
Key Exchange Tunnel
The keys generated by DH need to be exchanged between the 2 entities. Entity A requires Entity
B's key to decrypt data from B to A and vice versa.
A Secure tunnel is required to encrypt the key exchange.
An Secure tunnel requires 3 components:
c
o A Key – This key will be used to encrypt the Key generated by Diffie Hellman. It is known as the
Pre-shared Key. This key is configured manually on both sides. It needs to match.
o Encryption mechanism [DES,3DES,AES] - Data Confidentiality
o Hash mechanism [MD5,SHA] - Data Integrity
To exchange the Keys that are going to be used for Data Encryption and Decryption, a protocol
was developed.
The protocol is called ISAKMP / IKE [UDP/500]. The purpose of this protocol is to securely
exchange the Keys.
Data Encryption Tunnel
Once the Keys are generated and exchanged, you are ready for the Data
Tunnel. The first tunnel now goes into IDLE state.
The Key used for this tunnel is the dynamically generated key that was
exchanged in the first tunnel.
You need to define the Encryption and Hash parameters for this tunnel as
well.
The protocol used for this tunnel is ESP [IP Protocol 50].
IPSec Tunnels
c
IPSec LAN – To – LAN Tunnels
Policy Based tunnels are tunnels that are configured by specifying the
Interesting traffic [Traffic that needs to be encrypted] by using a Policy
[ACL].
c
If the traffic match the Policy [ACL] it is encapsulated within the ESP
header. The Outer header will have the Public IP Addresses of the Tunnel
Endpoints.
The Drawback is that every time a new network is added, the ACL needs
to be modified on both ends.
IPSec LAN – To – LAN Tunnel
Configure an IPSec LAN – To – LAN VPN to encrypt the traffic between the internal private
networks.
L2L IPSec VPN – Step # 1
Step 1. Configure Phase I Parameters
R1
R2
R1
c
Crypto ipsec transform-set TSET esp-3des esp-sha-hmac
R2
R1
c
Access-list 101 permit ip 10.1.0.0 0.0.255.255 10.2.0.0 0.0.255.255
R2
R1
R2
R1
Interface E 0/0 c
crypto map CMAP
R2
Interface E 0/0
crypto map CMAP
Whiteboard