|
|
This chapter provides a brief overview of Virtual Private Networks (VPNs) and information about the Cisco-supported standards for the IP Security Protocol (IPSec), Internet Key Exchange (IKE), IKE Mode Configuration (Config), and certification authority (CA). The order in which Cisco recommends you configure each of the IPSec components is also provided in this chapter.
This chapter includes the following sections:
With IPSec, data can be transmitted across a public network without fear of observation, modification, or spoofing. As part of its security functions, the PIX Firewall provides IPSec standards-based VPN capability. VPNs maintain the same security and management policies as a private network. With a VPN, customers, business partners, and remote users, such as telecommuters, can access enterprise computing resources securely.
Site-to-site and remote-access VPNs are the two main types of VPN, both of which the PIX Firewall supports. Site-to-site VPNs are an alternative WAN infrastructure that replace and augment existing private networks that use leased lines, Frame Relay, or ATM to connect remote and branch offices and central site(s). Access VPNs use analog, dial, ISDN, DSL, mobile IP, and cable technologies to securely connect mobile users, telecommuters, and branch offices. The PIX Firewall supports mixed VPN deployments, with both site-to-site and remote-access traffic. For site-to-site VPNs, the PIX Firewall can interoperate with any Cisco VPN-enabled network device, such as a Cisco VPN router. For remote-access VPN, you must currently use one of the following Cisco remote access VPN applications to gain access into a PIX Firewall-protected network:
Cisco implements the following standards for the IPSec and IKE features within the PIX Firewall:
IPSec as implemented in PIX Firewall supports the following additional standards:
IKE is implemented per "The Internet Key Exchange" (RFC# 2409).
ISAKMP is implemented per "Internet Security Association and Key Management Protocol (ISAKMP)" (RFC# 2408).
OakleyA key exchange protocol that defines how to derive authenticated keying material.
The component technologies implemented for use by IKE include:
IKE interoperates with the following standard:
CA supports the following standards:
1. CA (see "Configuring CA")
2. IKE (see "Configuring IKE")
3. IPSec (see "Configuring IPSec")
4. (Optional) IKE Extended Authenticationapplies only if you are configuring user authentication for remote VPN clients (see "Configuring Extended Authentication" within "Advanced Configurations")
5. (Optional) IKE Mode Configurationapplies only if you are configuring dynamic IP addressing for remote VPN clients (see "Configuring IKE Mode Config (Dynamic IP Address Assignment for VPN Client)" within "Advanced Configurations")
If you will not implement interoperability with a CA, and you will implement IKE, Cisco recommends that you perform your IPSec configuration in the following order:
1. IKE (see "Configuring IKE")
2. IPSec (see "Configuring IPSec")
3. (Optional) IKE Extended Authenticationapplies only if you are configuring user authentication for remote VPN clients (see "Configuring Extended Authentication" within "Advanced Configurations")
4. (Optional) IKE Mode Configurationapplies only if you are configuring dynamic IP addressing for remote VPN clients (see "Configuring IKE Mode Config (Dynamic IP Address Assignment for VPN Client)" within "Advanced Configurations")
If you will not implement IKE, see "Configuring IPSec."
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Aug 31 19:50:03 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.