cc/td/doc/product/ismg/policy/ver20
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

IPSec Tunnels

IPSec Tunnels

IPSec is a suite of protocols that seamlessly integrate security features, such as authentication, integrity, and confidentiality, into IP. You can use Cisco Secure Policy Manager to create IPSec tunnels between devices that support these protocols. IPSec tunnels enable peers to securely transmit information over an untrusted or public IP network.

Cisco Secure Policy Manager enables you to use tunnels in two ways:

This chapter contains the following sections:

This section provides a brief overview of IPSec and how IPSec is implemented within Cisco Secure Policy Manager.
This section provides a brief introduction to encryption and the various algorithms used to encrypt network traffic in IPSec implementations.
This section provides information about the prerequisites and the decisions you need to make before you can implement IPSec tunnels between devices managed by Cisco Secure Policy Manager.
This section provides the step-by-step procedures for creating both Policy Enforcement Point-to-Policy Enforcement Point and Policy Distribution Point-to-Policy Enforcement Point IPSec tunnels.

About IPSec Tunnels

IPSec is a suite of protocols that seamlessly integrate security features, such as authentication, integrity, and/or confidentiality, into IP. Using the IPSec protocols, you can create an encrypted and/or authenticated communication path, depending upon the protocols used, between two peers. This path is referred to as a tunnel. A peer is a device, such as a client, router, or firewall, that serves as an endpoint for the tunnel. This section provides a brief overview of IPSec and how Cisco Secure Policy Manager implements IPSec features. More information about the IPSec architecture can be found in RFC2401.

IPSec tunnels based on the Authentication Header (AH) protocol provide data integrity, data source authentication, and protection against replay attacks. The AH protocol accomplishes this by encapsulating the original IP packet in a packet that contains a new IP header, the AH header, followed by the original header. The actual payload of the packet, however, is transmitted in clear text, so tunnels based on the AH protocol do not provide data confidentiality. More information about the AH protocol can be found in RFC2402.

IPSec tunnels based on the Encapsulating Security Payload (ESP) protocol can also provide data integrity, data source authentication, and protection against replay attacks, but they also provide data confidentiality. The ESP protocol accomplishes this by basically encrypting the IP packet and creating another IP packet consisting of an IP header, and ESP header, the encrypted data (which contains the original IP header), and an ESP trailer, half of which is encrypted and half of which is clear text. VPNs, which allow secure data communication through a public or unsecured network, are created using IPSec tunnels based on the ESP protocol. More information about the ESP protocol can be found in RFC2406.

The IPSec specification allows both AH and ESP to be applied to the data being protected, but with IPSec tunnels based on ESP that is not always necessary. ESP provides an authentication algorithm, called the authenticator, which can be used for data source authentication. The authenticator, however, can be set to null, in which case ESP will not provide data source authentication. In this case, another method of authentication, such as AH, will need to be employed for authentication.

The AH and ESP protocols rely on several keyed encryption and hash algorithms to provide integrity, authentication, and confidentiality. The IPSec specification does not state which algorithm must be used, but it does provide a standard set that must be supported by all implementations of IPSec. This standard allows for the selection of an algorithm based on the needs of the particular implementation of IPSec, as well as the future addition of algorithms as they are developed. The standard set of algorithms used by both AH and ESP for integrity and authentication include HMAC-MD5 and HMAC-SHA. ESP-based tunnels often use the Data Encryption Standard (DES) or Triple Data Encryption Standard (3DES or Triple-DES) algorithms in cipher block chaining mode for encryption.

IPSec provides two methods for determining the keys used by these algorithms: pre-shared key (manual) and Internet Key Exchange (IKE). With a pre-shared key, both tunnel peers must be pre-configured with a shared key and the AH and/or ESP algorithm prior to creating the tunnel. Tunnels created with a shared secret are referred to as manual tunnels. With IKE, both the key and the AH and/or ESP algorithm are negotiated by the tunnel peers prior to creating the tunnel. Tunnels based on the IKE are referred to as IKE tunnels or negotiated tunnels. The benefits of negotiated tunnels include automatic key updates and automatic negotiation of the security algorithms with an IPSec peer. For more information about manual tunnels and IKE tunnels, refer to the following sections:

The combination of how to protect the data (ESP and/or AH, plus the associated algorithms and keys determination), what data to protect (based on service), and between what points the data is to be protected (the tunnel peers, or endpoints) is called a security association (SA). SAs define which protocols and algorithms should be applied to sensitive packets, which packets are considered sensitive, and the keying material to be used by the two IPSec peers.

Cisco Secure Policy Manager implements support for and configuration of IPSec SAs through the use of tunnel templates (in the Tools and Services tree), tunnel groups (in the Network Policy Tree), and policies. A tunnel template defines algorithms and protocols that will be used to negotiate the key exchange (for IKE tunnels only) and the encryption of the data for confidentiality or authentication purposes. Tunnel groups define the tunnel peers, or endpoints. A tunnel group is based on a single tunnel template, which ensures that the peers that are added to the tunnel group reference the same protocols and algorithms (SAs) for key exchange, authentication, and confidentiality. This reduces the chances for introducing errors when manually configuring each peer in a tunnel group. Finally, Cisco Secure Policy Manager uses security policies to define which services the tunnel endpoints should route through the tunnels and which service the tunnel endpoints should send as clear text (or via some other secure method).

About Manual IPSec Tunnels

In a manual IPSec tunnel, the shared secret (or key), protocol (AH, ESP, or both), and the algorithms used by each protocol are established and configured on the tunnel peers before any attempts at creating a tunnel are made.

One benefit of manual tunnels is that they are slightly faster and less resource intensive to set up than IKE tunnels. This is because the tunnel peers already have the tunnel parameters established---the peers do not need to negotiate the key, protocol, and algorithm.

Of course, this does mean that each peer must be properly pre-configured to accept the tunnel from the other. If the parameters of the tunnel are misconfigured on one peer, the tunnels will be unable to communicate. Cisco Secure Policy Manager alleviates this potential problem by using tunnel templates. The tunnel peers are defined in a tunnel group, and the group references a single tunnel template, ensuring that the same tunnel parameters (protocols and algorithms) are used on each peer.

Another problem with manual tunnels is key management. You need to manually select and configure shared keys between all tunnel peers. Every time a new peer is added to the tunnel group, you must manually select and configure keys between that peer and each of the other peers. Consequently, the more manual tunnel peers you add to your network topology, the more complex the task of key administration and tracking becomes. For this reason, manual IPSec tunnels are recommended for smaller networks where key distribution can be kept to a minimum. For larger networks with a large number of tunnels, we recommend that you use IKE tunnels for dynamic negotiations of keys and protocol algorithms.

About IKE IPSec Tunnels

IKE tunnels negotiate a shared key between tunnel peers. This means that you do not have to manually pre-configure the peers with a shared secret. Additionally, they can negotiate the AH and/or ESP protocol algorithm used to create the tunnel.

IKE tunnels use the Diffie-Hellman algorithm to derive a symmetric key for the tunnel peers when creating the tunnel. This key can be given a time-to-live value, after which another key is negotiated, providing perfect forward secrecy to the tunnel. During key negotiation, a hash algorithm is used to verify data integrity and either a certificate or a shared secret is used for data authentication. If a shared secret is used for authentication of the Diffie-Hellman exchange, the shared secret must be pre-configured on the tunnel peers.

One major benefit of using IKE tunnels as opposed to manual tunnels is key management. Because the peers negotiate the key each time a tunnel is created, there is no need to manually maintain and change shared secrets between each tunnel endpoint (unless, of course, you use a shared secret for authentication of the key negotiation). For this reason, on large networks with a large number of tunnel connections, we recommend that you use IKE tunnels with certificate authentication to avoid key management problems.

Another benefit is that each time the tunnel is created, and each time a key's time-to-live value is reached, a new key is generated. Even if one key is derived from the encrypted data, data protected by subsequent keys will remain safe. It also prevents an observer from gaining a large amount of cipher text generated by the same key, which can potentially make the key that encrypted the text easier to decipher.

IKE tunnels are not limited to a single AH and/or ESP protocol. You can create prioritized lists, called proposals, of protocols that are negotiated between the peers when creating the tunnel. For example, you can have a group of three tunnel peers, two of which support 3DES (called PeerA and PeerB) and one of which only supports DES (called PeerC), that you want to connect with an ESP tunnel. On PeerA and PeerB, you can create an initial proposal for 3DES followed by a proposal for DES as the ESP encryption algorithm. On PeerC, you create a single proposal for DES. Whenever PeerA tries to negotiate a tunnel with PeerB, it will use 3DES as the ESP encryption algorithm. When PeerA negotiates a tunnel with PeerC, it will propose using 3DES, to which PeerC will reply with DES. Because DES is an option on PeerA, it will use DES as the ESP encryption algorithm.

This negotiation is prioritized by the administrator setting up the tunnels, not by any inherent property of the algorithms. In the above example, the 3DES and DES proposals could easily have been reversed so that the peers attempt to use DES as the ESP encryption algorithm. In this case, PeerA and PeerB would have used DES.

Cisco Secure Policy Manager facilitates the configuration of IKE tunnel key negotiation and protocol algorithm proposals through the use of tunnel templates. The template enables you to specify the parameters of key negotiation (integrity and authentication algorithms as well as Diffie-Hellman type) and to create prioritized lists of AH and ESP proposals. This template can then be applied to a tunnel group, which defines the tunnel peers, ensuring that all peers in that group are configured with the same IKE configuration.

Of course, negotiation of the key does take time and system resources, so creating an IKE tunnel is more time and resource intensive than creating a manual tunnel. Where speed and resources are a concern, you should consider using manual tunnels.

Learn More About How Encryption Works in IPSec

In the public eye, encryption is probably the most visible technology within network security; however, it does not solve all network security concerns. This section defines encryption and how IPSec uses encryption to enhance the protection of information on your network.

We begin by defining the key components of IPSec encryption and their role in the encryption process. Next, we describe the different encryption algorithms that IPSec offers. We close our discussion of encryption by describing how IPSec packet encryption works and how to manage the secret master keys used by IPSec.

What is Encryption?

The primary goal of encryption is to allow peer network objects to communicate using an unprotected network path in a manner that is as secure as a physically protected path.

Within IPSec, as with most encryption techniques, two primary components are used to provide the resulting encryption: a cipher and a secret key. A cipher is a mathematical algorithm that converts a string of known source data, or plaintext, into apparently random data, called ciphertext. This conversion process is what we call encryption. Using the cipher, you can also decrypt the data, or convert it from ciphertext to plaintext. A cipher uniquely depends on the value of cryptographic variables known as keys. If you do not have these secret keys, you cannot encrypt or decrypt the data. Secret keys are also called symmetric keys.

When you use the same cipher to encrypt and decrypt data, the sender and receiver must share the same secret information. This type of cipher is known as a secret key cipher.

Cisco IPSec solutions support the two most popular secret key algorithms:

Modes of Encryption

To help you to understand the specific encryption mode that IPSec uses and to develop a better understanding of basic encryption, we explain two different modes typically supported within the DES family of ciphers. This section defines two modes of operation that provide certain capabilities for communications.

The simplest mode supported is ECB, also known as block mode. Block mode combines a block of plaintext (64 bits or 8 characters) and a key to yield a block of ciphertext. Every block of plaintext is encrypted independently of preceding blocks. For most communications, this mode is unsuitable because transformation of repetitive plaintext blocks will yield repetitive ciphertext, which is vulnerable to cryptoanalysis that uses a one-for-one substitution (also called a known plaintext attack). However, block mode is the fastest form of encryption that can be supported by DES implementations.


To address the problem of repetitive plaintext, some DES implementations also support one or more chaining modes. In a chaining mode, each block is still encrypted; however, the ciphertext is calculated using a third input, a feedback value based on the previous block of information. As with block mode, the two remaining inputs are the plaintext block and the key. Using chaining modes ensures that the ciphertext appears as a random stream of data, even when the source plaintext contains highly repetitive sequences.


In place of a feedback value for the first block, an initialization vector is used to start the encryption processes. This initialization vector causes bit changes in one block of the plaintext, which propagate into the subsequent ciphertext.

Because chaining modes have distinct starting points where the initialization vector is fed into the calculation, the sender and receiver must synchronize between messages. To do this, the sender and receiver agree on the initialization vector and the key, and a method of signaling the start of a new message.

Errors that occur during transmission (such as changed, dropped, or extra bits in the ciphertext) can introduce synchronization problems. Chaining modes are designed to address these synchronization problems. If the problems are not addressed, the received plaintext stream would be continuously unintelligible.

To address these synchronization problems, all Cisco IPSec solutions use a type of chaining mode for DES-based encryption called CBC. In CBC mode, the ciphertext of each block is the feedback value of the next block. When a bit error occurs in the ciphertext, it does not propagate more than two blocks into the deciphered plaintext. However, CBC does not deal well with lost or extra bits or characters in the ciphertext. Even though this is true, block chaining is still well suited for protocols, such as the IPSec suite, that use packets and datagrams. These higher-layer protocols use a checksum to verify that the ciphertext was received unaltered.

How Encryption Works in IPSec

IPSec uses a type of encryption known as packet encryption. It is referred to as packet encryption because it takes place at the network layer, or layer 3 in the OSI reference model. Because this encryption takes place above the data link layer (layer 2), communication takes place in the form of distinct packets or datagrams, depending on which protocol controls the session (TCP or UDP). Packet encryption is often called end-to-end encryption because the encryption process takes place only at the source and destination endpoints.

Unlike encryption that takes place in lower-layer protocols (like the data link layer), packet encryption avoids synchronization problems because the chaining process is restarted on each packet. If a receiver misses or ignores some packets, he can still decipher subsequent packets without error because each packet is independent of previous packets from the point of view of the encryption mechanism. A transmission error in one packet will not propagate to subsequent packets.

In packet encryption, the entire message packet is not encrypted, specifically the packet header is not encrypted. Parts of the header must remain unencrypted because the header contains information needed by the recipient to decipher the message. (For example, a recipient communicating with a number of systems may need to see a source address to determine which of several keys to use for decryption.) Moreover, any additional headers appended by lower-layer protocols must remain unencrypted. By not encrypting the protocol headers, the destination address of a datagram remains visible, which allows it to be routed to its proper destination.

Planning IPSec Tunnels

IPSec is an open standard, which means that new protocols and algorithms can be added and old ones removed at any time. While this makes the IPSec standard flexible in that it can incorporate more secure protocols and authentication/encryption algorithms as they become available, it also makes IPSec implementations complex because of the many choices that need to be made.

This section provides the information you need to make decisions about how to implement IPSec on your network using Cisco Secure Policy Manager. The information provided does not go into detail about the mechanisms of the various protocols and algorithms but rather provides an overview to help you decide which choices to make. Refer to About IPSec Tunnels, for a more in-depth discussion about the components of an IPSec implementation.

This section contains the following topics. Unless specifically stated, the topics refer to both manual and IKE tunnels:

Determining Tunnel Usage

The first decision you need to make regards your usage of tunnels. What services do you want to protect? When do you want them protected? The obvious answer is that you want to protect the services that carry confidential or sensitive data over an untrusted or public network.

For example, you may want HTTP services between a remote office and a main office intranet to be encrypted so that remote office users can access confidential company information from the main office's internal network, yet at the same time permit unencrypted HTTP traffic to the internet.

Before planning your IPSec tunnel implementation, you need to have a solid understanding of the services you want protected by IPSec tunnels, and the sources and destinations of the protected services. This information will serve you later when you begin to write and enforce the security policies that use your IPSec implementation.

Determining Tunnel Topology

After determining what services are to be protected by IPSec tunnels, and the endpoints between which those services are being protected, you need to decide upon a configuration of those endpoints. In this planning step, you need to arrange the source and destination endpoints of the tunnels you identified in the Determining Tunnel Usage section into a tunnel topology.

For example, you may have several remote offices that you want to communicate with a main office via IPSec tunnels. You have two choices in configuring the tunnel topology.

First, you can create a single tunnel from each remote office to the main office, much like a star topology in a network diagram. This type of topology is called a spoke-and-hub tunnel topology. In the example, the main office acts as a hub and the remote offices are spokes off that hub. Each remote office can communicate to the main office securely, but it cannot create a secure connection to the other remote offices.

Second, you can create tunnels from each office, main and remote, to every other office. This is called a mesh tunnel topology. Each office acts as a hub with every other office acting as a spoke. This enables all the offices to communicate with one another over a secure connection.

You need to decide how your tunnel endpoints are going to be connected. Do you need a simple one-to-one connection as in a spoke-and-hub model? Multiple connections as in a mesh model? Or some combination of the two? The decisions you make now about your tunnel topology will assist you later when creating tunnel groups in the GUI client.

Some things to consider when planning your tunnel topology:

Using IKE or Manual Tunnels

Cisco Secure Policy Manager supports the configuration and management of both IKE and manual tunnels. An IKE tunnel uses Diffie-Hellman to generate a key between tunnel peers. Manual tunnels have the key used in tunnel sessions pre-configured. Use the benefits and drawbacks listed below to determine what type of tunnel will suit your organization's needs:

IKE Tunnels Benefits

IKE Tunnel Drawbacks

Manual Tunnel Benefits

Manual Tunnel Drawbacks

Determining IKE Algorithms

When configuring an IKE IPSec implementation, you need to decide upon the algorithms used during the IKE negotiation. You will need to decide the algorithms to use for the following areas:

Data Integrity Algorithms

Cisco Secure Policy Manager supports the use of SHA and MD5 hash algorithms to provide data integrity to an IKE negotiation.

Data Authentication Algorithms

Cisco Secure Policy Manager supports the use of certificates (RSA Encryption and RSA Signature) and shared secrets to provide authentication services to IKE negotiation.

Data Confidentiality Algorithms

Cisco Secure Policy Manager supports the use of DES and triple DES to provide confidentiality to the IKE negotiation.

Key Derivation Algorithms

Cisco Secure Policy Manager supports Diffie-Hellman group 1 and group 2 key derivations.

Determining IPSec Protocols

Cisco Secure Policy Manager supports AH and ESP IPSec protocols. AH is used for authentication and anti-replay services, while ESP is used for authentication, confidentiality, and anti-replay services. For both protocols, anti-replay protection is provided by a field in the protocol header that the sender monotonically increments. It is up to the recipient of the packet to examine this field and provide the anti-replay protection.

Use the following information to decide which IPSec protocol to use in your IPSec session implementation:

AH. AH authenticates the entire IP packet, including the IP header on the packet. However, it does not provide confidentiality for the data payload of the packet.

ESP. ESP can provide both authentication and confidentiality services. It uses two separate algorithms to provide these services: a hash algorithm for authentication and a cipher for confidentiality. The difference between AH and ESP authentication is that ESP only authenticates the ESP payload; it does not authenticate the outer IP header. Furthermore, you can use ESP without the authentication services to provide confidentiality services only.

Both. You can also use both protocols in your IPSec session implementation. When you use both, the ESP protocol is applied to the packet first, and then AH is used to authenticate the entire packet. When using both AH and ESP in your tunnel implementation, you should consider using ESP without authentication services (since authentication is also being provided by the AH protocol) to provide a less resource-intensive implementation.

These protocols define the method used for authentication/encryption, but do not define the algorithm used to achieve that method. Next, you need to decide the algorithms used with each protocol.

Determining IPSec Protocol Algorithms

After choosing the IPSec protocols to be used by the tunnel, you must select the algorithms to be used by each protocol.

If the tunnels use both AH and ESP protocols, the algorithms must be selected for each protocol.

Authentication Algorithms

When implementing the AH protocol or the ESP protocol with authentication services, you must also decide which hash algorithm to use with the protocol. Cisco Secure Policy Manager supports the two most common authentication hash algorithms: HMAC-SHA and HMAC-MD5.

Encryption Algorithms (Ciphers)

A cipher is an encryption algorithm. Cisco Secure Policy Manager supports two ciphers: DES and triple DES.


Note In IKE tunnel configurations, you can specify up to three sets of IPSec protocol proposals to be negotiated when the endpoints are creating the tunnel. If you are not certain whether an endpoint can support triple DES, you can create a proposal that attempts to use triple DES first, and then drops to a proposal using DES if triple DES is not supported.

Creating IPSec Tunnels

Cisco Secure Policy Manager can configure IPSec tunnels to create secure IPSec sessions between a Policy Distribution Point and Policy Enforcement Point or simply between two Policy Enforcement Point.


Note If you are creating both types of tunnels on your network, you should create your Policy Distribution Point-to-Policy Enforcement Point tunnels first, and then your Policy Enforcement Point-to-Policy Enforcement Point tunnels.

Each tunnel usage has unique requirements for set-up and configuration. The following checklists will guide you through the process of configuring tunnels for each usage:

Checklist for Creating Tunnels Between the Policy Distribution Point and the Policy Enforcement Point

You can create IPSec tunnels between the Cisco Secure Policy Manager Policy Distribution Point and the Policy Enforcement Point for the secure distribution of security policies over an untrusted network.

Table 1-1 outlines the steps required to create IPSec tunnels between the Cisco Secure Policy Manager host and the Policy Enforcement Points. Each step, described in the Step column, may contain several substeps and should be performed in the order presented. References to the specific tasks used to perform each step appear in the Reference column.


Table 1-1: Policy Distribution Point to Policy Enforcement Point Tunnel Checklist
Step Reference

1. Verify or Configure your Tunnel Templates

Tunnel templates define the security parameters that apply to the IPSec Tunnel Groups (the tunnel peers, in this case the Policy Distribution Point and the Policy Enforcement Point). Before you can set up the IPSec tunnel between the Policy Distribution Point and the Policy Enforcement Point, you need to configure a tunnel template with the security settings to be used by the tunnel (or verify that the needed template already exists).

Cisco Secure Policy Manager is pre-configured with several tunnel templates. You can use one of the pre-configured templates as is, modify a pre-configured template to suit your needs, or create a new IPSec Tunnel Template.

"IPSec Tunnel Templates."

2. Configure the Policy Enforcement Points

For each Policy Enforcement Point, you must verify that the Policy Enforcement Point is a managed object and that it supports IPSec. Then, you must select the appropriate IPSec Tunnel Template and enter a shared secret. You must use a shared secret between the Policy Distribution Point and the Policy Enforcement Point; you cannot use certificates when creating a tunnel between the Policy Distribution Point and the Policy Enforcement Point.

After each Policy Enforcement Point is configured with an IPSec Tunnel Template, an IPSec Tunnel Group is automatically generated and placed in the IPSec Tunnel Groups branch of the Network Policy tree. This group will consist of the Cisco Secure Policy Manager host containing the Policy Distribution Point and the selected Policy Enforcement Point.

A security policy, permitting Telnet access via the tunnel, is automatically generated and placed in the Cisco System Folder of the Security Policy Enforcement branch. This policy ensures that the Policy Distribution Point can send commands to the Policy Enforcement Point. You cannot modify this policy.

"Configuring Policy Enforcement Points."

3. Generate the Command Sets

The command sets are automatically generated when you save and update your Cisco Secure Policy Manager configuration from the menu or toolbar.

If you have Cisco Secure Policy Manager set to automatically publish the command sets to the Policy Enforcement Points when you click Save and Update on the File menu or the toolbar, you will need to disable this feature before generating the command sets.

"IPSec Tunnel Policy."

4. Restart the Cisco Secure VPN Client (Optional)

The Cisco Secure VPN Client provides the services required for the Cisco Secure Policy Manager host to act as a tunnel endpoint. If the Cisco Secure VPN Client was running during the previous configuration steps, it will not display your tunnels, although it will still function correctly as a tunnel endpoint. You will need to stop and restart it for the tunnel configuration to appear in the Cisco Secure VPN Client.

Refer to the Cisco Secure VPN Client documentation for information about shutting down and restarting the application.

Cisco Secure VPN Client Documentation

5. Publish the Commands to the Policy Enforcement Point

Publishing the command sets to the Policy Enforcement Point is a two-step process.

First, you must manually bootstrap each Policy Enforcement Point. Because you have just configured Cisco Secure Policy Manager to communicate with the Policy Enforcement Point via tunnel, it will immediately try to do so, even though the Policy Enforcement Point has not been configured to accept that tunnel. The first step in the process enables the Policy Enforcement Point to accept the tunnel.

Finally, you must publish the command sets to the Policy Enforcement Point.

The recommended sequence is to perform the following two steps for each Policy Enforcement Point, starting with the most remote Policy Enforcement Point and working your way to the closest. In this case, remote refers to a Policy Enforcement Point that is located behind another Policy Enforcement Point from the point of view of the Policy Distribution Point.

      a. Bootstrap the Policy Enforcement Point.

      b. Publish the command set to the Policy Enforcement Point.

Repeat the above two steps for each Policy Enforcement Point being configured to accept tunnel traffic from Cisco Secure Policy Manager.

"Configuring Policy Enforcement Points"

"IPSec Tunnel Policy."

Checklist for Creating Peer-to-Peer Tunnels

You can create IPSec tunnels between two Policy Enforcement Points that are connected by an untrusted or public network. This type of tunneling creates a VPN, whereby a remote office can be securely connected to the main office network over the Internet or a shared network, that provides authentication, integrity, and confidentiality for the information being transmitted.

Table 1-2 outlines the steps required to create IPSec tunnels between two managed Policy Enforcement Points. Each step, described in the Step column, may contain several substeps and should be performed in the order presented. References to the specific tasks used to perform each step appear in the Reference column.


Table 1-2: Policy Distribution Point to Policy Enforcement Point Tunnel Checklist
Step Reference

1. Set Up the Certificate Server

If you will be using IKE tunnels with certificates, you need to set up a certificate server with the appropriate services before configuring the tunnels. This server can be a host on your network or leased service from a public certificate service.

To configure IKE tunnels in Cisco Secure Policy Manager, you will need to set up the certificate server in your network topology. This involves performing the following tasks:

      a. Add the Certificate Server Host to the Network Topology Tree (if it currently does not appear in the tree).

      b. Add the certificate service to the Certificate Server object in the Network Topology tree.

"Authentication Server Panel."

2. Verify or Configure your Tunnel Templates

The tunnel templates define the security parameters that apply to the IPSec Tunnel Groups. Before you can set up the IPSec tunnel between the Policy Distribution Point and the Policy Enforcement Point, you need to configure a tunnel template with the security settings to be used by the tunnel.

Cisco Secure Policy Manager is pre-configured with several tunnel templates. You can use one of the pre-configured templates as is, modify a pre-configured template to suit your needs, or create a new template.

"IPSec Tunnel Templates."

3. Create the IPSec Tunnel Groups

Cisco Secure Policy Managers uses tunnel groups to specify the tunnel peers and configuration (mesh or spoke-and-hub).

The Cisco Secure Policy Manager host is not part of the tunnel group for Policy Enforcement Point-to-Policy Enforcement Point tunnels.

"IPSec Tunnel Groups."

4. Configure the Policy Enforcement Points

For each Policy Enforcement Point, you must verify that the Policy Enforcement Point supports IPSec. Then, you must specify the level of DES supported by the Policy Enforcement Point and configure the certificate, associated certificate authority, or shared secret that the Policy Enforcement Points will use when negotiating an IKE tunnel.

"Configuring Policy Enforcement Points."

5. Obtain Certificate for each Policy Enforcement Point

If you are using IKE tunnels with certificates, you will need to obtain certificates for each Policy Enforcement Point. This is a two-step process:

      a. Configure the Policy Enforcement Point to obtain a certificate from the certificate authority (set up in Step 1, above). Because Cisco Secure Policy Manager supports several types of Policy Enforcement Point (such as the PIX Firewall, IOS with Firewall Feature Set, and hosts running the Cisco Secure VPN Client), you will need to refer to your Policy Enforcement Point documentation for information about obtaining a certificate.

      b. Grant the certificate to the router from the certificate authority. (This step depends upon the certificate server installed on your network. Refer to your certificate server's documentation for information about granting certificates.) Because Cisco Secure Policy Manager supports a variety of certificate authorities, you will need to refer to your certificate authority's documentation for information about granting a certificate.

Policy Enforcement Point Documentation

Certificate Authority Documentation

6. Create Policy

Although you have defined the tunnel parameters for each Policy Enforcement Point, you have not yet defined the services that will be routed through those tunnels. The final steps in the process are to create policies that route selected services through the tunnels, generate the device-specific command sets for those policies, and publish the command sets to the Policy Enforcement Points.

"IPSec Tunnel Policy."


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu May 25 13:37:52 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.