Resource Page CIS 2153 Syllabus Chapter Lesson Notes: 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11
Chapter 7 Lesson Notes
Configuring and Troubleshooting IPSecElements of IPSec:
IPSec Terminology
- IP Sec terms are listed on pages 458-460 Know them.
Cryptography, or secret writing, dates back 4000 years to the origins of Egyptian hieroglyphics and Chinese ideographs.
Encryption developed in order to control access to information. Early communication was oral, which made it difficult to limit and direct information and keep it from eavesdroppers. When written language evolved, ways were found to disguise it in order to control who got what information (knowledge is power). .
Methods of encryption ranged over time from simple (transposing letters or changing the alphabetic sequence by a few letters, as shown in Table 7-1 on page 461) to the highly complex codes of today.
The more complex the algorithm/process/encryption is, the less vulnerable it is to hacking.
To solve "the code," one needs an algorithm, or secret key. When the same key is used to both encrypt and decrypt the data, it is a symmetric key encryption method.
The key is called a shared secret, which poses problems if you want to send data to more than one person. This introduced asymmetric encryption, which is popularly used in public key encryption.
Public key encryption uses these three methods:
The Diffie-Hellman algorithm creates a secret key between communicating pairs that is known only to them.
DES (Data Encryption Standard), the standard for the U.S. Government, is a widely used encryption method today that operates on 64-bit blocks of data. Triple DES processes each 64-bit block of data three times, which increases the complexity.
DES can be combined with CBC (Cipher Block Chaining), which prevents identical messages from looking the same.
IPSec is a collection of open standards and was developed by the Internet Task Force (IETF) to ensure secure IP network communication. These standards are changed through RFCs (Requests for Comments).
IPSec operates at the network layer of the OSI Model and remains transparent to protocols that lie above the transport layer.
Security Negotiation is responsible for ensuring that the sending and receiving computers use the same security method.
SAs define IPSec secured links between the following:
- remote nodes and the network
- two networks
- two computers on a LAN
Two types of SAs are possible:
A separate SA is used for outgoing and incoming messages, requiring at least two SAs for each IPSec connection.
An SPI tracks and uniquely identifies each SA.
Data Protection is handled in Windows 2000 through DES or the stronger triple DES (3DES). 3DES must be installed using the High Encryption Pack, and if the computer does not have the High Encryption Pack installed and receives a policy with 3DES settings, it will revert to DES.
IPSec Authentication methods include Kerberos v5, Public Key certificates, and preshared keys.
Default security type for Windows2000: computers that share this security method and belong to a trusted domain will use this method.
Using public keys and a trusted third party, individuals can be sure of communicating with the real party.
Predefined keys allow two parties to communicate authentically, but IPSec must be configured for this method to work.
The ISAKMP Service combines with session key protocols like Oakley, a leading key management method, to centralize the management of security associations, which reduces connection time. ISAKMP + Oakley = IKE (Internet Key Exchange)
The IPSec driver first checks the IP filter list in the policy that is active, then notifies the ISAKMP service to begin security negotiations.
IPSec Packet Handling involves the four steps found on page 477.
IPSec Filter Lists define IP addresses and types of IP traffic. This allows an administrator to define what filters to watch for. Each IP packet is checked against the filter list.
IP Filters include inbound filters (applied to incoming IP packets) and outbound filters (applied to those packets sent out onto the network). When the Filters list has a match, a security negotiation is triggered. Filters settings include the following:
When SNMP (Simple Network Management Protocol) is running, IPSec blocks messages unless you configure a rule in your current active IPSec policy to prevent this.
Secure VPNs are possible in Windows 2000 thanks to L2TP (the Layer Two Tunneling Protocol). Windows NT 4.0 supported only the PPTP for virtual private networking.
Use L2TP when providing a secure link between remote clients and a corporate network or when providing a secure connection for a companys offices located at multiple sites.
Encryption and encapsulation provide data security when L2TP over IPSec is used, which involves putting one data structure within another structure so that the first data structure is temporarily hidden. This creates a tunnel effect; thus L2TPs name.
Two-Tiered Encapsulation occurs when packets are encapsulated twice by L2TP, then once by IPSec. Two types of encapsulation are
This process takes the PPP frame and encapsulates it.
The L2TP packet created above is then wrapped by IPSec.
II. Enabling and Configuring IPSec
Microsoft has implemented policy-based administration of IPSec. By using an MMC snap-in, you can configure the IPSec policies.
Balance accessibility with security
Considerations for policy content should include the type of information typically sent over the network and how sensitive it is. Also, consider how vulnerable or open you are to public or other network attacks, and do not discount possible attacks from within the company.
The stereotypical "hacker" may not be your most dangerous threat. Discuss list on page 485 to help determine more likely threats.
When active, it allows the client to communicate with servers that require IPSec communications. This does not mean that the client requires IPSec; just that it is available to it.
This allows the server to use IPSec with a client if the client has IPSec available. If the client does not have IPSec available, then the server will communicate insecurely.
If a server cannot establish a secure connection with a client, then the client connection will be denied.
- Be aware that you have appropriate administrator rights to Group Policy to define IPSec policies. You cannot delete built-in policies, but you can edit them.
To create custom policies, perform the seven steps on pages 490-491, and see Figure 7-3 on page 490. The Properties dialog box for an existing security policy is shown in Figure 7-4 on page 491.
How to add and edit filters is outlined on pages 494-495 and Figures 7-6 and 7-7 on pages 494 and 495.
Filter actions define the type of security and the methods under which security is established. The primary methods are:
Follow the steps on page 497, using Figures 7-8, 7-9, 7-10 on pages 497 and 498, and to configure IPSec authentication.
Configuring IPSec Tunneling requires two separate IPSec rules to define the endpoints. See Figure 7-12 on page 500.
The Advanced button in the General tab will allow you to set Key Exchange settings, as shown in Figures 7-13, 7-14, and 7-15 on pages 501 and 502.
III. Managing, Monitoring, and Troubleshooting IPSec
The following IPSec settings can be achieved using the context menu shown in Figure 7-16 on page 504. You may need to refresh the policy list to see the effect of any changes.
This provides verification that the changes made to the policy settings have been properly propagated.
Overwrite custom changes with the predefined policies.
As changes are made they may not be immediately refreshed, so a screen refresh may be done.
The System Log aids in troubleshooting Policy Agent, as in the Event 279 (Informational) or event 284 (Error) into the System Log.
The Security Log lists messages pertaining to ISAKMP/Oakley.