CISSP Infographics: Cryptography Part-2
December 19, 2021




FACT SHEET – VPN IPSEC (Cisco based)
Key IPSec negotiation protocol
IPSec Negotiation process
Interesting traffic decision
IKE Phase1
IKE phase2
Designing IKE phase1 (IKE phase 1 focuses on establishing authentication and a secure tunnel for IKE phase2 exchange)
| Side A IKE1 Parameters | Side B IKE1 Parameters | ||
| Encryption | AES-128 | Encryption | AES-128 |
| Hashing | SHA-1 | Hashing | SHA-1 |
| Authentication | Pre-Shared | Authentication | Pre-Shared |
| DH Level | 2 | DH Level | 2 |
| Lifetime | 86400 | Lifetime | 86400 |
Designing IKE Phase2 policy (IKE2 focuses on establishing secure IPSec tunnel for data transfer).
Required elements
| Side A IKE2 Parameters | Side B IKE2 Parameters | ||
| Encryption | ESP-AES | Encryption | ESP-AES |
| Hashing | ESP-SHA-HMAC | Hashing | ESP-SHA-HMAC |
Enable ISAKMP: Router(config)#crypto isakmp enable Create ISAKMP Policy: Router(config)#crypto isakmp policy <1-10000> Router(config)#crypto isakmp policy 100
Router(config-isakmp)#encryption aes 128
Router(config-isakmp)#authentication pre-share
Router(config-isakmp)#group 2
Router(config-isakmp)#hash sha
Configure ISAKMP Identity: Router(config)#crypto isakmp identity <address/hostname>
Configure pre-shared keys: Router(config)#crypto isakmp key <key> address <remote_ip>
IKE2 Configurations.
Create transform sets: Router(config)#crypto ipsec transform-set <name> <methods> Router(config)#crypto ipsec transform-set TEST esp-aes 128 esp-sha-hmac (optional) Configure IPSec lifetime: : Router(config)#crypto ipsec <seconds/kilobytes> <value> Create mirrored ACLs defining traffic to be encrypted and the traffic expected to be received encrypted Set up IPSec crypto-map: Router(config)#crypto isakmp map <name> <seq> ipsec-isakmp Router(config)#crypto map TESTING 100 ipsec-isakmp Router(config-crypto-map)#match address <acl> Router(config-crypto-map)#set peer <remote_ip> Router(config-crypto-map)#set pfs <group1/2/5> Router(config-crypto-map)#set transform-set <set>
Verification commands
Image: http://ccnabolivia.blogspot.com/2016/12/como-configurar-vpn-ipsec-site-to-site.html?spref=pi