01 - IPsec Intro Flashcards
Two primary IPsec protocols
Encapsulating Security Payload (ESP) Authentication Header (AH)
CET
Cisco Encryption Technology
IOS 11.2, August 2003
CET Features / Capabilities
Commercial grade in the sense that it was a major simplification over the former systems. It allowed a mere mortal to configure a very regular and relatively cheap router (Cisco 2500) to encrypt data across a public Layer 3 network. The cryptographic algorithms were very good: DES, then 3-DES, Diffie-Hellman key exchange. At 160 Kbps, the throughput was acceptable in those days (~2003)
4 Steps of Technology Deployment
- Make it work.
- Make it work reliably.
- Make it work at speed.
- Make it work at scale.
What did CET evolve into?
CET evolved into IKE/ISAKMP + IPsec
RFC 2408
Internet Security Association and Key Management Protocol (ISAKMP)
Limits of Crypto Maps
- the combinatory explosion of source/destination pairs on ever larger and complex networks
- code complexity due to packets being stolen in OSI layer 2 and re-encapsulated into a new IP header (OSI layer 3)
Control plane issues which triggered many race conditions in IKE/ISAKMP implementations
- IKE itself and its rekey complexity
2. Differences in behavior between IKE SA rekeys and IPsec SA rekeys
Effect of security policy size explosion
The security policy size explosion made mesh networks totally unmanageable.
Limitation of GRE protected by IPsec in order to run routing protocols on top of the tunnels
Scalability was relatively limited due to hardware performance.
Basic function of NHRP protocol
Establish circuits on demand
EasyVPN Summary
EasyVPN supported remote access (especially the software client) compact but the feature had grown organically and the UI was terrible; it was also crypto map based, and its quality was poor.
Enhanced EasyVPN Summary
Enhanced Easy VPN solved the crypto map problem and was a major improvement over Easy VPN, but it did not enjoy proper marketing and remained poorly adopted.
The UI was the same and hence difficult.
What caused GRE/IPsec to gradually disappear?
GRE/IPsec was slowly disappearing at the benefit of DMVPN and tunnel protection in the site-to-site scenarios.
GET VPN Summary
GET VPN has lower security and limited scalability, but it is lighter on resources when used properly, if the use case is adequate. Notably, it allows native multicast.