09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Encrypted GRE Tunnels<br />

To create encrypted GRE tunnels, you need an enterprise plus or plus 40 version of<br />

<strong>the</strong> IOS software. The tunnel interface configuration is <strong>the</strong> same as it is in<br />

unencrypted tunnels. However, <strong>the</strong>re are added commands for <strong>the</strong> exchange of DES<br />

encryption keys, as well as for <strong>the</strong> creation and application of <strong>the</strong> encryption maps,<br />

which are used <strong>to</strong> define what traffic will be encrypted.<br />

After <strong>the</strong> tunnel interface is created, <strong>the</strong> first encryption step is <strong>to</strong> create <strong>the</strong> DES<br />

key and define <strong>the</strong> DES encryption algorithms you will use. Here is an example:<br />

bumb(config)#cryp<strong>to</strong> gen-signature-keys vpn<br />

Generating DSS keys ….<br />

[OK]<br />

bumb(config)#cryp<strong>to</strong> algorithm 40-bit-des<br />

NOTE<br />

Encrypted GRE tunnel endpoints need <strong>to</strong> be configured at <strong>the</strong> same time because<br />

<strong>the</strong> router administra<strong>to</strong>rs need <strong>to</strong> actively verify <strong>the</strong> DES key exchange.<br />

NOTE<br />

Enterprise IOS comes with one encryption engine: <strong>the</strong> IOS cryp<strong>to</strong> engine. However,<br />

<strong>the</strong> software encryption engine (as mentioned earlier) places additional load on <strong>the</strong><br />

router when used. In addition, two IOS cryp<strong>to</strong> engines, <strong>the</strong> Cisco RSP7000 and<br />

7500, have <strong>the</strong> VIP 2 cryp<strong>to</strong> and Encryption Service Adapter (ESA) cryp<strong>to</strong> engines<br />

available. The ESA is also available on <strong>the</strong> 7200. When using encryption with <strong>the</strong>se<br />

routers, using <strong>the</strong> VIP2 or ESA cryp<strong>to</strong> engines will result in better performance than<br />

using <strong>the</strong> IOS cryp<strong>to</strong> engine.<br />

After <strong>the</strong> DES keys have been created, <strong>the</strong>y need <strong>to</strong> be exchanged between <strong>the</strong><br />

routers that will make up <strong>the</strong> encrypted tunnel. This exchange is done in global<br />

configuration mode, with both router administra<strong>to</strong>rs on <strong>the</strong> telephone so <strong>the</strong> DES<br />

key information can be verified. One side is configured as active and <strong>the</strong> o<strong>the</strong>r as<br />

passive. The passive router will wait until <strong>the</strong> active router connects. After it

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!