32
CCNA A d v ance Chap ter 6 Virtual Private Network - VPN

Chapter 6 - VPN - Part 2- IP Sec Configuring

Embed Size (px)

Citation preview

Page 1: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 1/32

CCNA Advance

Chapter 6

Virtual Private Network - VPN

Page 2: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 2/32

Configuring IPSec

Page 3: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 3/32

3

Tasks to Configure IPSec

Page 4: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 4/32

Task 1 – Prepare for IKE and IPSec

Page 5: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 5/325

Task 1.1: IKE Phase 1 Policy Example

Page 6: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 6/326

Task 1.2: IKE Phase 2 Policy Example

Page 7: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 7/327

Task 1.3 – Check Current Configuration

Page 8: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 8/32

8

Task 1.4 – Ensure The Network Works

Page 9: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 9/32

9

Task 1.5 – Ensure ACLs are Compatible

with IPSec

Page 10: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 10/32

Task 2 – Configuration IKE

Page 11: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 11/32

11

Task 2.1, 2.2– Enable IKE, create policy

Task 2.1

Task 2.2

T k 2 2 C t IKE P li i

Page 12: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 12/32

12

Task 2.2 – Create IKE Policies

with The crypto isakmp Command

Page 13: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 13/32

13

Task 2.3 – Configure ISAKMP Identity

• IPSec peers authenticate each other during ISAKMP

negotiations using the preshared key and the ISAKMP

identity.

• The identity can either be the router IP address or hostname.

• Cisco IOS software uses the IP address identity method by

default.

Page 14: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 14/32

14

Task 2.4 – Configure Pre-shared Keys

Page 15: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 15/32

15

Task 2.4 – Configure Pre-shared Keys

Rout er A( conf i g) #crypto isakmp key cisco1234 address 172.30.2.2Rout er A( conf i g) #crypto isakmp policy 110Rout er A( conf i g- i sakmp) #hash md5Rout er A( conf i g- i sakmp) #authentication pre-share

Rout er B( conf i g) #crypto isakmp key cisco1234 address 172.30.2.1Rout er B( conf i g) #crypto isakmp policy 110Rout er B( conf i g- i sakmp) #hash md5Rout er B( conf i g- i sakmp) #authentication pre-share

Page 16: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 16/32

16

Task 2.5 – Verify IKE Configuration

Page 17: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 17/32

Task 3 – Configure IPSec

Page 18: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 18/32

18

Task 3 – Configure IPSec

Task 3 1 Configure Transform Set

Page 19: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 19/32

19

Task 3.1 – Configure Transform Set

Suites

 A transform set defines the type of authentication,

integrity, and payload encryption you will use for your VPN

tunnel.

Page 20: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 20/32

20

Task 3.1 - Transform Set Negotiation

Task 3 2 Configure Global IPSec Security

Page 21: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 21/32

21

Task 3.2 – Configure Global IPSec Security

 Association Lifetimes (Optional)

Page 22: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 22/32

22

Task 3.2 - Purpose of Crypto ACLs

Task 3 3 – Create Crypto ACLs using

Page 23: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 23/32

23

Task 3.3 Create Crypto ACLs using

Extended Access Lists

Task 3 3 - Configure Symmetrical Peer

Page 24: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 24/32

24

Task 3.3 Configure Symmetrical Peer

Crypto Access Lists

Symmetrical Peer Crypto Access Lists MUST be done

T k 3 3 P f C t M

Page 25: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 25/32

25

Task 3.3 - Purpose of Crypto Maps

T k 3 3 C t M P t

Page 26: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 26/32

26

Task 3.3 - Crypto Map Parameters

Task 3.4 – Configure IPSec Crypto

Page 27: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 27/32

27

g yp

Maps

Task 3.4 – IPSec Crypto Maps

Page 28: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 28/32

28

yp p

Configuration Mode

Task 3.4 - Example Crypto Map

Page 29: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 29/32

29

p yp p

Commands

Task 3.5 – Apply Crypto Maps to

Page 30: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 30/32

30

pp y yp p

Interfaces

IPSec Configuration Summative

Page 31: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 31/32

31

g

Examples

Page 32: Chapter 6 - VPN - Part 2- IP Sec Configuring

8/16/2019 Chapter 6 - VPN - Part 2- IP Sec Configuring

http://slidepdf.com/reader/full/chapter-6-vpn-part-2-ip-sec-configuring 32/32

Question ?

Thank you !