For feedback, use the following: |
ipd_online_feedback@alcatel-lucent.com |
→
→
→ Figure 26 shows an example of an IPSec deployment, and the way this would be supported inside a 7750. GRE and IP-IP tunnel deployments are very similar.Figure 26: 7750 IPSec Implementation ArchitectureFigure 26, the public network is typically an “insecure network” (for example, the public Internet) over which packets belonging to the private network in the diagram cannot be transmitted natively. Inside the 7750, a public service instance (IES or VPRN) connects to the public network and a private service instance (typically a VPRN) connects to the private network.
• Note: SR OS will use a configured authentication algorithm in an ike-policy for Pseudorandom Function (PRF).A tunnel-group is a collection of MS-ISAs (each having mda-type isa-tunnel) configured to handle the termination of one or more IPSec, GRE and/or IP-IP tunnels. An example tunnel-group configuration is shown below:config isatunnel-group 1 createprimary 1/1backup 2/1no shutdownexitThe public tunnel SAP type has the format tunnel-tunnel-group.public:index, as shown in the following CLI example.config service ies 199 customer 1 createinterface “public-1” createaddress 64.251.12.1/30sap tunnel-1.public:200 createexit allThe private tunnel SAP has the format tunnel-tunnel-group.private:index, as shown in the following CLI example where a GRE tunnel is configured under the SAP.config service vprn 1 customer 1 createinterface “gre tunnel to ce1” tunnel createaddress 10.0.0.1/30ip-mtu 1476sap tunnel-1.private:210 createip-tunnel “to ce1” creategre-headerdest-ip 10.0.0.2source 64.251.12.1remote-ip 12.47.10.33backup-remote-ip 12.47.51.7delivery-service 199dscp af11no shutdownexitingressegressexit allTo bind an IP/GRE or IP-IP tunnel to a private tunnel SAP, the ip-tunnel command should be added under the SAP. To configure the tunnel as an IP/GRE tunnel, the gre-header command must be present in the configuration of the ip-tunnel. To configure the tunnel as an IP-IP tunnel, the ip-tunnel configuration should have the no gre-header command. When configuring a GRE or IP-IP tunnel, the dest-ip command is mandatory as this specifies the private IP address of the remote tunnel endpoint. If the dest-ip address is not within the subnet of the local private endpoint then the tunnel will not come up. In the CLI sub-tree under ip-tunnel, there are commands to configure the following:
• To avoid public network fragmentation of IPSec, GRE, or IP-IP packets belonging to a particular tunnel, one possible strategy is to fragment IPv4 payload packets larger than a specified size M at entry into the tunnel (before encapsulation and encryption if applicable). The size M is configurable using the ip-mtu command under the ip-tunnel or ipsec-tunnel configuration.Figure 27: Example GRE over IPSec Tunnel Configurationconfig isatunnel-group 1 createprimary 1/1backup 2/1no shutdownexittunnel-group 2 createprimary 3/1backup 2/1no shutdownexitexit allconfig ipsecike-policy 1 createauth-algorithm sha1dh-group 5encryption-algorithm aes128ike-mode mainike-version 1exitipsec-transform 1esp-auth-algorithm sha1esp-encryption-algorithm aes256exitexit allconfig service ies 100 customer 1 createinterface “public-ipsec-1” createaddress 1.1.1.1/24sap tunnel-1.public:200 createexit allconfig service vprn 101 customer 1 createipsecsecurity-policy 1 createentry 1 createlocal-ip 192.168.1.0/24remote-ip 192.168.2.0/24exitexitexitinterface “private-ipsec-1” tunnel createsap tunnel-1.private:201 createipsec-tunnel “ipsec-tunnel-for-n-gre-tunnels” createsecurity-policy 1local-gateway-address 1.1.1.2 peer 2.2.2.2 delivery-service 100dynamic-keyingike-policy 1pre-shared-key “secret”transform 1exitexitexitexitinterface “public-gre-1” createaddress 192.168.1.1/24sap tunnel-2.public:200 createexitinterface “private-gre-1” tunnel createaddress 10.0.0.1/30sap tunnel-2.private:201 createip-tunnel “protected-gre-tunnel” creategre-headerdest-ip 10.0.0.2source 192.168.1.2remote-ip 192.168.2.2delivery-service 101no shutdownexitexitexitstatic-route 192.168.2.0/24 next-hop ipsec-tunnel “ipsec-tunnel-for-n-gre-tunnels”A change to the ike-policy is allowed at any time. The change will not impact tunnels that have been established until they are renegotiated. If the change is required immediately the tunnel must be cleared (reset) for force renegotiation.The public interface address can be changed at any time (current behavior). If changed, tunnels that were configured to use it will require a configuration change. If the subnet changed the tunnels will be in an operationally down state until their configuration is corrected. The public service cannot be deleted while tunnels are configured to use it. A public service is the IES or VPRN service that hold the regular interface that connects the node to the public network. A private service connects to the private protected service.The MS-ISA can interact with the queuing functions on the IOM through the ingress/egress QoS provisioning in the IES or IP VPN service where the IPSec session is bound. Multiple IPSec sessions can be assigned into a single IES or VPRN service. In this case, QoS defined at the IES or VPRN service level, is applied to the aggregate traffic coming out of or going into the set of sessions assigned to that service.Traffic that ingresses or egresses an IES or VPRN service associated with certain IPSec tunnels can be mirrored like other traffic.IKEv2, defined in RFC 4306, Internet Key Exchange (IKEv2) Protocol, is the second version of the Internet Key Exchange Protocol. The main driver of IKEv2 is to simplify and optimize the IKEv1. An IKE_SA and a CHILD_SA could be created with only 4 IKEv2 messages exchanges. The 7750-SR supports IKEv2 with following features:According to RFC 4868, Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec, the following SHA2 variants are supported for authentication or pseudo-random functions:
•
•
•
•
• Note: The generated key file is a plain DER format file and must be imported before can be further used.
•
→
→
→
→
→
→
→
• Figure 28: IPSec into VPRN ExampleIn this application (Figure 28), an IPSec client sets up encrypted tunnel across public network. The 7750 MS-ISA acts as a concentrator gathering, and terminating these IPSec tunnels into an IES or VPRN service. This mechanism allows as service provider to offer a global VPRN service even if node of the VPRN are on an uncontrolled or insecure portion of the network.Figure 29: Video Wholesale Configuration
→ Figure 30: MC-IPSec ArchitectureWith MIMP enabled, there is a master chassis and a backup chassis. The state of the master or standby is per tunnel-group. For example (Table 12), chassis A and B, for tunnel-group 1, A is master, B is standby; for tunnel-group 2, A is standby, B is master.
Table 12: Master and Backup Chassis Example
1.
• If the peer is not reached before the discovery-interval has expired, then the state will be changed to eligible or notEligible depending on the oper-status of the tunnel-group.
2.
3.
4.
5.
12. The show redundancy multi-chassis mc-ipsec peer <ip-address> tunnel-group <tunnel-group-id>” command can be used to check current protection status.
• MIMP will use the configured value of the config>redundancy>multi-chassis>peer>source-address command as the source address. If not configured, then system address will be used.
•
→ To attract traffic to the master chassis, a route metric of these /32 routes could be set according to the MIMP state, a metric from the master chassis is better than a metric from the standby chassis. There are three available states that can be used in the from state command in the route policy entry configuration:For static LAN-to-LAN tunnels, the static route with the IPSec tunnel as the next-hop could be exported to a routing protocol by a route policy. The protocol type remains static. For dynamic LAN-to-LAN tunnels, the reverse-route could be exported to a routing protocol by a route policy. The protocol type is ipsecconfig>isa>tunnel-grp# ?[no] ipsec-responder-onlyMC-IPSec pair IKEv2 lifetime should be higher than the peer according to the suggestions in Overall IPSec.DPD on peer side, no dpd on the 7750 SR sideCheck and make sure the protection status is nominal on both chassis before a manual switchover is performed.