248
MDS Orbit MCR/ECR Technical Manual
MDS 05-6632A01, Rev. F
The first part, IKE, is the initial negotiation phase, where the Orbit device and VPN gateway agree on
which methods will be used to provide security for the underlying IP traffic. There are two IKE protocol
versions: IKE-v1 and IKE-v2. These are not compatible with each other. The IKE-v2 is more efficient
and therefore should be preferred for new deployments. The MCR supports IKE-v1 and IKE-v2.
The other part is the actual IP data being transferred, using the encryption and authentication methods
agreed upon in the IKE negotiation. This is accomplished by using IPsec protocols like Encapsulating
Security Payload (ESP) or Authentication Header (AH). Orbit MCR only supports ESP protocol as it
provides both encryption and authentication of the data. The AH protocol provides only data
authentication.
The process of IPsec VPN connection establishment consists of following phases:
IKE Phase-1 (IKE security negotiation)
-
IKE authenticates IPSec peers and negotiates IKE Security Association (SAs) during this
phase, setting up a secure channel for negotiating IPSec SAs in phase 2
IKE Phase-2 (IPsec Security Association)
-
IKE negotiates IPSec SA parameters and sets up matching IPSec SAs in the peers
Data Transfer
-
Data is transferred between IPSec peers based on the IPSec parameters and keys stored in the
SA database
Both the IKE and the IPsec connections have limited lifetimes. These lifetimes prevent a connection from
being used too long, which is desirable from a cryptanalysis perspective.
The IPsec lifetime is generally shorter than the IKE lifetime. This allows for the IPsec connection to be
re-keyed simply by performing another phase-2 negotiation.
Configuration
Site-to-Site IPsec VPN Configuration
The Figure 3-166 below shows a site-to-site policy-based IPsec VPN setup to securely connect remote
private network (LAN or WiFi) with the customer’s backoffice/data center private network. This enables
IP traffic from/to devices connected to either LAN, WiFi or Serial port of the Orbit to securely flow
to/from back-office applications via a secure tunnel through a public cellular network. The tunneled
application traffic is authenticated and encrypted to protect from eavesdropping, tampering and replay
attacks.
Summary of Contents for MDS ORBIT ECR
Page 15: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 15 ...
Page 35: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 35 ...
Page 145: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 145 ...
Page 188: ...188 MDS Orbit MCR ECR Technical Manual MDS 05 6632A01 Rev F ...
Page 302: ...302 MDS Orbit MCR ECR Technical Manual MDS 05 6632A01 Rev F Figure 3 224 SNMP Main Page ...
Page 380: ...380 MDS Orbit MCR ECR Technical Manual MDS 05 6632A01 Rev F ...
Page 389: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 389 ...
Page 393: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 393 ...
Page 407: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 407 ...
Page 449: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 449 ...
Page 451: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 451 ...
Page 452: ...452 MDS Orbit MCR ECR Technical Manual MDS 05 6632A01 Rev F ...
Page 453: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 453 ...
Page 459: ...MDS 05 6632A01 Rev F MDS Orbit MCR ECR Technical Manual 459 NOTES ...
Page 460: ...460 MDS Orbit MCR ECR Technical Manual MDS 05 6632A01 Rev F ...
Page 461: ......