IPsec VPN With DVTI (Cisco EEzVPN)
IPsec VPN with DVTI Overview
IPsec VTI (Virtual Tunnel Interfaces)
- IPsec deployment that allow you to configure a virtual interface to which you can apply features
- Features: NAT, ACLs, QoS, NetFlow, VRF, etc.
- Features for clear-text packets are applied on the VTI
- Features for encrypted packets are applied on the phyiscal outside interface
- There are 2 types of VTI interfaces:
- Static VTI (SVTI): used for site-to-site IPsec VPN
- Dynamic VTI (DVTI): mainly used for remote-access SSL/IPsec VPN
IPsec VPN with DVTI (Dynamic VTI)
- A.k.a Enhanced EzVPN (EEzVPN)
- Configure virtual-template on the head-end (as a Crypto listener)
- Dynamically instantiated IPsec Virtual-Access interface (not configurable, cloned from virtual-template)
- Created on an incoming IPsec tunnel request
- Interface state tied to underlying crypto socket state (IPsec SA)
- Can support multiple IPsec SAs per DVTI
- While SVTI support only a single IPsec SA per VTI (always “IP any any”)
- DVTI uses auto-RRI to further simplify the routing configurations
DVTI Overview
DVTI benefits
- Provide highly secure and scalable connectivity for remote-access VPN
- Dynamic hub-and-spoke method for establishing IPsec VPN tunnels
- Eliminates crypto maps, crypto ACLs, and GRE encapsulation (if used)
- Requires minimal configuration, a single virtual template can be configured and cloned
- Tunnel-specific features can be applied
- NAT, ACLs, QoS, NetFlow, VRF, dynamic routing
- Integrated with Cisco EEzVPN Solution
- Support per-group and per-user attributes on EEzVPN servers
- Enhanced EzVPN server: crypto isakmp profile, crypto ipsec profile, interface Virtual-Template1
- Enhanced EzVPN remote: interface Virtual-Template1
- Also integrated with Cisco VPN Client, and legacy EzVPN remote
- DVTI can also be used in site-to-site scenarios
- HUB is using DTVI, Spokes can be using SVTI or crypto map
Per-User Attribute Support for EzVPN Servers
- Local EzVPN AAA server
- Applied at the group level or at the user level using the CLI
- Example: attribute type inacl “per-group-acl” service ike protocol ip mandatory
- Remote EzVPN AA server
- Applied using Cisco RADIUS AV pairs
- Supported per-user attributes: inacl, interface-config, outacl, route, policy-route, prefix, …
- Format: cisco-avpair= “<protocol:attribute> <sep> <value>”
- Example: cisco-avpair = “ip:outacl#101=permit tcp any any established”
0 Comments