Configuring IKE And IPsec Policies VPN Version 4.1 Vpipsec
User Manual: IPSec VPN Version 4.1
Open the PDF directly: View PDF
.
Page Count: 64
| Download | |
| Open PDF In Browser | View PDF |
CH A P T E R 22 Configuring IKE and IPsec Policies This chapter describes how to configure Internet Protocol Security (IPsec) and the Internet Security Association and Key Management Protocol (ISAKMP, or IKE) standards to build site-to-site and remote access IPsec Virtual Private Networks (VPNs). These policies are used in regular IPsec and other types of IPsec-based VPN technologies to build VPN tunnels. Tunneling makes it possible to use a public TCP/IP network, such as the Internet, to create secure connections between remote users and a private corporate network. Each secure connection is called a tunnel. IPsec-based VPN technologies use the ISAKMP and IPsec tunneling standards to build and manage tunnels. ISAKMP and IPsec accomplish the following: • Negotiate tunnel parameters. • Establish tunnels. • Authenticate users and data. • Manage security keys. • Encrypt and decrypt data. • Manage data transfer across the tunnel. • Manage data transfer inbound and outbound as a tunnel endpoint or router. A device in a VPN functions as a bidirectional tunnel endpoint. It can receive plain packets from the private network, encapsulate them, create a tunnel, and send them to the other end of the tunnel where they are unencapsulated and sent to their final destination. It can also receive encapsulated packets from the public network, unencapsulate them, and send them to their final destination on the private network. The following topics explain the basic IKE and IPsec policies and how to configure them: • Overview of IKE and IPsec Configurations, page 22-2 • Understanding IKE, page 22-5 • Understanding IPsec Proposals, page 22-15 • Configuring VPN Global Settings, page 22-26 • Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs, page 22-39 • Understanding Public Key Infrastructure Policies, page 22-43 • Configuring IKEv2 Authentication in Site-to-Site VPNs, page 22-58 User Guide for Cisco Security Manager 4.1 OL-23991-01 22-1 Chapter 22 Configuring IKE and IPsec Policies Overview of IKE and IPsec Configurations Overview of IKE and IPsec Configurations Internet Key Exchange (IKE) is a key management protocol that is used to authenticate IPsec peers, negotiate and distribute IPsec encryption keys, and to automatically establish IPsec security associations (SAs). The IKE negotiation comprises two phases. Phase 1 negotiates a security association between two IKE peers, which enables the peers to communicate securely in Phase 2. During Phase 2 negotiation, IKE establishes SAs for other applications, such as IPsec. Both phases use proposals when they negotiate a connection. An IKE proposal is a set of algorithms that two peers use to secure the IKE negotiation between them. IKE negotiation begins by each peer agreeing on a common (shared) IKE policy. This policy states which security parameters will be used to protect subsequent IKE negotiations. For IKE version 1 (IKEv1), IKE proposals contain a single set of algorithms and a modulus group. You can create multiple, prioritized policies at each peer to ensure that at least one policy matches a remote peer’s policy. Unlike IKEv1, in an IKEv2 proposal, you can select multiple algorithms and modulus groups from which peers can choose during the Phase 1 negotiation, potentially making it possible to create a single IKE proposal (although you might want different proposals to give higher priority to your most desired options). You can define several IKE proposals per VPN. You must configure several policies to define the settings required to make successful regular IPsec connections in a site-to-site or remote access VPN. The following procedure provides an overview of the steps required to complete the configuration, and points to other topics that provide detailed information for each step. Related Topics Step 1 • Understanding IKE, page 22-5 • Understanding IPsec Proposals, page 22-15 • Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs, page 22-39 • Understanding Public Key Infrastructure Policies, page 22-43 Configure the IKE Proposal policy. In the IKE Proposal policy, you define the IKE proposal policy objects to use for making VPN connections. When defining the IKE proposal object, you select the algorithms to use for encrypting the IKE negotiation and for integrity checking, and the Diffie-Hellman group to use to operate the encryption algorithm. For IKEv1, you also determine whether you are using preshared keys or Public Key Infrastructure, whereas in IKEv2, the IKE proposal does not include a specification for authentication mode. The following topics explain how to configure the IKE Proposal policy: • Configuring an IKE Proposal, page 22-9 – Configuring IKEv1 Proposal Policy Objects, page 22-10 – Configuring IKEv2 Proposal Policy Objects, page 22-13 • Configuring the IKE Proposal for GET VPN, page 25-15 User Guide for Cisco Security Manager 4.1 22-2 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Overview of IKE and IPsec Configurations Step 2 Complete the authentication mode configuration. Your selection for authentication mode in the IKEv1 proposal, and your decision on which mode to use for IKEv2, controls what other policies are required to complete the authentication mode configuration: • Preshared keys—For remote access IKEv1 IPsec VPNs, you define the preshared keys in the Connection Profiles policy; preshared keys are not supported for IKEv2 in remote access VPNs. For site-to-site VPNs, you define the keys in the IKEv1 Preshared Keys or the IKEv2 Authentication policy based on the IKE version you are using. The following topics explain preshared key configuration: – IPSec Tab (Connection Profiles), page 27-16 – Configuring IKEv1 Preshared Key Policies, page 22-40 – Configuring IKEv2 Authentication in Site-to-Site VPNs, page 22-58 • Public Key Infrastructure Certificate Authority servers—If you configure IKE to use Certificate Authority (CA) servers, you must configure the Public Key Infrastructure policy. You also use this policy to define the Public Key Infrastructure for SSL VPNs. For site-to-site VPNs, the policy is IKEv1 Public Key Infrastructure or IKEv2 Authentication, based on the IKE version you are using. The Public Key Infrastructure policy identifies the PKI enrollment object that identifies the Certificate Authority server. For site-to-site VPNs, you can select a single PKI enrollment object; for remote access VPNs, you can select all objects needed for your remote access connections. These trustpoints are then identified in the remote access Connection Profiles policy (on the IPsec tab). The following topics explain public key infrastructure configuration: – Understanding Public Key Infrastructure Policies, page 22-43 – Configuring IKEv1 Public Key Infrastructure Policies in Site-to-Site VPNs, page 22-46 – Defining Multiple IKEv1 CA Servers for Site-to-Site VPNs, page 22-47 – Configuring Public Key Infrastructure Policies for Remote Access VPNs, page 22-48 – IPSec Tab (Connection Profiles), page 27-16 – Configuring IKEv2 Authentication in Site-to-Site VPNs, page 22-58 Step 3 Configure the IPsec Proposal policy. The IPsec Proposal policy defines the IPsec transform set policy objects used to create a secure IPsec tunnel for the VPN. The following topics explain how to configure the IPsec Proposal policy: • Configuring IPsec Proposals in Site-to-Site VPNs, page 22-19 – Selecting the IKE Version for Devices in Site-to-Site VPNs, page 22-22 – Configuring IPSec IKEv1 or IKEv2 Transform Set Policy Objects, page 22-23 • Configuring an IPsec Proposal for Easy VPN, page 24-10 • Configuring an IPsec Proposal on a Remote Access VPN Server (ASA, PIX 7.0+ Devices), page 27-29 • Configuring an IPsec Proposal on a Remote Access VPN Server (IOS, PIX 6.3 Devices), page 29-3 User Guide for Cisco Security Manager 4.1 OL-23991-01 22-3 Chapter 22 Configuring IKE and IPsec Policies Overview of IKE and IPsec Configurations Step 4 Configure the Global Settings policy. The Global Settings (remote access) and VPN Global Settings (site-to-site) policies define various ISAKMP, IKEv1, IKEv2, IPsec, NAT, fragmentation, and other settings. These settings have default values that are frequently adequate, so normally you need to configure the Global Settings policy only if you want non-default behavior. However, you must configure the policy for remote access IKEv2 IPsec VPNs, because you must specify a remote access global trustpoint on the IKEv2 Settings tab. The following topics explain how to configure the Global Settings policy: • Configuring VPN Global Settings, page 22-26 – Configuring VPN Global ISAKMP/IPsec Settings, page 22-26 – Configuring VPN Global IKEv2 Settings, page 22-30 – Configuring VPN Global NAT Settings, page 22-34 – Configuring VPN Global General Settings, page 22-36 • Step 5 Configuring Global Settings for GET VPN, page 25-16 If you are configuring a remote access IKEv2 IPsec VPN, you must also configure several policies for SSL VPN. IKEv2 shares several configuration settings with SSL VPNs. For information on the other policies you need to configure, see Creating IPSec VPNs Using the Remote Access VPN Configuration Wizard (ASA and PIX 7.0+ Devices), page 26-24. Comparing IKE Version 1 and 2 There are two versions of IKE: version 1 (IKEv1) and version 2 (IKEv2). When you configure IKE on a device that supports IKEv2, you have the option of configuring either version alone, or both versions together. When the device attempts to negotiate a connection with another peer, it uses whichever versions you allow and that the other peer accepts. If you allow both versions, the device automatically falls back to the other version if negotiations are unsuccessful with the initially chosen version (IKEv2 is always tried first if it is configured). Both peers must support IKEv2 to use it in a negotiation. Tip Security Manager supports IKEv2 on ASA 8.4(1)+ only. For remote access IPsec VPNs, users must use the AnyConnect 3.0+ client to complete IKEv2 connections, and IKEv2 connections use the same license pool that is used for SSL VPN connections. The legacy VPN Client is used for IKEv1 remote access connections on ASAs. For more information about device support in VPNs, see Understanding Devices Supported by Each IPsec Technology, page 21-9. IKEv2 differs from IKEv1 in the following ways: • IKEv2 fixes the Photuris style cookie mechanism. • IKEv2 has fewer round trips in a negotiation than IKEv1, two round trips versus five for IKEv1 for a basic exchange. • Transform options are OR’ed, which means that you can specify multiple options in a single proposal rather than creating separate unique proposals for each allowed combination. • Built-in dead peer detection (DPD). • Built-in configuration payload and user authentication mode. • Built-in NAT traversal (NAT-T). IKEv2 uses ports 500 and 4500 for NAT-T. User Guide for Cisco Security Manager 4.1 22-4 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE • Improved re-keying and collision handling. • A single security association (SA) can protect multiple subnets, which improves scalability. • Asymmetric authentication in site-to-site VPNs, where each side of a tunnel can have different preshared keys, different certificates, or one side a key and the other side a certificate. • For remote access IPsec VPNs, you can configure double authentication for IKEv2 connections in the same way that you configure them for remote access SSL VPNs. IKEv1 does not support double authentication. Related Topics • Overview of IKE and IPsec Configurations, page 22-2 • Configuring an IKE Proposal, page 22-9 Understanding IKE Internet Key Exchange (IKE), also called Internet Security Association and Key Management Protocol (ISAKMP), is the negotiation protocol that lets two hosts agree on how to build an IPsec security association (SA). It provides a common framework for agreeing on the format of SA attributes. This includes negotiating with the peer about the SA, and modifying or deleting the SA. IKE creates the cryptographic keys used to authenticate IPsec peers, negotiates and distributes IPsec encryption keys, and automatically establishes IPsec security associations. The IKE negotiation comprises two phases. Phase 1 negotiates a security association between two IKE peers, creating the first tunnel that enables the peers to communicate securely in Phase 2, protecting later ISAKMP negotiation messages. During Phase 2 negotiation, IKE establishes SAs for other applications, such as IPsec, which protects the data sent between peers. Both phases use proposals when they negotiate a connection. An IKE proposal is a set of algorithms that two peers use to secure the IKE negotiation between them. IKE negotiation begins by each peer agreeing on a common (shared) IKE policy. This policy states which security parameters will be used to protect subsequent IKE negotiations. In remote access IPsec VPNs, you can define several IKE proposals per VPN to create multiple, prioritized policies at each peer to ensure that at least one policy matches a remote peer’s policy. For site-to-site VPNs, you can create a single IKE proposal. To define an IKE proposal, you must specify: • A unique priority (1 through 65,543, with 1 the highest priority). • An encryption method for the IKE negotiation, to protect the data and ensure privacy. See Deciding Which Encryption Algorithm to Use, page 22-6. • A Hashed Message Authentication Codes (HMAC) method (called integrity algorithm in IKEv2) to ensure the identity of the sender, and to ensure that the message has not been modified in transit. See Deciding Which Hash Algorithm to Use, page 22-7. • For IKEv2, a separate pseudo-random function (PRF) used as the algorithm to derive keying material and hashing operations required for the IKEv2 tunnel encryption. The options are the same as those used for the hash algorithm; see Deciding Which Hash Algorithm to Use, page 22-7. • A Diffie-Hellman group to determine the strength of the encryption-key-determination algorithm. The device uses this algorithm to derive the encryption and hash keys. See Deciding Which Diffie-Hellman Modulus Group to Use, page 22-7. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-5 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE Tip • An authentication method, to ensure the identity of the peers. See Deciding Which Authentication Method to Use, page 22-8. • A limit to the time the device uses an encryption key before replacing it. (ASA devices only.) With IKEv1 policies, for each parameter, you set one value. For IKEv2, you can configure multiple encryption, integrity, PRF, and Diffie-Hellman options. The ASA orders the settings from the most secure to the least secure and negotiates with the peer using that order. This allows you to potentially send a single proposal to convey all the allowed transforms instead of the need to send each allowed combination as with IKEv1. When IKE negotiation begins, the peer that initiates the negotiation sends all of its policies to the remote peer, and the remote peer searches for a match with its own policies, in priority order. A match between IKE policies exists if they have the same encryption, hash (integrity and PRF for IKEv2), authentication, and Diffie-Hellman values, and an SA lifetime less than or equal to the lifetime in the policy sent. If the lifetimes are not identical, the shorter lifetime—from the remote peer policy—applies. If no match exists, IKE refuses negotiation and the IKE SA is not established. The following topics explain how to configure IKE proposals: • Configuring an IKE Proposal, page 22-9 • Configuring IKEv1 Proposal Policy Objects, page 22-10 • Configuring IKEv2 Proposal Policy Objects, page 22-13 • Configuring the IKE Proposal for GET VPN, page 25-15 Deciding Which Encryption Algorithm to Use When deciding which encryption and hash algorithms to use for the IKE proposal, your choice is limited to algorithms that are supported by the devices in the VPN. You can choose from the following encryption algorithms: • DES (Data Encryption Standard) is a symmetric secret-key block algorithm. It is faster than 3DES and uses less system resources, but it is also less secure. If you do not need strong data confidentiality, and if system resources or speed is a concern, you should choose DES. • 3DES (Triple DES) is more secure because it processes each block of data three times, each time with a different key. However, it uses more system resources and is slower than DES. 3DES is the recommended encryption algorithm, assuming that the devices support it. • AES (Advanced Encryption Standard) provides greater security than DES and is computationally more efficient than 3DES. AES offers three different key strengths: 128-, 192- and 256-bit keys. A longer key provides higher security but a reduction in performance. When you configure IKE on a router, the router must use Cisco IOS Software 12.3T or later to use AES. Note AES cannot be used in conjunction with a hardware encryption card. Related Topics • Understanding IKE, page 22-5 • Configuring an IKE Proposal, page 22-9 User Guide for Cisco Security Manager 4.1 22-6 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE Deciding Which Hash Algorithm to Use You can choose from the following hash algorithms. In IKEv2, the hash algorithm is separated into two options, one for the integrity algorithm, and one for the pseudo-random function (PRF). • SHA produces a 160-bit digest and is more resistant to brute-force attacks than MD5. However, it is also more resource intensive than MD5. For implementations that require the highest level of security, use the SHA hash algorithm. • MD5 produces a 128-bit digest and uses less processing time for an overall faster performance than SHA, but it is considered to be weaker than SHA. Related Topics • Understanding IKE, page 22-5 • Configuring an IKE Proposal, page 22-9 Deciding Which Diffie-Hellman Modulus Group to Use Security Manager supports the following Diffie-Hellman key derivation algorithms to generate IPsec security association (SA) keys. Each group has a different size modulus. A larger modulus provides higher security, but requires more processing time. You must have a matching modulus group on both peers. Tip If you select AES encryption, to support the large key sizes required by AES, ISAKMP negotiation should use Diffie-Hellman (DH) Group 5 or higher. ASA devices support groups 1, 2, and 5 only, and these are the only groups available for IKEv2. • Diffie-Hellman Group 1: 768-bit modulus. Use to generate IPsec SA keys where the prime and generator numbers are 768 bits. • Diffie-Hellman Group 2: 1024-bit modulus. Use to generate IPsec SA keys where the prime and generator numbers are 1024 bits. Cisco VPN Client Version 3.x or higher requires a minimum of Group 2. • Diffie-Hellman Group 5: 1536-bit modulus. Use to generate IPsec SA keys where the prime and generator numbers are 2048 bits. Considered good protection for 128-bit keys, but group 14 is better. • Diffie-Hellman Group 7: Use to generate IPsec SA keys when the elliptical curve field size is 163 characters. Group 7 is not supported on a Catalyst 6500/7600 device with VPNSM or VPN SPA configuration. • Diffie-Hellman Group 14: 2048-bit modulus. Considered good protection for 128-bit keys. • Diffie-Hellman Group 15: 3072-bit modulus. Considered good protection for 192-bit keys. • Diffie-Hellman Group 16: 4096-bit modulus. Considered good protection for 256-bit keys. Related Topics • Understanding IKE, page 22-5 • Configuring an IKE Proposal, page 22-9 User Guide for Cisco Security Manager 4.1 OL-23991-01 22-7 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE Deciding Which Authentication Method to Use Security Manager supports two methods for peer device authentication in a VPN communication: • Preshared Key—Preshared keys allow for a secret key to be shared between two peers and to be used by IKE during the authentication phase. The same shared key must be configured at each peer or the IKE SA cannot be established. To use IKE successfully with this device authentication method, you must define various preshared key parameters. For more information, see the appropriate topic: – Site-to-site VPN, IKEv1 configuration—See Configuring IKEv1 Preshared Key Policies, page 22-40. – Site-to-site VPN, IKEv2 configuration—See Configuring IKEv2 Authentication in Site-to-Site VPNs, page 22-58. – Remote access IPsec VPN, IKEv1—Configured on the IPsec tab of the connection profile. See IPSec Tab (Connection Profiles), page 27-16. – Remote access IPsec VPN, IKEv2—You cannot use preshared keys when using IKEv2 in a remote access IPSec VPN. You must use certificates. • Certificate—An authentication method in which RSA key pairs are used to sign and encrypt IKE key management messages. Certificates provide non-repudiation of communication between two peers, meaning that it can be proved that the communication actually took place. When using this authentication method, peers are configured to obtain digital certificates from a Certification Authority (CA). CAs manage certificate requests and issue certificates to participating IPsec network devices. These services provide centralized key management for the participating devices. While the use of preshared keys does not scale well, using a CA does improve the manageability and scalability of your IPsec network. With a CA, you do not need to configure keys between all encrypting devices. Instead, each participating device is registered with the CA, and requests a certificate from the CA. Each device that has its own certificate and the public key of the CA can authenticate every other device within a given CA’s domain. To use IKE successfully with the Certificate authentication method, you must define parameters for CA authentication and enrollment. For more information, see the appropriate topic: – Site-to-site VPN, IKEv1 configuration—See Understanding Public Key Infrastructure Policies, page 22-43. – Site-to-site VPN, IKEv2 configuration—Configuring IKEv2 Authentication in Site-to-Site VPNs, page 22-58. – Remote access IPsec VPN, IKEv1—Configured on the IPsec tab of the connection profile as explained in IPSec Tab (Connection Profiles), page 27-16. You must also configure the Public Key Infrastructure policy with the same trustpoint; see Understanding Public Key Infrastructure Policies, page 22-43. – Remote access IPsec VPN, IKEv2—Configure the global trustpoint on the IKEv2 Settings tab of the Global Settings policy as explained in Configuring VPN Global IKEv2 Settings, page 22-30. You must also configure the Public Key Infrastructure policy with the same trustpoint; see Understanding Public Key Infrastructure Policies, page 22-43. Related Topics • Understanding IKE, page 22-5 • Configuring an IKE Proposal, page 22-9 User Guide for Cisco Security Manager 4.1 22-8 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE Configuring an IKE Proposal In Security Manager, an IKE proposal is a mandatory policy when you configure a site-to-site or remote access IPsec VPN. When you use the configuration wizard to create a new IPsec VPN, an IKE Proposal policy is automatically assigned to the VPN; the policy might be the factory default, or it might be a shared policy specifically selected for the VPN. For more information about the IKE (Internet Key Exchange) key management protocol, see Understanding IKE, page 22-5. Use the IKE Proposal policy to examine the current IKE proposals and to configure new proposals except for GET VPN topologies. For GET VPN, see Configuring the IKE Proposal for GET VPN, page 25-15. Tips • For site-to-site VPNs, you can select at most one IKE proposal per IKE version. For remote access IPsec VPNs, you can select multiple proposals for each IKE version; select all IKE proposals that are allowed in the remote access VPN. • To configure IKEv2 (version 2), the device must be an ASA running ASA Software release 8.4(1) or higher. • The IPsec Proposal policy must enable IKEv1, IKEv2, or both, to match the IKE proposals you configure in this policy. In cases where you cannot configure IKEv2 in the IPsec proposal, such as in Easy VPN topologies, IKEv2 is not supported. For more information, see Understanding IPsec Proposals, page 22-15. • The IKEv1 Proposal objects specify whether preshared keys or certificates are used for authentication. You must configure the appropriate policies to configure preshared keys or Public Key Infrastructure settings. For IKEv2, the object does not specify whether preshared keys or certificates are used, but other policies must define the authentication requirements. For more information, see Deciding Which Authentication Method to Use, page 22-8. Related Topics Step 1 • Deciding Which Hash Algorithm to Use, page 22-7 • Deciding Which Diffie-Hellman Modulus Group to Use, page 22-7 • Deciding Which Authentication Method to Use, page 22-8 Do one of the following to open the IKE Proposal policy based on the type of VPN you are configuring: • For remote access VPNs, do one of the following: – (Device View) Select Remote Access VPN > IPSec VPN > IKE Proposal from the Policy selector. – (Policy View) Select Remote Access VPN > IPSec VPN > IKE Proposal from the Policy Type selector. Select an existing policy or create a new one. • For site-to-site VPNs, do one of the following: – Open the Site-to-Site VPN Manager Window, page 21-18, select a topology (other than GET VPN) in the VPNs selector, then select IKE Proposal in the Policies selector. – (Policy view) Select Site-to-Site VPN > IKE Proposal from the Policy Types selector. Select an existing shared policy or create a new one. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-9 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE Step 2 In each of the IKEv1 Proposals and IKEv2 Proposals fields, click Select to choose the policy objects that define the settings for an IKE version 1 or version 2 proposal. Configure proposals only for those IKE versions supported in the VPN. • To select an IKE proposal for site-to-site VPNs, simply highlight it in the available proposals list. For remote access IPsec VPNs, highlight the desired objects in the available proposals list and click >> to move them to the selected proposals list. • To remove an IKE proposal for remote access IPsec VPNs, highlight it in the selected proposals list and click << to move it to the available proposals list. • To create a new IKE proposal, click the Create (+) button beneath the available proposals list. The Add IKEv1 or IKEv2 Proposal dialog box opens. For instructions on creating the object, see the following topics: – Configuring IKEv1 Proposal Policy Objects, page 22-10 – Configuring IKEv2 Proposal Policy Objects, page 22-13 • To edit an object, or to view its settings, select it and click the Edit (pencil) button beneath the list. Configuring IKEv1 Proposal Policy Objects Use the IKEv1 Proposal dialog box to create, copy, and edit an IKEv1 proposal object. Internet Key Exchange (IKE) version 1 proposal objects contain the parameters required for IKEv1 proposals when defining remote access and site-to-site VPN policies. IKE is a key management protocol that facilitates the management of IPsec-based communications. It is used to authenticate IPsec peers, negotiate and distribute IPsec encryption keys, and automatically establish IPsec security associations (SAs). The IKE negotiation comprises two phases. Phase 1 negotiates a security association between two IKE peers, which enables the peers to communicate securely in Phase 2. During Phase 2 negotiation, IKE establishes security associations (SAs) for other applications, such as IPsec. Both phases use proposals when they negotiate a connection. For more information about IKE proposals, see the following topics: • Overview of IKE and IPsec Configurations, page 22-2 • Comparing IKE Version 1 and 2, page 22-4 • Understanding IKE, page 22-5 • Deciding Which Encryption Algorithm to Use, page 22-6 • Deciding Which Hash Algorithm to Use, page 22-7 • Deciding Which Diffie-Hellman Modulus Group to Use, page 22-7 • Deciding Which Authentication Method to Use, page 22-8 Navigation Path Select Manage > Policy Objects, then select IKE Proposals > IKEv1 Proposals from the Object Type Selector. Right-click inside the work area, then select New Object or right-click a row, then select Edit Object. Tip You can also access this dialog box when configuring the IKE Proposal policy as explained in Configuring an IKE Proposal, page 22-9. User Guide for Cisco Security Manager 4.1 22-10 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE Related Topics • Configuring IKEv2 Proposal Policy Objects, page 22-13 • Creating Policy Objects, page 6-6 • Policy Object Manager Window, page 6-3 • Configuring IPSec IKEv1 or IKEv2 Transform Set Policy Objects, page 22-23 Field Reference Table 22-1 IKEv1 Proposal Dialog Box Element Description Name The name of the policy object. A maximum of 128 characters is allowed. Description A description of the policy object. A maximum of 1024 characters is allowed. Priority The priority value of the IKE proposal. The priority value determines the order of the IKE proposals compared by the two negotiating peers when attempting to find a common security association (SA). If the remote IPsec peer does not support the parameters selected in your first priority policy, the device tries to use the parameters defined in the policy with the next lowest priority number. Valid values range from 1 to 10000. The lower the number, the higher the priority. If you leave this field blank, Security Manager assigns the lowest unassigned value starting with 1, then 5, then continuing in increments of 5. Encryption Algorithm Hash Algorithm The encryption algorithm used to establish the Phase 1 SA for protecting Phase 2 negotiations: • AES-128—Encrypts according to the Advanced Encryption Standard using 128-bit keys. • AES-192—Encrypts according to the Advanced Encryption Standard using 192-bit keys. • AES-256—Encrypts according to the Advanced Encryption Standard using 256-bit keys. • DES—Encrypts according to the Data Encryption Standard using 56-bit keys. • 3DES—Encrypts three times using 56-bit keys. 3DES is more secure than DES, but requires more processing for encryption and decryption. It is less secure than AES. A 3DES license is required to use this option. The hash algorithm used in the IKE proposal. The hash algorithm creates a message digest, which is used to ensure message integrity. Options are: • SHA (Secure Hash Algorithm)—Produces a 160-bit digest. SHA is more resistant to brute-force attacks than MD5. • MD5 (Message Digest 5)—Produces a 128-bit digest. MD5 uses less processing time than SHA. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-11 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE Table 22-1 IKEv1 Proposal Dialog Box (Continued) Element Description Modulus Group The Diffie-Hellman group to use for deriving a shared secret between the two IPsec peers without transmitting it to each other. A larger modulus provides higher security but requires more processing time. The two peers must have a matching modulus group. Options are: Lifetime • 1—Diffie-Hellman Group 1 (768-bit modulus). • 2—Diffie-Hellman Group 2 (1024-bit modulus). • 5—Diffie-Hellman Group 5 (1536-bit modulus, considered good protection for 128-bit keys, but group 14 is better). If you are using AES encryption, use this group (or higher). The ASA supports this group as the highest group. • 7—Diffie-Hellman Group 7 (163-bit elliptical curve field size). • 14—Diffie-Hellman Group 14 (2048-bit modulus, considered good protection for 128-bit keys). • 15—Diffie-Hellman Group 15 (3072-bit modulus, considered good protection for 192-bit keys). • 16—Diffie-Hellman Group 16 (4096-bit modulus, considered good protection for 256-bit keys). The lifetime of the security association (SA), in seconds. When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. As a general rule, the shorter the lifetime (up to a point), the more secure your IKE negotiations will be. However, with longer lifetimes, future IPsec security associations can be set up more quickly than with shorter lifetimes. You can specify a value from 60 to 2147483647 seconds. The default is 86400. Authentication Method Category The method of authentication to use between the two peers. For information on how this selection determines which other policies you must configure, see Deciding Which Authentication Method to Use, page 22-8. Select one of the following: • Preshared Key—Preshared keys allow for a secret key to be shared between two peers and to be used by IKE during the authentication phase. If one of the participating peers is not configured with the same preshared key, the IKE SA cannot be established. • Certificate—An authentication method in which RSA key pairs are used to sign and encrypt IKE key management messages. This method provides non-repudiation of communication between two peers, meaning that it can be proved that the communication actually took place. When you use this authentication method, the peers are configured to obtain digital certificates from a Certification Authority (CA). The category assigned to the object. Categories help you organize and identify rules and objects. See Using Category Objects, page 6-9. User Guide for Cisco Security Manager 4.1 22-12 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE Configuring IKEv2 Proposal Policy Objects Use the IKEv2 Proposal dialog box to create, copy, and edit an IKEv2 proposal object. You can use IKEv2 proposals with ASA Software release 8.4(1)+ only. Internet Key Exchange (IKE) version 2 proposal objects contain the parameters required for IKEv2 proposals when defining remote access and site-to-site VPN policies. IKE is a key management protocol that facilitates the management of IPsec-based communications. It is used to authenticate IPsec peers, negotiate and distribute IPsec encryption keys, and automatically establish IPsec security associations (SAs). The IKE negotiation comprises two phases. Phase 1 negotiates a security association between two IKE peers, which enables the peers to communicate securely in Phase 2. During Phase 2 negotiation, IKE establishes security associations (SAs) for other applications, such as IPsec. Both phases use proposals when they negotiate a connection. Unlike IKEv1, in an IKEv2 proposal, you can select multiple algorithms and modulus groups from which peers can choose during the Phase 1 negotiation. For more information about IKE proposals, see the following topics: Tip • Overview of IKE and IPsec Configurations, page 22-2 • Comparing IKE Version 1 and 2, page 22-4 • Understanding IKE, page 22-5 • Deciding Which Encryption Algorithm to Use, page 22-6 • Deciding Which Hash Algorithm to Use, page 22-7 • Deciding Which Diffie-Hellman Modulus Group to Use, page 22-7 Unlike IKEv1, you do not specify the authentication method in the IKE proposal. For more information on how to configure the authentication method in IKEv2, see Deciding Which Authentication Method to Use, page 22-8. Navigation Path Select Manage > Policy Objects, then select IKE Proposals > IKEv2 Proposals from the Object Type Selector. Right-click inside the work area, then select New Object or right-click a row, then select Edit Object. Tip You can also access this dialog box when configuring the IKE Proposal policy as explained in Configuring an IKE Proposal, page 22-9. Related Topics • Configuring IKEv1 Proposal Policy Objects, page 22-10 • Creating Policy Objects, page 6-6 • Policy Object Manager Window, page 6-3 • Configuring IPSec IKEv1 or IKEv2 Transform Set Policy Objects, page 22-23 User Guide for Cisco Security Manager 4.1 OL-23991-01 22-13 Chapter 22 Configuring IKE and IPsec Policies Understanding IKE Field Reference Table 22-2 IKEv2 Proposal Dialog Box Element Description Name The name of the policy object. A maximum of 128 characters is allowed. Description A description of the policy object. A maximum of 1024 characters is allowed. Priority The priority value of the IKE proposal. The priority value determines the order of the IKE proposals compared by the two negotiating peers when attempting to find a common security association (SA). If the remote IPsec peer does not support the parameters selected in your first priority policy, the device tries to use the parameters defined in the policy with the next lowest priority number. Valid values range from 1 to 65535. The lower the number, the higher the priority. If you leave this field blank, Security Manager assigns the lowest unassigned value starting with 1, then 5, then continuing in increments of 5. Encryption Algorithm Integrity (Hash) Algorithm The encryption algorithm used to establish the Phase 1 SA for protecting Phase 2 negotiations. Click Select and select all of the algorithms that you want to allow in the VPN: • AES—Encrypts according to the Advanced Encryption Standard using 128-bit keys. • AES-192—Encrypts according to the Advanced Encryption Standard using 192-bit keys. • AES-256—Encrypts according to the Advanced Encryption Standard using 256-bit keys. • DES—Encrypts according to the Data Encryption Standard using 56-bit keys. • 3DES—Encrypts three times using 56-bit keys. 3DES is more secure than DES, but requires more processing for encryption and decryption. It is less secure than AES. A 3DES license is required to use this option. • Null—No encryption algorithm. The integrity portion of the hash algorithm used in the IKE proposal. The hash algorithm creates a message digest, which is used to ensure message integrity. Click Select and select all of the algorithms that you want to allow in the VPN: • SHA (Secure Hash Algorithm)—Produces a 160-bit digest. SHA is more resistant to brute-force attacks than MD5. • MD5 (Message Digest 5)—Produces a 128-bit digest. MD5 uses less processing time than SHA. User Guide for Cisco Security Manager 4.1 22-14 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals Table 22-2 IKEv2 Proposal Dialog Box (Continued) Element Description Prf Algorithm The pseudo-random function (PRF) portion of the hash algorithm used in the IKE proposal. In IKEv1, the Integrity and PRF algorithms are not separated, but in IKEv2, you can specify different algorithms for these elements. Click Select and select all of the algorithms that you want to allow in the VPN: Modulus Group Lifetime • SHA (Secure Hash Algorithm)—Produces a 160-bit digest. SHA is more resistant to brute-force attacks than MD5. • MD5 (Message Digest 5)—Produces a 128-bit digest. MD5 uses less processing time than SHA. The Diffie-Hellman group to use for deriving a shared secret between the two IPsec peers without transmitting it to each other. A larger modulus provides higher security but requires more processing time. The two peers must have a matching modulus group. Click Select and select all of the groups that you want to allow in the VPN: • 1—Diffie-Hellman Group 1 (768-bit modulus). • 2—Diffie-Hellman Group 2 (1024-bit modulus). This is the minimum recommended setting. • 5—Diffie-Hellman Group 5 (1536-bit modulus, considered good protection for 128-bit keys). Select this option if you are using AES encryption. The lifetime of the security association (SA), in seconds. When the lifetime is exceeded, the SA expires and must be renegotiated between the two peers. As a general rule, the shorter the lifetime (up to a point), the more secure your IKE negotiations will be. However, with longer lifetimes, future IPsec security associations can be set up more quickly than with shorter lifetimes. You can specify a value from 120 to 2147483647 seconds. The default is 86400. Category The category assigned to the object. Categories help you organize and identify rules and objects. See Using Category Objects, page 6-9. Understanding IPsec Proposals IPsec is one of the most secure methods for setting up a VPN. IPsec provides data encryption at the IP packet level, offering a robust security solution that is standards-based. With IPsec, data is transmitted over a public network through tunnels. A tunnel is a secure, logical communication path between two peers, which can be devices in a site-to-site VPN or a device and user in remote access IPsec VPNs. Traffic that enters an IPsec tunnel is secured by a combination of security protocols and algorithms called a transform set. An IPsec proposal is used in Phase 2 of an IKE negotiation, as explained in Understanding IKE, page 22-5. The specific content of the proposal varies according to topology type (site-to-site or remote access) and device type, although the proposals are broadly similar and contain many of the same elements, such as IPsec transform sets. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-15 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals The following topics explain IPsec proposal concepts and procedures in more detail: • Understanding IPsec Proposals for Site-to-Site VPNs, page 22-16 – Understanding Crypto Maps, page 22-16 – Understanding Transform Sets, page 22-17 – Understanding Reverse Route Injection, page 22-18 • Configuring IPsec Proposals in Site-to-Site VPNs, page 22-19 • Configuring IPSec IKEv1 or IKEv2 Transform Set Policy Objects, page 22-23 • Configuring an IPsec Proposal for Easy VPN, page 24-10 • Configuring an IPsec Proposal on a Remote Access VPN Server (ASA, PIX 7.0+ Devices), page 27-29 • Configuring an IPsec Proposal on a Remote Access VPN Server (IOS, PIX 6.3 Devices), page 29-3 Understanding IPsec Proposals for Site-to-Site VPNs IPsec is one of the most secure methods for setting up a VPN. IPsec provides data encryption at the IP packet level, offering a robust security solution that is standards-based. Pure IPsec configurations cannot use routing protocols—the policy created is used for pure IPsec provisioning. You can configure pure IPsec on Cisco IOS routers, PIX Firewalls, Catalyst VPN Service Modules, and Adaptive Security Appliance (ASA) devices. With IPsec, data is transmitted over a public network through tunnels. A tunnel is a secure, logical communication path between two peers. Traffic that enters an IPsec tunnel is secured by a combination of security protocols and algorithms called a transform set. In Security Manager, you use an IPsec Proposal policy to define the settings required for a IPsec tunnels. An IPsec proposal is a collection of one or more crypto maps that are applied to the VPN interfaces on the devices. A crypto map combines all the components required to set up IPsec security associations, including transform sets. A crypto map can also be configured with Reverse Route Injection (RRI). The following topics provide more information: • Understanding Crypto Maps, page 22-16 • Understanding Transform Sets, page 22-17 • Understanding Reverse Route Injection, page 22-18 Related Topics • Configuring IPsec Proposals in Site-to-Site VPNs, page 22-19 Understanding Crypto Maps A crypto map combines all components required to set up IPsec security associations (SA), including IPsec rules, transform sets, remote peers, and other parameters that might be necessary to define an IPsec SA. A crypto map entry is a named series of CLI commands. Crypto map entries with the same crypto map name (but different map sequence numbers) are grouped into a crypto map set, which is applied to the VPN interfaces on relevant devices. All IP traffic passing through the interface is evaluated against the applied crypto map set. User Guide for Cisco Security Manager 4.1 22-16 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals When two peers try to establish an SA, they must each have at least one compatible crypto map entry. The transform set defined in the crypto map entry is used in the IPsec security negotiation to protect the data flows specified by that crypto map’s IPsec rules. Dynamic crypto map policies are used in site-to-site VPNs when an unknown remote peer tries to initiate an IPsec security association with the local hub. The hub cannot be the initiator of the security association negotiation. Dynamic crypto policies allow remote peers to exchange IPsec traffic with a local hub even if the hub does not know the remote peer’s identity. You can create a dynamic crypto policy on individual hubs or on a device group that contains hubs. The policy is written only to the hubs, not to any spokes that might be contained in the group. A dynamic crypto map policy essentially creates a crypto map entry without all the parameters configured. The missing parameters are later dynamically configured (as the result of an IPsec negotiation) to match a remote peer’s requirements. The peer addresses for dynamic or static crypto maps are deduced from the VPN topology. Dynamic crypto map policies apply only in a hub-and-spoke VPN configuration—in a point-to-point or full mesh VPN topology, you can apply only static crypto map policies. Note (Site-to-site VPNs.) Except for Extranet VPNs, Security Manager can manage an existing VPN tunnel only if the tunnel’s peers are managed by Security Manager. In such a case, Security Manager uses the same crypto map name for the tunnel on the peers. On subsequent deployments, only Security Manager tunnels are managed (Security Manager maintains a log of all tunnels that were configured). Related Topics • Understanding IPsec Proposals, page 22-15 • Understanding Transform Sets, page 22-17 • Configuring IPsec Proposals in Site-to-Site VPNs, page 22-19 Understanding Transform Sets A transform set is a combination of security protocols and algorithms that secure traffic in an IPsec tunnel. During the IPsec security association (SA) negotiation, peers search for a transform set that is the same at both peers. When such a transform set is found, it is applied to create an SA that protects data flows in the access list for that crypto map, protecting the traffic in the VPN. There are separate IPsec transform sets for IKEv1 and IKEv2. With IKEv1 transform sets, for each parameter, you set one value. For IKEv2 transform sets, you can configure multiple encryption and integration algorithms for a single proposal. ASA devices order the settings from the most secure to the least secure and negotiate with the peer using that order. This allows you to potentially send a single proposal to convey all the allowed combinations instead of the need to send each allowed combination individually as with IKEv1. You can specify a number of transform sets per IPsec proposal policy. If you are defining the policy on a spoke or a group of spokes, you do not usually have to specify more than one transform set. This is because the spoke’s assigned hub would typically be a higher performance router capable of supporting any transform set that the spoke supports. However, if you are defining the policy on a hub for dynamic crypto, you should specify more than one transform set to ensure that there will be a transform set match between the hub and the unknown spoke. If more than one of your selected transform sets is supported by both peers, the transform set that provides the highest security is used. Security Manager provides predefined transform sets that you can use in your tunnel policies. You can also create your own transform sets. For more information, see Configuring IPSec IKEv1 or IKEv2 Transform Set Policy Objects, page 22-23. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-17 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals Selecting Tunnel Mode for IKEv1 Transform Sets When defining an IKEv1 transform set, you must specify which IPsec mode of operation to use—tunnel mode or transport mode. You can use the AH and ESP protocols to protect an entire IP payload (Tunnel mode) or just the upper-layer protocols of an IP payload (Transport mode). In tunnel mode (the default), the entire original IP datagram is encrypted, and it becomes the payload in a new IP packet. This mode allows a router to act as an IPsec proxy. That is, the router performs encryption on behalf of the hosts. The source’s router encrypts packets and forwards them along the IPsec tunnel. The destination’s router decrypts the original IP datagram and forwards it on to the destination system. The major advantage of tunnel mode is that the end systems do not need to be modified to enjoy the benefits of IPsec. Tunnel mode also protects against traffic analysis. With tunnel mode, an attacker can only determine the tunnel endpoints and not the true source and destination of the tunneled packets, even if they are the same as the tunnel endpoints. In transport mode, only the IP payload is encrypted, and the original IP headers are left intact. This mode has the advantage of adding only a few bytes to each packet. It also allows devices on the public network to see the final source and destination of the packet. However, by passing the IP header in the clear, transport mode allows an attacker to perform some traffic analysis. For example, an attacker could see when a company’s CEO sent many packets to another senior executive. However, the attacker would only know that IP packets were sent; the attacker would not be able to decipher the contents of the packets. With transport mode, the destination of the flow must be an IPsec termination device. Note You cannot use transport mode for VPN topologies using regular IPsec or Easy VPN. Related Topics • Understanding IPsec Proposals, page 22-15 • Understanding Crypto Maps, page 22-16 • Configuring IPsec Proposals in Site-to-Site VPNs, page 22-19 Understanding Reverse Route Injection Reverse Route Injection (RRI) enables static routes to be automatically inserted into the routing process for those networks and hosts protected by a remote tunnel endpoint. These protected hosts and networks are known as remote proxy identities. Each route is created on the basis of the remote proxy network and mask, with the next hop to this network being the remote tunnel endpoint. By using the remote VPN router as the next hop, the traffic is forced through the crypto process to be encrypted. After the static route is created on the VPN router, this information is propagated to upstream devices, allowing them to determine the appropriate VPN router to which to send returning traffic in order to maintain IPsec state flows. This is particularly useful if multiple VPN routers are used at a site to provide load balancing or failover, or if the remote VPN devices are not accessible through a default route. Routes are created in either the global routing table or the appropriate virtual route forwarding (VRF) table. Note Security Manager automatically configures RRI on devices with High Availability (HA) or on the IPsec Aggregator when VRF-Aware IPsec is configured. You can also configure RRI on a device’s crypto map in a remote access VPN. See Configuring an IPsec Proposal on a Remote Access VPN Server (ASA, PIX 7.0+ Devices), page 27-29 and Configuring an IPsec Proposal on a Remote Access VPN Server (IOS, PIX 6.3 Devices), page 29-3. User Guide for Cisco Security Manager 4.1 22-18 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals In Security Manager, the following options are available for configuring Reverse Route Injection: • For dynamic crypto maps, routes are created upon the successful establishment of IPsec security associations (SAs) for those remote proxies. The next hop back to those remote proxies is through the remote VPN router whose address is learned and applied during the creation of the dynamic crypto map template. The routes are deleted after the SAs are deleted. • The Remote Peer option (available for IOS devices only) enables you to specify an interface or address as the explicit next hop to the remote VPN device. Two routes are created. One route is the standard remote proxy ID and the next hop is the remote VPN client tunnel address. The second route is the actual route to the remote tunnel endpoint, when a recursive lookup is forced to impose that the remote endpoint is reachable via “next-hop.” Creation of the second route for the actual next hop is very important for VRF-Aware IPsec when a default route must be overridden by a more explicit route. Note • For devices using a VPN Services Module (VPNSM), the next hop is the interface or subinterface/VLAN on which the crypto map is applied. In the case of Remote Peer IP (available for IOS devices only), one route is created to a remote proxy by way of a user-defined next hop. The next hop can be used to override a default route to properly direct outgoing encrypted packets. This option reduces the number of routes created and supports those platforms that do not readily facilitate route recursion. Related Topics • Understanding IPsec Proposals, page 22-15 • Understanding Crypto Maps, page 22-16 • Configuring IPsec Proposals in Site-to-Site VPNs, page 22-19 Configuring IPsec Proposals in Site-to-Site VPNs Use the IPsec Proposal page to configure the IPsec proposal used during IKE Phase 2 negotiations for site-to-site VPN topologies with the exception of Easy VPN topologies. IPsec proposals used with Easy VPN topologies, and with remote access VPNs, are significantly different than the basic site-to-site proposal explained in this topic. For information on IPsec proposals in these other topologies, see the following topics: • Configuring an IPsec Proposal for Easy VPN, page 24-10 • Configuring an IPsec Proposal on a Remote Access VPN Server (ASA, PIX 7.0+ Devices), page 27-29 • Configuring an IPsec Proposal on a Remote Access VPN Server (IOS, PIX 6.3 Devices), page 29-3 Navigation Path • (Site-to-Site VPN Manager Window, page 21-18) Select a non-Easy VPN topology in the VPNs selector, then select IPsec Proposal in the Policies selector. If necessary, click the IPsec Proposal tab. • (Policy view) Select Site-to-Site VPN > IPsec Proposal from the Policy Types selector. Select an existing shared policy or create a new one. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-19 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals Related Topics • Understanding IKE, page 22-5 • Understanding IPsec Proposals for Site-to-Site VPNs, page 22-16 Field Reference Table 22-3 IPsec Proposal Page, Site-to-Site VPNs (except Easy VPN) Element Description A crypto map combines all the components required to set up IPsec security associations (SA). When two peers try to establish an SA, they (Hub and spoke and full mesh must each have at least one compatible crypto map entry. For more topologies only.) information, see Understanding Crypto Maps, page 22-16. Crypto Map Type Select the type of crypto map you want to generate: Enable IKEv1 Enable IKEv2 • Static—Use a static crypto map in a point-to-point or full mesh VPN topology. • Dynamic—Dynamic crypto maps can only be used in a hub-and-spoke VPN topology. Dynamic crypto map policies allow remote peers to exchange IPsec traffic with a local hub, even if the hub does not know the remote peer’s identity. The IKE versions to use during IKE negotiations. IKEv2 is supported on ASA Software release 8.4(1)+ only. Select either or both options as appropriate; you must select IKEv1 if any device in the topology does not support IKEv2. When you select both options in hub-and-spoke or full mesh topologies, Security Manager automatically assigns the IKE version to devices based on the OS type and version used by the device. You can change these assignments by clicking the IKE Version tab, then click the Select button beneath the IKEv1 Enabled Peers or IKEv2 Enabled Peers to change which version is assigned to the device. You can change the assignments for devices that support each version only; other devices are not selectable. For more information, see Selecting the IKE Version for Devices in Site-to-Site VPNs, page 22-22. User Guide for Cisco Security Manager 4.1 22-20 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals Table 22-3 IPsec Proposal Page, Site-to-Site VPNs (except Easy VPN) (Continued) Element Description Transform Sets The transform sets to use for your tunnel policy. Transform sets specify which authentication and encryption algorithms will be used to secure the traffic in the tunnel. The transform sets are different for each IKE version; select objects for each supported version. You can select up to 11 transform sets for each. For more information, see Understanding Transform Sets, page 22-17. IKEv2 Transform Sets If more than one of your selected transform sets is supported by both peers, the transform set that provides the highest security will be used. Click Select to select the IPsec transform set policy objects to use in the topology. If the required object is not yet defined, you can click the Create (+) button beneath the available objects list in the selection dialog box to create a new one. For more information, see Configuring IPSec IKEv1 or IKEv2 Transform Set Policy Objects, page 22-23. Note Enable Perfect Forward Secrecy Modulus Group IKEv1 Transform sets can use tunnel mode or transport mode of IPsec operation. However, you cannot use transport mode in IPsec or Easy VPN topologies. Whether to use Perfect Forward Secrecy (PFS) to generate and use a unique session key for each encrypted exchange. The unique session key protects the exchange from subsequent decryption, even if the entire exchange was recorded and the attacker has obtained the preshared or private keys used by the endpoint devices. If you select this option, also select the Diffie-Hellman key derivation algorithm to use when generating the PFS session key in the Modulus Group list. For an explanation of the options, see Deciding Which Diffie-Hellman Modulus Group to Use, page 22-7. Lifetime (sec) Lifetime (kbytes) The global lifetime settings for the crypto IPsec security association (SA). You can specify the IPsec lifetime in seconds, in kilobytes, or both. • Seconds (sec)—The number of seconds an SA will exist before expiring. The default is 3600 seconds (one hour). • Kilobytes (kbytes)—The volume of traffic (in kilobytes) that can pass between IPsec peers using a given SA before it expires. Valid values depend on the device type. Enter a value within the range 10-2147483647 for an IOS router, and 2560-536870912 for an ASA/PIX7.0+ device. The default value is 4,608,000 kilobytes. QoS Preclassify Supported on Cisco IOS routers, except 7600 devices. When selected, enables the classification of packets before tunneling and encryption occur. The Quality of Service (QoS) for VPNs feature enables Cisco IOS QoS services to operate with tunneling and encryption on an interface. The QoS features on the output interface classify packets and apply the appropriate QoS service before the data is encrypted and tunneled, enabling traffic flows to be adjusted in congested environments, and resulting in more effective packet tunneling. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-21 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals Table 22-3 IPsec Proposal Page, Site-to-Site VPNs (except Easy VPN) (Continued) Element Description Reverse Route Supported on ASA devices, PIX 7.0+ devices, and Cisco IOS routers except 7600 devices. Reverse Route Injection (RRI) enables static routes to be automatically inserted into the routing process for those networks and hosts protected by a remote tunnel endpoint. For more information, see Understanding Reverse Route Injection, page 22-18. Select one of the following options to configure RRI on the crypto map: • None—Disables the configuration of RRI on the crypto map. • Standard—(ASA, PIX 7.0+, IOS devices) Creates routes based on the destination information defined in the crypto map access control list (ACL). This is the default option. • Remote Peer—(IOS devices only) Creates two routes, one for the remote endpoint and one for route recursion to the remote endpoint via the interface to which the crypto map is applied. • Remote Peer IP—(IOS devices only) Specifies an address as the explicit next hop to the remote VPN device. Enter the IP address or a network/host object that specifies the address, or click Select to select the network/host object from a list or to create a new object. Note If you use network/host objects, you can select the Allow Value Override per Device option in the object to override the IP address, if required, for specific devices that use this object. Selecting the IKE Version for Devices in Site-to-Site VPNs Use the IKE Version tab in the IPsec Proposal page to select which version of IKE to use for each device in a hub-and-spoke or full mesh site-to-site VPN. This tab appears only in the Site-to-Site VPN Manager; you cannot configure the options in Policy view, because they are specific to the actual devices in a VPN topology. The IKE Version tab contains two lists: IKEv1 Enabled Peers and IKEv2 Enabled Peers. When you configure the IPsec proposal, as described in Configuring IPsec Proposals in Site-to-Site VPNs, page 22-19, you select which IKE versions to allow in the VPN (version 1, version 2, or both). Security Manager automatically chooses which IKE version to use for a device based on the OS version used by the device. For example, IOS routers always appear in the IKEv1 Enabled Peers list. If a device supports both IKEv1 and IKEv2, it appears in both lists. You need to alter the selection only if you are allowing both IKE versions in a VPN and you want to specifically prevent some IKEv2-capable devices from using one of the IKE versions. To change which IKE version is allowed for a device, click the Select button beneath the list from which you want to remove the device (or to add the device after previously removing it). A selection dialog box opens where you can do the following (click OK to confirm your choices): • To remove a device, so that it cannot use the IKE version, highlight it in the Selected Peers list and click << to move it to the Available Peers list. • To add a device, so that it is allowed to use the IKE version, highlight it in the Available Peers list and click >> to move it to the Selected Peers list. User Guide for Cisco Security Manager 4.1 22-22 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals Tip The selection lists include only those devices that support both IKE versions, because you cannot change the version selection for devices that support a single version. IKEv2 is supported on ASA Software 8.4(1)+. Navigation Path (Site-to-Site VPN Manager Window, page 21-18) Select a non-Easy VPN topology in the VPNs selector, then select IPsec Proposal in the Policies selector. Click the IKE Version tab. Related Topics • Understanding IKE, page 22-5 • Understanding IPsec Proposals for Site-to-Site VPNs, page 22-16 Configuring IPSec IKEv1 or IKEv2 Transform Set Policy Objects Use the Add or Edit IPSec Transform Set dialog box to configure IPSec transform sets for use in IKE negotiations. You can create IPSec transform set objects for use in IPSec proposals when defining IPSec-protected traffic in site-to-site and remote access VPNs. During IPSec security association negotiation, the peers agree to use a particular transform set when protecting a particular data flow. Two different security protocols are included within the IPSec standard: Note • Encapsulating Security Protocol (ESP)—Provides authentication, encryption, and anti-replay services. ESP is IP protocol type 50. • Authentication Header (AH)—Provides authentication and anti-replay services. AH does not provide encryption and has largely been superseded by ESP. It is also supported on routers only. AH is IP protocol type 51. We recommend using both encryption and authentication on IPSec tunnels. There are separate IPsec transform set objects based on the IKE version, IKEv1 or IKEv2: • When you create an IPSec IKEv1 transform set object, you select the mode in which IPSec should operate, as well as define the required encryption and authentication types. Additionally, you can select whether to include compression in the transform set. You can select single options for the algorithms, so if you want to support multiple combinations in a VPN, you must create multiple IPsec IKEv1 transform set objects. • When you create an IPSec IKEv2 transform set object, you can select all of the encryption and hash algorithms that you will allow in a VPN. During IKEv2 negotiations, the peers select the most appropriate options that each support. Navigation Path Select Manage > Policy Objects, then select IPSec Transform Sets > IPSec IKEv1 Transform Sets or IPSec Transform Sets > IPSec IKEv2 Transform Sets from the Object Type Selector. Right-click inside the work area and select New Object or right-click a row and select Edit Object. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-23 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals Related Topics • Understanding Transform Sets, page 22-17 • Overview of IKE and IPsec Configurations, page 22-2 • Comparing IKE Version 1 and 2, page 22-4 • Understanding IKE, page 22-5 • Understanding IPsec Proposals, page 22-15 • IPsec Proposal Editor (ASA, PIX 7.0+ Devices), page 27-30 • IPsec Proposal Editor (IOS, PIX 6.3 Devices), page 29-4 • Configuring an IPsec Proposal on a Remote Access VPN Server (ASA, PIX 7.0+ Devices), page 27-29 • Configuring an IPsec Proposal on a Remote Access VPN Server (IOS, PIX 6.3 Devices), page 29-3 • Configuring IPsec Proposals in Site-to-Site VPNs, page 22-19 • Configuring an IPsec Proposal for Easy VPN, page 24-10 • Configuring IKEv1 Proposal Policy Objects, page 22-10 • Creating Policy Objects, page 6-6 • Policy Object Manager Window, page 6-3 Field Reference Table 22-4 IPSec IKEv1 or IKEv2 Transform Set Dialog Box Element Description Name The name of the policy object. A maximum of 128 characters is allowed. Description A description of the policy object. A maximum of 1024 characters is allowed. Mode The mode in which the IPSec tunnel operates: (IKEv1 only.) • Tunnel—Tunnel mode encapsulates the entire IP packet. The IPSec header is added between the original IP header and a new IP header. This is the default. Use tunnel mode when the firewall is protecting traffic to and from hosts positioned behind the firewall. Tunnel mode is the normal way regular IPSec is implemented between two firewalls (or other security gateways) that are connected over an untrusted network, such as the Internet. • Transport—Transport mode encapsulates only the upper-layer protocols of an IP packet. The IPSec header is inserted between the IP header and the upper-layer protocol header (such as TCP). Transport mode requires that both the source and destination hosts support IPSec, and can only be used when the destination peer of the tunnel is the final destination of the IP packet. Transport mode is generally used only when protecting a Layer 2 or Layer 3 tunneling protocol such as GRE, L2TP, and DLSW. User Guide for Cisco Security Manager 4.1 22-24 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IPsec Proposals Table 22-4 IPSec IKEv1 or IKEv2 Transform Set Dialog Box (Continued) Element Description ESP Encryption The Encapsulating Security Protocol (ESP) encryption algorithm that the transform set should use. For more information on the following options, see Deciding Which Encryption Algorithm to Use, page 22-6. For IKEv1, select one of the following options. For IKEv2, click Select to open a dialog box where you can select all of the options you want to support. ESP Hash Algorithm (IKEv1) ESP Integration Algorithm (IKEv2) AH Hash Algorithm (IKEv1 only) Compression (IKEv1 only, IOS devices only.) Category • (Blank)—Do not use ESP encryption. • DES—Encrypts according to the Data Encryption Standard using 56-bit keys. • 3DES—Encrypts three times using 56-bit keys. 3DES is more secure than DES, but requires more processing for encryption and decryption. A 3DES license is required to use this option. • AES-128—Encrypts according to the Advanced Encryption Standard using 128-bit keys. • AES-192—Encrypts according to the Advanced Encryption Standard using 192-bit keys. • AES-256—Encrypts according to the Advanced Encryption Standard using 256-bit keys. • ESP-Null (NULL)—A null encryption algorithm. Transform sets defined with ESP-Null provide authentication without encryption; this is typically used for testing purposes only. The hash or integrity algorithm to use in the transform set for authentication. For IKEv1, the default is to use SHA for ESP authentication and to not use AH authentication. For IKEv2, there is no default. The AH hash algorithm is used on routers only. For IKEv1, select one of the following options. For IKEv2, click Select to open a dialog box where you can select all of the options you want to support. • None—Does not perform ESP or AH authentication. • SHA, SHA-1 (Secure Hash Algorithm version 1)—Produces a 160-bit digest. SHA is more resistant to brute-force attacks than MD5, but requires more processing time. • MD5 (Message Digest 5)—Produces a 128-bit digest. MD5 uses less processing time than SHA, but is less secure. Whether to compress the data in the IPSec tunnel using the Lempel-Ziv-Stac (LZS) algorithm. The category assigned to the object. Categories help you organize and identify rules and objects. See Using Category Objects, page 6-9. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-25 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Configuring VPN Global Settings You can define global settings that apply to all devices in your remote access or site-to-site VPN topology. These settings include Internet Key Exchange (IKE), IKEv2, IPsec, NAT, and fragmentation definitions. The global settings typically have defaults that work in most situations, so configuring the Global Settings policy is optional in most cases; configure it only if you need non-default behavior or if you are supporting IKEv2 negotiations in a remote access IPsec VPN. Note The VPN Global Settings policy for site-to-site VPNs applies to all technologies except GET VPN. For an explanation of global settings for GET VPN, see Configuring Global Settings for GET VPN, page 25-16. Step 1 Do one of the following to open the global settings policy based on the type of VPN you are configuring: • For remote access VPNs, do one of the following: – (Device View) Select Remote Access VPN > Global Settings from the Policy selector. – (Policy View) Select Remote Access VPN > Global Settings from the Policy Type selector. Select an existing policy or create a new one. • For site-to-site VPNs, do one of the following: – Open the Site-to-Site VPN Manager Window, page 21-18, select a topology in the VPNs selector, then select VPN Global Settings in the Policies selector. – (Policy view) Select Site-to-Site VPN > VPN Global Settings from the Policy Types selector. Select an existing shared policy or create a new one. Step 2 Select the desired tab and configure the settings as needed: • ISAKMP/IPsec Settings—To configure global settings for IKE and IPsec. For detailed information about the options, see Configuring VPN Global ISAKMP/IPsec Settings, page 22-26. • IKEv2 Settings—To configure global settings for IKE version 2 negotiations. For detailed information about the options, see Configuring VPN Global IKEv2 Settings, page 22-30. • NAT Settings—To configure NAT behavior. For detailed information about the options, see Configuring VPN Global NAT Settings, page 22-34. Also see Understanding NAT in VPNs, page 22-33. • General Settings—To configure fragmentation behavior and some other miscellaneous options. For detailed information about the options, see Configuring VPN Global General Settings, page 22-36. Configuring VPN Global ISAKMP/IPsec Settings Use the ISAKMP/IPsec Settings tab of the VPN Global Settings page to specify global settings for Internet Key Exchange (IKE) and IPsec. The Internet Key Exchange (IKE) protocol, also called the Internet Security Association and Key Management Protocol (ISAKMP) is the negotiation protocol that lets two hosts agree on how to build an IPsec security association. Each ISAKMP negotiation is divided into a Phase 1 and Phase 2. Phase 1 creates the first tunnel, which protects ISAKMP negotiation messages. Phase 2 creates the tunnel that protects data. User Guide for Cisco Security Manager 4.1 22-26 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings To set terms for ISAKMP negotiations, you create an IKE proposal. For more information, see Configuring an IKE Proposal, page 22-9. About IKE Keepalive With IKE keepalive, tunnel peers exchange messages that demonstrate they are available to send and receive data in the tunnel. Keepalive messages transmit at set intervals, and any disruption in that interval results in the creation of a new tunnel, using a backup device. Devices that rely on IKE keepalive for resiliency transmit their keepalive messages regardless of whether they are exchanging other information. These keepalive messages can therefore create a small but additional demand on your network. A variation on IKE keepalive called keepalive dead-peer detection (DPD) sends keepalive messages between peer devices only when no incoming traffic is received and outbound traffic needs to be sent. If you want to send DPD keepalive messages when no incoming traffic is received regardless of whether there is any outbound traffic, you can specify this using the Periodic option. Navigation Path • For remote access VPNs, do one of the following: – (Device View) Select Remote Access VPN > Global Settings from the Policy selector. Click the ISAKMP/IPsec Settings tab. – (Policy View) Select Remote Access VPN > Global Settings from the Policy Type selector. Select an existing policy or create a new one, then click the ISAKMP/IPsec Settings tab. • For site-to-site VPNs, do one of the following: – Open the Site-to-Site VPN Manager Window, page 21-18, select a topology in the VPNs selector, then select VPN Global Settings in the Policies selector. Click the ISAKMP/IPsec Settings tab. – (Policy view) Select Site-to-Site VPN > VPN Global Settings from the Policy Types selector. Select an existing shared policy or create a new one, then click the ISAKMP/IPsec Settings tab. Related Topics • Configuring VPN Global Settings, page 22-26 • Understanding IKE, page 22-5 • Understanding IPsec Proposals, page 22-15 User Guide for Cisco Security Manager 4.1 OL-23991-01 22-27 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Field Reference Table 22-5 VPN Global Settings Page, ISAKMP/IPsec Settings Tab Element Description ISAKMP Settings Enable Keepalive Whether to configure dead-peer detection (DPD) settings. If the peer fails to respond, a new tunnel is constructed on the assumption that the peer is no longer available. IKE keepalive is defined on the spokes in a hub-and-spoke VPN topology, on both devices in a point-to-point VPN topology, or in remote access VPN configurations. Configure the following options: Identity • Interval—The number of seconds the peer can be idle before beginning keepalive monitoring. The range is 10-3600 seconds. The default is 10, although the ASA device default for remote access groups is 300. • Retry—The interval in seconds between retries after a keepalive response has not been received. The range is 2-10 seconds for ASA, 2-60 for IOS devices. The default is 2 seconds. • Periodic—(Routers running IOS Software version 12.3(7)T and later, except 7600 devices.) Whether to send DPD keepalive messages at regular intervals regardless of IPsec traffic. This changes how the interval value is used. • Infinite—(ASA only.) Whether to ignore the interval and retry settings and allow the peer to be idle indefinitely. During Phase I IKE negotiations, peers must identify themselves to each other. Select one of the following: • Address—Use the IP address of the host exchanging ISAKMP identity information. This is the default. • Hostname—Use the fully-qualified domain name of the host exchanging ISAKMP identity information. • Auto/DN—Use automatic selection or distinguished name based on device type: – Distinguished Name (IOS devices only)—Use a distinguished name (DN) to identify a user group name. – Auto (ASA devices only)—Determine ISAKMP negotiation by connection type; IP address for preshared key or certificate distinguished name for certificate authentication. SA Requests System Limit Supported on routers running Cisco IOS Software Release 12.3(8)T and later, except 7600 routers. The maximum number of SA requests allowed before IKE starts rejecting them, from 0 to 99999. The number must equal or exceed the number of peers, or the VPN tunnels might be disconnected. SA Requests System Threshold Supported on Cisco IOS routers and Catalyst 6500/7600 devices. The percentage of system resources that can be used before IKE starts rejecting new SA requests. The default is 75 percent. User Guide for Cisco Security Manager 4.1 22-28 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Table 22-5 VPN Global Settings Page, ISAKMP/IPsec Settings Tab (Continued) Element Description Enable Aggressive Mode Supported on ASA devices and PIX 7.0+ devices. (Site to site VPNs only.) When selected, enables you to use aggressive mode in ISAKMP negotiations. Aggressive mode is enabled by default. IPsec Settings Enable Lifetime Xauth Timeout Select to enable you to configure the global lifetime settings for the crypto IPsec security associations (SAs) on the devices in your site-to-site or remote access VPN. Configure the following: • Lifetime (secs)—The number of seconds a security association will exist before expiring. The default is 3,600 seconds (1 hour). • Lifetime (kbytes)—The volume of traffic (in kilobytes) that can pass between IPsec peers using a given security association before it expires. The default is 4,608,000 kilobytes. Supported on Cisco IOS routers and Catalyst 6500/7600 devices in remote access VPN and Easy VPN topologies only. The number of seconds the device will wait for a system response to the Xauth challenge. When negotiating tunnel parameters for establishing IPsec tunnels in a remote access or Easy VPN configuration, Xauth adds another level of authentication that identifies the user who requests the IPsec connection. Using the Xauth feature, the client waits for a username/password (Xauth) challenge after the IKE SA has been established. When the end user responds to the challenge, the response is forwarded to the IPsec peers for an additional level of authentication. Max Sessions Supported on ASA devices and PIX 7.0+ devices. The maximum number of security associations (SAs) that can be enabled simultaneously on the device. The maximum number differs based on device model. For ASA devices, the limits are: Enable IPsec via Sysopt • 5505—10 sessions. • 5510—250 sessions. • 5520—750 sessions. • 5540, 5550, 5585-X with SSP-10—5000 sessions. • 5580, 5585-X (other models)—10000 sessions. Supported on ASA devices, and PIX Firewalls versions 6.3 or 7.0+. When selected (the default), specifies that any packet that comes from an IPsec tunnel is implicitly trusted (permitted). User Guide for Cisco Security Manager 4.1 OL-23991-01 22-29 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Table 22-5 VPN Global Settings Page, ISAKMP/IPsec Settings Tab (Continued) Element Description Enable SPI Recovery Supported on routers running IOS version 12.3(2)T and later, in addition to Catalyst 6500/7600 devices running version 12.2(18)SXE and later. (Site-to-site VPNs only.) When selected, enables the SPI recovery feature to configure your device so that if an invalid SPI (Security Parameter Index) occurs, an IKE SA will be initiated. SPI is a number which, together with a destination IP address and security protocol, uniquely identifies a particular security association. When using IKE to establish security associations, the SPI for each security association is a pseudo-randomly derived number. Without IKE, the SPI is manually specified for each security association. When an invalid SPI occurs during IPsec packet processing, the SPI recovery feature enables an IKE SA to be established. Configuring VPN Global IKEv2 Settings Use the IKEv2 Settings tab of the VPN Global Settings page to specify global settings for Internet Key Exchange (IKE) version 2. These settings apply to ASA 8.4(1)+ devices only. Internet Key Exchange (IKE), also called Internet Security Association and Key Management Protocol (ISAKMP), is the negotiation protocol that lets two hosts agree on how to build an IPsec security association (SA). Preventing DoS Attacks by Limiting IKEv2 Open SAs You can prevent denial-of-service (DoS) attacks for IPsec IKEv2 connections by always cookie challenging incoming security associations (SAs) or by limiting the number of open SAs and cookie challenging any additional connections. By default, the ASA does not limit the number of open SAs and never cookie challenges SAs. You can also limit the number of SAs allowed, which stops further connections from negotiating to protect against memory or CPU attacks that the cookie-challenge feature may be unable to thwart. Limiting the maximum number of SAs can protect the current connections. With a DoS attack, an attacker initiates the attack when the peer device sends an SA initiate packet and the ASA sends its response, but the peer device does not respond further. If the peer device does this continually, all the allowed SA requests on the ASA can be used up until it stops responding. Enabling a threshold percentage for cookie challenges limits the number of open SA negotiations. For example, with the default setting of 50%, when 50% of the allowed SAs are in-negotiation (open), the ASA cookie challenges any additional SA initiate packets that arrive. For the Cisco ASA 5580 with 10,000 allowed IKEv2 SAs, after 5000 SAs become open, any more incoming SAs are cookie-challenged. If used in conjunction with the Maximum SAs in Negotiation option, configure a lower cookie-challenge threshold. User Guide for Cisco Security Manager 4.1 22-30 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Navigation Path • For remote access VPNs, do one of the following: – (Device View) Select Remote Access VPN > Global Settings from the Policy selector. Click the IKEv2 Settings tab. – (Policy View) Select Remote Access VPN > Global Settings from the Policy Type selector. Select an existing policy or create a new one, then click the IKEv2 Settings tab. • For site-to-site VPNs, do one of the following: – Open the Site-to-Site VPN Manager Window, page 21-18, select a topology in the VPNs selector, then select VPN Global Settings in the Policies selector. Click the IKEv2 Settings tab. – (Policy view) Select Site-to-Site VPN > VPN Global Settings from the Policy Types selector. Select an existing shared policy or create a new one, then click the IKEv2 Settings tab. Related Topics • Configuring VPN Global Settings, page 22-26 • Understanding IKE, page 22-5 • Understanding IPsec Proposals, page 22-15 • Configuring Cluster Load Balance Policies (ASA), page 27-5 Field Reference Table 22-6 VPN Global Settings Page, IKEv2 Settings Tab Element Description Maximum SAs The number of allowed IKEv2 connections (security associations) on the device. The default limit is the maximum number of connections specified by the device license, which differs by device model. Specify a number only if you want to create a limit that is lower than the device license. The range is 1 to 10000. Maximum SAs in Negotiation The maximum number of IKEv2 security associations (SAs) that can be in negotiation at any time as a percentage of the maximum allowed SAs. The default is no limit on SAs in negotiation, so it is possible for all available SAs to be in negotiation. The range is 1 to 100%. If you configure this option and also enable custom cookie challenge, configure the cookie challenge threshold lower than this limit. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-31 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Table 22-6 VPN Global Settings Page, IKEv2 Settings Tab (Continued) Element Description Enable Cookie Challenge Whether to send cookie challenges to peer devices in response to SA initiate packets, which can help thwart denial of service (DoS) attacks. The default is to use cookie challenges when 50% of the available SAs are in negotiation. Select one of these options: Remote Access Authentication RA Trustpoint (Remote access VPN only.) • Custom—Cookie challenge when the number of SAs in negotiation exceeds the total number of allowed SAs on the device based on percentage (SAs in negotiation as a percentage of total allowed SAs). In Custom Cookie Challenge, enter the percentage that triggers cookie challenges for any future SA negotiations. The range is 1 to 100%. The default is 50%. • Never—The device never uses cookie challenge. • Always—The device always uses cookie challenge, regardless of the percentage of SAs in negotiation. (Required when supporting IKEv2 negotiations.) The PKI enrollment object that identifies the Certificate Authority (CA) server that the device can use to authenticate itself to the remote user. This authorization is required before the user can select a connection profile and log into the VPN. This CA server is used in remote access IKEv2 IPsec VPNs only. Click Select to select the object or to create a new one. Tip You must also select this PKI enrollment object in the Remote Access VPN > Public Key Infrastructure policy. User Guide for Cisco Security Manager 4.1 22-32 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Table 22-6 VPN Global Settings Page, IKEv2 Settings Tab (Continued) Element Description If you configure load balancing, using the ASA Cluster Load Balance policy, you can specify the IKEv2 negotiation phase in which a user can Redirect Connections During be redirected to another device in the cluster. Select one of these (Remote access VPNs only.) options: Load Balancing Settings • INIT—Redirect at unauthenticated initiation requests (the first IKEv2 message IKE_SA_INIT), before any group or user authentication. – Pros—This option allows the master server to do minimal processing and state keeping (using CPU and memory) prior to redirecting the connection. – Cons—This option is not as secure as AUTH (even though security risks are minimal) because anyone can get a redirected IP address without authenticating at all. • AUTH (the default)—Redirect during authentication (during IKE_AUTH). The device still has not identified or authenticated the user at this point, but it allows the client to authenticate the server to make sure it can trust the redirection that it receives. – Pros—This option is more secure as the reply is encrypted in the IKEv2 tunnel and it allows the client side to authenticate the server before retrying with the redirected IP address, providing better DoS protection than the INIT option. – Cons—This option requires more processing as the IKEv2 tunnel needs to be almost brought up before redirecting, although child SAs and data tunnels do not need to be brought up. The client is not authenticated at all. Note that IKEv1 redirection occurs after group authentication of both sides of the tunnel. Understanding NAT in VPNs Network Address Translation (NAT) enables devices that use internal IP addresses to send and receive data through the Internet. It converts private, internal LAN addresses into globally routable IP addresses when they try to access data on the Internet. In this way, NAT enables a small number of public IP addresses to provide global connectivity for a large number of hosts. NAT enhances the stability of your hub-and-spoke VPN tunnels or remote access connections because resources required for VPN connections are not used for other purposes, and the VPN tunnel is kept available for traffic requiring complete security. Sites inside the VPN can use NAT through a split tunnel to exchange non secure traffic with outside devices, and they do not squander VPN bandwidth or overwhelm the hub at the tunnel head-end by directing nonessential traffic through it. Security Manager supports NAT with dynamic IP addressing only, and applies to it an overload feature that permits what is known as port-level NAT or Port Address Translation (PAT). PAT uses port addressing to associate thousands of private NAT addresses with a small group of public IP address. PAT is used if the addressing requirements of your network exceed the available addresses in your dynamic NAT pool. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-33 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Note When you enable PAT on Cisco IOS routers, an additional NAT rule is implicitly created for split-tunneled traffic on deployment. This NAT rule, which denies VPN-tunneled traffic and permits all other traffic (using the external interface as the IP address pool), is not reflected as a router platform policy. You can remove the NAT rule by disabling this feature. For more information, see NAT Page: Dynamic Rules, page 20-10. You can configure traffic to bypass NAT configuration on site-to-site VPN traffic. To bypass NAT configuration on Cisco IOS routers, make sure the Do Not Translate VPN Traffic option is selected in the NAT Dynamic Rule platform policy (see NAT Dynamic Rule Dialog Box, page 20-11). To exclude NAT on PIX Firewalls or ASA devices, make sure this option is selected in the NAT Translation Options platform policy (see Translation Options Page, page 20-16). About NAT Traversal NAT traversal is used for the transmission of keepalive messages when there is a device (middle device) located between a VPN-connected hub and spoke, and that device performs NAT on the IPsec flow. If the IP address of the VPN interface on the spoke is not globally routable, the NAT on the middle device replaces it with a new globally routable IP address. This change is made in the IPsec header, and violates the checksum of the spoke causing a mismatch with the hub’s checksum calculation. This results in loss of connectivity between the hub and the spoke. With NAT traversal, the spoke adds a UDP header to the payload. The NAT on the middle device changes the IP address in the UDP header, leaving the IPsec header and checksum intact. On a middle device that uses static NAT, you must provide the static NAT IP address (globally routable) on the inside interface. The static NAT IP address is provided for all traffic through that interface that requires NAT. However, if the middle device uses dynamic NAT where the NAT IP address is unknown, you must define dynamic crypto on the hub to serve any connection request from the spoke. Security Manager generates the required tunnel configuration for the spoke. Note NAT traversal is enabled by default on routers running IOS version 12.3T and later. If you want to disable the NAT traversal feature, you must do this manually on the device or using a FlexConfig (see Chapter 7, “Managing FlexConfigs”). You can define global NAT settings on the NAT Settings tab of the Global VPN Settings page as described in Configuring VPN Global NAT Settings, page 22-34. Configuring VPN Global NAT Settings Use the NAT Settings tab of the Global Settings page to define global Network Address Translation (NAT) settings that enable devices that use internal IP addresses to send and receive data through the Internet. Note For site-to-site VPNs, if you want to bypass NAT configuration on IOS routers, make sure that the Do Not Translate VPN Traffic option is selected in the NAT Dynamic Rule platform policy (see NAT Dynamic Rule Dialog Box, page 20-11). To exclude NAT on PIX Firewalls or ASA devices, make sure this option is selected in the NAT Translation Options platform policy (see Translation Options Page, page 20-16). User Guide for Cisco Security Manager 4.1 22-34 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Navigation Path • For remote access VPNs, do one of the following: – (Device View) Select Remote Access VPN > Global Settings from the Policy selector. Click the NAT Settings tab. – (Policy View) Select Remote Access VPN > Global Settings from the Policy Type selector. Select an existing policy or create a new one, then click the NAT Settings tab. • For site-to-site VPNs, do one of the following: – Open the Site-to-Site VPN Manager Window, page 21-18, select a topology in the VPNs selector, then select VPN Global Settings in the Policies selector. Click the NAT Settings tab. – (Policy view) Select Site-to-Site VPN > VPN Global Settings from the Policy Types selector. Select an existing shared policy or create a new one, then click the NAT Settings tab. Related Topics • Understanding NAT in VPNs, page 22-33 • Configuring VPN Global Settings, page 22-26 Field Reference Table 22-7 VPN Global Settings Page, NAT Settings Tab Element Description Enable Traversal Keepalive Whether to enable NAT traversal keepalive. NAT traversal keepalive is used for the transmission of keepalive messages when there is a device (middle device) located between a VPN-connected hub and spoke, and that device performs NAT on the IPsec flow. Interval If you select this option, configure the interval, in seconds, between the keepalive signals sent between the spoke and the middle device to indicate that the session is active. The value can be from 5 to 3600 seconds. The default is 10 seconds. Note On Cisco IOS routers, NAT traversal is enabled by default. If you want to disable the NAT traversal feature, you must do this manually on the device or by using a FlexConfig (see Chapter 7, “Managing FlexConfigs”). Enable Traversal over TCP Supported on ASA and PIX 7.0+ devices. TCP Ports When selected, encapsulates both the IKE and IPsec protocols within a TCP packet and enables secure tunneling through both NAT and PAT devices and firewalls. (Remote access VPNs only.) If you select this option, specify the TCP ports for which you want to enable NAT traversal (NAT-T). You must configure TCP ports on the remote clients and on the VPN device. The client configuration must include at least one of the ports you set for the security appliance. You can enter up to 10 ports. Tip These ports are used for IKEv1 connections only. IKEv2 uses ports 500 and 4500 for NAT-T. Ensure that any ports that you specify are opened in the access rules for the applicable interface. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-35 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Table 22-7 VPN Global Settings Page, NAT Settings Tab (Continued) Element Description Enable PAT (Port Address Translation) on Split Tunneling for Spokes Supported on Cisco IOS routers and Catalyst 6500/7600 devices. (Site-to-site VPNs only.) PAT can associate thousands of private NAT addresses with a small group of public IP address through the use of port addressing. PAT is used if the addressing requirements of your network exceed the available addresses in your dynamic NAT pool. When selected, enables Port Address Translation (PAT) to be used for split-tunneled traffic on spokes in your VPN topology. Note When you select this option, Security Manager implicitly creates an additional NAT rule for split-tunneled traffic on deployment. This NAT rule, which denies VPN-tunneled traffic and permits all other traffic (using the external interface as the IP address pool), is not reflected as a router platform policy. For information on creating or editing a dynamic NAT rule as a router platform policy, see NAT Page: Dynamic Rules, page 20-10. Configuring VPN Global General Settings Use the General Settings tab of the VPN Global Settings page to define fragmentation settings including maximum transmission unit (MTU) handling parameters for site-to-site and remote access VPNs. Fragmentation breaks a packet into smaller units when it is transmitted over a physical interface that cannot support the original size of the packet. Fragmentation minimizes packet loss in a VPN tunnel, because it enables transmission of secured packets that might otherwise be too large to transmit. This is particularly relevant when using GRE, because any packet of more than 1420 bytes will not have enough room in its header for the additional 80 bytes that the combined use of IPsec and GRE adds to the packet payload. The maximum transmission unit (MTU) specifies the maximum packet size, in bytes, that an interface can handle. If a packet exceeds the MTU, it is fragmented, typically after encryption. If the DF (Do Not Fragment) bit is set, the packet is dropped. A DF bit is a bit within the IP header that indicates if a device can fragment a packet. You must specify whether the device can clear, set, or copy the DF bit from the encapsulated header. Because reassembly of an encrypted packet is difficult, fragmentation can degrade network performance. To prevent network performance problems, you can select Enable Fragmentation Before Encryption so that fragmentation occurs before encryption. Navigation Path • For remote access VPNs, do one of the following: – (Device View) Select Remote Access VPN > Global Settings from the Policy selector. Click the General Settings tab. – (Policy View) Select Remote Access VPN > Global Settings from the Policy Type selector. Select an existing policy or create a new one, then click the General Settings tab. User Guide for Cisco Security Manager 4.1 22-36 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings • For site-to-site VPNs, do one of the following: – Open the Site-to-Site VPN Manager Window, page 21-18, select a topology in the VPNs selector, then select VPN Global Settings in the Policies selector. Click the General Settings tab. – (Policy view) Select Site-to-Site VPN > VPN Global Settings from the Policy Types selector. Select an existing shared policy or create a new one, then click the General Settings tab. Related Topics • Configuring VPN Global Settings, page 22-26 Field Reference Table 22-8 VPN Global Settings Page, General Settings Tab Element Description Fragmentation Settings Fragmentation Mode Supported on Cisco IOS routers and Catalyst 6500/7600 devices. Local MTU Size Fragmentation minimizes packet loss in a VPN tunnel when packets are transmitted over a physical interface that cannot support the original size of the packet. Select the fragmentation mode: • No Fragmentation—Do not fragment before IPsec encapsulation. After encapsulation, the device fragments packets that exceed the MTU setting before transmitting them through the public interface. • End to End MTU Discovery—Use ICMP messages to determine the maximum MTU. Use this option with IPsec VPNs. End-to-end MTU discovery uses Internet Control Message Protocol (ICMP) messages to determine the maximum MTU that a host can use to send a packet through the VPN tunnel without causing fragmentation. The MTU setting for each link in a transmission path is checked to ensure that no transmitted packet exceeds the smallest MTU in that path. The discovered MTU is used to decide whether fragmentation is necessary. If ICMP is blocked, MTU discovery fails and packets are either lost (if the DF bit is set) or fragmented after encryption (if the DF bit is not set). Note • (Site-to-site VPNs) For Catalyst 6500/7600 devices, end-to-end path MTU discovery is supported only on images 12.2(33)SRA, 12.2(33)SRB, 12.2(33)SXH, 12.2(33)SXI or above. Local MTU Handling—Set the MTU locally on the devices. This option is typically used when ICMP is blocked or in site-to-site IPsec/GRE VPNs. If you select this option, specify the local MTU size, which can be between 68 and 65535 bytes depending on the VPN interface. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-37 Chapter 22 Configuring IKE and IPsec Policies Configuring VPN Global Settings Table 22-8 VPN Global Settings Page, General Settings Tab (Continued) Element Description DF Bit Supported on Cisco IOS routers, Catalyst 6500/7600 devices, PIX 7.0+ and ASA devices. A Do Not Fragment (DF) bit within an IP header determines whether a device is allowed to fragment a packet. Select how to handle the DF bit: • Copy—Copy the DF bit from the encapsulated header in the current packet to all the device’s packets. If the packet’s DF bit is set to fragment, all future packets are fragmented. This is the default option. • Set—Set the DF bit in the packet you are sending. A large packet that exceeds the MTU is dropped and an ICMP message is sent to the packet’s initiator. • Clear—Fragment packets regardless of the original DF bit setting. If ICMP is blocked, MTU discovery fails and packets are fragmented only after encryption. Enable Fragmentation Before Supported on Cisco IOS routers, Catalyst 6500/7600 devices, PIX 7.0+ Encryption and ASA devices. When selected, enables fragmentation to occur before encryption if the expected packet size exceeds the MTU. Look ahead Fragmentation (LAF) is used before encryption takes place to calculate the packet size that would result after encryption, depending on the transform sets configured on the IPsec SA. If the packet size exceeds the specified MTU, the packet will be fragmented before encryption. Enable Notification on Disconnection Supported on ASA and PIX 7.0+ devices. When selected, enables the device to notify qualified peers of sessions that are about to be disconnected. The peer receiving the alert decodes the reason and displays it in the event log or in a pop-up window. This feature is disabled by default. IPsec sessions might be dropped for several reasons, such as a security appliance shutdown or reboot, session idle timeout, maximum connection time exceeded, or administrator cut-off. Enable Split Tunneling (Site-to-site VPN only.) When selected (the default), enables you to configure split tunneling in your site-to-site VPN topology. Split tunneling allows you to transmit both secured and unsecured traffic on the same interface. Split tunneling requires that you specify exactly which traffic will be secured and what the destination of that traffic is, so that only the specified traffic enters the IPsec tunnel, while the rest is transmitted unencrypted across the public network. Enable Spoke-to-Spoke Connectivity through the Hub Supported on ASA and PIX 7.0+ devices. When selected, enables direct communication between spokes in a hub-and-spoke VPN topology in which the hub is an ASA or PIX 7.0+ device. User Guide for Cisco Security Manager 4.1 22-38 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs Table 22-8 VPN Global Settings Page, General Settings Tab (Continued) Element Description Enable Default Route Supported on Cisco IOS routers and Catalyst 6500/7600 devices. When selected, the device uses the configured external interface as the default outbound route for all incoming traffic. Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs If you want to use preshared key as your authentication method for IKEv1 negotiations, you must define a shared key for each tunnel between two peers that will be their shared secret for authenticating the connection. The key will be configured on each peer. If the key is not the same on both peers of the tunnel, the connection cannot be established. The peer addresses that are required for configuring the preshared key are deduced from the VPN topology. Tip You can also use preshared keys for IKEv2 negotiations, but the configuration is different from the one used for IKEv1, as are the rules and requirements. For information on configuring preshared keys for IKEv2 negotiations, see Configuring IKEv2 Authentication in Site-to-Site VPNs, page 22-58. Preshared keys are configured on spokes. In a hub-and-spoke VPN topology, Security Manager mirrors the spoke’s preshared key and configures it on its assigned hub, so that the key on the spoke and hub are the same. In a point-to-point VPN topology, you must configure the same preshared key on both peers. In a full mesh VPN topology, any two devices that are connected must have the same preshared key. In a preshared key policy, you can use a specific key, or you can use automatically generated keys for peers participating in each communication session. Using automatically generated keys (the default method) is preferred, because security can be compromised if all connections in a VPN use the same preshared key. There are three methods for negotiating key information and setting up IKE security associations (SAs): • Main mode address—Negotiation is based on IP address. Main mode provides the highest security because it has three two-way exchanges between the initiator and receiver. This is the default negotiation method. This method has three options for creating keys: – You can create a key for each peer, based on the unique IP address of each peer, providing high security. – You can create a group preshared key on a hub in a hub-and-spoke VPN topology, to be used for communication with any device in a specified subnet. Each peer is identified by its subnet, even if the IP address of the device is unknown. In a point-to-point or full mesh VPN topology, a group preshared key is created on the peers. – You can create a wildcard key on a hub in a hub-and-spoke VPN topology, or on a group containing hubs, to be used for dynamic crypto where a spoke does not have a fixed IP address or belong to a specific subnet. All spokes connecting to the hub have the same preshared key, which could compromise security. In a point-to-point or full mesh VPN topology, a wildcard key is created on the peers. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-39 Chapter 22 Configuring IKE and IPsec Policies Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs Note If you are configuring DMVPN with direct spoke-to-spoke connectivity, you create a wildcard key on the spokes. • Main mode fully qualified domain name (FQDN)—Negotiation is based on DNS resolution, with no reliance on IP address. This option can only be used if the DNS resolution service is available for the host. It is useful when managing devices with dynamic IP addresses that have DNS resolution capabilities. • Aggressive mode—Negotiation is based on hostname (without DNS resolution) and domain name. Aggressive mode is less secure than main mode. However, it provides more security than using group preshared keys if the IP address of the VPN interface on the host is unknown, and the FQDN of the dynamic IP peer is not DNS resolvable. This negotiation method is recommended for use with a GRE Dynamic IP or DMVPN failover and routing policy. Related Topics • Deciding Which Authentication Method to Use, page 22-8 • Configuring IKEv1 Preshared Key Policies, page 22-40 Configuring IKEv1 Preshared Key Policies Use the IKEv1 Preshared Key page to define the preshared key configuration when using IKEv1 in a site-to-site VPN topology. For information on configuring preshared keys when using IKEv2, see Configuring IKEv2 Authentication in Site-to-Site VPNs, page 22-58. Note The preshared key policy does not apply to Easy VPN topologies. To open the IKEv1 Preshared Key page: • (Site-to-Site VPN Manager Window, page 21-18) Select a topology in the VPNs selector, then select IKEv1 Preshared Key in the Policies selector. • (Policy view) Select Site-to-Site VPN > IKEv1 Preshared Key from the Policy Types selector. Select an existing shared policy or create a new one. The following table explains the settings you can configure in this policy. Table 22-9 IKEv1 Preshared Key Page Element Description Key Specification Select whether to manually define the key (User Defined) or to have the key automatically generated. There are additional options you can configure when using auto generated keys. User Defined When selected, enables you to use a manually defined preshared key. Enter the required preshared key in the Key field, then enter it again in the Confirm field. User Guide for Cisco Security Manager 4.1 22-40 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs Table 22-9 IKEv1 Preshared Key Page (Continued) Element Description Auto Generated When selected, allocates a random key to the participating peers. This ensures security because a different key is generated for every hub-spoke connection. Auto Generated is the default selection. Auto generated is not a useful option when you do not manage all nodes in the VPN, for example, in the case of an Extranet VPN. Note The key is allocated during the first deployment to the devices and is used in all subsequent deployments to the same devices, until you select the Regenerate Key (Only in Next Deployment) check box. Key Length The required length of the preshared key to be automatically generated, from 1 to 127. The default is 24. Same Key for All Tunnels Unavailable in a point-to-point VPN topology. When selected, enables you to use the same auto-generated key for all tunnels. Note Regenerate Key (Only in Next Deployment) If you do not select this option, different keys are used for the tunnels, except in cases, such as DMVPN configuration, when different multipoint GRE interfaces in the same network must use the same preshared key. When selected, enables Security Manager to generate a new key for the next deployment to the devices. This is useful if it is possible that the secrecy of the keys might be compromised. When you submit the job for deployment, this check box is cleared. It does not remain selected because the new key will only be generated for the upcoming deployment, and not for subsequent deployments (unless you select it again). Negotiation Method Select the type of negotiation method. The methods are explained in more detail in Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs, page 22-39. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-41 Chapter 22 Configuring IKE and IPsec Policies Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs Table 22-9 IKEv1 Preshared Key Page (Continued) Element Description Main Mode Address Use this negotiation method for exchanging key information if the IP address of the devices is known. Negotiation is based on IP address. Main mode provides the highest security because it has three two-way exchanges between the initiator and receiver. Main mode address is the default negotiation method. Select one of the following options to define the negotiation address type: • Peer Address—Negotiation is based on the unique IP address of each peer. A key is created for each peer, providing high security. This is the default. • Subnet—Creates a group preshared key on a hub in a hub-and-spoke topology to use for communication with any device in a specified subnet, even if the IP address of the device is unknown. Each peer is identified by its subnet. In a point-to-point or full mesh VPN topology, a group preshared key is created on the peers. Enter the subnet in the field provided, for example, 10.10.10.0/24. • Wildcard—Creates a wildcard key on a hub or on a group of hubs in a hub-and-spoke topology to use when a spoke does not have a fixed IP address or belong to a specific subnet. In this case, all spokes connecting to the hub have the same preshared key, which could compromise security. Use this option if a spoke in your hub-and-spoke VPN topology has a dynamic IP address. In a point-to-point or full mesh VPN topology, a wildcard key is created on the peers. Note When configuring DMVPN with direct spoke-to-spoke connectivity, you create a wildcard key on the spokes. Main Mode FQDN Select this negotiation method for exchanging key information if the IP address is not known and DNS resolution is available for the devices. Negotiation is based on DNS resolution, with no reliance on IP address. Aggressive Mode Available only in a hub-and-spoke VPN topology. Select this negotiation method for exchanging key information if the IP address is not known and DNS resolution might not be available on the devices. Negotiation is based on hostname and domain name. Note If direct spoke to spoke tunneling is enabled, you cannot use aggressive mode. Related Topics • Understanding IKEv1 Preshared Key Policies in Site-to-Site VPNs, page 22-39 User Guide for Cisco Security Manager 4.1 22-42 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding Public Key Infrastructure Policies Understanding Public Key Infrastructure Policies Security Manager supports IPsec configuration with Certification Authority (CA) servers that manage certificate requests and issue certificates to devices in your VPN topology. You can create a Public Key Infrastructure (PKI) policy to generate enrollment requests for CA certificates and RSA keys, and manage keys and certificates, providing centralized key management for the participating devices. CA servers, also known as trustpoints, manage public CA certificate requests and issue certificates to participating IPsec network devices. When you use Certificates as the authentication method for IKE and IPsec proposal policies, peers are configured to obtain digital certificates from a CA server. With a CA server, you do not have to configure keys between all the encrypting devices. Instead, you individually enroll each participating device with the CA server, which is explicitly trusted to validate identities and create a digital certificate for the device. When this has been accomplished, each participating peer can validate the identities of the other participating peers and establish encrypted sessions with the public keys contained in the certificates. CAs can also revoke certificates for peers that no longer participate in an IPsec VPN topology. Revoked certificates are either managed by an Online Certificate Status Protocol (OCSP) server or are listed in a certificate revocation list (CRL) stored on an LDAP server, which each peer can check before accepting a certificate from another peer. PKI enrollment can be set up in a hierarchical framework consisting of multiple CAs. At the top of the hierarchy is a root CA, which holds a self-signed certificate. The trust within the entire hierarchy is derived from the RSA key pair of the root CA. Subordinate CAs within the hierarchy can enroll with either the root CA or with another subordinate CA. Within a hierarchical PKI, all enrolled peers can validate each other’s certificate if the peers share a trusted root CA certificate or a common subordinate CA. Keep the following in mind: • PKI policies can be configured on Cisco IOS routers running version 12.3(7)T and later, PIX Firewalls, and Adaptive Security Appliance (ASA) devices for site-to-site and remote access VPNs. • In site-to-site VPNs, you use the IKEv1 Public Key Infrastructure policy to identify CA servers for IKEv1 negotiations only. For IKEv2 negotiations, you identify the CA servers in the IKEv2 Authentication policy as described in Configuring IKEv2 Authentication in Site-to-Site VPNs, page 22-58. • To save the RSA key pairs and the CA certificates between reloads permanently to Flash memory on a PIX Firewall release 6.3, you must configure the ca save all command. You can do this manually on the device or using a FlexConfig (see Chapter 7, “Managing FlexConfigs”). CA Server Authentication Methods You can authenticate the CA server using one of the following methods: • Using the Simple Certificate Enrollment Protocol (SCEP) to retrieve the CA’s certificates from the CA server. Using SCEP, you establish a direct connection between your device and the CA server. Be sure your device is connected to the CA server before beginning the enrollment process. Because this method of retrieving CA certificates for routers is interactive, you can deploy your PKI policy to live devices only, not to files. Note When using SCEP, you must enter the fingerprint for the CA server. If the value you enter does not match the fingerprint on the certificate, the certificate is rejected. You can obtain the CA’s fingerprint by contacting the server directly, or by entering the following address in a web browser: http:///certsrv/mscep/mscep.dll. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-43 Chapter 22 Configuring IKE and IPsec Policies Understanding Public Key Infrastructure Policies • Manually creating an enrollment request that you can submit to a CA server offline, by copying the CA server’s certificates from another device. Use this method if your device cannot establish a direct connection to the CA server or if you want to generate an enrollment request and send it to the server at a later time. Note This method enables you to deploy the PKI policy either to devices or to files. For more information, see PKI Enrollment Dialog Box, page 22-50. Note You can also use Cisco Secure Device Provisioning (SDP) to enroll for a certificate for a router. For more information about using SDP for certificate enrollment, see Secure Device Provisioning on Cisco IOS Routers, page 57-81. The following topics explain Public Key Infrastructure configuration in more detail: • Requirements for Successful PKI Enrollment, page 22-44 • Configuring IKEv1 Public Key Infrastructure Policies in Site-to-Site VPNs, page 22-46 • Defining Multiple IKEv1 CA Servers for Site-to-Site VPNs, page 22-47 • Configuring Public Key Infrastructure Policies for Remote Access VPNs, page 22-48 • PKI Enrollment Dialog Box, page 22-50 Requirements for Successful PKI Enrollment The following are prerequisites for configuring a PKI policy in your network: • For IKEv1, the IKE proposal must specify Certificate for the IKE authentication method. See Configuring IKEv1 Proposal Policy Objects, page 22-10. • The domain name must be defined on the devices for PKI enrollment to be successful (unless you specify the CA server nickname). • To enroll with the CA server directly, you must specify the server’s enrollment URL. • To enroll with the CA server by means of a TFTP server, you must ensure that the CA certificates file is saved to the TFTP server. After deployment of the PKI policy, you must copy the certificate request from your TFTP server to the CA server. • You may specify an RSA public key to use in the enrollment request. If you do not specify an RSA key pair, the Fully Qualified domain Name (FQDN) key will be used. If using RSA keys, once the certificate has been granted, the public key is included in the certificate so that peers can use it to encrypt data sent to the device. The private key is kept on the device and used to decrypt data sent by peers, and to digitally sign transactions when negotiating with peers. You can use an existing key pair or generate a new one. If you want to generate a new key pair to use in the certificate for router devices, you must also specify the modulus to determine the size of the key. For more information, see PKI Enrollment Dialog Box—Enrollment Parameters Tab, page 22-55. • If you are making a PKI enrollment request on a Cisco Easy VPN IPsec remote access system, you must configure each remote component (spoke) with the name of the user group to which it connects. You specify this information in the Organization Unit (OU) field in the Certificate Subject Name tab of the PKI Enrollment Editor dialog box. User Guide for Cisco Security Manager 4.1 22-44 OL-23991-01 Chapter 22 Configuring IKE and IPsec Policies Understanding Public Key Infrastructure Policies Note You do not need to configure the name of the user group on the hub (Easy VPN server). For more information, see PKI Enrollment Dialog Box—Certificate Subject Name Tab, page 22-57. • To deploy PKI policies to files (not to live devices), the following prerequisites must be met: – Routers must run Cisco IOS Software 12.3(7)T or later. – CA authentication certificates must be cut and pasted into the Security Manager user interface (so that CA authentication is not interactive and does not require communication with the live device). • If you are deploying to live devices, the PKI server must be online. • Security Manager supports the Microsoft, Verisign, and Entrust PKIs. • Security Manager supports Cisco IOS Certificate Servers. The Cisco IOS Certificate Server feature embeds a simple certificate server, with limited CA functionality, into the Cisco IOS software. An IOS Certificate Server can be configured as a FlexConfig policy. For more information, see Chapter 7, “Managing FlexConfigs”. • To configure PKI with AAA authorization that uses the entire subject name on an IOS router, use the predefined FlexConfig object named IOS_PKI_WITH_AAA. Prerequisites for PKI Enrollment Using TFTP If you do not have constant direct access to the CA server, you can enroll using TFTP if your devices are routers running Cisco IOS Software 12.3(7)T or later. On deployment, Security Manager generates the corresponding CA trustpoint command and authenticate command. The trustpoint command is configured with the enrollment URL tftp:// entry to retrieve the CA certificate using TFTP. If file_specification is not specified, the FQDN of the router is used. Before using this option, you must make sure that the CA certificates file (.ca) is saved on the TFTP server. To do this, use this procedure: 1. Connect to http://servername/certsrv, where servername is the name of the Windows 2000 web server on which the CA you want to access is located. 2. Select Retrieve the CA certificate or certificate revocation list, then click Next. 3. Select Base64 encoded, then click Download CA certificate. 4. Save the .crt file as a .ca file on the TFTP server using your browser’s Save As function. After deployment, you must transfer the certificate request generated by Security Manager on the TFTP server to the CA, and then transfer the device’s certificates from the CA to the device. Transferring the Certificate Request from the TFTP Server to the CA Server Security Manager creates a PKCS#10 formatted enrollment request (.req) on the TFTP server. You must transfer it to the PKI server using this procedure: 1. Connect to http://servername/certsrv, where servername is the name of the Windows 2000 web server where the CA you want to access is located. 2. Select Request a certificate, then click Next. 3. Select Advanced request, then click Next. 4. Select Submit a certificate request using a base64 encoded PKCS #10 file or a renewal request using a base64 encoded PKCS #7 file, then click Next. User Guide for Cisco Security Manager 4.1 OL-23991-01 22-45 Chapter 22 Configuring IKE and IPsec Policies Understanding Public Key Infrastructure Policies 5. Either select browse for a file (and browse to the TFTP server and select the .req file) or open the just received by TFTP .req file with WordPad/Notepad and copy/paste the contents in the first window. 6. Export the .crt file from the CA and put it on the TFTP server. 7. Configure the ‘crypto ca import
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No Language : en Page Mode : UseOutlines Page Count : 64 Description : Configuring IKE and IPsec Policies Producer : Acrobat Elements 10.0.0 (Windows); modified using iText 2.1.7 by 1T3XT Access Level : Customer,Guest,Partner Secondary Concept : Ia Path : Content Type : cisco.com#US Modify Date : 2015:08:20 01:48:44-07:00 Entitlement Expression : contains( "0,1,2,3,4,7" , $profileField[3] ) Title : Configuring IKE and IPsec Policies Alfresco Doc Version : Creator : FrameMaker 11.0.2 Doc Type : Country : US Document Id : Alfresco Trace ID : Concept : Create Date : 2013:07:31 01:56:09Z Author : ctsadmin-wem-p.gen Date : 2015-08-20T01:11:07.790-07:00EXIF Metadata provided by EXIF.tools