18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 14: Configuring Virtual Private Networks<br />

<strong>Sidewinder</strong> <strong>G2</strong> VPN overview<br />

396<br />

VPN configuration options<br />

VPN involves establishing an association (or a trust relationship) between your<br />

<strong>Sidewinder</strong> <strong>G2</strong> and an IPSec-compliant remote <strong>Sidewinder</strong> <strong>G2</strong>, host, or client.<br />

(These entities are referred to as “VPN peers.”) Once this trust relationship is<br />

defined, data sent between the two ends is encrypted and then authenticated<br />

before it is transmitted. There are three important concepts that comprise the<br />

<strong>Sidewinder</strong> <strong>G2</strong> VPN:<br />

• IPSec keys, which determine how the information is encrypted and<br />

decrypted, and may be manually or automatically exchanged.<br />

• certificates, pre-shared passwords, and extended authentication, which<br />

authenticate the VPN peer.<br />

• tunnel or transport encapsulation, two methods <strong>of</strong> how header information<br />

is passed.<br />

Understanding the options associated with each concept will assist you greatly<br />

in creating your security association. Study the following information to help<br />

you determine which VPN configuration best suits your network environment.<br />

About IPSec keys<br />

A key is a number that is used to electronically sign, encrypt and authenticate<br />

data when you send it, and decrypt and authenticate your data when it is<br />

received. When a VPN is established between two sites, two keys are<br />

generated for each remote end: an encryption key and an authentication key.<br />

To prevent these keys from being guessed or calculated by a third party, a key<br />

is a large number. Encryption and authentication (or session) keys are unique<br />

to each VPN security association you create.<br />

Once generated, these keys are exchanged (either automatically or manually)<br />

between the sites, so that each end <strong>of</strong> the VPN knows the other end’s keys.<br />

To generate key pairs, the <strong>Sidewinder</strong> <strong>G2</strong> gives you two options:<br />

• Manual key generation — If the remote site is not Internet Key Exchange<br />

(IKE)-compliant, you may want to choose the manual method <strong>of</strong> key<br />

generation. With this method, the <strong>Sidewinder</strong> <strong>G2</strong> provides randomlygenerated<br />

encryption and authentication keys (or you can create your own)<br />

which you must copy and pass to the remote end <strong>of</strong> the VPN via secure email,<br />

diskette, or telephone. Repeat this process each time you generate<br />

keys. Manual keys are more labor intensive than automatic keys and rarely<br />

used.<br />

• Automatic key generation using IKE — If the remote end <strong>of</strong> your VPN uses<br />

the IKE protocol, the <strong>Sidewinder</strong> <strong>G2</strong> can manage the generation <strong>of</strong> session<br />

keys between sites automatically. This process also regularly changes the<br />

keys to avoid key-guessing attacks. Automatic keys are very common in<br />

today’s network environments.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!