Select Page

IPsec VPN Dynamic Crypto Map With RRI, X-Auth

by | 4-May-2021 | Cisco, Security, VPN

(1) Routing Consideration in Dynamic Crypto Maps

Underlay’s control plane packets shouldn’t go inside IPsec Tunnel

  • These control plane packets need to be explicitly denied first on Crypto ACL
  • So they will not encrypted/dropped unnecessarily

 

RRI (Reverse Route Injection)

  • Feature to dynamically inject routes on dynamic crypto map endpoints
    • From remote endpoints into IPsec VPN gateways’s routing table
    • Which can subsequently be redistributed into IGP domain
  • Benefits
    • To keep the routing table size manageable
    • Scale the IGP of an IPsec VPN implementation

 

RRI and Dynamic Crypto Maps illustration (Figure 1)

  • 155.0.0.0/8 attempts to connect to 100.0.0.0 via default route towards R2
  • R2 sees the traffic, successfully matches it against its crypto ACL
    • Initiates ISAKMP SA negotiation
  • R1 receives the request and finds a matched configured ISAKMP
    • Creates a temporary crypto map entry
    • IKE negotiation continue until finishing Phase 2 SA
  • R1 uses RRI to dynamically inject route “155.0.0.0/8 via Tu11” into its routing table
    • Redistribute the route into IGP
  • No need for routing protocol adjacency between R1 and R2
    • 155.0.0.0/8 network use default route to reach 100.0.0.0/8
    • 100.0.0.0/8 network use redistributed RRI route to reach 155.0.0.0/8

(2) Security Consideration in Dynamic Crypto Maps

Peering restriction and traffic flow restriction

  • By default, dynamic crypto maps allow
    • Peering sessions from any peer IP address
    • All traffic to be protected by IPsec
  • Both of these areas can be secured by
    • Restricting peering sessions
    • Restricting traffic using dynamic crypto map ACLs

 

Key administration and scalability of dynamic crypto map authentication

  • Using preshared key
    • Difficult to scale and maintain unique key for each peer
  • Using wildcard preshared key
    • Present a security risk
  • IKE X-Auth in conjunction with radius AAA server
    • Highly scalable, centralized credential database
    • More secure than wildcard preshared key

 

X-Auth (Extended Authentication)

IKE X-Auth negotiation occurs in IKE Phase 1.5

  • After an IKE Phase 1 SA has been created
    • Doesn’t replace IKE itself, but an additional to it
  • Before IKE Phase 2 start

 

IKE Phase 1 using X-Auth illustration (Figure 2)

  • R2 initiates IKE Phase 1 negotiation
  • R1 responds IKE Phase 1 negotiation until finishing IKE Phase 1 SA
  • R1 sends a radius access-request message to the AAA server
  • AAA server responds with either an access-accept or access-reject message
    • Depends on peer authentication is success or not
  • If successfully authenticated, R1 install a temporary crypto map entry
  • R1 & R2 continue to negotiate IKE Phase 2

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *