Top Banner
1 © 2012 Fortinet Training Services. This training may not be recorded in any medium, disclosed, copied, reproduced or distributed to anyone without prior written consent of an authorized representative of Fortinet. IPSec VPN Modulo 2
33

IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

Jul 07, 2018

Download

Documents

phungdan
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

1

© 2012 Fortinet Training Services. This training may not be recorded in any medium, disclosed, copied, reproduced or

distributed to anyone without prior written consent of an authorized representative of Fortinet.

IPSec VPN

Modulo 2

Page 2: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

2

Obiettivi

• Al termine del webinar sarete in grado di:

» Definire le componenti architetturali delle VPN IPSec

» Definire i protocolli facenti parte delle VPN IPSec

» Identificare le modalità operative

» Configurare VPN IPSec in diversi scenari

Page 3: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

3

IPSec VPN

Private network

Mittente

autenticato

Informazioni

confidenziali

Informazioni

Integre

Page 4: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

4

IPSec VPN

• IPSec è una suite di protocolli standard (AH e ESP) usati per crittografare

i dati così che non possano essere letti durante l’attraversamento delle

reti insicure

• Offre:

» Autenticazione del mittente

» Confidenzialità dei dati

» Integrità dei dati

Page 5: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

5

IPSec VPN

• IPSec opera a livello network (ISO/OSI layer 3)

» Crittografia trasparente per gli strati superiori

» Le applicazioni non devono essere progettate per l’utilizzo mediante IPSec

• IPSec protegge anche i livelli superiori (come TCP) ma la

complessità ed il carico di CPU aumentano

• Hardware “Enterprise” dedicato all’encryption offloading (NPU)

» FGT-200B e sueriori (non disponibile su VMs)

» Modulo opzionale con porte accelerate (FORASM-FB4)

Page 6: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

6

Internet Key Exchange

• Internet Key Exchange (IKE) consente ai peers coinvolti in una

transazione, di sincronizzare le loro Security Associations

• Phase 1 autentica i peers coinvolti ed attiva un canale sicuro per lo

scambio delle chiavi di cifratura

• Phase 2 negozia i parametri IPSec per definire il tunnel e determinare

le politiche di routing (Quick Selector)

Page 7: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

7

Definizione Parametri Phase 1

KB IDs:

11657 SonicWall

13574 Cisco

Page 8: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

8

Tunnel vs. Interface Mode

Tunnel Mode

• Configurazione più semplice

• Influenzata dal posizionamento delle policy

• Minor granularità

Interface Mode

• Necessaria in caso di GRE over IPSec

• Necessaria se occorre manipolare l’IP sorgente dei pacchetti

• Necessaria se è richiesto routing dinamico over IPSec

• Maggiore controllo

Page 9: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

9

Definizione Parametri Phase 2

Page 10: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

10

Interface Mode

• Crea un’interfaccia virtuale IPSec che applica la crittografia/decrittografia a tutto il traffico che l’attraversa» Anche conosciuta come Route-Based

• Creare due firewall policies tra la interfaccia virtuale IPSec e l’interfacciache si connette alla rete privata interna

• Azione impostata ad ACCEPT

• Necessita una rotta statica dedicata ad ogni tunnel VPN

• Necessaria in caso di utilizzo con routing dinamico o GRE over IPSec

Page 11: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

11

Tunnel Mode

• Facile da configurare, unica firewall policy internal → external che

supporta il traffico bi-direzionale

• Azione impostata a IPSec

• Selezione della Phase1 del tunnel

• Firewall policies IPSec devono essere posizionate in cima alla policy

list

• Vulnerabile agli errori dei quick selectors o delle policies

• Posizionamento delle policies è molto importante

Page 12: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

12

Tunnel Mode vs Interface Mode

Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based)

Disponibile in modalità NAT e TP sì solo in NAT mode

Supporto L2TP-over-IPSec sì no

Supporto GRE-over-IPSec no sì

FW Policy tipi e configurazioniLan > Internet + Action=IPSec (Encrypt)

Source e Destination address specificatiLan > Phase1 Virtual Interface + Action=Accept (no NAT)

Phase1 Virtual Interface > Lan + Action=Accept (no NAT)

Numero di FW Policy per VPN Una, controlla entrambe le direzioni Due, una per direzione

Page 13: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

13

IPSec Topologies (Site-to-Site)

Centro Stella

Sede periferica

Site-to-site

Page 14: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

14

IPSec VPN Client-to-Gateway

1. Preshared key

2. Encryption (DES, 3DES, AES 128,192,256 bit)

3. Authentication (MD5, SHA 1,256,384,512)

4. Extended Authentication (X-Auth)

5. Autenticazione a 2 fattori (PIN da FortiToken)

Page 15: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

15

Autenticazione

Username e Password (primo fattore)

FortiToken (secondo fattore)+

Page 16: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

16

FortiClient - Versioni e Funzionalità supportate

Versione/Funzionalità VPN-SSL VPN IPSec AntiVirus WebFiltering Application Firewall 2-Fact Auth Vulnerability Scan WAN Optimization

Windows (XP o superiori) sì sì sì sì sì sì sì sì

Mac OS X (Snow Leopard 10.6 o superiori) sì sì sì sì sì sì sì nd

iOS Apple - iPhone/iPad (5.1 o superiori) sì no nd sì nd sì nd nd

Android (4.0 ICS o superiori) sì sì nd nd nd Sì nd nd

http://www.forticlient.com/

Page 17: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

17

IPSec nativo (versione Android)

Page 18: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

18

FortiClient IPSec (versione Android) http://www.forticlient.com

Page 19: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

19

FortiClient IPSec (versione Android) http://www.forticlient.com

Page 20: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

20

FortiClient IPSec (versione Android) http://www.forticlient.com

Page 21: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

21

FortiClient IPSec (versione Android) http://www.forticlient.com

Page 22: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

22

FortiClient IPSec (versione Android) http://www.forticlient.com

Page 23: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

23

FortiClient IPSec (versione Windows)

Page 24: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

24

FortiClient IPSec (versione Windows)

Page 25: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

25

Topologia dell’ambiente di laboratorio FCL-to-Gw

Page 26: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

26

Topologia dell’ambiente di laboratorio Smartphone-to-Gw

Page 27: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

27

Topologia dell’ambiente di laboratorio Gw-to-Gw

Page 28: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

28

Troubleshooting

Abilitare Debug

diag debug enable

diag vpn ike filter src-addr4 <src_IP>

diag debug application ike -1

Disabilitare Debug

diag debug reset

diag debug disable

Page 29: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

29

Troubleshooting

FGT-60C_LAB # ike 0: comes 213.215.239.62:879->87.241.14.115:500,ifindex=4....

ike 0: IKEv1 exchange=Aggressive id=90f6dd40de8116f9/0000000000000000 len=564

ike 0: IKEv1 Aggressive, comes 213.215.239.62:879->87.241.14.115 4, peer-id=(null).

ike 0:FortiClient_pc: check for IP assignment method ...

ike 0:FortiClient_pc: no IP assignment method defined

ike 0:FortiClient_pc:88: responder: aggressive mode get 1st message...

ike 0:FortiClient_pc:88: VID draft-ietf-ipsec-nat-t-ike-02

ike 0:FortiClient_pc:88: VID draft-ietf-ipsra-isakmp-xauth-06.txt 09002689DFD6B712

ike 0:FortiClient_pc:88: XAUTHv6 negotiated

ike 0:FortiClient_pc:88: VID DPD AFCAD71368A1F1C96B8696FC77570100

ike 0:FortiClient_pc:88: DPD negotiated

ike 0:FortiClient_pc:88: VID forticlient connect license

ike 0:FortiClient_pc:88: enable FortiClient license check

ike 0:FortiClient_pc:88: VID Fortinet Endpoint Control

ike 0:FortiClient_pc:88: enable FortiClient endpoint compliance check, use 169.254.1.1

ike 0:FortiClient_pc:88: negotiation result

ike 0:FortiClient_pc:88: proposal id = 1:

ike 0:FortiClient_pc:88: protocol id = ISAKMP:

ike 0:FortiClient_pc:88: trans_id = KEY_IKE.

ike 0:FortiClient_pc:88: encapsulation = IKE/none

ike 0:FortiClient_pc:88: type=OAKLEY_ENCRYPT_ALG, val=3DES_CBC.

ike 0:FortiClient_pc:88: type=OAKLEY_HASH_ALG, val=SHA.

ike 0:FortiClient_pc:88: type=AUTH_METHOD, val=PRESHARED_KEY.

ike 0:FortiClient_pc:88: type=OAKLEY_GROUP, val=1536.

ike 0:FortiClient_pc:88: ISKAMP SA lifetime=28800

ike 0:FortiClient_pc:88: selected NAT-T version: RFC 3947

ike 0:FortiClient_pc:88: cookie 90f6dd40de8116f9/6371187ba063666a

ike 0:FortiClient_pc:88: PSK authentication succeeded

ike 0:FortiClient_pc:88: authentication OK

ike 0:FortiClient_pc:88: NAT detected: ME PEER

ike 0:FortiClient_pc:88: port change 879 -> 62736

ike 0:FortiClient_pc:88: established IKE SA 90f6dd40de8116f9/6371187ba063666a

ike 0:FortiClient_pc: adding new dynamic tunnel for 213.215.239.62:62736

ike 0:FortiClient_pc_: could not create dialup name FCL_pc_0

ike 0: comes 213.215.239.62:62736->87.241.14.115:4500,ifindex=4....

ike 0: IKEv1 exchange=Informational id=90f6dd40de8116f9/6371187ba063666a:c0615af7

len=84

ike 0: in

90F6DD40DE8116F96371187BA063666A08100501C0615AF700000054BD08D6C2D06903

25A22B21CAB52F6DD4877E0B4982052B5CF866218F06DFEFBF3D358B4ADF02F0A2A2

C60234CCB15DC887543BE2D00D4266

ike 0: no established IKE SA for exchange-type Informational from 213.215.239.62:62736-

>87.241.14.115 4 cookie 90f6dd40de8116f9/6371187ba063666a, drop

id=13 trace_id=68 func=resolve_ip_tuple_fast line=4190 msg="vd-root received a

packet(proto=17, 213.215.239.62:62736->87.241.14.115:4500) from wan1."

id=13 trace_id=68 func=resolve_ip_tuple_fast line=4224 msg="Find an existing session, id-

0041e778, original direction"

Page 30: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

30

Troubleshooting

ike 0:to-CentroStella:281:32051: peer proposal is: peer:0:0.0.0.0-255.255.255.255:0,

me:0:0.0.0.0-255.255.255.255:0

ike 0:to-CentroStella:281:ph2_to_CS:32051: trying

ike 0:to-CentroStella:281:32051: specified selectors mismatch

ike 0:to-CentroStella:281:32051: peer: type=7/7, local=0:0.0.0.0-255.255.255.255:0,

remote=0:0.0.0.0-255.255.255.255:0

ike 0:to-CentroStella:281:32051: mine: type=7/7, local=0:192.168.169.0-192.168.169.255:0,

remote=0:192.168.168.0-192.168.168.255:0

ike 0:to-CentroStella:281:32051: no matching phase2 found

ike 0:to-CentroStella:281:32051: failed to get responder proposal

ike 0:to-CentroStella:281: error processing quick-mode message from 213.215.239.62 as

responder

ike 0:FortiClient_pc:88: PSK authentication succeeded

ike 0:FortiClient_pc:88: authentication OK

ike 0:FortiClient_pc:88: NAT detected: ME PEER

ike 0:FortiClient_pc:88: port change 879 -> 62736

ike 0:FortiClient_pc:88: established IKE SA 90f6dd40de8116f9/6371187ba063666a

ike 0:FortiClient_pc: adding new dynamic tunnel for 213.215.239.62:62736

ike 0:FortiClient_pc_: could not create dialup name FortiClient_pc_0, too long

ike 0:FortiClient_pc:88: schedule delete of IKE SA

ike 0:FortiClient_pc: connection expiring due to phase1 down

ike 0:FortiClient_pc: deleting

ike 0:FortiClient_pc: flushing

ike 0:FortiClient_pc: sending SNMP tunnel DOWN trap

ike 0:FortiClient_pc: flushed

ike 0:FortiClient_pc: reset NAT-T

ike 0:FortiClient_pc: deleted

ike 0: comes 213.215.239.62:62736->87.241.14.115:4500,ifindex=4....

ike 0: IKEv1 exchange=Informational id=90f6dd40de8116f9/6371187ba063666a:c0615af7

len=84

ike 0: in

90F6DD40DE8116F96371187BA063666A08100501C0615AF700000054BD08D6C2D06903

25A22B21CAB52F6DD4877E0B4982052B5CF866218F06DFEFBF3D358B4ADF02F0A2A2

C60234CCB15DC887543BE2D00D4266

ike 0: no established IKE SA for exchange-type Informational from 213.215.239.62:62736-

>87.241.14.115 4 cookie 90f6dd40de8116f9/6371187ba063666a, drop

id=13 trace_id=68 func=resolve_ip_tuple_fast line=4190 msg="vd-root received a

packet(proto=17, 213.215.239.62:62736->87.241.14.115:4500) from wan1."

id=13 trace_id=68 func=resolve_ip_tuple_fast line=4224 msg="Find an existing session, id-

0041e778, original direction"

Page 31: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

31

URL Utili

#FortinetbySidin• Entra nella Community FortiTech Italia

• Area Partner Istituzionale

• Area Privata Istituzionale

• Area Partner Italia

https://partners.fortinet.com/Login.aspx?ReturnUrl=%2fDefault.aspx

https://support.fortinet.com/Login/UserLogin.aspx

http://www.fortinet.it/

• Area Tecnica Istituzionale

http://docs.fortinet.com/fgt.html

https://twitter.com/FortinetbySidin

Page 32: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

32

Prossimi eventi

• WiFi Controller - 15 febbraio h. 11.00

• Scenari Dual Wan - 22 febbraio h. 11.00

• http://www.sidin.it/scheda/Formazione_e_eventi/Formazione_on_line

Page 33: IPSec VPN Tunnel Mode vs Interface Mode Funzionalità Tunnel mode (Policy-Based) Interface mode (Route-Based) Disponibile in modalità NAT e TP sì solo in NAT mode Supporto L2TP-over-IPSec

33

Abbiamo Terminato il modulo 2 – VPN IPSec

!!! Grazie per l’attenzione !!!