cc/td/doc/product/iaabu/pix/pix_v52
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Introduction

Introduction

This chapter provides a brief overview of Virtual Private Networks (VPNs) and information about the Cisco-supported standards for the IP Security Protocol (IPSec), Internet Key Exchange (IKE), IKE Mode Configuration (Config), and certification authority (CA). The order in which Cisco recommends you configure each of the IPSec components is also provided in this chapter.

This chapter includes the following sections:

VPNs

With IPSec, data can be transmitted across a public network without fear of observation, modification, or spoofing. As part of its security functions, the PIX Firewall provides IPSec standards-based VPN capability. VPNs maintain the same security and management policies as a private network. With a VPN, customers, business partners, and remote users, such as telecommuters, can access enterprise computing resources securely.

Site-to-site and remote-access VPNs are the two main types of VPN, both of which the PIX Firewall supports. Site-to-site VPNs are an alternative WAN infrastructure that replace and augment existing private networks that use leased lines, Frame Relay, or ATM to connect remote and branch offices and central site(s). Access VPNs use analog, dial, ISDN, DSL, mobile IP, and cable technologies to securely connect mobile users, telecommuters, and branch offices. The PIX Firewall supports mixed VPN deployments, with both site-to-site and remote-access traffic. For site-to-site VPNs, the PIX Firewall can interoperate with any Cisco VPN-enabled network device, such as a Cisco VPN router. For remote-access VPN, you must currently use one of the following Cisco remote access VPN applications to gain access into a PIX Firewall-protected network:

Supported Standards

Cisco implements the following standards for the IPSec and IKE features within the PIX Firewall:

  IPSec is documented in a series of Internet RFCs, all available at http://www.ietf.org/html.charters/ipsec-charter.html. The overall IPSec implementation is guided by "Security Architecture for the Internet Protocol," RFC# 2401.

IPSec as implemented in PIX Firewall supports the following additional standards:

  The AH protocol (RFC# 2402) allows for the use of various authentication algorithms; PIX Firewall has implemented the mandatory MD5-HMAC (RFC# 2403) and SHA-HMAC
(RFC# 2404) authentication algorithms. Used in conjunction with ISAKMP, the AH protocol algorithms. In conjunction with ISAKMP, the ESP protocol provides anti-replay services.
  The ESP protocol (RFC# 2406) allows for the use of various cipher algorithms and (optionally) various authentication algorithms. The PIX Firewall implements the mandatory 56-bit DES-CBC with Explicit IV (RFC# 2405); as the encryption algorithm, and MD5-HMAC (RFC# 2403) or SHA-HMAC (RFC# 2404) as the authentication.

IKE is implemented per "The Internet Key Exchange" (RFC# 2409).

ISAKMP—The Internet Security Association and Key Management Protocol. A protocol framework that defines payload formats, the mechanics of implementing a key exchange protocol, and the negotiation of a security association.

ISAKMP is implemented per "Internet Security Association and Key Management Protocol (ISAKMP)" (RFC# 2408).

Oakley—A key exchange protocol that defines how to derive authenticated keying material.

Skeme—A key exchange protocol that defines how to derive authenticated keying material, with rapid key refreshment.

The component technologies implemented for use by IKE include:

IKE Extended Authentication (Xauth) is implemented per the IETF draft-ietf-ipsec-isakmp-xauth-04.txt ("extended authentication" draft). This provides this capability of authenticating a user within IKE using TACACS+ or RADIUS.

IKE Mode Configuration is implemented per the IETF draft-ietf-ipsec-isakmp-mode-cfg-04.txt. IKE Mode Configuration provides a method for a security gateway to download an IP address (and other network level configuration) to the VPN client as part of an IKE negotiation.

IKE interoperates with the following standard:

X.509v3 certificates—Used with the IKE protocol when authentication requires public keys. Certificate support that allows the IPSec-protected network to scale by providing the equivalent of a digital ID card to each device. When two peers wish to communicate, they exchange digital certificates to prove their identities (thus removing the need to manually exchange public keys with each peer or to manually specify a shared key at each peer). These certificates are obtained from a CA. X.509 is part of the X.500 standard by the ITU.

CA supports the following standards:

Order in Which You Configure Your IPSec

If you will implement interoperability with a CA, Cisco recommends that you perform your IPSec configuration in the following order:

    1. CA (see "Configuring CA")

    2. IKE (see "Configuring IKE")

    3. IPSec (see "Configuring IPSec")

    4. (Optional) IKE Extended Authentication—applies only if you are configuring user authentication for remote VPN clients (see "Configuring Extended Authentication" within "Advanced Configurations")

    5. (Optional) IKE Mode Configuration—applies only if you are configuring dynamic IP addressing for remote VPN clients (see "Configuring IKE Mode Config (Dynamic IP Address Assignment for VPN Client)" within "Advanced Configurations")

If you will not implement interoperability with a CA, and you will implement IKE, Cisco recommends that you perform your IPSec configuration in the following order:

    1. IKE (see "Configuring IKE")

    2. IPSec (see "Configuring IPSec")

    3. (Optional) IKE Extended Authentication—applies only if you are configuring user authentication for remote VPN clients (see "Configuring Extended Authentication" within "Advanced Configurations")

    4. (Optional) IKE Mode Configuration—applies only if you are configuring dynamic IP addressing for remote VPN clients (see "Configuring IKE Mode Config (Dynamic IP Address Assignment for VPN Client)" within "Advanced Configurations")

If you will not implement IKE, see "Configuring IPSec."


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Aug 31 19:50:03 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.