28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Encryption, which is the encoding of packet data, is also done with algorithms that<br />

create and verify shared keys. The JUNOS software implements DES and Triple-DES<br />

for encryption, both with cipher block chaining (CBC). DES-CBC uses a 64-bit key<br />

for encryption (56 bits for encryption and 8 bits for error checking), and the stronger<br />

3DES-CBC uses three times the number of bits (168 bits) for encryption.<br />

To identify the traffic to protect, IPSec creates security associations (SAs) to negotiate<br />

the desired security services. Each SA, which is identified by a security parameter<br />

index (SPI), defines preferences for authentication, encryption, and security protocol.<br />

SAs can be either unidirectional or bidirectional and are created either manually<br />

or dynamically. For manual SAs, you configure matching preset shared keys for<br />

authentication and encryption, security protocols, and fixed SPI values on both ends<br />

of the IPSec connection. Dynamic SAs are negotiated by IKE, but you can configure<br />

recommended suggestions for all IPSec parameters. As a result of the negotiation<br />

with the peer, an SA pair is set up, one inbound and one outbound. The inbound<br />

half of the SA pair de-encrypts and authenticates the incoming traffic from the IPSec<br />

peer, and the outbound half encrypts and authenticates the outbound traffic going to<br />

the peer.<br />

IPSec SAs operate in one of two modes, tunnel mode or transport mode. A tunnel<br />

mode SA is essentially an IP tunnel between two security gateways, which are routers<br />

or other devices protecting the networks behind them. One common way to use<br />

tunnel mode is to send secure traffic between two sites on an intranet (that is, within<br />

a corporate network). The router at each end of the tunnel acts as a security gateway.<br />

Any data transferred between the two sites is protected as it traverses the tunnel<br />

between the security gateways. Transport mode provides security between two hosts,<br />

protecting traffic (such as OSPF and BGP traffic) that is destined for the router itself.<br />

For a tunnel mode SA, an IP header specifies the IPsec processing destination and an<br />

inner IP header specifies the packet’s ultimate destination. The security protocol<br />

header is placed between the outer and inner headers. If the protocol is AH, portions<br />

of the outer IP header and the entire tunneled IP packet (the inner IP header<br />

and the higher-layer protocols) are protected. With ESP, only the tunneled packet is<br />

protected, not the outer header.<br />

To use IPSec with M-series and T-series routers, the router must have either an ES<br />

PIC or an Adaptive Services (AS) PIC. The configuration for these two PICs differs<br />

slightly. The J-series routers also run IPSec but require no additional hardware<br />

because they have built-in AS functionality. In this chapter, we show how to configure<br />

IPSec with both PICs.<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.<br />

Introduction | 107

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!