Hi All
Doses any know if you can configure BGP to run over a crypto map ipsec tunnel
Hi All
Doses any know if you can configure BGP to run over a crypto map ipsec tunnel
Sorry
I meant, does anyone know if you can run a bgp session over an crypto map ipsec tunnel ( itās 3:30 am and iām really for bed )
Thatās no problem at all.
Hi Rene,
I have couple of doubts. Can I have your attention to get this reply.
Site to Site Tunnel is established properly between Site A and Site B. Both the Phases 1 & 2 is established properly. Both the site can ping each other nicely.
Now, Scenario 1> Site A traffic cannot be decrypted at Site B -> What could be the possible reasons?
Scenario 2> Site A traffic cannot be encrypted -> What could be the possible reasons?
Scenario 3> from Site A to Site B traffic is passing slowly -> What could be the possible reasons?
Thanks,
Manami
Hi Manami,
With the sites being able to ping each other. Do you mean you can ping each otherās public IP address or are you able to ping from LAN to LAN?
If you have issues with packets that are not getting encrypted and/or decrypted. There are three things to check first:
* Routing: make sure each know how to reach the remote subnet.
* ACLs: make sure you have the correct ACL to match traffic from LAN1 to LAN2.
* NAT: make sure traffic between LAN1 and LAN2 doesnāt get translated by NAT, you need to make exemptions for this.
Assuming itās not related to interfaces / ISP issues, slow IPSec traffic usually boils down to:
* Fragmentation: check your MTU.
* CPU Load: some lower end devices donāt support much IPSec throughput.
Hi Rene,
What is the different between checksum and hashing algorithm ( MD5 or SHA ) which both of them used for integrity ??
Hello Hussein
A checksum such as CRC for example, is used to detect errors in data by creating a ārelativelyā unique result to an algorithm applied to a set of data. Remarkably enough, a checksum is really just another word for a hash function. Their purposes are essentially the same.
Now MD5 and SHA on the other hand are cryptographic hash functions. Cryptographic hash functions aim to guarantee a number of security properties. Most importantly, that itās hard to find multiple data sets that produce the same output and that the output appears random. Cryptographic hash functions such as MD5 and SHA aim to provide not only data integrity, but also security. Such algorithms are usually much more involved and complex for this purpose than simple checksum algorithms.
I hope this has been helpful!
Laz
Thanks Laz that was helpful.
Hi Rene,
I understand that Diffie-Hellman is not used to encrypt and decrypt the data but rather used to generate the keys. Here I read 3 terms in DH process
Suppose I have a data. I will encrypt it using 3DES algorithm. Is Public_Key generated in DH, used to lock the encrypted data and Private_Key to unlock.
If Public_Key and Private_Key is used to lock and unlock the data, then what is the Shared Secret Key? Where this key is used?
I am trying to understand the actual difference between the encryption algorithm and DH process.
Hi,
What Is nat traversal and story of SIP
Thanks
Hello Bharath
Specifically the Diffie-Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.
The following elements are used for the DH process:
An excellent explanation using colours can be found at this link which should clarify any questions you may have.
I hope this has been helpful!
Laz
Hello Sims
Using SIP across a NAT router can be quite complex. The sessions SIP establishes can easily be disrupted or blocked by NAT and can often result in phenomena such as one way voice, no way voice and unsuccessful session initiation.
There are various solutions and traversal mechanisms available that will solve these issues. A good place to start is RFC6314 by the IETF that provides concrete recommendations for SIP NAT traversal.
I hope this has been helpful!
Laz
Great article Rene.
Just wondered if you could explain this:
Initiation: something has to trigger the creation of our tunnels. For example when you configure IPsec on a router, you use an access-list to tell the router what data to protect. When the router receives something that matches the access-list, it will start the IKE process. Itās also possible to manually initiate the tunnel.
How can you manually initiate the tunnel, without any interesting traffic?
Hello Chris,
Iām trying to recall exactly what I had in mind when I wrote this article
On Cisco IOS, I donāt think you canā¦on the ASA however, it is possible. If you use the packet tracer command with a source/destination that matches your VPN ACL, it will be used as a trigger to initiate the IPSec tunnel.
Rene
Hello @ReneMolenaar
I have one question:
Why, in topic have 2 section i think confuse:
And:
2. "IKEv2 doesnāt have a main or aggressive mode for phase 1 and thereās no quick mode in phase 2. It still has two phases though, phase 1 is called the IKE_SA_INIT and the second phase is called IKE_AUTH. Only four messages are required for the entire exchange. "
ā1ā You write IKEv2 have quick mode
ā2ā You write IKEv2 no quick mode
@@
Thank @ReneMolenaar
Hello Nguyen
I can understand your confusion. The first comment was that
IKE phase 2 tunnel uses only one mode which is called quick mode.
Here Rene is referring to IKEv1.
In the next statement, he says that IKEv2 (unlike IKEv1) does not have quick mode. So this is basically a difference between IKEv1 and IKEv2 that he is highlighting.
I will let Rene know so that maybe he can make it a little clearer that in the first case he is referring to IKEv1.
Thanks very much for your feedback and I hope this has been helpful!
Laz
Hi Team,
Is Main mode and Tunnel mode default ? and how can we change the modes to Aggressive mode and Transport mode ?
Hello Aniket
Tunnel mode is the default mode for an IPSec tunnel. Similarly, main mode is the default for IKE phase 1 authentication.
If you want to change them, you can do so. The following two links show examples of how these are configured. The first shows transport mode:
The second shows aggressive authentication mode on page 3 of the document:
I hope this has been helpful!
Laz
Thanks a lot Lazā¦As always
Hi Rene,
Thanks for the wonderful explanation on IPSec.
I would appreciate if you could explain a bit about MD5 as to why we are saying MD5 Authentication in Phase-1 and MD5 Hashing in Phase-2 ?
Being a newbie in security world, I couldnāt figure out when we label MD5 as an authentication thing and when an integrity thing ?