28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

have to set up an IKE SA and a firewall filter to direct traffic into the tunnel. Again,<br />

this recipe is for M-series and T-series routers with ES PICs.<br />

The IKE negotiation happens in two phases, Phase 1 and Phase 2. In Phase 1, the IKE<br />

SA is negotiated based on the IKE policy and IKE proposal, and the result is the creation<br />

of an IKE SA. This negotiated IKE SA is then used to secure the Phase 2<br />

exchange, which uses the IPSec proposal and IPSec policy to create an IPSec SA pair<br />

(one SA for inbound and a second for outbound traffic). The IKE policy is used for<br />

the negotiation during Phase 1, and IPSec policy is used for the negotiation in Phase 2.<br />

This means that the IKE and IPSec proposals can use different algorithms.<br />

For IKE, this recipe defines a negotiation proposal, here called site1-site2-ikeproposal,<br />

that creates an IKE SA based on the stated authentication and encryption<br />

algorithms. The set dh-group command configures this proposal to use 768-bit Diffie-<br />

Hellman prime modulus group when establishing the IKE session keys. By default,<br />

the IKE SA is valid for 3,600 seconds (1 hour). When it expires, a new one is negotiated.<br />

The IKE SA references an IKE policy (here, policy 10.0.97.62) that defines the<br />

preshared key to use for negotiation. The policy is identified by the IP address of the<br />

security gateway at the remote end of the tunnel, which is the tunnel destination<br />

addresses configured on ES interface es-3/0/0.<br />

For IPSec, also define a proposal (here, site1-site2-ipsec-proposal) and a policy<br />

(site1-site2-ipsec-policy). The proposal uses the same parameters as in the manual<br />

SA in Recipe 3.1. By default, the negotiated SA is valid for 28,800 seconds (8<br />

hours). When it expires, a new one is negotiated. On the ES PIC, anti-replay is disabled<br />

by default. (On the AS PIC, it is enabled by default with a default window size<br />

of 64 bits.) This recipe enables anti-replay with a window size of 64 bits.<br />

The lifetime of both the IKE and IPSec proposals is configurable by using the set<br />

lifetime-seconds command. Here, you change the IKE proposal lifetime to 2 hours<br />

and the IPSec proposal lifetime to 10 hours:<br />

[edit security ike]<br />

aviva@router1# set proposal site1-site2-ike-proposal lifetime-seconds 7200<br />

[edit security ipsec]<br />

aviva@router1# set proposal site1-site2-ipsec-proposal lifetime-seconds 36000<br />

The IPSec policy, site1-site2-ipsec-policy, defines which proposals IKE should<br />

consider and in which order (if you configure more than one). This recipe also<br />

enables perfect forward secrecy (PFS) security for keys, which means that the shared<br />

key material can be used to drive the IPSec SA keys only once. With PFS, if an IKE<br />

SA is present (Phase 1 of the negotiation), then during the IPSec SA negotiation<br />

(Phase 2 of the negotiation), a Diffie-Hellman exchange is required for every rekeying<br />

to generate the shared key material. Without PFS, a Diffie-Hellman exchange is<br />

done only during the initial keying but is not done again during the rekeying operation.<br />

PFS is considered to be more secure because it gets fresh keying material every<br />

time an IPsec SA is renegotiated.<br />

Configuring IPSec Dynamic SAs | 113<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!