SlideShare a Scribd company logo
IPSEC                                                                                                  packetlife.net
                            Protocols                                                Encryption Algorithms
Internet Security Association and Key Management                              Type           Key Length (Bits)    Strength
Protocol (ISAKMP)                                                       DES Symmetric        56                   Weak
A framework for the negotiation and management of
security associations between peers (traverses UDP/500)                3DES Symmetric        168                  Medium

Internet Key Exchange (IKE)                                             AES Symmetric        128/192/256          Strong
Responsible for key agreement using asymmetric                          RSA Asymmetric       1024+                Strong
cryptography
Encapsulating Security Payload (ESP)                                                  Hashing Algorithms
Provides data encryption, data integrity, and peer                                Length (Bits)        Strength
authentication; IP protocol 50                                              MD5 128                    Medium
Authentication Header (AH)
                                                                          SHA-1 160                    Strong
Provides data integrity and peer authentication, but not data
encryption; IP protocol 51                                                                IKE Phases
                          IPsec Modes                                  Phase 1
                                                                       A bidirectional ISAKMP SA is established
  Original                                                             between peers to provide a secure management
             L2      IP       TCP/UDP
   Packet                                                              channel (IKE in main or aggressive mode)
Transport                                                              Phase 1.5 (optional)
             L2      IP       ESP/AH      TCP/UDP
    Mode                                                               Xauth can optionally be implemented to enforce
                                                                       user authentication
   Tunnel
             L2    New IP     ESP/AH       IP       TCP/UDP            Phase 2
    Mode
                                                                       Two unidirectional IPsec SAs are established for
Transport Mode                                                         data transfer using separate keys (IKE quick
The ESP or AH header is inserted behind the IP header; the             mode)
IP header can be authenticated but not encrypted
                                                                                         Terminology
Tunnel Mode
A new IP header is created in place of the original; this              Data Integrity
allows for encryption of the entire original packet                    Secure hashing (HMAC) is used to ensure data
                                                                       has not been altered in transit
                          Configuration                                Data Confidentiality
                                                     ISAKMP Policy     Encryption is used to ensure data cannot be
crypto isakmp policy 10
 encryption aes 256
                                                                       intercepted by a third party
 hash sha                                                              Data Origin Authentication
 authentication pre-share                                              Authentication of the SA peer
 group 2
 lifetime 3600                                                         Anti-replay
                                                                       Sequence numbers are used to detect and
                                          ISAKMP Pre-Shared Key        discard duplicate packets
crypto isakmp key 1 MySecretKey address 10.0.0.2                       Hash Message Authentication Code (HMAC)
                                                                       A hash of the data and secret key used to
                                                IPsec Transform Set    provide message authenticity
crypto ipsec transform-set MyTS esp-aes 256 esp-sha-hmac
 mode tunnel                                                           Diffie-Hellman Exchange
                                                                       A shared secret key is established over an
                                                       IPsec Profile   insecure path using public and private keys
crypto ipsec profile MyProfile
 set transform-set MyTS                                                                Troubleshooting
                                                                       show crypto isakmp sa
interface Tunnel0                    Virtual Tunnel Interface
 ip address 172.16.0.1 255.255.255.252                                 show crypto isakmp policy
 tunnel source 10.0.0.1
 tunnel destination 10.0.0.2                                           show crypto ipsec sa
 tunnel mode ipsec ipv4                                                show crypto ipsec transform-set
 tunnel protection ipsec profile MyProfile
                                                                       debug crypto {isakmp | ipsec}

by Jeremy Stretch                                                                                                        v2.0

More Related Content

What's hot

Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
IT Tech
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
sharetech
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
Abdullaziz Tagawy
 
IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1
Abdallah Abuouf
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and sslMohd Arif
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
eyad alaa
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
Deepak296
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
Mustafa Kuğu
 
05 06 ike
05   06 ike05   06 ike
05 06 ike
Babaa Naya
 
Ubuntu Cloud Juju
Ubuntu Cloud JujuUbuntu Cloud Juju
Ubuntu Cloud JujueNovance
 

What's hot (12)

Vpn site to site
Vpn site to siteVpn site to site
Vpn site to site
 
Vpn(4)
Vpn(4)Vpn(4)
Vpn(4)
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Easy vpn
Easy vpnEasy vpn
Easy vpn
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
Crypt tech technical-presales
Crypt tech technical-presalesCrypt tech technical-presales
Crypt tech technical-presales
 
05 06 ike
05   06 ike05   06 ike
05 06 ike
 
Ubuntu Cloud Juju
Ubuntu Cloud JujuUbuntu Cloud Juju
Ubuntu Cloud Juju
 

Viewers also liked (17)

Ppp
PppPpp
Ppp
 
Nat
NatNat
Nat
 
Ios zone based-firewall
Ios zone based-firewallIos zone based-firewall
Ios zone based-firewall
 
Qo s
Qo sQo s
Qo s
 
Is is
Is isIs is
Is is
 
Media wiki
Media wikiMedia wiki
Media wiki
 
I pv6
I pv6I pv6
I pv6
 
I pv4 subnetting
I pv4 subnettingI pv4 subnetting
I pv4 subnetting
 
Ieee 802.11 wlan
Ieee 802.11 wlanIeee 802.11 wlan
Ieee 802.11 wlan
 
Ios i pv4_access_lists
Ios i pv4_access_listsIos i pv4_access_lists
Ios i pv4_access_lists
 
Ios interior routing_protocols
Ios interior routing_protocolsIos interior routing_protocols
Ios interior routing_protocols
 
Markdown
MarkdownMarkdown
Markdown
 
Rip
RipRip
Rip
 
Physical terminations
Physical terminationsPhysical terminations
Physical terminations
 
Spanning tree
Spanning treeSpanning tree
Spanning tree
 
I pv4 multicast
I pv4 multicastI pv4 multicast
I pv4 multicast
 
Ospf
OspfOspf
Ospf
 

Similar to I psec

IPSEC
IPSECIPSEC
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psecMohd Arif
 
IPsec with AH
IPsec with AHIPsec with AH
IPsec with AH
jtlevesque
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
anoean
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
CAS
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
Chinmay Patel
 
Ipsec rbe guide
Ipsec rbe guideIpsec rbe guide
Ipsec rbe guide
Wahyu Nasution
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
Ram Dutt Shukla
 
Moein
MoeinMoein
The Security layer
The Security layerThe Security layer
The Security layer
Swetha S
 
20 palo alto site to site
20 palo alto site to site20 palo alto site to site
20 palo alto site to site
Mostafa El Lathy
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
Hossein Yavari
 
Ip Sec
Ip SecIp Sec
I psec tunnel vs transport mode
I psec tunnel vs transport modeI psec tunnel vs transport mode
I psec tunnel vs transport modeIT Tech
 
Ipsec
IpsecIpsec
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
David Sweigert
 

Similar to I psec (20)

IPSEC
IPSECIPSEC
IPSEC
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
IPsec with AH
IPsec with AHIPsec with AH
IPsec with AH
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Ipsec rbe guide
Ipsec rbe guideIpsec rbe guide
Ipsec rbe guide
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Moein
MoeinMoein
Moein
 
The Security layer
The Security layerThe Security layer
The Security layer
 
20 palo alto site to site
20 palo alto site to site20 palo alto site to site
20 palo alto site to site
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
I psec tunnel vs transport mode
I psec tunnel vs transport modeI psec tunnel vs transport mode
I psec tunnel vs transport mode
 
I psec
I psecI psec
I psec
 
Ipsec
IpsecIpsec
Ipsec
 
Certified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheetCertified Ethical Hacker quick test prep cheat sheet
Certified Ethical Hacker quick test prep cheat sheet
 
Ch16
Ch16Ch16
Ch16
 
VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 

More from Mohamed Gamel (13)

Vyatta subnet range_cheat_sheet
Vyatta subnet range_cheat_sheetVyatta subnet range_cheat_sheet
Vyatta subnet range_cheat_sheet
 
Voip basics
Voip basicsVoip basics
Voip basics
 
Vla ns
Vla nsVla ns
Vla ns
 
Tcpdump
TcpdumpTcpdump
Tcpdump
 
Scapy
ScapyScapy
Scapy
 
Ieee 802.1 x
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 x
 
Frame mode mpls
Frame mode mplsFrame mode mpls
Frame mode mpls
 
First hop redundancy
First hop redundancyFirst hop redundancy
First hop redundancy
 
Eigrp
EigrpEigrp
Eigrp
 
Common ports
Common portsCommon ports
Common ports
 
Cisco ios versions
Cisco ios versionsCisco ios versions
Cisco ios versions
 
Bgp
BgpBgp
Bgp
 
All ospf in one image
All  ospf in one imageAll  ospf in one image
All ospf in one image
 

I psec

  • 1. IPSEC packetlife.net Protocols Encryption Algorithms Internet Security Association and Key Management Type Key Length (Bits) Strength Protocol (ISAKMP) DES Symmetric 56 Weak A framework for the negotiation and management of security associations between peers (traverses UDP/500) 3DES Symmetric 168 Medium Internet Key Exchange (IKE) AES Symmetric 128/192/256 Strong Responsible for key agreement using asymmetric RSA Asymmetric 1024+ Strong cryptography Encapsulating Security Payload (ESP) Hashing Algorithms Provides data encryption, data integrity, and peer Length (Bits) Strength authentication; IP protocol 50 MD5 128 Medium Authentication Header (AH) SHA-1 160 Strong Provides data integrity and peer authentication, but not data encryption; IP protocol 51 IKE Phases IPsec Modes Phase 1 A bidirectional ISAKMP SA is established Original between peers to provide a secure management L2 IP TCP/UDP Packet channel (IKE in main or aggressive mode) Transport Phase 1.5 (optional) L2 IP ESP/AH TCP/UDP Mode Xauth can optionally be implemented to enforce user authentication Tunnel L2 New IP ESP/AH IP TCP/UDP Phase 2 Mode Two unidirectional IPsec SAs are established for Transport Mode data transfer using separate keys (IKE quick The ESP or AH header is inserted behind the IP header; the mode) IP header can be authenticated but not encrypted Terminology Tunnel Mode A new IP header is created in place of the original; this Data Integrity allows for encryption of the entire original packet Secure hashing (HMAC) is used to ensure data has not been altered in transit Configuration Data Confidentiality ISAKMP Policy Encryption is used to ensure data cannot be crypto isakmp policy 10 encryption aes 256 intercepted by a third party hash sha Data Origin Authentication authentication pre-share Authentication of the SA peer group 2 lifetime 3600 Anti-replay Sequence numbers are used to detect and ISAKMP Pre-Shared Key discard duplicate packets crypto isakmp key 1 MySecretKey address 10.0.0.2 Hash Message Authentication Code (HMAC) A hash of the data and secret key used to IPsec Transform Set provide message authenticity crypto ipsec transform-set MyTS esp-aes 256 esp-sha-hmac mode tunnel Diffie-Hellman Exchange A shared secret key is established over an IPsec Profile insecure path using public and private keys crypto ipsec profile MyProfile set transform-set MyTS Troubleshooting show crypto isakmp sa interface Tunnel0 Virtual Tunnel Interface ip address 172.16.0.1 255.255.255.252 show crypto isakmp policy tunnel source 10.0.0.1 tunnel destination 10.0.0.2 show crypto ipsec sa tunnel mode ipsec ipv4 show crypto ipsec transform-set tunnel protection ipsec profile MyProfile debug crypto {isakmp | ipsec} by Jeremy Stretch v2.0