iscw module 3 lesson 6

28
© 2007 Cisco Systems, Inc. All rights reserved. ISCW-Mod3_L6 1 Implementing Secure Converged Wide Area Networks (ISCW)

Upload: trong-oganort-gampoula

Post on 19-Jan-2016

17 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 1

Implementing Secure Converged Wide Area Networks (ISCW)

Page 2: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 2

Module 3 – Lesson 6

Configuring High-Availability VPNs

Page 3: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 3

Module Introduction

Virtual private networks (VPNs) use advanced encryption techniques and tunneling to permit organisations to establish secure, end-to-end, private network connections over third-party networks such as the Internet

Cisco offers a wide range of VPN products, including VPN-optimised routers, PIX security and Adaptive Security Appliances (ASA), and dedicated VPN concentrators. These infrastructure devices are used to create VPN solutions that meet the security requirements of any organisation

This module explains fundamental terms associated with VPNs, including the IP Security protocol, and Internet Key Exchange. It then details how to configure various types of VPN, using various currently available methods

Page 4: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 4

Objectives

At the completion of this sixth lesson, you will be able to:

Describe various methods to provide high availability for IPsec VPNs

Explain the methods used to determine when VPN has failed

Configure systems to provide enhanced availability

Page 5: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 5

High Availability for IOS IPsec VPNs

IPsec-based VPNs provide connectivity between distant sites using an untrusted transport network

Network connectivity consists of links, devices, or paths across networks with unknown topologies. Any of these components can fail, making the VPN inoperable

IPsec VPNs that need high availability (HA) require redundancy in their design and implementation to survive failures

In this lesson, some of the techniques to provide HA will be investigated

Page 6: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 6

Failures

IPsec VPNs can experience any one of a number of different types of failures:

Access link failure

Remote peer failure

Intermediate device failure

Path failure

VPNs should be designed and implemented with redundancy and high-availability mechanisms to mitigate possible failures

Page 7: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 7

Redundancy

The next slide illustrates an implementation of IPsec in which maximum failover is configured. The duplication techniques must also be combined with high-availability mechanisms

Every component has been duplicated so that the solution will survive any possible single failure:

Two access links are used on both ends of the tunnel to mitigate a failure of any access link

The remote site is configured with two remote peers in case any one of the routers fails

Both sites use two VPN gateways to mitigate local device failures

Multiple independent paths are used between remote sites to mitigate an unknown failure anywhere in any of the paths

Page 8: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 8

Redundancy

Common solutions use one or more of these options:

•Two access links to mitigate access-link failures

•Multiple peers to mitigate peer failure

•Two local VPN devices to mitigate device failures

•Multiple independent paths to mitigate all path failures

Page 9: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 9

Failure Detection

The next slide illustrates the use of high-availability mechanisms to detect failures and reroute to secondary paths.

Failures in the IPsec path are typically detected using one of these two mechanisms:

Dead peer detection (DPD), which is a native IKE mechanism similar to the old proprietary IKE keepalives

Any routing protocol running across the IPsec tunnel will detect failures using the hello mechanism of the routing protocol

Detecting failures of local devices can be achieved by using the Cisco-proprietary Hot Standby Router Protocol (HSRP), Virtual Router Redundancy Protocol (VRRP) or Gateway Load Balancing Protocol (GLBP)

In each case, the failure of one routing device results in a second active routing device taking over with little interruption of traffic

Page 10: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 10

Failure Detection

Native IPsec uses DPD to detect failures in the path and remote peer failure.

Any form of GRE over IPsec typically uses a routing protocol to detect failures (hello mechanism).

HSRP is typically used to detect failures of local devices. VRRP and GLBP have similar failure-detection functionality.

Page 11: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 11

How DPD and Cisco IOS Keepalive Features Work

DPD and Cisco IOS keepalives function based on a timer (often configured for 10 seconds).

Cisco IOS keepalives are always transmitted while periodic DPD will only send keepalives when there is no traffic flowing.

The benefit of Cisco IOS keepalives and periodic DPD is earlier detection of dead peers.

However, Cisco IOS keepalives and periodic DPD rely on periodic messages that have to be sent frequently. The result is communicating peers must encrypt and decrypt more packets, and more traffic flows between peers.

Page 12: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 12

How DPD and Cisco IOS Keepalive Features Work

Rather than use periodic messaging, DPD defaults to an on-demand approach.

With on-demand DPD, messages are sent based on traffic patterns.

For example, if a router has to send outbound traffic and the liveliness of the peer is in question, the router sends a DPD message to query the status of the peer

If a router has no traffic to send, the router never sends a DPD message. If a peer is dead and the router never has any traffic to send to the peer, the router will not find out until the IKE or IPsec security association (SA) has to be renegotiated (the liveliness of the peer is unimportant if the router is not trying to communicate with the peer). However, if the router has traffic to send to the peer, and the peer does not respond, the router initiates a DPD message to determine the state of the peer.

Page 13: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 13

IPsec Backup Peer

DPD and IOS keepalive features can be used in conjunction with multiple peers in the crypto map to allow for stateless failover.

DPD allows the router to detect a dead IKE peer. When the router detects the dead state, the router deletes the IPsec and IKE SAs to the peer.

If multiple peers are configured, the router switches over to the next listed peer for a stateless failover.

Page 14: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 14

IPsec Backup Peer

One HA design option is to use native IPsec and its HA mechanisms:

DPD to detect failures

Backup peers to take over new tunnels when primary peer becomes unavailable

Page 15: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 15

DPD Configuration Example

Router will first try primary peer.

If primary peer is not available or becomes unavailable (DPD failure detection), the router tries backup peers in order as listed in the crypto map.

Page 16: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 16

‘crypto isakmp keepalive’ Command

crypto isakmp keepalive seconds [retries] [periodic | on-demand]

router(config)#

Seconds

Number of seconds between DPD messages; the range is from 10 to 3600 seconds. If you do not specify a time interval, you will receive an error message.

Retries

(Optional) Number of seconds between DPD retries if the DPD message fails; the range is from 2 to 60 seconds. If unspecified, the default is 2 seconds.

Periodic

(Optional) If periodic is included, DPD messages are sent at regular intervals.

On-demand

(Optional) The default behavior and the alternative to periodic messaging. DPD retries are sent only on demand. Note that because this option is the default, the on-demand keyword does not appear in configuration output.

Page 17: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 17

Hot Standby Routing Protocol (HSRP)

Hosts that do not support dynamic router discovery are typically configured with a default gateway (router)

Running a dynamic router discovery mechanism on every host may not be feasible for a number of reasons, including administrative overhead, processing overhead, security issues, or lack of a protocol implementation for some platforms

HSRP provides failover services to these hosts

HSRP is not part of the IPsec or VPN suite of protocols.

HSRP simply provides the basis for more resilient and reliable VPN design.

Page 18: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 18

Hot Standby Routing Protocol (HSRP)

With HSRP, a set of routers work together to present the illusion of a single virtual router to the hosts on the LAN

This set of routers is called an HSRP group or a standby group

HSRP selects a single router from the group that is responsible for forwarding the packets that hosts send to the virtual router

This router is known as the active router

Another router is designated as the standby router

In the event that the active router fails, the standby router assumes the packet-forwarding duties of the active router. Although an arbitrary number of routers may run HSRP, only the active router forwards the packets that are sent to the virtual router

Page 19: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 19

HSRP

HSRP can be used at:

Head-end: Two head-end IPsec devices appear as one device to remote peers.

Remote site: Two IPsec gateways appear as one gateway to local devices.

Active HSRP device uses a virtual IP and MAC address.

Standby HSRP device takes over virtual IP and MAC address when active HSRP device goes down.

Page 20: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 20

HSRP for Default Gateway at Remote Site

All remote devices use virtual IP as the default gateway.

The backup router is only used when the primary router is down.

Page 21: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 21

HSRP for Head-End IPsec Routers

Remote sites peer with virtual IP address (HSRP) of the head-end.

RRI or HSRP can be used on the inside interface to ensure a proper return path.

Page 22: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 22

IPsec Stateful Failover

IPsec VPNs using DPD, HSRP, or IGPs to mitigate failures only provide stateless failover

IPsec stateful failover requires:• Identical hardware and software configurations of IPsec on the

active and standby device• Exchange of IPsec state between the active and standby

device (that is, complete SA information)

Page 23: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 23

IPsec Stateful Failover

Deploying stateful failover for IPsec has restrictions

1. Identical Cisco IOS images are needed.2. Only selected VPN accelerators can be used.3. Intrachassis failover is not supported.4. Inside and outside interfaces must be connected on a

LAN.5. Load balancing is not supported.6. L2TP is not supported.7. IKE keepalives are not supported.8. IPsec idle timers are not supported. 9. A stateful failover crypto map applied to a VRF

interface is not supported. 10. Not compatible or interoperable with the SSP

Page 24: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 24

IPsec Stateful Failover and SSO

IPsec stateful failover works in combination with HSRP and stateful switchover (SSO)

SSO is responsible for synchronising ISAKMP and the IPsec SA database between the HSRP active and standby routers

Reverse Route Injection (RRI) is optionally used to inject the routes into the internal network

Page 25: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 25

IPsec Stateful Failover Example

Configure IPsec to exchange state information between head-end devices.

Enable stateful redundancy.

Page 26: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 26

Using an IPsec VPN to Back Up a WAN Connection

IPsec VPNs can be used as cost-effective and fast backups for an existing WAN.

Switchover options:

Using an IGP (for example, GRE over IPsec or VTI):

Use IGP metrics to influence primary path selection.

Optionally, use HSRP to track PVC status on remote site.

Using floating static routes for VPN destinations

Page 27: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 27

Using an IPsec VPN to Back Up a WAN Connection

IGP used to detect PVC failures

Reroute to GRE over IPsec tunnel

Example Using GRE over IPsec

Page 28: ISCW Module 3 Lesson 6

© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L6 28