Brksec 3629
Brksec 3629
Brksec 3629
Pawel Cecot
Security Technical Leader, CX
BRKSEC-3629
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Abstract
This session covers the design and deployment aspects of integrating IPSec
VPNs with Firepower Threat Defense (FTD) services. VPN (FlexVPN/DMVPN)
and FTD deployment options will be reviewed with high availability and
scalability in mind. The second part contains a detailed walk through of an
example deployment which will help to understand the configuration and
packet flow between different setup components. Proper understating of
how each of the components of the deployment work is a key for successful
design and operation. This session is aimed at Network Specialists and
Architects involved in designing, managing and troubleshooting security
solutions. This is NOT an introductory session; attendees should have
existing knowledge of FlexVPN/DMVPN and FTD capabilities.
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
For your reference
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
About Me Paweł Cecot
pcecot@cisco.com
Technical Leader, CX
• VPN Team Krakow
• 8 years in TAC, 10 in Networking
• Automation
• Network Design
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 6
Example Design Requitements
• Large Scale Deployment - 40000 locations
• Hub-and-spoke topology
• Provide security using cryptographically protected tunnels.
• Headend redundancy with 15 seconds convergence
• Mix of ASA and IOS routers on branch locations …
• IPS inspection for the spoke-to-spoke traffic using FTD
Session Objectives
• Large scale IPSec VPN deployments, i.e. deployments exceeding single platform limits.
• VPN Design Selection.
• Understand challenges of inserting a security appliance into a VPN topology (Firewall, IPS)
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
Agenda
• IPSec VPN Solutions Overview
• IPSec VPN High Availability and Scalability
• Selecting a VPN Design
• FTD Deployment and Interface Modes
• FTD Resiliency and Scalability
• Scalable VPN with FTD Integration Deployment Example
• IPSec VPN Best Practices
• Conclusion
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 8
IPSec VPN Solutions Overview
IPSec VPN High Availability and Scalability
Selecting a VPN Design
FTD Deployment and Interface Modes
FTD Resiliency and Scalability
Scalable VPN with FTD Integration Deployment Example
IPSec VPN Best Practices
Conclusion
Underlay & Overlay
Underlay Network
Overlay Network
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Underlay & Overlay
VPN
Underlay Network
Overlay Network
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 11
IPSec VPNs per platform
Irrelevant to our
Cisco IPSec VPNs
presentation
Site-Site, Any-to-Any
Remote-Access Site-Site
(GETVPN)
All in One
IOS/IOS-XE Yes Yes Yes Yes Yes Yes
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Crypto Map
• Crypto Map was the first implementation of IPSec VPNs used on Cisco devices.
• Aligned to the IPsec protocol, were traffic that is about to be encrypted is defined by
an ACL (crypto ACL).
• Configuration nightmare:
• Mismatched/not mirrored ACL entries.
• ACL must be updated every time new networks are added.
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 14
Crypto Map - Packet Flow
LAN WAN
Overlay Underlay crypto keyring internet-keyring vrf green
pre-shared-key address 10.1.1.2 key cisco123
!
RIB/FIB RIB/FIB crypto isakmp profile cust1-ike-prof
vrf blue
keyring internet-keyring
No native route match identity address 172.16.1.1 green
leaking !
crypto map outside_map 10 ipsec-isakmp
set peer 172.16.1.1
set transform-set ESP-AES-SHA
match address 110
Eth0/0 Eth0/1
LAN WAN
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
Dynamic Crypto Map
• Dynamic Crypto Map dynamically accepts remote (initiating) peer’s IP address.
• By default, any proposed traffic selector will be accepted from an authenticate peer.
• By design requires more TCAM space (IOS-XE).
• The DVTI technology replaces dynamic crypto maps as a dynamic hub-and-spoke
method for establishing tunnels.
crypto ipsec transform-set TS esp-aes esp-sha-hmac
mode tunnel
!
crypto dynamic-map dynamic_map 10
set transform-set TS
reverse-route
!
crypto map outside_map 10 ipsec-isakmp dynamic dynamic_map
!
interface GigabitEthernet0/0
ip address 172.17.1.1 255.255.255.0
crypto map outside_map
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Crypto Map Summary
• Crypto Map is a legacy VPN solution with many limitations:
• Does not support multicast.
• A crypto map and VTI using the same physical interface is not supported.
• It is not supported on port-channel interface (IOS-XE).
• Multi-VRF limitations; fvrf=vrf1 and ivrf=global not supported.
• Limited HA capabilities (IOS-XE does not support stateful IPSec failover).
• IOS-XE architecture has scaling limitations for dynamic crypto map.
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 17
Tunnel Interface
Tunnel Interface
Overlay Underlay
TUNNEL
INTERFACE
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 19
IPSec Virtual Tunnel Interface
IPSec VTI
• IPsec Virtual Tunnel Interface (VTI) provides a virtual routable interface for
terminating IPsec tunnels and an easy way to define protection between sites to
form an overlay network.
• Simplifies the configuration of IPsec for protection of remote links, support multicast,
and simplify network management and load balancing.
• The VTI tunnel is always up.
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 20
IOS Tunnel Interface – Packet Flow
LAN WAN
Overlay Underlay interface Tunnel <>
vrf forwarding blue Overlay VRF (IVRF)
RIB/FIB RIB/FIB
ip address <> Overlay IP address
tunnel mode gre ipv6 Tunnel encap type
tunnel source <> Underlay src IP address
tunnel vrf green Underlay VRF (FVRF)
tunnel destination <> Underlay dst IP address
Eth0/0 Tunnel1 Eth0/1
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 21
IOS Tunnel Interface – Packet Flow
LAN WAN
Overlay Underlay interface Tunnel <>
Pre-encapsulation
vrf forwarding blue
Tunnel encapsulation Overlay VRF (IVRF)
interface output features RIB/FIB RIB/FIB
(apply to cleartext packet) & optional protection
ip address <> Overlay IP address
tunnel mode gre ipv6 Tunnel encap type
tunnel source <> Underlay IP address
tunnel vrf green Underlay VRF (FVRF)
tunnel destination <>
Post-encapsulation Underlay dst IP address
Interface input features
Eth0/0 Eth0/1
Tunnel1 interface output features
(apply to cleartext packet)
(apply to encrypted packet)
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
Virtual Interface Types
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 23
IPSec Tunnel Interface Types - Static
Tu Static Tunnel
VT
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
IPSec Tunnel Interface Types - Dynamic
interface Virtual-Access1
ip unnumbered Loopback1
tunnel source GigabitEthernet2
tunnel destination 10.0.0.1
tunnel protection ipsec profile default
no tunnel protection ipsec initiate
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 25
IOS Tunnel interface types – with GRE
Tunnel
Encapsulation Configuration Use Cases
Type
• p2p GRE
interface Tunnel <id>
Static tunnel mode gre {ip | ipv6}
• p2p GRE over IPSec
GRE/IPSec* tunnel protection ipsec profile default • FlexVPN Spoke w/
shortcuts
interface Virtual-Template <id> type tunnel • FlexVPN Hub
Dynamic IP IPsec GRE IP L4 Data tunnel mode gre {ip | ipv6} • FlexVPN Spoke w/
GRE/IPSec Encrypted tunnel protection ipsec profile default shortcuts
FlexVPN
interface Tunnel <id>
mGRE over tunnel mode gre multipoint [ipv6] • DMVPN
IPSec* tunnel protection ipsec profile default DMVPN
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 26
IOS Tunnel interface types – without GRE
Tunnel
Encapsulation Configuration Use Cases
Type
• p2p IPSec
interface Tunnel <id>
Native IPsec tunnel mode ipsec {ipv4 | ipv6}
• FlexVPN Spoke w/o
(SVTI) tunnel protection ipsec profile default shortcuts
• FlexVPN inter-Hub
interface Virtual-Template <id> type tunnel
Native IPsec tunnel mode ipsec {ipv4 | ipv6}
• FlexVPN Hub w/o
(DVTI) IP IPsec IP L4 Data tunnel protection ipsec profile default shortcuts
FlexVPN
Encrypted interface tunnel <id>
Native IPsec • Static Crypto Map
tunnel mode ipsec <ipv4|ipv6>
Multi-SA tunnel protection ipsec profile default replacement for 3rd party
SVTI 16.12.1 tunnel protection ipsec policy ipv4 ACL peers
Native IPsec interface Virtual-Template <id> type tunnel • Dynamic Crypto Map
Multi-SA tunnel mode ipsec {ipv4 | ipv6} replacement for 3rd party
DVTI 15.2(1)T+ tunnel protection ipsec profile default peers
FlexVPN
• Less overhead – no GRE Crypto Map
• Multi-SA support compatibility
• Mixed Mode – IPv4 over IPv6 (tunnel mode ipsec ipv4 v6-overlay) or vice versa
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Traffic Permitted by Protection Type
Native IPsec
IPv4 Tunnel Yes Yes No Yes No
(SVTI/DVTI)
Native IPsec
IPv6 Tunnel Yes Yes No Yes No
(SVTI/DVTI)
Recommended
* With Static and Dynamic Tunnel
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
FlexVPN - Mode Auto to Rule Them All
• Automatic transport and encapsulation
protocol detection
• Virtual-Access interface dynamically
interface tunnel 1
adjusted to transport/encapsulation type tunnel mode gre ip
FlexVPN Hub
IPv6
crypto ikev2 profile ALL-SPOKES interface tunnel 1
tunnel mode gre ipv6
virtual-template 1 mode auto
!
interface virtual-template 1 type tunnel interface tunnel 1
tunnel mode ipsec ipv6
tunnel mode gre ip
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 29
FlexVPN Configuration Example
Tu1: 192.168.1.1/32 Tu1: 192.168.1.2/32
10.0.1.0/24 10.0.2.0/24
Router1 Router2
Gi2: 172.16.12.1/24 Gi2: 172.16.23.2/24
Smart
Router1 Defaults IKEv2 Routing – pushing a static
crypto ikev2 authorization policy default
route to a remote peer
route set remote ipv4 10.0.1.0 255.255.255.0
!
crypto ikev2 profile default IKEv2 Profile - repository of
match identity remote address 172.16.23.2 nonnegotiable parameters of
authentication remote pre-share key cisco the IKE SA
authentication local pre-share key cisco
aaa authorization group psk list flex default local Tunnel Interface defining tunnel
!
endpoints, encapsulation and
interface Tunnel1
IPSec protection
ip unnumbered Loopback1
tunnel source GigabitEthernet2
tunnel destination 172.16.23.2 BRKSEC-3054 - IOS FlexVPN Remote
tunnel protection ipsec profile default Access, IoT and Site-to-Site advanced Crypto
VPN Designs
Thursday, January 30 | 11:00 AM - 01:00 PM
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 30
IKEv2 Dynamic VTI – Configuration
Va1: 192.168.1.1/32 Tu1: 192.168.1.2/32
10.0.1.0/24 10.0.2.0/24
Hub Spoke
Gi2: 10.0.12.1/24 Gi2: 10.0.23.2/24
Hub Spoke
crypto ikev2 authorization policy default crypto ikev2 authorization policy default
route set remote ipv4 10.0.0.0 255.0.0.0 route set remote ipv4 10.0.2.0 255.255.255.0
! !
crypto ikev2 profile default crypto ikev2 profile default
match identity remote any match identity remote address 10.0.12.1
authentication remote pre-share key cisco authentication remote pre-share key cisco
authentication local pre-share key cisco authentication local pre-share key cisco
aaa authorization group psk list flex default aaa authorization group psk list flex default
local local
virtual-template 1 !
! interface Tunnel1
interface Virtual-Template1 type tunnel ip address 192.168.1.2 255.255.255.255
ip unnumbered Loopback1 tunnel source GigabitEthernet2
ip ospf 1 area 1 tunnel mode ipsec ipv4
tunnel source GigabitEthernet2 tunnel destination 10.0.12.1
tunnel mode ipsec ipv4 tunnel protection ipsec profile default
tunnel protection ipsec profile default !
interface GigabitEthernet2
ip address 10.0.23.2 255.255.255.0
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
IKEv2 Multi-SA Static VTI
IOS XE 16.12.1
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 32
IKEv2 Multi-SA SVTI - Configuration
Tu1: 192.168.1.1/32 Tu1: 192.168.1.2/32
172.16.1.0/24 172.30.3.0/24
172.30.4.0/24
172.16.2.0/24
Router1 Router2
Gi2: 10.0.12.1/24 Gi2: 10.0.23.2/24
Router1 Router2
crypto ikev2 profile default crypto ikev2 profile default
match identity remote 10.0.23.2 match identity remote 10.0.12.1
authentication remote pre-share key cisco authentication remote pre-share key cisco
authentication local pre-share key cisco authentication local pre-share key cisco
aaa authorization group psk list flex default local aaa authorization group psk list flex default local
! !
crypto ipsec profile default crypto ipsec profile default
reverse-route reverse-route
! !
ip access-list extended SVTI_ACL ip access-list extended SVTI_ACL
permit ip 172.16.1.0 0.0.0.255 172.30.3.0 0.0.0.255 permit ip 172.30.3.0 0.0.0.255 172.16.1.0 0.0.0.255
permit ip 172.16.2.0 0.0.0.255 172.30.4.0 0.0.0.255 permit ip 172.30.4.0 0.0.0.255 172.16.2.0 0.0.0.255
! !
interface Tunnel1 interface Tunnel1
ip address 192.168.1.1 255.255.255.252 ip address 192.168.1.2 255.255.255.252
tunnel source GigabitEthernet2 tunnel source GigabitEthernet2
tunnel mode ipsec ipv4 tunnel mode ipsec ipv4
tunnel destination 10.0.23.2 tunnel destination 10.0.12.1
tunnel protection ipsec policy ipv4 SVTI_ACL tunnel protection ipsec policy ipv4 SVTI_ACL
tunnel protection ipsec profile default tunnel protection ipsec profile default
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
IKEv2 Multi-SA Dynamic VTI
15.2(1)T+
• IKEv2 DVTI supports multiple IPsec SAs proposed by the initiator – Multi-SA DVTI
• Multi-SA DVTI is interoperable with third-party devices that implement only crypto
maps.
• DVTI allow per peer features to be applied on a dedicated interface.
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Multi-SA DVTI - security-policy limit
Hub# show crypto session detail
IPSEC FLOW: permit ip 172.16.254.0/255.255.255.0 172.16.4.0/255.255.255.0
Active SAs: 2, origin: crypto map
Inbound: #pkts dec'ed 4 drop 0 life (KB/Sec) 4607999/3353
Outbound: #pkts enc'ed 4 drop 0 life (KB/Sec) 4607999/3353
IPSEC FLOW: permit ip 172.16.254.0/255.255.255.0 172.16.3.0/255.255.255.0
Active SAs: 2, origin: crypto map
Inbound: #pkts dec'ed 4 drop 0 life (KB/Sec) 4607999/3342
Outbound: #pkts enc'ed 4 drop 0 life (KB/Sec) 4607999/3342
172.16.3.0/24
172.16.254.0/24
Hub Spoke 172.16.2.0/24
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
IKEv2 Multi-SA DVTI - Configuration
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
FlexVPN and DMVPN comparison
FlexVPN DMVPN
DVTI mGRE
mGRE
SVTI
• DMVPN uses mGRE interface while FlexVPN is using p2p tunnels – SVTI or DVTI.
• In DMVPN crypto is optional, FlexVPN is tied to crypto configuration and requires IKEv2.
• If direct spoke-to-spoke is not needed, GRE encapsulation can be omitted for FlexVPN.
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 37
FlexVPN and DMVPN comparison
Granular per tunnel configuration of QoS, ZBF, VRF, etc. (AAA server)
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Demo – FlexVPN
IPSec VPN Solutions Overview
IPSec VPN High Availability and Scalability
Selecting a VPN Design
FTD Deployment and Interface Modes
FTD Resiliency and Scalability
Scalable VPN with FTD Integration Deployment Example
IPSec VPN Best Practices
Conclusion
Designing Fault-Tolerant IPSec VPNs
• The design depends on what faults the VPN needs to be able to withstand.
• From the fault-tolerance perspective, the design can be broken down into:
• Transport Network – connectivity between IPSec Gateways
• Access Link – link/device that connects the IPSec gateway to the Transport Network
• IPSec Gateway
VPN VPN
Router Router
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
Branch Location Design
• Dual-Router, Dual-Link
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 42
FlexVPN Hub Redundancy – active-active
Dynamic Routing
(BGP, EIGRP, OSPF, RIP…)
IKEv2 Routing
FlexVPN FlexVPN
Spoke Only
interface Tunnel1
(…) In case of link/hub failure, dynamic routing
tunnel destination <hub1-nbma-ip> protocol timers or IKEv2 DPD timers determine
interface Tunnel2 the convergence time
(…)
tunnel destination <hub2-nbma-ip>
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 43
Tunnel Origin/Destination Dynamic Modification
FlexVPN crypto ikev2 client flexvpn <name>
Tunnel Only client connect tunnel 1
Origin/Destination peer 1 <address> track 10 up
peer 2 <address> track 10 down
source 1 <primary interface> track 100
source 2 <cellular interface> track 200
Tunnel Peer Selection Tunnel Source Selection !
interface Tunnel1
(…)
Backup Peer List Tunnel Pivoting tunnel source dynamic
tunnel destination dynamic
Static or Downloadable
Load-Balancing
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 44
DMVPN Hub Redundancy
DMVPN DMVPN
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Scaling beyond the limits of one hub router
Static assignment active/standby cluster
• Multiple clusters for scale
• 1+1 redundancy
Cluster1
Inter-DC Link Cluster2
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Scaling beyond the limits of one hub router
Static assignment active/standby cluster
• Multiple clusters for scale
• 1+1 redundancy
Cluster1
Inter-DC Link Cluster2
Primary Tunnel
Spoke Spoke Spoke Spoke
Backup Tunnel
Spoke Spoke Spoke Spoke
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 47
Scaling beyond the limits of one hub router
IKEv2 Load Balancer
• IKEv2 Load Balancer Components:
• Cluster Load Balancing (CLB)
3. CLB Master sends a redirect
• Hot Standby Router Protocol (HSRP) to client to Hub 3
2. CLB Master selects the LLG (Hub3)
• IKEv2 Redirect
• N+1 redundancy (N<5) HSRP Standby HSRP Active HSRP Standby
CLB Master
• Easy to configure and cost-effective CLB Slave CLB Slave
Spoke
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 48
Scaling beyond the limits of one hub router
Server Load Balancing
• F5 SLB
• A10 Thunder SLB
Spoke
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Bringing it all together – Geo LB + SLB
America Europe
Hub1 Hub1
SLB SLB
Hub2 Hub2
Hub3 Hub3
Spoke Spoke
Primary Tunnel
Backup Tunnel
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
IPSec VPN Solutions Overview
IPSec VPN High Availability and Scalability
Selecting a VPN Design
FTD Deployment and Interface Modes
FTD Resiliency and Scalability
IPSec VPN Best Practices
Scalable VPN with FTD Integration Deployment Example
Selecting a VPN Design
• Large or small number of branch offices?
• Small Scale -> Static Tunnels
• Large Scale -> Dynamic Tunnels on Hub + Clustering, DNS Balancing, IKEv2 Load Balancer, SLB
• DMVPN or FlexVPN?
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 52
IPSec VPN Solutions Overview
IPSec VPN High Availability and Scalability
Selecting a VPN Design
FTD Deployment and Interface Modes
FTD Resiliency and Scalability
Scalable VPN with FTD Integration Deployment Example
IPSec VPN Best Practices
Conclusion
Firewall - Asymmetric Traffic Challenge
• Symmetric flow example:
inside outside
SYN inside
SYN/ACK
SYN
SYN/ACK same-security-traffic is not applicable on FTD.
Traffic is allowed for both inter- and intra-interface
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
FTD Deployment and Interface Modes
FTD Interface Mode FTD Deployment Mode Description Real traffic can be
(inherited from ASA) FW + IPS dropped?
Routed Routed Full ASA and Snort Yes
checks
ASA
checks
Passive Routed or Transparent Partial ASA and full Snort No
checks
Passive (ERSPAN) Routed Partial ASA and full Snort No
checks
IPS-only
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Symmetric VPN flow – Spoke to DC
FTD in Transparent
SYN
SYN ACK DC
outside
inside
2.
Hub1 Hub2
VPN
Spoke1
Spoke3
Spoke2
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Asymmetric VPN traffic flow example?
FTD in Transparent mode
SYN
SYN ACK
DC
outside
inside
2.
inside outside
Hub1 Hub2
SYN
SYN/ACK
VPN
Spoke1
Spoke3
Spoke2
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
FTD on a stick
FTD in Routed mode
DC
outside
inside
2.
Hub1 Hub2
VPN
Spoke1
Spoke3
Spoke2
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 58
Protecting direct spoke-spoke traffic
Option 1 – spoke being an FTD/ASA
• Snort IPS*
• URL Filtering*
• Cisco Umbrella
Spoke1 Spoke2
• ETA (Encrypted Traffic Analytics)
* Available only on selected platforms BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
IPSec VPN Solutions Overview
IPSec VPN High Availability and Scalability
IPSec VPN Best Practices
Selecting a VPN Design
FTD Deployment and Interface Modes
FTD Resiliency and Scalability
Scalable VPN with FTD Integration Deployment Example
Conclusion
High Availability for Firepower Threat Defense
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Clustering for the Firepower Threat Defense
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 62
IPSec VPN Solutions Overview
IPSec VPN High Availability and Scalability
Selecting a VPN Design
FTD Deployment and Interface Modes
FTD Resiliency and Scalability
Scalable VPN with FTD Integration Deployment Example
IPSec VPN Best Practices
Conclusion
Example Design Requirements and Assumptions
• Large Scale Deployment - 40000 locations
• Hub-and-spoke topology
• Provide security using cryptographically protected tunnels.
• Headend redundancy with 15 seconds convergence
• Mix of ASA and IOS routers on branch locations
• IPS inspection for the spoke-to-spoke traffic using FTD …
Proposed Solution
• FlexVPN Hub-and-Spoke topology
• HA and scalability using active/standby clusters with BGP
• PBR to redirect spoke-spoke traffic to FTD on a stick
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 64
High Level Design – Topology
Hub-and-spoke + Large Scale
Cluster 1
….. Cluster 4
HA or
FTD1 FTD2
Cluster
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
FTD Routed mode on a stick
IPS inspection for the spoke-to-spoke traffic using FTD
Cluster 1
FTD
interface Virtual-Access2
ip unnumbered Loopback0
ip policy route-map FW
tunnel source GigabitEthernet1
tunnel mode ipsec ipv4 2
tunnel destination 10.0.0.1 inside / 172.16.254.254/24
tunnel protection ipsec profile default
no tunnel protection ipsec initiate
3 2.
172.16.254.1/24
B 192.168.102.0/24 [200/0] ->Hub2172.16.1.7
Hub1 S 172.16.1.7 is directly connected, Virtual-Access1
172.16.1.254/32 172.16.1.253/32
1 4
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Spoke router configuration – ASA Example
hostname Spoke2 interface Tunnel1
domain-name Spoke2 nameif VTI Primary Tunnel
! IKE Identity ip address 172.16.1.5 255.255.255.254
crypto isakmp identity hostname tunnel source interface outside
! tunnel destination 10.0.0.253
crypto ikev2 policy 10 tunnel mode ipsec ipv4
encryption aes-256 tunnel protection ipsec profile VTI
integrity sha384 IKEv2 and IPSec !
group 19 algorithms interface Tunnel2
prf sha384 nameif VTI2 Secondary Tunnel
crypto ikev2 enable outside ip address 172.16.1.7 255.255.255.254
! tunnel source interface outside
crypto ipsec ikev2 ipsec-proposal IPSEC_PROP tunnel destination 10.0.0.254
protocol esp encryption aes tunnel mode ipsec ipv4
protocol esp integrity sha-1 tunnel protection ipsec profile VTI
! pre-shared-keys !
crypto ipsec profile VTI route VTI 172.16.1.253 255.255.255.255 172.16.1.253 1
set ikev2 ipsec-proposal IPSEC_PROP route VTI2 172.16.1.254 255.255.255.255 172.16.1.254 1
! !
tunnel-group 10.0.0.253 type ipsec-l2l router bgp 65000 Instead of IKEv2
tunnel-group 10.0.0.253 ipsec-attributes timers bgp 5 15 0 routing
ikev2 remote-authentication pre-shared-key cisco address-family ipv4 unicast
ikev2 local-authentication pre-shared-key cisco neighbor 172.16.1.253 remote-as 65000
! neighbor 172.16.1.253 activate
tunnel-group 10.0.0.254 type ipsec-l2l neighbor 172.16.1.254 remote-as 65000
tunnel-group 10.0.0.254 ipsec-attributes neighbor 172.16.1.254 activate
ikev2 remote-authentication pre-shared-key cisco redistribute connected
ikev2 local-authentication pre-shared-key cisco
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 69
Hub’s IKEv2 profile selection
crypto ikev2 name-mangler extract-domain
crypto ikev2 profile router fqdn domain
match identity remote fqdn domain router
authentication remote pre-share key cisco
crypto ikev2 authorization policy router
authentication local pre-share key cisco
route set interface
aaa authorization group psk list FlexVPN name-mangler extract-domain
virtual-template 1 mode auto
crypto ikev2 name-mangler extract-host
crypto ikev2 profile firewall
fqdn hostname
match identity remote fqdn domain firewall
authentication remote pre-share key cisco
authentication local pre-share key cisco crypto ikev2 authorization policy Spoke2
aaa authorization group psk list FlexVPN name-mangler extract-host route set local ipv4 172.16.1.5
virtual-template 1 mode auto 255.255.255.255
no config-exchange request
Store it on
Hub1 an external
AAA server
* VTI for FTD on 6.7 roadmap BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Hub router configuration - with PBR
aaa new-model interface Virtual-Template1 type tunnel
aaa authorization network FlexVPN local ip unnumbered Loopback1
! ip policy route-map FW
access-list 123 permit ip 192.168.0.0 0.0.255.255 any tunnel protection ipsec profile default
! !
route-map FW permit 10 router bgp 65000
match ip address 123 bgp listen range 172.16.1.0/24 peer-group Flex
set ip next-hop 172.16.254.254 PBR bgp listen limit 10000
! timers bgp 5 15
crypto ikev2 profile router neighbor Flex peer-group
match identity remote fqdn domain router neighbor Flex remote-as 65000
authentication remote pre-share key cisco !
authentication local pre-share key cisco address-family ipv4
aaa authorization group psk list FlexVPN name-mangler redistribute connected
extract-domain neighbor Flex activate
virtual-template 1 mode auto neighbor Flex route-reflector-client
! neighbor Flex next-hop-self all
crypto ikev2 profile firewall exit-address-family
match identity remote fqdn domain firewall
authentication remote pre-share key cisco
authentication local pre-share key cisco
aaa authorization group psk list FlexVPN name-mangler
Separate IKEv2 profiles
extract-domain
virtual-template 1 mode auto
for routers and firewalls iBGP with listen range
no config-exchange request
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
Interface and routing verification
Hub1# show derived-config interface Virtual-Access 1
Building configuration...
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
IPSec VPN Solutions Overview
IPSec VPN High Availability and Scalability
Selecting a VPN Design
FTD Deployment Modes Overview
FTD Resiliency and Scalability
Scalable VPN with FTD Integration Deployment Example
IPSec VPN Best Practices
Conclusion
IPSec Security Association Lifetime
• Block Ciphers become unsafe with more than 2n/2 blocks of message encrypted.
• 3DES is broken
• With AES encryption algorithms, the volume-based re-key is justified only if more
than 264 blocks of 16 bytes are encrypted = 256 exabytes of data.
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
IPSec Anti-Replay Window Size Tuning
• When QoS is used, packets from different traffic classes can be queued and
delivered out of order by a large number, bigger than anti-replay window size.
• There are a couple of possibilities to address this issue:
• Increase the IPsec anti-replay window size (default is 64 packets).
crypto ipsec security-association replay window-size 1024
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
IPSec Anti-Replay Checking with Multiple
Sequence Number Spaces CSR 16.6.1
ISR4k 16.7.1
ASR1k 16.8.1
• IPSec Anti-Replay multi-SNS is enabled with:
crypto ipsec security-association multi-sn
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Call Admission Control for IKE
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 77
IPsec & Fragmentation
interface Tunnel1
ip mtu 1400
tcp adjust-mss 1360 Recommended
settings covering
majority of scenarios
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 78
IPSec Overhead Calculator Tool
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 79
IPsec & Fragmentation - Crypto Map
Fragmentation with Crypto maps
(Crypto pre-fragmentation)
LAN WAN
INTF RIB/FIB
INTF
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 80
IPsec & Fragmentation – Tunnel Protection
Fragmentation with Tunnel protection
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
QoS Considerations – VPN Hub
• Implementing quality of service (QoS) on the FlexVPN Hub is often necessary, because
Spoke’s inbound physical bandwidth can become congested.
• The Hub has a much faster connection that does not become congested as fast as the
Spoke connection (that is, the Hub can overrun the Spoke).
10Gbps shaper
10Gbps 500Mbps
Hub Spoke
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
QoS Considerations – VPN Spoke
• QoS on FlexVPN Spoke is setup to shape/police outbound traffic to ensure that the spoke
doesn't overrun its own outbound bandwidth.
• This is an aggregate (across all tunnels) policy that is applied to the outbound physical
interface on the spoke.
10Gbps shaper
10Gbps 500Mbps
Hub Spoke
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
IPSec VPN Solutions Overview
IPSec VPN High Availability and Scalability
Selecting a VPN Design
FTD Deployment Modes Overview
FTD Resiliency and Scalability
Scalable VPN with FTD Integration Deployment Example
IPSec VPN Best Practices
Conclusion
Conclusion
• Many VPN Solutions; asses the design requirements before selecting the best
option.
• Evaluate failure scenarios and acceptable convergence time.
• Understand the packet flow to properly insert a security appliance (Firewall, IPS).
• Keep it simple.
• Follow the IPSec VPN best practices to achieve best performance and avoid
problems.
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 85
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 86
Continue your education
Demos in the
Walk-In Labs
Cisco Showcase
BRKSEC-3629 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
Thank you