SlideShare a Scribd company logo
1 of 21
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-1
LAN Extension into a WAN
Introducing VPN
Solutions
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-2
What Is a VPN?
Virtual: Information within a private network is transported
over a public network.
Private: The traffic is encrypted to keep the data confidential.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-3
Benefits of VPN
 Cost
 Security
 Scalability
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-4
Site-to-Site VPNs
Site-to-site VPN: extension of classic WAN
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-5
Remote-Access VPNs
Remote-access VPN: evolution of dial-in networks and ISDN
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-6
Cisco Easy VPN
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-7
Cisco IOS IPsec SSL VPN (WebVPN)
 Integrated security and routing
 Browser-based full network SSL VPN access
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-8
VPN-Enabled Cisco IOS Routers
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-9
Cisco ASA Adaptive Security Appliances
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-10
(legacy)
VPN Clients
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-11
What Is IPsec?
IPsec acts at the network layer, protecting and authenticating IP packets.
 It is a framework of open standards that is algorithm independent.
 It provides data confidentiality, data integrity, and origin authentication.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-12
IPsec Security Services
 Confidentiality
 Data integrity
 Authentication
 Antireplay protection
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-13
Confidentiality (Encryption)
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-14
Encryption Algorithms
Encryption algorithms:
 DES
 AES
 3DES
 RSA
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-15
DH Key Exchange
Diffie-Hellman algorithms:
 DH1
 DH2
 DH5
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-16
Data Integrity
Hashing algorithms:
 HMAC-MD5
 HMAC-SHA-1
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-17
Authentication
Peer authentication methods:
 PSKs
 RSA signatures
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-18
IPsec Security Protocols
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-19
IPsec Framework
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-20
Summary
 Organizations implement VPNs because they are less expensive,
more secure, and easier to scale than traditional WANs.
 Site-to-site VPNs secure traffic between intranet and extranet
peers. Remote access VPNs secure communications from the
traveling telecommuter to the central office.
 VPNs can be implemented with a variety of different Cisco
devices: Cisco IOS routers, ASA 5500 Series Adaptive Security
Appliances, and Cisco VPN Client software.
 IPsec is the framework that combines security protocols together
and provides VPNs with data confidentiality, integrity, and
authentication.
 AH and ESP are the two main IPsec framework protocols.
© 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-21

More Related Content

What's hot (20)

Icnd210 s02l05
Icnd210 s02l05Icnd210 s02l05
Icnd210 s02l05
 
Icnd210 s06l02
Icnd210 s06l02Icnd210 s06l02
Icnd210 s06l02
 
Icnd210 s08l04
Icnd210 s08l04Icnd210 s08l04
Icnd210 s08l04
 
Icnd210 s03l01
Icnd210 s03l01Icnd210 s03l01
Icnd210 s03l01
 
Icnd210 s02l03
Icnd210 s02l03Icnd210 s02l03
Icnd210 s02l03
 
CCNA Icnd110 s06l01
 CCNA Icnd110 s06l01 CCNA Icnd110 s06l01
CCNA Icnd110 s06l01
 
Icnd210 s08l03
Icnd210 s08l03Icnd210 s08l03
Icnd210 s08l03
 
Icnd210 lg
Icnd210 lgIcnd210 lg
Icnd210 lg
 
Icnd210 s07l01
Icnd210 s07l01Icnd210 s07l01
Icnd210 s07l01
 
CCNA Icnd110 s06l02
CCNA Icnd110 s06l02CCNA Icnd110 s06l02
CCNA Icnd110 s06l02
 
Icnd210 s02l02
Icnd210 s02l02Icnd210 s02l02
Icnd210 s02l02
 
Icnd210 s08l05
Icnd210 s08l05Icnd210 s08l05
Icnd210 s08l05
 
Icnd210 s01l01
Icnd210 s01l01Icnd210 s01l01
Icnd210 s01l01
 
CCNA Icnd110 s05l01
CCNA Icnd110 s05l01CCNA Icnd110 s05l01
CCNA Icnd110 s05l01
 
CCNA Icnd110 s04l10
CCNA Icnd110 s04l10CCNA Icnd110 s04l10
CCNA Icnd110 s04l10
 
Icnd210 s02l01
Icnd210 s02l01Icnd210 s02l01
Icnd210 s02l01
 
Icnd210 s02l06
Icnd210 s02l06Icnd210 s02l06
Icnd210 s02l06
 
Icnd210 s03l03
Icnd210 s03l03Icnd210 s03l03
Icnd210 s03l03
 
Icnd210 s07l03
Icnd210 s07l03Icnd210 s07l03
Icnd210 s07l03
 
CCNA Icnd110 s06l03
CCNA Icnd110 s06l03CCNA Icnd110 s06l03
CCNA Icnd110 s06l03
 

Viewers also liked (11)

Icnd210 s01l02
Icnd210 s01l02Icnd210 s01l02
Icnd210 s01l02
 
Icnd210 s06l03
Icnd210 s06l03Icnd210 s06l03
Icnd210 s06l03
 
Icnd210 s05l03
Icnd210 s05l03Icnd210 s05l03
Icnd210 s05l03
 
Icnd210 s05l02
Icnd210 s05l02Icnd210 s05l02
Icnd210 s05l02
 
CCNA Icnd110 s02l03
CCNA Icnd110 s02l03CCNA Icnd110 s02l03
CCNA Icnd110 s02l03
 
CCNA Icnd110 s01l05
CCNA Icnd110 s01l05CCNA Icnd110 s01l05
CCNA Icnd110 s01l05
 
CCNA Icnd110 s02l04
CCNA Icnd110 s02l04CCNA Icnd110 s02l04
CCNA Icnd110 s02l04
 
CCNA Icnd110 s02l01
CCNA Icnd110 s02l01CCNA Icnd110 s02l01
CCNA Icnd110 s02l01
 
CCNA Icnd110 s02l02
CCNA Icnd110 s02l02CCNA Icnd110 s02l02
CCNA Icnd110 s02l02
 
CCNA Icnd110 s01l01
CCNA Icnd110 s01l01CCNA Icnd110 s01l01
CCNA Icnd110 s01l01
 
CCNA Icnd110 s01l08
CCNA Icnd110 s01l08CCNA Icnd110 s01l08
CCNA Icnd110 s01l08
 

Similar to Icnd210 s08l01

cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20eyad alaa
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...NetworkCollaborators
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4Waqas Ahmed Nawaz
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network EvolutionCisco Canada
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport LayerYaser Rahmati
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layerteknetir
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerVuz Dở Hơi
 
محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاريmaherrrrz
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Bosnia Agile
 
Network basics. eng. moaath alshaikh
Network basics. eng. moaath alshaikhNetwork basics. eng. moaath alshaikh
Network basics. eng. moaath alshaikhMoaath alshaikh
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 

Similar to Icnd210 s08l01 (20)

cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
CCNA Icnd110 s04l08
CCNA Icnd110 s04l08CCNA Icnd110 s04l08
CCNA Icnd110 s04l08
 
CCNA Icnd110 s05l02
CCNA Icnd110 s05l02CCNA Icnd110 s05l02
CCNA Icnd110 s05l02
 
CCNA Icnd110 s03l02
CCNA Icnd110 s03l02CCNA Icnd110 s03l02
CCNA Icnd110 s03l02
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 Cisco Connect 2018 Philippines - software-defined access-a transformational ... Cisco Connect 2018 Philippines - software-defined access-a transformational ...
Cisco Connect 2018 Philippines - software-defined access-a transformational ...
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
CCNA (R & S) Module 03 - Routing & Switching Essentials - Chapter 4
 
Eigrp authentication
Eigrp authenticationEigrp authentication
Eigrp authentication
 
The Data Center Network Evolution
The Data Center Network EvolutionThe Data Center Network Evolution
The Data Center Network Evolution
 
Chapter 07 - Transport Layer
Chapter 07 - Transport LayerChapter 07 - Transport Layer
Chapter 07 - Transport Layer
 
Chapter 7 : Transport layer
Chapter 7 : Transport layerChapter 7 : Transport layer
Chapter 7 : Transport layer
 
CCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport LayerCCNAv5 - S1: Chapter 7 - Transport Layer
CCNAv5 - S1: Chapter 7 - Transport Layer
 
محمد مشاري
محمد مشاريمحمد مشاري
محمد مشاري
 
CCNA Icnd110 cag
CCNA Icnd110 cagCCNA Icnd110 cag
CCNA Icnd110 cag
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
 
CCNA Icnd110 s04l06
CCNA Icnd110 s04l06CCNA Icnd110 s04l06
CCNA Icnd110 s04l06
 
Network basics. eng. moaath alshaikh
Network basics. eng. moaath alshaikhNetwork basics. eng. moaath alshaikh
Network basics. eng. moaath alshaikh
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
CCNA Icnd110 s01l03
CCNA Icnd110 s01l03CCNA Icnd110 s01l03
CCNA Icnd110 s01l03
 

Recently uploaded

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

Icnd210 s08l01

  • 1. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-1 LAN Extension into a WAN Introducing VPN Solutions
  • 2. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-2 What Is a VPN? Virtual: Information within a private network is transported over a public network. Private: The traffic is encrypted to keep the data confidential.
  • 3. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-3 Benefits of VPN  Cost  Security  Scalability
  • 4. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-4 Site-to-Site VPNs Site-to-site VPN: extension of classic WAN
  • 5. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-5 Remote-Access VPNs Remote-access VPN: evolution of dial-in networks and ISDN
  • 6. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-6 Cisco Easy VPN
  • 7. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-7 Cisco IOS IPsec SSL VPN (WebVPN)  Integrated security and routing  Browser-based full network SSL VPN access
  • 8. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-8 VPN-Enabled Cisco IOS Routers
  • 9. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-9 Cisco ASA Adaptive Security Appliances
  • 10. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-10 (legacy) VPN Clients
  • 11. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-11 What Is IPsec? IPsec acts at the network layer, protecting and authenticating IP packets.  It is a framework of open standards that is algorithm independent.  It provides data confidentiality, data integrity, and origin authentication.
  • 12. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-12 IPsec Security Services  Confidentiality  Data integrity  Authentication  Antireplay protection
  • 13. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-13 Confidentiality (Encryption)
  • 14. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-14 Encryption Algorithms Encryption algorithms:  DES  AES  3DES  RSA
  • 15. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-15 DH Key Exchange Diffie-Hellman algorithms:  DH1  DH2  DH5
  • 16. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-16 Data Integrity Hashing algorithms:  HMAC-MD5  HMAC-SHA-1
  • 17. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-17 Authentication Peer authentication methods:  PSKs  RSA signatures
  • 18. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-18 IPsec Security Protocols
  • 19. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-19 IPsec Framework
  • 20. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-20 Summary  Organizations implement VPNs because they are less expensive, more secure, and easier to scale than traditional WANs.  Site-to-site VPNs secure traffic between intranet and extranet peers. Remote access VPNs secure communications from the traveling telecommuter to the central office.  VPNs can be implemented with a variety of different Cisco devices: Cisco IOS routers, ASA 5500 Series Adaptive Security Appliances, and Cisco VPN Client software.  IPsec is the framework that combines security protocols together and provides VPNs with data confidentiality, integrity, and authentication.  AH and ESP are the two main IPsec framework protocols.
  • 21. © 2007 Cisco Systems, Inc. All rights reserved. ICND2 v1.0—8-21

Editor's Notes

  1. IPsec acts at the network layer, protecting and authenticating IP packets between participating IPsec devices (peers), such as other PIX Firewalls, Cisco routers, VPN 3000 Concentrator Series, Cisco Secure VPN Client, and other IPsec-compliant products. IPsec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers at the IP layer. IPsec encompasses a suite of protocols. It is not bound to any specific encryption or authentication algorithms, key generation technique, or security association. IPsec supplies the rules while existing algorithms provide the encryption, authentication, key management, and so on. In this way, IPsec can allow the use of updated algorithms and key techniques without patching the IPsec protocol. In this topic, we’ll discuss how those open standards provide data confidentiality, integrity, and authentication.
  2. <number> The first VPN solution is remote access. Remote access is targeted to mobile user and Home telecommuters. Most people have access to the Internet from there homes, why not take advantage of it. In the past, corporations supported remote users via dial-in networks. This typically necessitated a toll, or 1-800, call to access the corporation. With the advent of VPNs, a mobile user can make a local call to their ISP to access corporation via Internet wherever they may be. It is an evolution of dial networks. Remote access VPN can support the needs of telecommuters, mobile users, extranet consumer-to-business, and so on.
  3. <number> The next VPN solution is site-to-site. Site-to-Site is targeted at corporate site interconnection. In the past, a leased line or frame relay connection was required to connect sites. Most corporations have Internet access. Why not take advantage of the corporate Internet access. Site-to-site VPN can be used to provide the network connection between sites. VPN can support company intranets and business partner extranets. Site-to-site VPN is an extension of classic WAN network.
  4. <number> The first VPN solution is remote access. Remote access is targeted to mobile user and Home telecommuters. Most people have access to the Internet from there homes, why not take advantage of it. In the past, corporations supported remote users via dial-in networks. This typically necessitated a toll, or 1-800, call to access the corporation. With the advent of VPNs, a mobile user can make a local call to their ISP to access corporation via Internet wherever they may be. It is an evolution of dial networks. Remote access VPN can support the needs of telecommuters, mobile users, extranet consumer-to-business, and so on.
  5. <number> Site-to-site VPNs provide cost benefits relative to private WANs and also enable new applications like extranets. However, site-to-site VPNs are still an end-to-end network and are subject to the same scalability, reliability, security, multi-protocol, etc. requirements that exist in the private WAN. In fact, since VPN are built on a public network infrastructure, they have additional requirements such as heightened security, advanced QoS capabilities, and a set of policy management tools to manage these additional features. Cisco provides a suite of VPN-optimized routers. Cisco IOS software running in Cisco routers combines rich VPN services with industry-leading routing, thus delivering a comprehensive solution. Cisco routing software adds scalability, reliability, multi-protocol, multi-service, management, Service Level Agreement monitoring, and QoS to site-to-site applications. The Cisco VPN software adds strong security via encryption and authentication. This Cisco VPN-based products provide high performance for site-to-site, intranet and extranet, VPN solutions.
  6. <number> Firewall is inherently a site-to-site solution. PIX (Private Internet Exchange) Firewall is a key element in the overall Cisco end-to-end security solution. The PIX Firewall is a dedicated hardware and software security solution that delivers high security without impacting network performance. Firewall-based VPN solutions are not a technical issue but a security issue. The question is “who manages the VPN network”. If security manages the VPN, PIX may be VPN solution of choice. Customer may wish to enhance their existing Firewall equipment to support VPN services. Firewall based VPN solutions support intranet and extranet applications.
  7. The concentrators can communicate with three IPsec clients, Certicom IPsec client, Cisco VPN software client, and VPN 3002 hardware client. The Certicom client is wireless client loaded on wireless PDAs such as Palm Handhelds, HP Jornada, Compaq iPAQ PDA, and so on. The Cisco VPN software client is loaded on an individual’s PC. The VPN 3002 hardware client is a standalone client located in small offices and home offices. There will be more on these clients in following lessons.
  8. IPsec acts at the network layer, protecting and authenticating IP packets between participating IPsec devices (peers), such as other PIX Firewalls, Cisco routers, VPN 3000 Concentrator Series, Cisco Secure VPN Client, and other IPsec-compliant products. IPsec is a framework of open standards that provides data confidentiality, data integrity, and data authentication between participating peers at the IP layer. IPsec encompasses a suite of protocols. It is not bound to any specific encryption or authentication algorithms, key generation technique, or security association. IPsec supplies the rules while existing algorithms provide the encryption, authentication, key management, and so on. In this way, IPsec can allow the use of updated algorithms and key techniques without patching the IPsec protocol. In this topic, we’ll discuss how those open standards provide data confidentiality, integrity, and authentication.
  9. In VPN, the framework of open standards provides three critical functions: confidentiality, data integrity, and authentication. Confidentiality (Encryption) The sender can encrypt the packets before transmitting them across a network. By doing so, no one can eavesdrop on the communication If intercepted, the communications can not be read. Data Integrity The receiver can verify the data was transmitted through the Internet without being changed or altered in anyway. Origin Authentication The receiver can authenticate the source of the packet. Can guarantee, certify, the source of the information
  10. 240, 197, 102
  11. Degree of security is dependent on the length of the key. If one were to try and hack the key through a brute force attack, guessing every possible combination, the number of possibilities is a function of the length of the key. The time to process all the possibilities is a function of the computing power of the computer. Therefore, the shorter the key, the easier it is to break. A 64 bit key with a relatively sophisticated computer can take approximately 1 year to break. A 128 bit key with the same machine can take roughly 10e19 years to decrypt. Some of the encryption algorithms are as follows: DES Algorithm –DES was developed by IBM. DES uses a 56-bit key, ensuring high performance encryption. DES is a symmetric key cryptosystem. Triple DES Algorithm (3DES) - The 3DES algorithm is a variant of the 56-bit DES. 3DES operates similarly to DES, in that data is broken into 64-bit blocks. 3DES then processes each block three times, each time with an independent 56-bit key. 3DES effectively doubles encryption strength over 56-bit DES. DES is a symmetric key cryptosystem RSA – RSA is a asymmetrical key cryptosystem. It uses a key length of 512, 768, 1024, or larger. RSA is used for encryption or digital signatures. In software, DES is up to 100 times faster than RSA. We’ll talk about digital signatures later in this topic.
  12. Degree of security is dependent on the length of the key. If one were to try and hack the key through a brute force attack, guessing every possible combination, the number of possibilities is a function of the length of the key. The time to process all the possibilities is a function of the computing power of the computer. Therefore, the shorter the key, the easier it is to break. A 64 bit key with a relatively sophisticated computer can take approximately 1 year to break. A 128 bit key with the same machine can take roughly 10e19 years to decrypt. Some of the encryption algorithms are as follows: DES Algorithm –DES was developed by IBM. DES uses a 56-bit key, ensuring high performance encryption. DES is a symmetric key cryptosystem. Triple DES Algorithm (3DES) - The 3DES algorithm is a variant of the 56-bit DES. 3DES operates similarly to DES, in that data is broken into 64-bit blocks. 3DES then processes each block three times, each time with an independent 56-bit key. 3DES effectively doubles encryption strength over 56-bit DES. DES is a symmetric key cryptosystem RSA – RSA is a asymmetrical key cryptosystem. It uses a key length of 512, 768, 1024, or larger. RSA is used for encryption or digital signatures. In software, DES is up to 100 times faster than RSA. We’ll talk about digital signatures later in this topic.
  13. The next VPN critical function is data integrity. VPN data is transported over the public Internet. Potentially, this data could be intercepted, and modified. To guard against this from happening, each message has a hash attached to the message. A hash guarantees the integrity of the original message. If the transmitted hash matches the received hash, the message has not been tampered with. However, if there is no match, the message was altered. In the example above, someone is trying to send John Smith a check for $100. At the remote end, John Jones is trying to cash the check for $1000. As the check progressed through the Internet, it was altered. Both the recipient and dollar amounts were changed. In this case, the hashes did not match. The transaction is no longer valid. We’ll talk about hash algorithms in the next few slides.
  14. When conducting business long distance, its necessary to know who is at the other end of the phone, email, or FAX. The same is true of VPN networking. The device on the other end of the VPN tunnel must be authenticated before the communications path is considered secure. There are three data origin authentication methods: Pre-shared Keys – A secret key value entered into each peer manually used to authenticate the peer. RSA Signatures – Use the exchange of digital certificates to authenticate the peers RSA Encrypted Nonces – Nonces ( a random number generated by each peer) are encrypted then exchanged between peers. The two nonces are used during peer authentication process.
  15. IPsec consists of the following two main protocols: Authentication Header (AH) provides data authentication and integrity for IP packets passed between two systems. It is a means of verifying any message passed from Router A to B has not been modified during transit. All text is transported in the clear. AH does not provide data confidentiality (encryption) of packets. Encapsulating Security Payload (ESP) is a security protocol used to provide confidentiality (encryption), data origin authentication, integrity, and optional anti-replay service. ESP provides confidentiality by performing encryption at the IP packet layer. All ESP traffic is encrypted between Router A and B.
  16. 1, 95, 133