Using IPsec VPN Technologies
 Several types of IPsec VPNs are used to permit secure, encrypted communication between network devices.
IPsec VPN Overview
IPsec functionality provides data encryption at the IP packet level, offering a robust, standards-based security solution.
Basic  IPsec provides secure point-to-point tunnels between two peers, such as  two routers. These tunnels are actually sets of security associations  (SA) that are established between two IPsec peers. The SAs define which  protocols and algorithms should be applied to sensitive packets and  specify the keying material to be used by the two peers. SAs are  unidirectional and are established per security protocol, either  Authentication Header (AH) or Encapsulating Security Payload (ESP).
With  IPsec, the network manager can define which traffic should be protected  between two IPsec peers by configuring ACLs and applying these ACLs to  interfaces by way of crypto maps. The ACLs used for IPsec are used only  to determine which traffic should be protected by IPsec, not which  traffic should be blocked or permitted through the interface. Separate  ACLs define blocking and permitting at the interface.
IPsec  can support certain traffic that is receiving one combination of IPsec  protection (for example, authentication only) and other traffic that is  receiving a different combination of IPsec protection (for example, both  authentication and encryption), by using two different crypto ACLs to  define the two different types of traffic. These different ACLs are then  used in different crypto map entries, which specify different IPsec  policies.
Standard IPsec VPNs support only unicast traffic, which is an issue for deploying them within an enterprise.
 Extensions to Basic IPsec VPNs
 Several site-to-site VPN solutions extend the capabilities of basic IPsec VPNs.
Cisco  provides several site-to-site VPN solutions that support routing to  deliver reliable transport for complex mission-critical traffic, such as  voice and client/server applications. These solutions are built on five  underlying VPN technologies:
-  
Cisco Easy VPN
 -  
GRE tunneling
 -  
Dynamic Multipoint VPN (DMVPN)
 -  
Virtual tunnel interfaces (VTIs)
 -  
Group Encrypted Transport VPN (GET VPN)
 
Each technology is customized to meet specific deployment requirements.
Cisco Easy VPN
 The Cisco Easy VPN solution provides simple VPN deployments for remote offices and teleworkers.
Ease  of deployment is critical when technical resources are not available  for VPN configuration at remote offices and for teleworkers. The Cisco  Easy VPN solution centralizes VPN management across all Cisco VPN  devices and reduces the management complexity of VPN deployments. The  Cisco Easy VPN Remote feature and the Cisco Easy VPN Server feature  offer flexibility, scalability, and ease of use for site-to-site and  remote-access VPNs.
The  Cisco Easy VPN Remote feature allows Cisco routers running Cisco IOS  Software Release 12.2(4)YA (or later releases), Cisco PIX Firewalls, and  Cisco hardware clients to act as remote VPN clients. These devices can  receive predefined security policies and configuration parameters from  the VPN headend at the central site, which minimizes the VPN  configuration required at the remote location. Parameters such as  internal IP addresses, internal subnet masks, DHCP server addresses,  Microsoft WINS server addresses, and split-tunneling flags are all  pushed to the remote device.
The  Cisco Easy VPN Server feature, available in Cisco IOS Software Release  12.2(8)T or later releases, increases compatibility of Cisco VPN  products, and allows Cisco VPN concentrators, Cisco ASA/PIX Firewalls,  or Cisco routers to act as VPN headend devices in site-to-site or  remote-access VPNs. With this feature, security policies defined at the  headend can be pushed to the remote-office devices running the Cisco  Easy VPN Remote feature.
 Overview of Cisco Easy VPN Server Wizard on Cisco SDM
 The  Cisco Router and Security Device Manager (SDM) Easy VPN Server Wizard  can configure the Cisco Easy VPN Server on Cisco routers.
The  Cisco Easy VPN solution is ideal for remote offices with little IT  support or for large customer deployments where it is impractical to  individually configure multiple remote devices. This feature makes VPN  configuration as easy as entering a password, which minimizes local IT  support, increases productivity, and lowers costs. Figure 9-8  shows the starting Cisco SDM screen for the Easy VPN Server Wizard that  can configure the Cisco Easy VPN Server. The Easy VPN Server Wizard  guides network administrators in performing the following tasks to  successfully configure a Cisco Easy VPN Server on a router:
-  
Selecting the interface on which the client connections will terminate
 -  
Configuring Internet Key Exchange (IKE) policies
 -  
Configuring the Group Policy lookup method
 -  
Configuring user authentication
 -  
Configuring group policies on local database, if needed
 -  
Configuring an IPsec transform set
 
| Note |   
  |  
| Note |   
  |  
 Overview of Easy VPN Remote Wizard on Cisco SDM
 The Cisco SDM Easy VPN Remote Wizard can configure the Cisco Easy VPN Remote devices. Figure 9-9 illustrates the SDM graphical configuration interface.
The  Cisco SDM Easy VPN Remote Wizard can configure a remote router that  will be connecting to the Cisco Easy VPN Server router. To launch the  wizard in Cisco SDM, on the configuration Tasks button list on the left,  click VPN. Select Easy VPN Remote in the tree hierarchy on the left.  With the Create an Easy VPN Remote option selected, click the Launch the  Selected Task button.
GRE over IPsec
Basic  IPsec designs cannot transport IGP dynamic routing protocols or IP  multicast traffic because the IPsec ESP only tunnels unicast IP traffic.  To support the routing or IP multicast requirements of most  enterprises, IPsec should be used in conjunction with other  technologies, such as GRE.
GRE tunneling, as shown in Figure 9-10,  encapsulates non-IP and IP multicast or broadcast packets into IP  unicast packets. These GRE packets can be encrypted by the IPsec tunnel.  At the remote end of the IPsec tunnel, both the IPsec encapsulation and  the GRE encapsulation are removed to recover the original packet. With  GRE over IPsec designs, the hub router uses a single GRE interface for  each spoke.
 GRE over IPsec Design Recommendations
  A  routing protocol can dynamically rebalance traffic across redundant  headend routers on failover recovery. Although IPsec can typically scale  to thousands of tunnels on some platforms, a routed point-to-point GRE  over IPsec design is generally limited by the routing protocol being  used and the number of routing peers exchanging routing information. In  an aggressive design, the headend routing protocol can scale up to 500  peers:
-  
Up to 500 peers for the Cisco 7200VXR series routers with Network Processing Engine-G1 (NPE-G1)
 -  
Up to 600 peers for the Cisco 7200VXR series with NPE-G2
 -  
Up to 1000 peers for the Cisco 7600 series router (or Cisco Catalyst 6500 series switches) with Supervisor Engine 720
 
EIGRP  is recommended as the routing protocol because of its conservative use  of router CPU and network bandwidth and its quick convergence times.  EIGRP also provides a range of options for address summarization and  default route propagation.
GRE  keepalives can be used for failure detection in case of static routing  on point-to-point tunnels. Beginning in Cisco IOS Software Release  12.2(8)T, the GRE keepalive feature is available for use on tunnel  interfaces. This functionality allows the line protocol of the tunnel  interface to track the reachability between the two tunnel endpoints. If  GRE keepalives are sent and acknowledged by the remote router, the line  protocol is “up.” If successive GRE keepalives are not acknowledged,  based on the configured interval and number of retries, the tunnel line  protocol is marked “down.”
 Figure 9-11  shows a simple hub-and-spoke network with multiple headend devices for  redundancy. Point-to-point GRE and crypto tunnels functionally coexist  on the same router CPU on the headend devices. The headend supports  multiple point-to-point GRE over IPsec tunnels for a prescribed number  of branch-office locations. In addition to terminating the VPN tunnels  at the central site, the headend can advertise branch routes using IP  routing protocols such as EIGRP and Open Shortest Path First (OSPF).
To  avoid asymmetric routing when routing is running over the tunnels, one  of the GRE tunnels between the headend routers and each remote site must  be favored. The routing metric should be consistent both upstream and  downstream to prevent asymmetric routing.
There  are options for configuring different paths in this design with  slightly different metrics to provide preference between the tunnels:
-  
Use the delay command under the GRE tunnel interface.
 -  
Set the bandwidth value for the GRE interface on both ends to match the speed of the actual link. This practice avoids unrealistic bandwidth settings that might affect the flow control of EIGRP.
 
 Hub-and-spoke topologies are the most common topologies in a point-to-point GRE over IPsec design:
-  
Although partial-mesh topologies are available, they are limited by both the routing protocol and the availability of static public IP addresses for the spokes.
 -  
Full-mesh topologies in a point-to-point GRE over IPsec design are also available and have the same limitations as partial-mesh topologies. With the administrative overhead involved, a full-mesh topology is not recommended in a point-to-point GRE over IPsec design.
 
DMVPN
Hub-and-spoke  designs do not scale well for more than 10 sites. With a traditional  hub-and-spoke topology, all spoke-to-spoke traffic is through the hub.  As more nodes are added to the topology, the configuration task becomes  more complex because a separate GRE interface is needed on the hub for  every spoke and all tunnels need to be predefined. In addition, the  number of IPsec SAs grows as the number of spokes increases.
In  these cases, dynamic peer discovery and on-demand tunnel creation  mechanisms are required. When there is more than 20 percent  spoke-to-spoke traffic or a full-mesh VPN topology is required, a DMVPN  solution should be considered.
 DMVPN Overview
 DMVPN  is a technology that supports IPsec VPNs with simplified configuration  through crypto profiles and dynamic discovery of tunnel endpoints.
DMVPN  enables dynamic configuration and reduces the maintenance and  configuration on the hubs. DMVPN has a backbone hub-and-spoke topology,  but allows direct spoke-to-spoke functionality using tunnelling to  enable the secure exchange of data between two branch offices without  traversing the head office. DMVPN is a combination of IPsec, GRE, and  Next Hop Resolution Protocol (NHRP).
DMVPN has several advantages:
-  
With a dynamic mesh, the number of active tunnels is much lower on each spoke than with a full-mesh design. Smaller routers can be used at the spokes.
 -  
The configuration scales better because there is no need for static definitions for each spoke in the hub.
 -  
It is easier to add a node to the topology because there is no need to configure the new spoke on all the other nodes.
 -  
The spokes can have dynamic address or be behind NAT.
 
| Note |   
  |  
Example: DMVPN Topology
 Figure 9-12  shows an example of a DMVPN topology. DMVPN does not alter the  standards-based IPsec VPN tunnels, but it changes their configuration.
The  hub router maintains an NHRP database of public interface addresses for  each spoke. The hub uses a single multipoint GRE (mGRE) tunnel  interface to support multiple IPsec tunnels.
The  spokes have a permanent IPsec tunnel to the hub but not to the other  spokes. The spokes register as clients of the NHRP server. The spoke  learns of all private networks on the other spokes and the hub through  routing updates sent by the hub. A spoke queries the NHRP database for  the real address of a destination spoke when it needs to communicate to  another destination. The spoke uses the real destination address to  build a dynamic IPsec tunnel to the target spoke. The spoke-to-spoke  tunnel is also built over an mGRE interface. After the spoke-to-spoke  tunnel is built, the IP next hop for the remote spoke network is the  spoke-to-spoke tunnel interface. After a programmable timeout period,  the NHRP entries will age out, triggering IPsec to break down the  dynamic spoke-to-spoke tunnel.
 In Figure 9-12, spoke A uses the real IP address of 172.16.2.1 to bring up a tunnel to spoke B.
 DMVPN Design Recommendations
 Cisco recommends several practices for DMVPN with the hub-and-spoke topology:
-  
Use tunnel protection mode to associate a GRE tunnel with the IPsec profile on the same router. Tunnel protection specifies that IPsec encryption is performed after the GRE headers are added to the tunnel packet. Both ends of the tunnel need to be protected.
 -  
Use IPsec in tunnel mode.
 -  
Configure 3DES or AES for encryption of transported data.
 -  
Use digital certificates or public key infrastructure (PKI) for scalable tunnel authentication. Typically, the CA is located on the private subnet of the hub.
 -  
Configure EIGRP with route summarization for dynamic routing.
 -  
Deploy hardware acceleration of IPsec to minimize router CPU overhead to support traffic with low-latency and -jitter requirements, and for the highest performance for cost.
 -  
Use an NHRP network ID and password key to prevent unauthorized nodes from joining the VPN. Provide each mGRE tunnel interface with a unique tunnel key, NHRP network ID, and IP subnet address. The mGRE tunnel key configured on the spokes must match the hub, and it is a recommended practice that the network ID matches on both sides of the tunnel.
 -  
Use multiple NHRP servers on multiple hubs for backup and redundancy.
 
0 comments
Post a Comment