Friday, April 17, 2015

SITE TO SITE VPN CONFIGURATION THEORY

SITE TO SITE VPN  Configuration theory 

IP Sec: Set of rules for securing data communication across a public, untrusted network 

suchas the Internet.

Encryption: DES, 3DES (Data encryption Standard), AES (Advanced Encryption Standard).

Symmetric: Symmetric keys uses the same values to both encrypt and decrypt the data.

Asymmetric: Asymmetric keys use one value to encrypt the data and another one to 

decrypt It.Hell-man

Authentication: hash-based msg authentication codes (HMAC) combines a hash function.

MD5 or SHA1 (Secure Hash Algorithm) with Shared Key.


IP sec Header

Authentication Header: Authenticate the packet include the ip header. Ip Port no 51

Encapsulation Security Pay load: 
       Encrypts packet payloads and can optional authenticates.   It adds a header and a 

trailerto the packet. The packet is encrypted first and then put through the hash 

mechanism. IP Port no 50

IP sec Mode: Transport Mode or tunnel mode.

Headers difference only.

Transport mode: uses the original IP header. The data payload can be encrypted. 

Transport mode is often used with Generic routing encapsulation (GRE).


Tunnel Mode: Replace the original IP header with a tunnel header. The ESP header is 

placed after the new header before the original one.

The original ip header can be encrypted along with the data payload and the packet can 

be Authenticated from the ESP header back.

When IPSec establishes a VPN between two peers, it sets up a Security Association (SA)

between them.

The Internet Security Association and Key Management Protocol (ISAKMP) defines how SA is

Created and deleted.

Internet Key Exchange (IKE) Mode: Main and Aggressive
 
Configuring a Site to Site VPN

1.       Configure the ISAKMP Policy

2.       Configure the crypto access control list (ACL)       

3.       Configure the IPSec transform Set or sets.

4.       Configure the crypto Map.

5.       Apply the Crypto Map to the outgoing interface.

6.       Optionally configure and apply an ACL that permits only IPSec or IKE traffic.

IKE Phase 1 (Internet Key Exchange Phase 1)

           Setup Secure Communication channel between peers.  A Basic setup of security

services are negotiated and agreed between peers.  The security service protects all the 

sub Sequent communication between peers.

IKE Phases 2

             IKE negotiation IPSEC Security Association (SA) Parameters and setup matching 

IPSEC SA in the peers. The security parameters are used to protect data and msg that are 

exchange between endpoints.

4 comments:

  1. That is really nice to hear. thank you for the update and good luck. windscribe free

    ReplyDelete
  2. Great article with excellent idea!Thank you for such a valuable article. I really appreciate for this great information.. tor vs vpn

    ReplyDelete
  3. Your blog provided us with valuable information to work with. Each & every tips of your post are awesome. Thanks a lot for sharing. Keep blogging.. avast vpn torrenting

    ReplyDelete