SlideShare a Scribd company logo
1 of 64
CCNA Security v2.0
Chapter 8:
Implementing Virtual Private
Networks
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2
8.0 Introduction
8.1 VPNs
8.2 IPsec VPN Components and
Operations
8.3 Implementing Site-to-Site
IPsec VPNs with CLI
8.4 Summary
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Upon completion of this section, you should be able to:
• Describe VPNs and their benefits.
• Compare site-to-site and remote-access VPNs.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
VPN Benefits:
• Cost Savings
• Security
• Scalability
• Compatibility
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 7
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
Remote-Access VPN
Site-to-Site VPN
Access
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
Upon completion of this section, you should be able to:
• Describe the IPsec protocol and its basic functions.
• Compare AH and ESP protocols.
• Describe the IKE protocol.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 12
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
IPsec Implementation
ExamplesIPsec Framework
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Confidentiality with Encryption:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Encryption Algorithms:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Hash Algorithms
Security of Hash Algorithms
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Peer Authentication Methods
PSK
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
RSA
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
Diffie-Hellman Key Exchange
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 20
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
AH Protocols
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
Router Creates Hash and Transmits
to Peer
Peer Router Compares Recomputed
Hash to Received Hash
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
Apply ESP and AH in Two Modes
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
ESP Tunnel Mode
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 28
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
Upon completion of this section, you should be able to:
• Describe IPsec negotiation and the five steps of IPsec configuration.
• Configure the ISAKMP policy.
• Configure the IPsec policy.
• Configure and apply a crypto map.
• Verify the IPsec VPN.
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 33
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
IPsec VPN Negotiation:
Step 2 - R1 and R2
negotiate an IKE Phase 1
session.
IPsec VPN Negotiation:
Step 1 - Host A sends
interesting traffic to Host B.
IPsec VPN Negotiation:
Step 3 - R1 and R2
negotiate an IKE Phase
2 session.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
IPsec VPN Negotiation:
Step 4 - Information is
exchanged via IPsec tunnel.
IPsec VPN Negotiation:
Step 5 - The IPsec
tunnel is terminated.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
XYZCORP Security Policy Configuration Tasks
Encrypt traffic with AES 256 and SHA 1. Configure the ISAKMP policy for IKE Phase 1
Authentication with PSK 2. Configure the IPsec policy for IKE Phase 2
Exchange keys with group 24 3. Configure the crypto map for IPsec policy
ISAKMP tunnel lifetime is 1 hour 4. Apply the IPsec policy
IPsec tunnel uses ESP with a 15-min. lifetime 5. Verify the IPsec tunnel is operational
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
ACL Syntax for
IPsec Traffic
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
Permitting Traffic for IPsec Negotiations
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 41
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
The crypto isakmp key Command
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Pre-Shared Key Configuration
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 47
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
The IKE Phase 1 Tunnel Does Not Exist Yet
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Configure an ACL to Define Interesting Traffic
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
The crypto ipsec transform-set Command
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
The crypto ipsec transform-set Command
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 52
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Crypto Map Configuration Commands
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Crypto Map Configuration:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Crypto Map Configuration:
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 58
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Use Extended Ping to Send Interesting Traffic
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Verify the ISAKMP Tunnel is Established
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Verify the IPsec Tunnel is Established
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
Chapter Objectives:
• Explain the purpose of VPNs.
• Explain how IPsec VPNs operate.
• Configure a site-to-site IPsec VPN, with pre-shared key authentication,
using the CLI.
Thank you.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
• Remember, there are
helpful tutorials and user
guides available via your
NetSpace home page.
(https://www.netacad.com)
• These resources cover a
variety of topics including
navigation, assessments,
and assignments.
• A screenshot has been
provided here highlighting
the tutorials related to
activating exams, managing
assessments, and creating
quizzes.
1
2

More Related Content

What's hot

012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
Babaa Naya
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
Babaa Naya
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
Rassul Ismailov
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
Bill McGee
 
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Oscar Romano
 

What's hot (20)

Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1Ccna sv2 instructor_ppt_ch1
Ccna sv2 instructor_ppt_ch1
 
012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9012 2 ccna sv2-instructor_ppt_ch9
012 2 ccna sv2-instructor_ppt_ch9
 
04 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch504 ccna sv2 instructor_ppt_ch5
04 ccna sv2 instructor_ppt_ch5
 
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)Nexus DataCenter Switch の概要 (2014/8/06 webcast)
Nexus DataCenter Switch の概要 (2014/8/06 webcast)
 
MOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talkMOSSCon 2013, Cisco Open Source talk
MOSSCon 2013, Cisco Open Source talk
 
Deploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless CampusDeploying Secure Converged Wired, Wireless Campus
Deploying Secure Converged Wired, Wireless Campus
 
Infrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and FaultsInfrastructure Resilience against Attacks and Faults
Infrastructure Resilience against Attacks and Faults
 
Secure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDMSecure Data Center Solution with FP 9300 - BDM
Secure Data Center Solution with FP 9300 - BDM
 
Icnd210 s04l02
Icnd210 s04l02Icnd210 s04l02
Icnd210 s04l02
 
Deployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_applianceDeployment of cisco_iron_portweb_security_appliance
Deployment of cisco_iron_portweb_security_appliance
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
 
Presentación - Cisco ASA with FirePOWER Services
Presentación -  Cisco ASA with FirePOWER ServicesPresentación -  Cisco ASA with FirePOWER Services
Presentación - Cisco ASA with FirePOWER Services
 
Deploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CXDeploying Next Generation Firewalling with ASA - CX
Deploying Next Generation Firewalling with ASA - CX
 
Cisco ASA Firepower
Cisco ASA FirepowerCisco ASA Firepower
Cisco ASA Firepower
 
How to prevent ssh-tunneling using Palo Alto Networks NGFW
How to prevent ssh-tunneling using Palo Alto Networks NGFWHow to prevent ssh-tunneling using Palo Alto Networks NGFW
How to prevent ssh-tunneling using Palo Alto Networks NGFW
 
Leverage the Network
Leverage the NetworkLeverage the Network
Leverage the Network
 
Nagios-yating
Nagios-yatingNagios-yating
Nagios-yating
 
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos RienziReporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
Reporte de Seguridad Anual de Cisco 2014 - Por Carlos Rienzi
 
Cisco ASA con fire power services
Cisco ASA con fire power services Cisco ASA con fire power services
Cisco ASA con fire power services
 
Arduino: Ethernet Shield para Arduino
Arduino: Ethernet Shield para ArduinoArduino: Ethernet Shield para Arduino
Arduino: Ethernet Shield para Arduino
 

Similar to Ccna sv2 instructor_ppt_ch8

Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
Babaa Naya
 
Experiencias aumentadas por la red
Experiencias aumentadas por la redExperiencias aumentadas por la red
Experiencias aumentadas por la red
schangan1
 

Similar to Ccna sv2 instructor_ppt_ch8 (20)

Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8Ccna sv2 instructor_ppt_ch8
Ccna sv2 instructor_ppt_ch8
 
CCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptxCCNASv2_InstructorPPT_CH8.en.es.pptx
CCNASv2_InstructorPPT_CH8.en.es.pptx
 
It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8It nv51 instructor_ppt_ch8
It nv51 instructor_ppt_ch8
 
It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7It nv51 instructor_ppt_ch7
It nv51 instructor_ppt_ch7
 
Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9Ccna sv2 instructor_ppt_ch9
Ccna sv2 instructor_ppt_ch9
 
CCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptxCCNASv2_InstructorPPT_CH2.pptx
CCNASv2_InstructorPPT_CH2.pptx
 
It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6It nv51 instructor_ppt_ch6
It nv51 instructor_ppt_ch6
 
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
 
Chapter 4 Network Access
Chapter 4 Network AccessChapter 4 Network Access
Chapter 4 Network Access
 
It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1It nv51 instructor_ppt_ch1
It nv51 instructor_ppt_ch1
 
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASAОсновные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
Основные понятия и аспекты построения отказоустойчивых Site-to-Site VPN на ASA
 
Experiencias aumentadas por la red
Experiencias aumentadas por la redExperiencias aumentadas por la red
Experiencias aumentadas por la red
 
Brksec 2101 deploying web security
Brksec 2101  deploying web securityBrksec 2101  deploying web security
Brksec 2101 deploying web security
 
Chapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating SystemChapter 2 Configure a Network Operating System
Chapter 2 Configure a Network Operating System
 
Chapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and CommunicationsChapter 3 Network Protocol and Communications
Chapter 3 Network Protocol and Communications
 
Introduction to Segment Routing
Introduction to Segment RoutingIntroduction to Segment Routing
Introduction to Segment Routing
 
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUICisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
Cisco Digital Network Architecture – Deeper Dive, “From the Gates to the GUI
 
Cisco Digital Network Architecture Deeper Dive From The Gates To The Gui
Cisco Digital Network Architecture Deeper Dive From The Gates To The GuiCisco Digital Network Architecture Deeper Dive From The Gates To The Gui
Cisco Digital Network Architecture Deeper Dive From The Gates To The Gui
 
What network architects need to know about the evolving software lifecycle (S...
What network architects need to know about the evolving software lifecycle (S...What network architects need to know about the evolving software lifecycle (S...
What network architects need to know about the evolving software lifecycle (S...
 
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148	Leveraging Cisco OpenStack Private Cloud for DevelopersDEVNET-1148	Leveraging Cisco OpenStack Private Cloud for Developers
DEVNET-1148 Leveraging Cisco OpenStack Private Cloud for Developers
 

Recently uploaded

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 

Recently uploaded (20)

Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 

Ccna sv2 instructor_ppt_ch8

  • 1. CCNA Security v2.0 Chapter 8: Implementing Virtual Private Networks
  • 2. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 8.0 Introduction 8.1 VPNs 8.2 IPsec VPN Components and Operations 8.3 Implementing Site-to-Site IPsec VPNs with CLI 8.4 Summary
  • 3. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 Upon completion of this section, you should be able to: • Describe VPNs and their benefits. • Compare site-to-site and remote-access VPNs.
  • 4. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 4
  • 5. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 VPN Benefits: • Cost Savings • Security • Scalability • Compatibility
  • 6. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
  • 7. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 7
  • 8. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Remote-Access VPN Site-to-Site VPN Access
  • 9. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
  • 10. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
  • 11. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 Upon completion of this section, you should be able to: • Describe the IPsec protocol and its basic functions. • Compare AH and ESP protocols. • Describe the IKE protocol.
  • 12. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 12
  • 13. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 IPsec Implementation ExamplesIPsec Framework
  • 14. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Confidentiality with Encryption:
  • 15. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 Encryption Algorithms:
  • 16. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 Hash Algorithms Security of Hash Algorithms
  • 17. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 Peer Authentication Methods PSK
  • 18. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 RSA
  • 19. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 Diffie-Hellman Key Exchange
  • 20. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 20
  • 21. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
  • 22. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 AH Protocols
  • 23. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 Router Creates Hash and Transmits to Peer Peer Router Compares Recomputed Hash to Received Hash
  • 24. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
  • 25. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
  • 26. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 26 Apply ESP and AH in Two Modes
  • 27. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 ESP Tunnel Mode
  • 28. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 28
  • 29. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
  • 30. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
  • 31. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
  • 32. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 32 Upon completion of this section, you should be able to: • Describe IPsec negotiation and the five steps of IPsec configuration. • Configure the ISAKMP policy. • Configure the IPsec policy. • Configure and apply a crypto map. • Verify the IPsec VPN.
  • 33. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 33
  • 34. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 34 IPsec VPN Negotiation: Step 2 - R1 and R2 negotiate an IKE Phase 1 session. IPsec VPN Negotiation: Step 1 - Host A sends interesting traffic to Host B. IPsec VPN Negotiation: Step 3 - R1 and R2 negotiate an IKE Phase 2 session.
  • 35. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 35 IPsec VPN Negotiation: Step 4 - Information is exchanged via IPsec tunnel. IPsec VPN Negotiation: Step 5 - The IPsec tunnel is terminated.
  • 36. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
  • 37. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 37 XYZCORP Security Policy Configuration Tasks Encrypt traffic with AES 256 and SHA 1. Configure the ISAKMP policy for IKE Phase 1 Authentication with PSK 2. Configure the IPsec policy for IKE Phase 2 Exchange keys with group 24 3. Configure the crypto map for IPsec policy ISAKMP tunnel lifetime is 1 hour 4. Apply the IPsec policy IPsec tunnel uses ESP with a 15-min. lifetime 5. Verify the IPsec tunnel is operational
  • 38. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 38 ACL Syntax for IPsec Traffic
  • 39. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 39 Permitting Traffic for IPsec Negotiations
  • 40. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
  • 41. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 41
  • 42. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
  • 43. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
  • 44. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
  • 45. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 45 The crypto isakmp key Command
  • 46. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 46 Pre-Shared Key Configuration
  • 47. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 47
  • 48. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 48 The IKE Phase 1 Tunnel Does Not Exist Yet
  • 49. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 49 Configure an ACL to Define Interesting Traffic
  • 50. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 50 The crypto ipsec transform-set Command
  • 51. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 51 The crypto ipsec transform-set Command
  • 52. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 52
  • 53. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
  • 54. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 54 Crypto Map Configuration Commands
  • 55. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 55 Crypto Map Configuration:
  • 56. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 56 Crypto Map Configuration:
  • 57. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
  • 58. Cisco Public© 2013 Cisco and/or its affiliates. All rights reserved. 58
  • 59. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 59 Use Extended Ping to Send Interesting Traffic
  • 60. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 60 Verify the ISAKMP Tunnel is Established
  • 61. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 61 Verify the IPsec Tunnel is Established
  • 62. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 62 Chapter Objectives: • Explain the purpose of VPNs. • Explain how IPsec VPNs operate. • Configure a site-to-site IPsec VPN, with pre-shared key authentication, using the CLI.
  • 64. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 64 • Remember, there are helpful tutorials and user guides available via your NetSpace home page. (https://www.netacad.com) • These resources cover a variety of topics including navigation, assessments, and assignments. • A screenshot has been provided here highlighting the tutorials related to activating exams, managing assessments, and creating quizzes. 1 2

Editor's Notes

  1. 8.1.1.1 Introducing VPNs
  2. 8.1.1.2 Layer 3 IPsec VPNs
  3. 8.1.2.1 Two Types of VPNs
  4. 8.1.2.2 Components of Remote-Access VPNs
  5. 8.1.2.3 Components of Site-to-Site VPNs 8.1.2.4 Activity – Compare Remote-Access and Site-to-Site VPNs
  6. 8.2.1.1 IPsec Technologies
  7. 8.2.1.2 Confidentiality
  8. 8.2.1.2 Confidentiality (Cont.)
  9. 8.2.1.3 Integrity
  10. 8.2.1.4 Authentication
  11. 8.2.1.4 Authentication (Cont.)
  12. 8.2.1.5 Secure Key Exchange 8.2.1.6 Activity – Identify the Components fo the IPsec Framework
  13. 8.2.2.1 IPsec Protocol Overview
  14. 8.2.2.2 Authentication Header
  15. 8.2.2.2 Authentication Header (Cont.)
  16. 8.2.2.3 ESP
  17. 8.2.2.4 ESP Encrypts and Authenticates
  18. 8.2.2.5 Transport and Tunnel Modes
  19. 8.2.2.5 Transport and Tunnel Modes (Cont.) 8.2.2.6 Activity – Compare AH and ESP
  20. 8.2.3.1 The IKE Protocol
  21. 8.2.3.2 Phase 1 and 2 Key Negotiation
  22. 8.2.3.3 Phase 2: Negotiating Sas 8.2.3.4 Video Tutorial – IKE Phase 1 and Phase 2
  23. 8.3.1.1 IPsec Negotiation
  24. 8.3.1.1 IPsec Negotiation (Cont.)
  25. 8.3.1.2 Site-to-Site IPsec VPN Topology
  26. 8.3.1.3 IPsec VPN Configuration Tasks
  27. 8.3.1.4 Existing ACL Configurations
  28. 8.3.1.4 Existing ACL Configurations (Cont.)
  29. 8.3.1.5 Introduction to GRE Tunnels 8.3.1.6 Activity – Order the IPsec Negotiation Steps
  30. 8.3.2.1 The Default ISAKMP Policies
  31. 8.3.2.2 Syntax to Configure a New ISAKMP Policy
  32. 8.3.2.3 XYZCORP ISAKMP Policy Configuration
  33. 8.3.2.4 Configuring a Pre-Shared Key
  34. 8.3.2.4 Configuring a Pre-shared Key (Cont.)
  35. 8.3.3.1 Define Interesting Traffic
  36. 8.3.3.1 Define Interesting Traffic (Cont.)
  37. 8.3.3.2 Configure IPsec Transform Set
  38. 8.3.3.2 Configure IPsec Transform Set (Cont.)
  39. 8.3.4.1 Syntax to Configure a Crypto Map
  40. 8.3.4.1 Syntax to Configure a Crypto Map (Cont.)
  41. 8.3.4.2 XYZCORP Crypto Map Configuration
  42. 8.3.4.2 XYZCORP Crypto Map Configuration (Cont.)
  43. 8.3.4.3 Apply the Crypto Map
  44. 8.3.5.1 Send Interesting Traffic 8.3.5.2 Verify ISAKMP and IPsec Tunnels
  45. 8.3.5.2 Verify ISAKMP and IPsec Tunnels
  46. 8.3.5.2 Verify ISAKMP and IPsec Tunnels (Cont.)
  47. 8.4.1.1 Video Demonstration – Site-to-Site IPsec VPN Configuration 8.4.1.2 Packet Tracer – Configure and Verify a Site-to-Site IPsec VPN 8.4.1.3 Lab – Configuring a Site-to-Site VPN 8.4.1.4 Chapter 8: Implementing Virtual Private Networks
  48. https://www.netacad.com