Best Practices For Deploying IPsec VPN
Except on the first page, right running head:
Heading1 or Heading1NewPage text (automatic)
797
Alcatel-Lucent
Beta
Beta
CLI Configuration Guide
IP
SEC
A
CCESS
C
ONTROL
IPsec access control happens after the device Authentication. As defined by the
IPsec standard, the networks, host, and ports that are allowed to traverse the
network are defined in the Security Policy Database or SPD. It is advisable to
have an inbound control list when configuring VPN for site-to-site traffic.
IP
SEC
IPsec provides numerous security features. The following are some features that
can be configured:
•
Device Authentication and credentials
•
Data Encryption
•
Data Integrity
•
SA aging
IPsec standard requires the use of either data integrity or data encryption. It is
recommended to have both data integrity and data encryption.
Data encryption is brought about by using algorithms, such as DES, 3-DES, AES-
128, AES-192, and AES-256. Most common deployments use 3-DES in place of
DES. The drawback of using 3-DES is the loss of performance. It is
recommended to use AES-128 than 3-DES as it improves upon the performance.
AES-128 is also widely accepted by the federal government of U.S. Reference to
the same can be found at the following site:
http://www.nist.gov/public_affairs/
releases/g01-111.htm
Data Integrity is brought about using HASH algorithms like MD5 and SHA-1. SHA-
1 is considered to be more secure than MD5 because of its greater bit strength.
SHA-1 uses 160- bit hash algorithm while MD5 uses only 128-bit. It is
recommended to use SHA-1 instead of MD-5.
Both the IPsec phases offer the ability to change the lifetime of a Security
Association. Lesser the lifetime more secure is the connection. But it has to be
kept in mind that if the lifetime is too small i.e for a few seconds, tunnel negotiation
would keep on happening without the tunnel being setup for the flow of data
traffic. Hence, it is recommended that SA lifetime is kept in the magnitude of
minutes/hours instead of seconds so that the data traffic is more than the control
traffic.
Perfect Forward Secrecy (PFS) generates a new key based on new seed material
altogether by carrying out DH group exponentiation every time a new quick-mode
SA needs new key generation. This option increases the level of the security but
also increases the processor overhead. Some of the VPN devices do provide an
option of not configuring PFS due to this reason. Enabling of PFS also depends
upon the sensitivity of the data being tunneled. If the data mandates higher
security, PFS can be enabled. The strength of Diffie-Hellman exponentiation is
configurable.
Содержание OmniAccess 700
Страница 38: ...Left running head Chapter name automatic 12 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 176: ...Left running head Chapter name automatic 150 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 224: ...Per VLAN Spanning Tree Left running head Chapter name automatic 198 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 258: ...Port Monitoring Left running head Chapter name automatic 232 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 260: ...Left running head Chapter name automatic 234 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 296: ...T1E1 Line Card Left running head Chapter name automatic 270 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 360: ...Point to Point Protocol Left running head Chapter name automatic 334 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 434: ...Left running head Chapter name automatic 408 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 462: ...Common Classifiers Left running head Chapter name automatic 436 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 464: ...Left running head Chapter name automatic 438 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 534: ...Border Gateway Protocol Left running head Chapter name automatic 508 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 638: ...Left running head Chapter name automatic 612 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 762: ...Filter and Firewall Left running head Chapter name automatic 736 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 890: ...Transparent Firewall Left running head Chapter name automatic 864 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 940: ...Left running head Chapter name automatic 914 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1000: ...Quality of Service Left running head Chapter name automatic 974 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1002: ...Left running head Chapter name automatic 976 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1044: ...DNS Domain Name Service Client Left running head Chapter name automatic 1018 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1046: ...Left running head Chapter name automatic 1020 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1058: ...Left running head Chapter name automatic 1032 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1074: ...Lifeline Left running head Chapter name automatic 1048 Beta Beta CLI Configuration Guide Alcatel Lucent line con 0 end ...
Страница 1076: ...Left running head Chapter name automatic 1050 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1118: ...Web Cache Server Left running head Chapter name automatic 1092 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1120: ...Left running head Chapter name automatic 2 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1140: ...QoS Values and Mnemonics Left running head Chapter name automatic 22 Beta Beta CLI Configuration Guide Alcatel Lucent ...
Страница 1156: ...IPsec Interoperability of OA 700 Left running head Chapter name automatic 38 Beta Beta CLI Configuration Guide Alcatel Lucent ...