NetSec_8_VPNs Practical Flashcards
ACL Syntax for IPsec Traffic (3)
access-list acl# permit udp source_ip wildcard destination_ip wildcard eq isakmp
Permits ISAKMP traffic.
access-list acl# permit esp source_ip wildcard destination_ip wildcard
Permits ESP traffic.
access-list acl# permit ahp source_ip wildcard destination_ip wildcard
Permits AH traffic
Configuration Tasks for IPsec VPN (5)
- Configure the ISAKMP policy for IKE Phase 1
- Configure the IPsec Policy for IKE Phase 2
- Configure a Crypto Map for the IPsec Policy.
- Apply the IPsec Policy
- Verify the IPsec Tunnel is operational.
Configuring ISAKMP Policy for Phase 1 (2)
crypto isakmp policy priority_value // Priority 1 to 10000
Lowest priority value has the highest priority.
HAGLE (3)
- Mnemonic to remember the five SA’s to configure for Phase 1.
- Refers to ISAKMP Config Commands
1. Hash
2. Authenticate
3. Group (Diffie-Helman Group)
4. Lifetime
5. Encryption.
Hash ISAKMP Config Command with Options (2)
hash { sha | md5 } // Sets hash to SHA-1 or MD5
no hash // Resets hash command.
Authenticate ISAKMP Config Command with Options. (4)
authentication { rsa-sig | rsa-encr | pre-share }
rsa-sig // RSA Signatures as authentication method
rsa-encr // RSA Encrypted nonces as authentication method.
pre-share // Pre-Shared Keys as authentication method.
Group ISAKMP Config Command (3)
group DiffieHelman_GroupNumber
DH Groups: 1, 2, 5, 14, 15, 16, 19, 20, 21, 24
Lowest = Least Secure ; Highest = Most Secure.
Lifetime ISAKMP Config Command (2)
lifetime seconds // Sets lifetime of key exchange security association.
60 sec (min.) to 86400 sec. (max ; 1 day)
Encryption ISAKMP Config Command with Options (5)
encryption { des | 3des | aes bits | seal }
des // 56 bit keys
3des // 56 bit keys (3 times)
aes // 128, 192, or 256 bit keys
seal // 160 bit keys streaming cipher
Configuring Pre-Shared Key (Phase 2) (2)
crypto isakmp key keystring address peer_ip_address
crypto isakmp key keystring hostname peer_hostname
Command Used to Display the Status of an IKE Phase 1 Tunnel.
show crypto isakmp sa
Transform Set Definition
Encryption and hashing algorithms to be used to transform the data during the VPN communication, negotiated during Phase 2.
Configuring IPsec Transform Set (2)
crypto ipsec transform-set transform_set_tag upToThreeTransformKeywords
Can only have 1 AH transform per transform set.
Syntax to Configure Crypto Map (5)
crypto map map_name seq_number {ipsec-isakmp | ipsec-manual }
map name = name of crypto map
seq_number = Sequence number for crypto map.
ipsec-isakmp // Indicates IKE will be used.
ipsec-manual // IKE will not be used.
Steps to Complete Crypto Map Configuration (5)
- match address acl_number // Binds ACL for interesting traffic to crypto map.
- set transform-set cryptoMapName
- set peer peer_IP_address
- set pfs DH_Group# // Group number value set as group1, group2, etc
- set security-association lifetime seconds time_in_Seconds. // Sets the tunnel lifetime.