Virtual Tunnel Interface

Similar documents
Virtual Tunnel Interface

Configuration of an IPSec VPN Server on RV130 and RV130W

VPN Ports and LAN-to-LAN Tunnels

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Firepower Threat Defense Site-to-site VPNs

How to Configure a Site-to-Site IPsec IKEv1 VPN Tunnel

Configuring VPNs in the EN-1000

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

VPNC Scenario for IPsec Interoperability

VNS3 IPsec Configuration. VNS3 to Cisco ASA ASDM 9.2

How to Configure an IKEv1 IPsec VPN to an AWS VPN Gateway with BGP

How to Configure BGP over IKEv2 IPsec Site-to- Site VPN to an Google Cloud VPN Gateway

How to Configure a Site-To-Site IPsec VPN to the Amazon AWS VPN Gateway

Configuring a Hub & Spoke VPN in AOS

Configuring LAN-to-LAN IPsec VPNs

IPSec VPN Setup with IKE Preshared Key and Manual Key on WRVS4400N Router

How to Configure an IPsec VPN to an AWS VPN Gateway with BGP

Sample excerpt. Virtual Private Networks. Contents

LAN-to-LAN IPsec VPNs

Table of Contents 1 IKE 1-1

Integration Guide. Oracle Bare Metal BOVPN

Configuring VPN from Proventia M Series Appliance to Proventia M Series Appliance

Configuring VPN from Proventia M Series Appliance to NetScreen Systems

IKE and Load Balancing

How to Configure Forcepoint NGFW Route-Based VPN to AWS with BGP TECHNICAL DOCUMENT

Google Cloud VPN Interop Guide

Cradlepoint to Palo Alto VPN Example. Summary. Standard IPSec VPN Topology. Global Leader in 4G LTE Network Solutions

Quick Note 65. Configure an IPSec VPN tunnel between a TransPort WR router and an Accelerated SR router. Digi Technical Support 7 June 2018

VNS3 to Windows RRAS Instructions. Windows 2012 R2 RRAS Configuration Guide

VPN Auto Provisioning

Virtual Private Network. Network User Guide. Issue 05 Date

Virtual Private Networks

Configuring IPSec tunnels on Vocality units

The EN-4000 in Virtual Private Networks

Service Managed Gateway TM. Configuring IPSec VPN

Set Up a Remote Access Tunnel (Client to Gateway) for VPN Clients on RV016, RV042, RV042G and RV082 VPN Routers

Configuring Easy VPN Services on the ASA 5505

Configuring Security for VPNs with IPsec

Configuring VPN from Proventia M Series Appliance to Symantec 5310 Systems

Security for VPNs with IPsec Configuration Guide, Cisco IOS XE Release 3S

How to Configure an IKEv1 IPsec Site-to-Site VPN to the Static Microsoft Azure VPN Gateway

Cisco Exam Questions & Answers

Deploying the Barracuda Link Balancer with Cisco ASA VPN Tunnels

Configuring WAN Backhaul Redundancy

Quick Note. Configure an IPSec VPN tunnel between a Digi TransPort LR router and a Digi Connect gateway. Digi Technical Support 20 September 2016

Internet Key Exchange

Configuration Guide. How to connect to an IPSec VPN using an iphone in ios. Overview

Case 1: VPN direction from Vigor2130 to Vigor2820

Deploying VPN IPSec Tunnels with Cisco ASA/ASAv VTI on Oracle Cloud Infrastructure

How to Configure an IPsec Site-to-Site VPN to a Windows Azure VPN Gateway

Internet. SonicWALL IP Cisco IOS IP IP Network Mask

Defining IPsec Networks and Customers

Proxy Protocol Support for Sophos UTM on AWS. Sophos XG Firewall How to Configure VPN Connections for Azure

Efficient SpeedStream 5861

How to Configure a Route-Based VPN Between Azure and a Forcepoint NGFW TECHNICAL DOCUMENT

Managing Site-to-Site VPNs: The Basics

Configuring IPsec and ISAKMP

FAQ about Communication

Internet security and privacy

Virtual Private Network

Overview of the IPsec Features

Configuration of Shrew VPN Client on RV042, RV042G and RV082 VPN Routers through Windows

Packet Tracer - Configure and Verify a Site-to-Site IPsec VPN Using CLI

IPsec and ISAKMP. About Tunneling, IPsec, and ISAKMP

IPsec and ISAKMP. About Tunneling, IPsec, and ISAKMP

VPN Overview. VPN Types

IPSec Site-to-Site VPN (SVTI)

Configuring a VPN Using Easy VPN and an IPSec Tunnel, page 1

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN

Service Managed Gateway TM. How to Configure and Debug Generic Routing Encapsulation (GRE)

IOS/CCP: Dynamic Multipoint VPN using Cisco Configuration Professional Configuration Example

Hillstone IPSec VPN Solution

IKE. Certificate Group Matching. Policy CHAPTER

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

Site-to-Site VPN. VPN Basics

Windows 2000 Pre-shared IKE Dialup VPN Setup Procedures

VMware Cloud on AWS Networking and Security. 5 September 2018 VMware Cloud on AWS

A. Verify that the IKE gateway proposals on the initiator and responder are the same.

Pre-Fragmentation for IPSec VPNs

Network Security - ISA 656 IPsec IPsec Key Management (IKE)

Network Security CSN11111

Junos Security. Chapter 8: IPsec VPNs Juniper Networks, Inc. All rights reserved. Worldwide Education Services

Google Cloud VPN Interop Guide

BiGuard C01 BiGuard VPN Client Quick Installation Guide (BiGuard series VPN enabled devices) Secure access to Company Network

PPTP Server: This guide will show how an IT administrator can configure the VPN-PPTP server settings.

ASA-to-ASA Dynamic-to-Static IKEv1/IPsec Configuration Example

Application Note 11. Main mode IPSec between a Windows 2000 / XP (responder) and a Digi Transport Router (initiator)

IP Security II. Overview

Chapter 6 Virtual Private Networking

ZyWALL 70. Internet Security Appliance. Quick Start Guide Version 3.62 December 2003

IPSec Transform Set Configuration Mode Commands

DFL-210, DFL-800, DFL-1600 How to setup IPSec VPN connection with DI-80xHV

IPSec Transform Set Configuration Mode Commands

ASA 8.x/ASDM 6.x: Add New VPN Peer Information in an Existing Site-to-Site VPN using ASDM

Chapter 5 Virtual Private Networking

Lab - Configuring a Site-to-Site VPN Using Cisco IOS and CCP

How to Configure IPSec Tunneling in Windows 2000

Virtual Private Cloud. User Guide. Issue 03 Date

Chapter 8 Lab Configuring a Site-to-Site VPN Using Cisco IOS

Release Notes. NCP Android Secure Managed Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3.

Transcription:

This chapter describes how to configure a VTI tunnel. About s, on page 1 Guidelines for s, on page 1 Create a VTI Tunnel, on page 2 About s The ASA supports a logical interface called (VTI). As an alternative to policy based VPN, a VPN tunnel can be created between peers with s configured. This supports route based VPN with IPsec profiles attached to the end of each tunnel. This allows dynamic or static routes to be used. Egressing traffic from the VTI is encrypted and sent to the peer, and the associated SA decrypts the ingress traffic to the VTI. Using VTI does away with the requirement of configuring static crypto map access lists and mapping them to interfaces. You no longer have to track all remote subnets and include them in the crypto map access list. Deployments become easier, and having static VTI which supports route based VPN with dynamic routing protocol also satisfies many requirements of a virtual private cloud. Guidelines for s IPv6 IPv6 is not supported. General Configuration Guidelines VTIs are only configurable in IPsec mode. To terminate GRE tunnels on an ASA is unsupported. You can use dynamic or static routes for traffic using the tunnel interface. The MTU for VTIs is automatically set, according to the underlying physical interface. VTI supports IKEv1 and uses IPsec for sending and receiving data between the tunnel's source and destination. 1

Create a VTI Tunnel If Network Address Translation has to be applied, the IKE and ESP packets will be encapsulated in the UDP header. IKE and IPsec security associations will be re-keyed continuously regardless of data traffic in the tunnel. This ensures that VTI tunnels are always up. Tunnel group name must match what the peer will send as its IKEv1 identity. For IKEv1 in LAN-to-LAN tunnel groups, you can use names which are not IP addresses, if the tunnel authentication method is digital certificates and/or the peer is configured to use aggressive mode. VTI and crypto map configurations can co-exist on the same physical interface, provided the peer address configured in the crypto map and the tunnel destination for the VTI are different. By default, all traffic through VTI is encrypted. There are no security level configurations for VTI interfaces. Access list can be applied on a VTI interface to control traffic through VTI. Only BGP is supported over VTI. Context Mode Supported in single mode only. Firewall Mode Supported in routed mode only. Create a VTI Tunnel To configure a VTI tunnel, create an IPsec proposal (transform set). You will need to create an IPsec profile that references the IPsec proposal, followed by a VTI interface with the IPsec profile. Configure the remote peer with identical IPsec proposal and IPsec profile parameters. SA negotiation will start when all tunnel parameters are configured. Note For the ASA which is a part of both the VPN VTI domains, and has BGP adjacency on the physical interface: When a state change is triggered due to the interface health check, the routes in the physical interface will be deleted until BGP adjacency is re-established with the new active peer. This behavior does not apply to logical VTI interfaces. Step 3 Add an IPsec Proposal (Transform Sets). Add an IPsec Profile. Add a VTI Tunnel. 2

Add an IPsec Proposal (Transform Sets) Add an IPsec Proposal (Transform Sets) A transform set is required to secure traffic in a VTI tunnel. Used as a part of the IPsec profile, it is a set of security protocols and algorithms that protects the traffic in the VPN. Before you begin You can use either pre-shared key or certificates for authenticating the IKEv1 session associated with a VTI. You must configure the pre-shared key under the tunnel group used for the VTI. For certificate based authentication using IKEv1,you must specify the trustpoint to be used at the initiator. For the responder, you must configure the trustpoint in the tunnel-group command. Choose Configuration > Site-to-Site VPN > Advanced > IPsec Proposals (Transform Sets). In the IKEv1 IPsec Proposals (Transform Sets) panel, click Add. VTI supports IKEv1 only. a) Enter the Set Name. b) Retain the default selection of the Tunnel check box. c) Select ESP Encryption and ESP Authentication. d) Click OK. Add an IPsec Profile An IPsec profile contains the required security protocols and algorithms in the IPsec proposal or transform set that it references. This ensures a secure, logical communication path between two site-to-site VTI VPN peers. Step 3 Step 4 Step 5 Step 6 Step 7 Choose Configuration > Site-to-Site VPN > Advanced > IPsec Proposals (Transform Sets). In the IPsec Profile panel, click Add. Enter the IPsec profile Name. Enter the IKE v1 IPsec Proposal created for the IPsec profile. If you need an end of the VTI tunnel to act only as a responder, check the Responder only check box. You can configure one end of the VTI tunnel to perform only as a responder. The responder-only end will not initiate the tunnel or rekeying. (Optional) Check the Enable security association lifetime check box, and enter the security association duration values in kilobytes and seconds. (Optional) Check the PFS Settings check box to enable PFS, and select the required Diffie-Hellman Group. 3

Add a VTI Interface Perfect Forward Secrecy (PFS) generates a unique session key for each encrypted exchange. This unique session key protects the exchange from subsequent decryption. To configure PFS, you have to select the Diffie-Hellman key derivation algorithm to use when generating the PFS session key. The key derivation algorithms generate IPsec security association (SA) keys. Each group has a different size modulus. A larger modulus provides higher security, but requires more processing time. You must have matching Diffie-Hellman groups on both peers. This establishes the strength of the of the encryption-key-determination algorithm. The ASA uses this algorithm to derive the encryption and hash keys. Step 8 Step 9 0 Click OK. In the IPsec Proposals (Transform Sets) main panel, click Apply. In the Preview CLI Commands dialog box, click Send. Add a VTI Interface To create a new VTI interface and establish a VTI tunnel, perform the following steps: Note Implement IP SLA to ensure that the tunnel remains up when a router in the active tunnel is unavailable. See Configure Static Route Tracking in the ASA General Operations Configuration Guide in http://www.cisco.com/ go/asa-config. Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 0 Choose Configuration > Device Setup > Interface Settings > Interfaces. Choose Add > VTI Interface. The Add VTI Interface window appears. In the General tab, enter the VTI ID. This can be any value from 0 to 100. Up to 100 VTI interfaces are supported. Note If you will be migrating configurations from other devices to ASA 5506 devices, use the tunnel ID range of 1-100. This is to ensure compatibility of tunnel range of 1-100 available in ASA 5506 devices. Enter the Interface Name. Ensure the Enable Interface checkbox is checked. Enter the source IP Address of the tunnel and the Subnet Mask. Click the Advanced tab. All the fields need to have valid values or selections for the tunnel to be displayed in the VPN Wizard. Enter the Destination IP address. Select the Source Interface. Select the IPsec profile in the Tunnel Protection with IPsec Profile field. Check the Ensure the Enable Tunnel Mode IPv4 IPsec check box. 4

Add a VTI Interface 1 2 3 Click OK. In the Interfaces panel, click Apply. In the Preview CLI Commands dialog box, click Send. After the updated configuration is loaded, the new VTI appears in the list of interfaces. This new VTI can be used to create an IPsec site-to-site VPN. 5

Add a VTI Interface 6