wKioL1aTJ_STSYhNAAMMy2-kZ4w591.jpg

Lab instructions

This lab will show you how to configure site-to-site IPSEC ××× using the new Packet Tracer 6.1 ASA 5505 firewall. By default, the ASA 5505 firewall denies the traffic entering the outside interface if no explicit ACL has been defined to allow the traffic. This default behaviour helps protecting the enterprise network from the internet during the ××× configuration.

In this lab, a small branch office will be securely connected to the enterprise campus over the internet using a broadband DSL connection. Not routing protocol traffic is needed between the two sites. 

 

Campus addressing scheme :

  • Campus IP addresses :     172.16.0.0/17

  • DC : 172.16.0.0/18

  • Users : 172.16.64.0/20

  • DMZ : 172.16.96.0/21

  • Network devices :     172.16.252.0/23

  • L3 P2p links : 172.16.254.0/24

 

Branch office 1 IP subnet : 172.16.129.0/24

Enterprise internet IP addresses : 134.95.56.16/28

 

IPSEC ××× configuration to apply :

  • ESP Encryption : AES-256

  • AH hash algorithm : SHA

  • Pre shared key : SHAREDSECRET

 

 

 

Solution

ASA configuration

Campus network - ASA 5505 IPSEC ××× headend device configuration .

interface Vlan1

 nameif inside

 security-level 100

 ip address 172.16.254.254 255.255.255.252

!

interface Vlan2

 nameif outside

 security-level 0

 ip address 134.95.56.17 255.255.255.240

!

object network BRANCH01_NETWORK

 subnet 172.16.129.0 255.255.255.0

object network BRANCH_NETWORK

 subnet 172.16.128.0 255.255.128.0

object network CAMPUS_NETWORK

 subnet 172.16.0.0 255.255.128.0

object network PRIVATE_NETWORK

 subnet 176.16.0.0 255.255.0.0

!

route outside 172.16.129.0 255.255.255.0 134.95.56.18 1

route inside 172.16.0.0 255.255.128.0 172.16.254.253 1

!

access-list BRANCH01_TRAFFIC extended permit tcp object CAMPUS_NETWORK object BRANCH01_NETWORK

access-list BRANCH01_TRAFFIC extended permit icmp object CAMPUS_NETWORK object BRANCH01_NETWORK

access-list ENTERPRISE_PRIVATE-TRAFFIC extended permit tcp object PRIVATE_NETWORK object PRIVATE_NETWORK

access-list ENTERPRISE_PRIVATE-TRAFFIC extended permit icmp object BRANCH_NETWORK object CAMPUS_NETWORK

!

!

access-group ENTERPRISE_PRIVATE-TRAFFIC out interface inside

!

crypto ipsec ikev1 transform-set L2L esp-aes 256 esp-sha-hmac

!

crypto map BRANCH1 1 match address BRANCH01_TRAFFIC

crypto map BRANCH1 1 set peer 134.95.56.18 

crypto map BRANCH1 1 set security-association lifetime seconds 86400

crypto map BRANCH1 1 set ikev1 transform-set L2L 

crypto map BRANCH1 interface outside

crypto ikev1 enable outside

crypto ikev1 policy 1

 encr aes

 authentication pre-share

 group 2

!

tunnel-group 134.95.56.18 type ipsec-l2l

tunnel-group 134.95.56.18 ipsec-attributes

 ikev1 pre-shared-key SHAREDSECRET

!

 

The ENTERPRISE_PRIVATE-TRAFFIC access-group is important to allow the IP traffic through the firewall from remote subnets to the inside subnets. The traffic wiill be blocked by the ASA if this access-list is not configured and applied to the inside vlan interface.

 

Branch office n°1 - ASA 5505 remote device configuration

interface Vlan1

 nameif inside

 security-level 100

 ip address 172.16.129.1 255.255.255.0

!

interface Vlan2

 nameif outside

 security-level 0

 ip address 134.95.56.18 255.255.255.240

!

object network BRANCH01_NETWORK

 subnet 172.16.129.0 255.255.255.0

object network BRANCH_NETWORK

 subnet 172.16.128.0 255.255.128.0

object network CAMPUS_NETWORK

 subnet 172.16.0.0 255.255.128.0

object network PRIVATE_NETWORK

 subnet 176.16.0.0 255.255.0.0

!

route outside 172.16.0.0 255.255.128.0 134.95.56.17 1

!

access-list PRIVATE_TRAFFIC extended permit tcp object BRANCH01_NETWORK object CAMPUS_NETWORK

access-list PRIVATE_TRAFFIC extended permit icmp object BRANCH01_NETWORK object CAMPUS_NETWORK

access-list ENTERPRISE_PRIVATE-TRAFFIC extended permit tcp object PRIVATE_NETWORK object PRIVATE_NETWORK

access-list ENTERPRISE_PRIVATE-TRAFFIC extended permit icmp object CAMPUS_NETWORK object BRANCH_NETWORK

!

!

access-group ENTERPRISE_PRIVATE-TRAFFIC out interface inside

!

!

crypto ipsec ikev1 transform-set L2L esp-aes 256 esp-sha-hmac

!

crypto map BRANCH1 1 match address PRIVATE_TRAFFIC

crypto map BRANCH1 1 set peer 134.95.56.17 

crypto map BRANCH1 1 set security-association lifetime seconds 86400

crypto map BRANCH1 1 set ikev1 transform-set L2L 

crypto map BRANCH1 interface outside

crypto ikev1 enable outside

crypto ikev1 policy 1

 encr aes

 authentication pre-share

 group 2

!

tunnel-group 134.95.56.17 type ipsec-l2l

tunnel-group 134.95.56.17 ipsec-attributes

 ikev1 pre-shared-key SHAREDSECRET

!

 

Check the IPSEC tunnel establishment using show commands

Use show crypto isakmp sa to shows the Internet Security Association Management Protocol (ISAKMP) security associations (SAs) built between the two firewalls. and show crypto ipsec sa to check IPSEC security associations and monitor encrypted traffic statistics

ASA-CAMPUS-×××#show crypto isakmp sa

IKEv1 SAs:

Active SA: 1
  Rekey SA: 0 (A tunnel will report 1 Active and 1 Rekey SA during rekey)

Total IKE SA: 1
1   IKE Peer: 134.95.56.18
    Type    : L2L             Role    : Initiator
    Rekey   : no              State   : QM_IDLE

There are no IKEv2 SAs

 

ASA-CAMPUS-×××#show crypto ipsec sa

interface: outside
    Crypto map tag: BRANCH1, seq num: 1, local addr 134.95.56.17

permit tcp object CAMPUS_NETWORK object BRANCH01_NETWORK
      local  ident (addr/mask/prot/port): (172.16.0.0/255.255.128.0/6/0)
      remote  ident (addr/mask/prot/port): (172.16.129.0/255.255.255.0/6/0)
      current_peer 134.95.56.18
      #pkts encaps: 0, #pkts encrypt: 0, #pkts digest: 0
      #pkts decaps: 6, #pkts decrypt: 6, #pkts verify: 0
      #pkts compressed: 0, #pkts decompressed: 0
      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
      #send errors 0, #recv errors 0

local crypto endpt.: 134.95.56.17/0, remote crypto endpt.:134.95.56.18/0
      path mtu 1500, ip mtu, ipsec overhead 78,  media mtu 1500
      current outbound spi: 0x6386132D(1669731117)
      current inbound spi: 0x04B729EA(1669731117)

inbound esp sas:
      spi: 0x04B729EA(79112682)
         transform: esp-aes 256 esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, }
         slot: 0, conn id: 2007, crypto map: BRANCH1
         sa timing: remaining key lifetime (k/sec): (4525504/85906)
         IV size: 16 bytes
         replay detection support: N
         Anti replay bitmap:
          0x00000000 0x0000001F
     outbound esp sas:
      spi: 0x6386132D(1669731117)
         transform: esp-aes 256 esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, }
         slot: 0, conn id: 2008, crypto map: BRANCH1
         sa timing: remaining key lifetime (k/sec): (4525504/85906)
         IV size: 16 bytes
         replay detection support: N
         Anti replay bitmap:
          0x00000000 0x00000001

Crypto map tag: BRANCH1, seq num: 1, local addr 134.95.56.17

permit icmp object CAMPUS_NETWORK object BRANCH01_NETWORK
      local  ident (addr/mask/prot/port): (172.16.0.0/255.255.128.0/1/0)
      remote  ident (addr/mask/prot/port): (172.16.129.0/255.255.255.0/1/0)
      current_peer 134.95.56.18
      #pkts encaps: 7, #pkts encrypt: 7, #pkts digest: 0
      #pkts decaps: 0, #pkts decrypt: 0, #pkts verify: 0
      #pkts compressed: 0, #pkts decompressed: 0
      #pkts not compressed: 0, #pkts comp failed: 0, #pkts decomp failed: 0
      #pre-frag successes: 0, #pre-frag failures: 0, #fragments created: 0
      #PMTUs sent: 0, #PMTUs rcvd: 0, #decapsulated frgs needing reassembly: 0
      #send errors 1, #recv errors 0

local crypto endpt.: 134.95.56.17/0, remote crypto endpt.:134.95.56.18/0
      path mtu 1500, ip mtu, ipsec overhead 78,  media mtu 1500
      current outbound spi: 0x6386132D(1669731117)
      current inbound spi: 0x04B729EA(1669731117)

inbound esp sas:
      spi: 0x04B729EA(79112682)
         transform: esp-aes 256 esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, }
         slot: 0, conn id: 2007, crypto map: BRANCH1
         sa timing: remaining key lifetime (k/sec): (4525504/85906)
         IV size: 16 bytes
         replay detection support: N
         Anti replay bitmap:
          0x00000000 0x0000001F
     outbound esp sas:
      spi: 0x6386132D(1669731117)
         transform: esp-aes 256 esp-sha-hmac no compression
         in use settings ={L2L, Tunnel, }
         slot: 0, conn id: 2008, crypto map: BRANCH1
         sa timing: remaining key lifetime (k/sec): (4525504/85906)
         IV size: 16 bytes
         replay detection support: N
         Anti replay bitmap:
          0x00000000 0x00000001

 

源文档 <http://wwwkmhcpx.cn