What is IPsec [Internet Protocol Security]? – Learning Guide
What is IPsec (Internet Protocol Security)

What is IPsec [Internet Protocol Security]? – Learning Guide

Last updated on 14th Jul 2020, Blog, General

About author

Dinesh (Sr Network Engineer )

Delegates in Corresponding Technical Domain with 6+ Years of Experience. Also, He is a Technology Writer for Past 3 Years & Share's this Informative Blogs for us.

(5.0) | 17529 Ratings 999

IPSEC is the most popular form of VPN used today. It is important to understand how IPSEC works in order to troubleshoot issues with IPSEC tunnels. IPSEC is an end-to-end security scheme. This means that data is encrypted on one end and decrypted on the other end of the connection.

IPsec uses ESP or AH for initial encryption

ESP is the most popular method and is used in Barracuda VPNs

ESP Encapsulating Security Payload or ESP

In tunnel mode ESP adds a new ip header, after encrypting the original ip header and payload.

In transport mode ESP does not create a new header. It simply encypts the payload

In both modes an ESP header field is added to the packet.

ESP divides the date into smaller pieces in which it encrypts it with AES

    Subscribe For Free Demo

    [custom_views_post_title]

    Phase one: IKE1 (internet key exchange)

    ISAKMP SA (phase1)

    Occurs on UDP port 500

    The server and client negotiate an encryption algorithm that will be used to transport the encryption keys to be used during the transfer of data.

    This phase requires the following:

    • An encryption algorithm- This determines the depth and type of encryption.  (Keep in mind the deeper the encryption the slower the connection)
    • AES (advanced encryption Standard).  The key size used for an AES cipher specifies the number of repetitions of transformation rounds that convert the input, called the plaintext, into the final output, called the ciphertext. The number of cycles of repetition are as follows:
      • 10 cycles of repetition for 128-bit keys.
      • 12 cycles of repetition for 192-bit keys.
      • 14 cycles of repetition for 256-bit keys.
      • 3DES – (Triple DES) they tripled the depth of the encryption of DES
      • DES – A 56 bit algorithm that is susceptible to brute force attacks
      • AES256 – Considered the top encryption cipher has the most combinations of possible keys
      • Blowfish – A symmetric-key block cipher. This a good encryption cipher that encrypts in blocks
      • Cast – another symmetric-key block cipher
    • A hashing algorithm
      • SHA– (secure Hash Algorithm) this is a 160-bit hash
      • MD5 – (message-digest algorithm) a 128-bit hash
    • Diffie-Hellman key (DH key ) also known as MODP Group on other Site 2 Site VPNs
      • Group1 – 768-bit
      • Group 2 – 1024-bit
      • Group 5 – 1536-bit
      • Lifetime – Rekeying time in milliseconds.

    Phase2: (Ike2) internet key exchange

     ISAKMP(phase2)

    Phase two also  occurs over UDP port 500.

    Phase two requires the same information that phase one needs in set up and also provides with one more layer of security through the form of authentication

    Course Curriculum

    Get Hand-on Experience from CCNA Routing and Switching Training Course By IT Experts

    Weekday / Weekend BatchesSee Batch Details

    Authentication can take place through the following means:

    • PSK (pre shared key) most commonly used, this is simply a pass phase that is shared.
    • Client certificate

    After the two IKE phases have completed data is transported through the establish VPN tunnel

    The best way to troubleshoot IPSEC is to look at a packet capture. The IPSEC exchange is easy to see and identify in a packet capture.

    Here is a sample packet capture showing the ISAKMP information you will need when troubleshooting both ends of a site 2 site VPN tunnel.

    The packet you want to look at is “Identity protection” . This packet shows all of the phase one settings you are using to negotiate phase one between the two ends on the tunnel. There are several packets of this type. You will need to look at each until you find the one with the IKE attributes.

    Understanding IPSec rar37 Article

    After opening the packet you will want to expand out the payload so you can see how each end is set up. You can also expand each IKE attribute to see what their individual settings are.

    In this packet the initiating server is proposing the listed protocols it will be followed by an informational packet from the receiving server accepting the protocols or not accepting.

    IT Security Sample Resumes! Download & Edit, Get Noticed by Top Employers! Download

    In the following packet the proposal was not chosen. This means that the IKE 1 settings are not the same on both devices. And the receiving device is rejecting the proposed IKE 1 settings.

    Understanding IPSec rar37 Article

    Understanding How IPsec works will help you to set up and troubleshoot your Site to Site and client to site connections.

    Are you looking training with Right Jobs?

    Contact Us
    Get Training Quote for Free