IPSec VPN Design

Book description

The definitive design and deployment guide for secure virtual private networks

  • Learn about IPSec protocols and Cisco IOS IPSec packet processing

  • Understand the differences between IPSec tunnel mode and transport mode

  • Evaluate the IPSec features that improve VPN scalability and fault tolerance, such as dead peer detection and control plane keepalives

  • Overcome the challenges of working with NAT and PMTUD

  • Explore IPSec remote-access features, including extended authentication, mode-configuration, and digital certificates

  • Examine the pros and cons of various IPSec connection models such as native IPSec, GRE, and remote access

  • Apply fault tolerance methods to IPSec VPN designs

  • Employ mechanisms to alleviate the configuration complexity of a large- scale IPSec VPN, including Tunnel End-Point Discovery (TED) and Dynamic Multipoint VPNs (DMVPN)

  • Add services to IPSec VPNs, including voice and multicast

  • Understand how network-based VPNs operate and how to integrate IPSec VPNs with MPLS VPNs

  • Among the many functions that networking technologies permit is the ability for organizations to easily and securely communicate with branch offices, mobile users, telecommuters, and business partners. Such connectivity is now vital to maintaining a competitive level of business productivity. Although several technologies exist that can enable interconnectivity among business sites, Internet-based virtual private networks (VPNs) have evolved as the most effective means to link corporate network resources to remote employees, offices, and mobile workers. VPNs provide productivity enhancements, efficient and convenient remote access to network resources, site-to-site connectivity, a high level of security, and tremendous cost savings.

    IPSec VPN Design is the first book to present a detailed examination of the design aspects of IPSec protocols that enable secure VPN communication. Divided into three parts, the book provides a solid understanding of design and architectural issues of large-scale, secure VPN solutions. Part I includes a comprehensive introduction to the general architecture of IPSec, including its protocols and Cisco IOS® IPSec implementation details. Part II examines IPSec VPN design principles covering hub-and-spoke, full-mesh, and fault-tolerant designs. This part of the book also covers dynamic configuration models used to simplify IPSec VPN designs. Part III addresses design issues in adding services to an IPSec VPN such as voice and multicast. This part of the book also shows you how to effectively integrate IPSec VPNs with MPLS VPNs.

    IPSec VPN Design provides you with the field-tested design and configuration advice to help you deploy an effective and secure VPN solution in any environment.

    This security book is part of the Cisco Press® Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

    Table of contents

    1. About This eBook
    2. Title Page
    3. Copyright Page
    4. About the Authors
    5. About the Technical Editors
    6. Dedications
    7. Acknowledgments
    8. Contents at a Glance
    9. Contents
    10. Icons Used in This Book
    11. Command Syntax Conventions
    12. Introduction
      1. The Goals of This Book
      2. Who Should Read This Book
      3. How This Book Is Organized
    13. Chapter 1. Introduction to VPNs
      1. Motivations for Deploying a VPN
      2. VPN Technologies
        1. Layer 2 VPNs
        2. Layer 3 VPNs
        3. Remote Access VPNs
      3. Summary
    14. Chapter 2. IPSec Overview
      1. Encryption Terminology
        1. Symmetric Algorithms
        2. Asymmetric Algorithms
        3. Digital Signatures
      2. IPSec Security Protocols
        1. IPSec Transport Mode
        2. IPSec Tunnel Mode
        3. Encapsulating Security Header (ESP)
        4. Authentication Header (AH)
      3. Key Management and Security Associations
        1. The Diffie-Hellman Key Exchange
        2. Security Associations and IKE Operation
        3. IKE Phase 1 Operation
        4. IKE Phase 2 Operation
        5. IPSec Packet Processing
      4. Summary
    15. Chapter 3. Enhanced IPSec Features
      1. IKE Keepalives
      2. Dead Peer Detection
      3. Idle Timeout
      4. Reverse Route Injection
        1. RRI and HSRP
      5. Stateful Failover
        1. SADB Transfer
        2. SADB Synchronization
      6. IPSec and Fragmentation
        1. IPSec and PMTUD
        2. Look Ahead Fragmentation
      7. GRE and IPSec
      8. IPSec and NAT
        1. Effect of NAT on AH
        2. Effect of NAT on ESP
        3. Effect of NAT on IKE
        4. IPSec and NAT Solutions
      9. Summary
    16. Chapter 4. IPSec Authentication and Authorization Models
      1. Extended Authentication (XAUTH) and Mode Configuration (MODE-CFG)
      2. Mode-Configuration (MODECFG)
      3. Easy VPN (EzVPN)
        1. EzVPN Client Mode
        2. Network Extension Mode
      4. Digital Certificates for IPSec VPNs
        1. Digital Certificates
        2. Certificate Authority—Enrollment
        3. Certificate Revocation
      5. Summary
    17. Chapter 5. IPSec VPN Architectures
      1. IPSec VPN Connection Models
        1. IPSec Model
        2. The GRE Model
        3. The Remote Access Client Model
        4. IPSec Connection Model Summary
      2. Hub-and-Spoke Architecture
        1. Using the IPSec Model
        2. Transit Spoke-to-Spoke Connectivity Using IPSec
        3. Internet Connectivity
        4. Scalability Using the IPSec Connection Model
        5. GRE Model
        6. Remote Access Client Connection Model
        7. Scalability of Client Connectivity Models
      3. Full-Mesh Architectures
        1. Native IPSec Connectivity Model
        2. GRE Model
      4. Summary
    18. Chapter 6. Designing Fault-Tolerant IPSec VPNs
      1. Link Fault Tolerance
        1. Backbone Network Fault Tolerance
        2. Access Link Fault Tolerance
        3. Access Link Fault Tolerance Summary
        4. IPSec Peer Redundancy
        5. Simple Peer Redundancy Model
        6. Virtual IPSec Peer Redundancy Using HSRP
        7. IPSec Stateful Failover
        8. Peer Redundancy Using GRE
        9. Virtual IPSec Peer Redundancy Using SLB
        10. Server Load Balancing Concepts
      2. IPSec Peer Redundancy Using SLB
        1. Cisco VPN 3000 Clustering for Peer Redundancy
        2. Peer Redundancy Summary
      3. Intra-Chassis IPSec VPN Services Redundancy
        1. Stateless IPSec Redundancy
        2. Stateful IPSec Redundancy
      4. Summary
    19. Chapter 7. Auto-Configuration Architectures for Site-to-Site IPSec VPNs
      1. IPSec Tunnel Endpoint Discovery
        1. Principles of TED
        2. Limitations with TED
        3. TED Configuration and State
        4. TED Fault Tolerance
      2. Dynamic Multipoint VPN
        1. Multipoint GRE Interfaces
        2. Next Hop Resolution Protocol
        3. Dynamic IPSec Proxy Instantiation
        4. Establishing a Dynamic Multipoint VPN
        5. DMVPN Architectural Redundancy
        6. DMVPN Model Summary
      3. Summary
    20. Chapter 8. IPSec and Application Interoperability
      1. QoS-Enabled IPSec VPNs
        1. Overview of IP QoS Mechanisms
        2. IPSec Implications for Classification
        3. IPSec Implications on QoS Policies
      2. VoIP Application Requirements for IPSec VPN Networks
        1. Delay Implications
        2. Jitter Implications
        3. Loss Implications
      3. IPSec VPN Architectural Considerations for VoIP
        1. Decoupled VoIP and Data Architectures
        2. VoIP over IPSec Remote Access
        3. VoIP over IPSec-Protected GRE Architectures
        4. VoIP Hub-and-Spoke Architecture
        5. VoIP over DMVPN Architecture
        6. VoIP Traffic Engineering Summary
      4. Multicast over IPSec VPNs
        1. Multicast over IPSec-protected GRE
        2. Multicast on Full-Mesh Point-to-Point GRE/IPSec Tunnels
        3. DMVPN and Multicast
        4. Multicast Group Security
        5. Multicast Encryption Summary
      5. Summary
    21. Chapter 9. Network-Based IPSec VPNs
      1. Fundamentals of Network-Based VPNs
      2. The Network-Based IPSec Solution: IOS Features
        1. The Virtual Routing and Forwarding Table
        2. Crypto Keyrings
        3. ISAKMP Profiles
      3. Operation of Network-Based IPSec VPNs
        1. A Single IP Address on the PE
        2. Front-Door and Inside VRF
        3. Configuration and Packet Flow
        4. Termination of IPSec on a Unique IP Address Per VRF
      4. Network-Based VPN Deployment Scenarios
        1. IPSec to MPLS VPN over GRE
        2. IPSec to L2 VPNs
        3. PE-PE Encryption
      5. Summary
    22. Index
    23. Code Snippets

    Product information

    • Title: IPSec VPN Design
    • Author(s): Vijay Bollapragada, Mohamed Khalid, Scott Wainner
    • Release date: March 2005
    • Publisher(s): Cisco Press
    • ISBN: 1587051117