Таланты в работе
  • Найти вакансии
  • Добавить резюме
Вход
  • Вход
  • Регистрация
  • Работодателям
  • Войти

    Напомнить пароль

    Нет учетной записи?

    Зарегистрироваться
  • Еще
    • Кадровые агентства
    • Новости
    • Библиотека
    • ВУЗы
    • Услуги соискателям
    • Работодателям
  • Работодателям
  1. Talent.UA
  2. Поиск резюме
  3. IT: Специалисты, PM, Lead
  4. Резюме Support
  • К списку резюме
  • Войти как работодатель
  • Присылать похожие
  •  Распечатать резюме
  • Добавить в избранные

Asdasd Asd

Резюме Support

9 ноября 2021 г.

Львов

Войдите или зарегистрируйтесь как работодатель, чтобы увидеть контактную информацию.

  • Образование—
  • Опыт работыне имеет значения
  • Тип работылюбая
  • Вид занятостилюбой

Профессиональные навыки

  • 3D
  • Business
  • CIPA
  • Composite
  • Design
  • Git
  • HR
  • HTML
  • iOS
  • LESS
  • Lua
  • Management
  • Networking
  • Pear
  • Perl
  • Sales
  • Shell
  • Support
  • TCP/IP
  • NET

Исходный текст

background image

IBM i

***********

Security

Virtual Private Networking

IBM

background image

Note
Before using this information and the product it supports, read the information in “Notices” on page (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#89)

83 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#89).

This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is

licensed to you under the terms of the IBM License Agreement for Machine Code.

©

Copyright International Business Machines Corporation 1998, 2013.

US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with

IBM Corp.

background image

Contents

Virtual Private Networking.....................................................................................1 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#7)

What's new for IBM i 7.2..............................................................................................................................1 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#7)

PDF file for Virtual private network............................................................................................................. 2 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#8)

Concepts.......................................................................................................................................................2 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#8)

IP Security protocols.............................................................................................................................. 2 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#8)

Authentication Header......................................................................................................................3 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#9)

Encapsulating Security Payload....................................................................................................... 5 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#11)

AH and ESP combined...................................................................................................................... 6 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#12)

Enhanced Cryptographic Algorithms................................................................................................6 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#12)

Key management....................................................................................................................................8 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#14)

IKE **************************************************************************************************************************************************** (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#16)

IKE_SA rekey.................................................................................................................................. 11 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#17)

URL lookup of certificates...............................................................................................................11 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#17)

Layer 2 Tunnel Protocol....................................................................................................................... 11 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#17)

Network address translation for VPN.................................................................................................. 12 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#18)

NAT compatible IPSec with UDP......................................................................................................... 13 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#19)

IP Compression.................................................................................................................................... 14 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#20)

VPN and IP filtering.............................................................................................................................. 15 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#21)

VPN connections with no policy filters...........................................................................................15 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#21)

Implicit IKE..................................................................................................................................... 15 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#21)

Scenarios....................................................................................................................................................16 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#22)

Scenario: Basic branch office connection........................................................................................... 16 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#22)

Completing the planning worksheets............................................................................................ 18 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#24)

Configuring VPN on System A.........................................................................................................19 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#25)

Configuring VPN on System C.........................................................................................................20 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#26)

Starting VPN....................................................................................................................................20 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#26)

Testing a connection.......................................................................................................................20 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#26)

Scenario: Basic business to business connection...............................................................................20 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#26)

Completing the planning worksheets............................................................................................ 22 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#28)

Configuring VPN on System A.........................................................................................................23 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#29)

Configuring VPN on System C.........................................................................................................24 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#30)

Activating packet rules................................................................................................................... 24 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#30)

Starting a connection......................................................................................................................24 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#30)

Testing a connection.......................................................................................................................24 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#30)

Scenario: Protecting an L2TP voluntary tunnel with IPSec.................................................................25 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#31)

Configuring VPN on System A.........................................................................................................26 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#32)

Configuring a PPP connection profile and virtual line on System A.............................................. 28 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#34)

Applying the l2tptocorp dynamic-key group to the toCorp PPP profile................................. 29 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#35)

Configuring VPN on System B.........................................................................................................30 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#36)

Configuring a PPP connection profile and virtual line on System B.............................................. 30 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#36)

Activating packet rules................................................................................................................... 31 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#37)

Scenario: Firewall friendly VPN............................................................................................................31 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#37)

Completing the planning worksheets............................................................................................ 33 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#39)

Configuring VPN on Gateway B...................................................................................................... 34 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#40)

Configuring VPN on System E.........................................................................................................35 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#41)

Starting Connection........................................................................................................................ 36 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#42)

Testing the connection................................................................................................................... 37 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#43)

Scenario: VPN connection to remote users.........................................................................................37 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#43)

Completing planning worksheets for VPN connection from the branch office to remote (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#43)

sales people...............................................................................................................................37 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#43)

Configuring L2TP terminator profile for System A.........................................................................38 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#44)

iii

background image

Starting receiver connection profile...............................................................................................39 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#45)

Configuring a VPN connection on System A for remote clients.....................................................40 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#46)

Activating filter rules.......................................................................................................................40 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#46)

Configuring VPN on Windows client............................................................................................... 41 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#47)

Testing VPN connection between endpoints.................................................................................42 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#48)

Scenario: Using network address translation for VPN........................................................................ 42 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#48)

Planning for VPN........................................................................................................................................ 44 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#50)

VPN setup requirements......................................................................................................................44 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#50)

Determining what type of VPN to create............................................................................................. 44 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#50)

Completing VPN planning work sheets............................................................................................... 45 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#51)

Planning work sheet for dynamic connections.............................................................................. 45 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#51)

Planning work sheet for manual connections................................................................................46 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#52)

Configuring VPN......................................................................................................................................... 48 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#54)

Configuring VPN connections with the New Connection wizard.........................................................49 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#55)

Configuring VPN security policies........................................................................................................ 49 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#55)

Configuring an Internet Key Exchange policy................................................................................ 49 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#55)

Configuring a data policy................................................................................................................ 50 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#56)

Configuring a secure VPN connection..................................................................................................50 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#56)

Part 1: Configure a dynamic-key group..........................................................................................51 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#57)

Part 2: Configure a dynamic-key connection.................................................................................51 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#57)

Configuring a manual connection........................................................................................................ 51 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#57)

Configuring a dynamic connection.......................................................................................................52 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#58)

Configuring VPN packet rules.............................................................................................................. 52 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#58)

Configuring the pre-IPSec filter rule.............................................................................................. 53 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#59)

Configuring a policy filter rule.........................................................................................................54 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#60)

Defining an interface for the VPN filter rules................................................................................. 55 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#61)

Activating VPN packet rules........................................................................................................... 56 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#62)

Configure traffic flow confidentiality................................................................................................... 57 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#63)

Configuring extended sequence number............................................................................................ 57 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#63)

Configuring populate from packet....................................................................................................... 57 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#63)

Configuring NPF VPN for VIPA............................................................................................................. 58 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#64)

Configuration Differences for IKEv2.................................................................................................... 59 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#65)

Starting a VPN connection................................................................................................................... 59 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#65)

Managing VPN............................................................................................................................................ 59 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#65)

Setting default attributes for your connections.................................................................................. 59 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#65)

Resetting connections in error state....................................................................................................60 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#66)

Viewing error information.................................................................................................................... 60 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#66)

Viewing attributes of active connections.............................................................................................60 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#66)

Viewing VPN server job logs.................................................................................................................61 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#67)

Viewing attributes of Security Associations........................................................................................ 61 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#67)

Stopping a VPN connection..................................................................................................................61 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#67)

Deleting VPN configuration objects..................................................................................................... 61 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#67)

Troubleshooting VPN.................................................................................................................................61 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#67)

Getting started with VPN troubleshooting...........................................................................................62 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#68)

Other things to check......................................................................................................................62 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#68)

Common VPN configuration errors and how to fix them.....................................................................63 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#69)

VPN error message: TCP5B28........................................................................................................63 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#69)

VPN error message: Item not found.............................................................................................. 64 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#70)

VPN error message: PARAMETER PINBUF IS NOT VALID............................................................ 64 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#70)

VPN error message: Item not found, Remote key server..............................................................65 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#71)

VPN error message: Unable to update the object......................................................................... 65 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#71)

VPN error message: Unable to encrypt key................................................................................... 65 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#71)

VPN error message: CPF9821........................................................................................................66 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#72)

VPN error: All keys are blank..........................................................................................................66 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#72)

VPN error: Connection has enabled status after you stop it......................................................... 66 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#72)

VPN error: Active filter rules fail to deactivate...............................................................................67 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#73)

VPN error: The key connection group for a connection changes.................................................. 67 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#73)

Troubleshooting VPN with the QIPFILTER journal..............................................................................67 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#73)

iv

background image

Enabling the QIPFILTER journal.....................................................................................................67 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#73)

Using the QIPFILTER journal..........................................................................................................68 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#74)

QIPFILTER journal fields................................................................................................................ 68 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#74)

Troubleshooting VPN with the QVPN journal...................................................................................... 70 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#76)

Enabling the QVPN journal............................................................................................................. 70 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#76)

Using the QVPN journal.................................................................................................................. 71 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#77)

QVPN journal fields.........................................................................................................................71 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#77)

Troubleshooting VPN with the VPN job logs........................................................................................73 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#79)

Common VPN Connection Manager error messages.....................................................................73 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#79)

Troubleshooting VPN with the communications trace........................................................................80 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#86)

Related information................................................................................................................................... 82 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#88)

Notices................................................................................................................83 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#89)

Programming interface information.......................................................................................................... 84 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#90)

Trademarks................................................................................................................................................ 84 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#90)

Terms and conditions................................................................................................................................ 85 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#91)

v

background image

vi

background image

Virtual Private Networking

A virtual private network (VPN) allows your company to securely extend its private intranet over the

existing framework of a public network, such as the Internet. With VPN, your company can control

network traffic while providing important security features such as authentication and data privacy.
You can configure VPN with IBM

®

Navigator for i, the graphical user interface (GUI) for IBM i. It allows you

to create a secure end-to-end path between any combination of host and gateway. VPN uses

authentication methods, encryption algorithms, and other precautions to ensure that data sent between

the two endpoints of its connection remains secure.
VPN runs on the network layer of the TCP/IP layered communications stack model. Specifically, VPN uses

the IP Security Architecture (IPSec) open framework. IPSec provides base security functions for the

Internet, as well as furnishes flexible building blocks from which you can create robust, secure virtual

private networks.
VPN also supports Layer 2 Tunnel Protocol (L2TP) VPN solutions. L2TP connections, which are also called

virtual lines, provide cost-effective access for remote users by allowing a corporate network server to

manage the IP addresses assigned to its remote users. Further, L2TP connections provide secure access

to your system or network when you protect them with IPSec.
It is important that you understand the effect a VPN will have on your entire network. Correct planning

and implementation are essential to your success. Review these topics to ensure that you know how

VPNs work and how you might use them:

What's new for IBM i 7.2

Read about new or changed information for the Virtual Private Networking topic collection.

IKE Version 2
Enhancements were added to the IKE version 2 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#16) support.
• NAT compatible IpSec negotiation support in IKEv2.
• Rekey of IKE_SA.
• Authentication with Elliptical Curve Digital Signature Algorithm (ECDSA).
• URL lookup of certificates.
• Enhanced Cryptographic Algorithms for Key Ex (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#12)change Policy and Data Policy security association

attributes.

Filter rules and VPN commands
There are new commands to load and unload filter rules and to manage VPN connections.
• LODIPFTR - load and unload filter rules.
• STRVPNCNN - start VPN connection.
• ENDVPNCNN - end VPN connection.
• CPYVPNCFGF - XML export and import VPN configurations.

How to see what's new or changed
To help you see where technical changes were made, the information center uses:
• The image to mark where new or changed information begins.
• The image to mark where new or changed information ends.

©

Copyright IBM Corp. 1998, 2013

1

background image

In PDF files, you might see revision bars (|) in the left margin of new and changed information.
To find other information about what's new or changed this release, see the Memo to users ().

PDF file for Virtual private network

You can view and print a PDF file of this information.

To view or download the PDF version of this document, select Virtual private network (VPN) ()

.

Saving PDF files
To save a PDF on your workstation for viewing or printing:

1. Right-click the PDF link in your browser.
2. Click the option that saves the PDF locally.
3. Navigate to the directory in which you would like to save the PDF.
4. Click Save.

Downloading Adobe Reader
You need Adobe Reader installed on your system to view or print these PDFs. You can download a copy
from the Adobe Web site (www.adobe.com/products/ (http://www.adobe.com/products/acrobat/readstep.html)acrobat/readstep.html)

.

VPN concepts

It is important that you have at least a basic knowledge of standard VPN technologies before you

implement a VPN connection.
Virtual private networking (VPN) uses several important TCP/IP protocols to protect data traffic. To better

understand how any VPN connection works, familiarize yourself with these protocols and concepts and

how VPN uses them:

IP Security protocols

IP Security (IPSec) provides a stable, long lasting base for providing network layer security.
IPSec supports all of the cryptographic algorithms in use today, and can also accommodate newer, more

powerful algorithms as they become available. IPSec protocols address these major security issues:
Data origin authentication

Verifies that each datagram was originated by the claimed sender.

Data integrity

Verifies that the contents of a datagram were not changed in transit, either deliberately or due to

random errors.

Data confidentiality

Conceals the content of a message, typically by using encryption.

Replay protection

Ensures that an attacker cannot intercept a datagram and play it back at some later time.

Automated management of cryptographic keys and security associations

Ensures that your VPN policy can be used throughout the extended network with little or no manual

configuration.

VPN uses two IPSec protocols to protect data as it flows through the VPN: Authentication Header (AH)

and Encapsulating Security Payload (ESP). The other part of IPSec enablement is the Internet Key

Exchange (IKE) protocol, or key management. While IPSec encrypts your data, IKE supports automated

2 IBM i: Virtual Private Networking

background image

negotiation of security associations (SAs), and automated generation and refreshing of cryptographic

keys.
Note: Some VPN configurations could have a security vulnerability depending on how IPSec is configured.

The vulnerability affects configurations where IPsec is configured to employ Encapsulating Security

Payload (ESP) in tunnel mode with confidentiality (encryption), but without integrity protection

(authentication) or Authentication Header (AH). The default configuration when ESP is selected always

includes an authentication algorithm that provides integrity protection. Therefore, unless the

authentication algorithm in the ESP transform is removed, VPN configurations will be protected from this

vulnerability. The IBM Universal Connection VPN configuration is not affected by this vulnerability.
To check if your system is affected by this security vulnerability follow these steps:

1. In IBM Navigator for i, expand Network > IP Policies > Virtual Private Networking and click IP

Security Policies.

2. Right-click Data Policies and select Open.
3. Right-click on the data policy you want to check and select Properties.
4. Click on the Proposals tab.
5. Select any of the data protection proposals that are using the ESP protocol and click Edit.
6. Click on the Transforms tab.
7. Select any transforms from the list that use the ESP protocol and click Edit.
8. Verify that the Authentication algorithm has any other value then None.

The Internet Engineering Task Force (IETF) formally defines IPSec in Request for Comment (RFC) 4301,

Security Architecture for the Internet Protocol. You can view this RFC on the Internet at the following Web

site: http://www.rfc-editor.org.
The principal IPSec protocols are listed below:
Related concepts
Key management (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#14)

A dynamic VPN provides additional security for your communications by using the Internet Key Exchange

(IKE) protocol for key management. IKE allows the VPN servers on each end of the connection to

negotiate new keys at specified intervals.
Related information
http://www.rfc-editor.org (http://www.rfc-editor.org)

Authentication Header

The Authentication Header (AH) protocol provides data origin authentication, data integrity, and replay

protection. However, AH does not provide data confidentiality, which means that all of your data is sent in

the clear.
AH ensures data integrity with the checksum that a message authentication code, like MD5, generates. To

ensure data origin authentication, AH includes a secret shared key in the algorithm that it uses for

authentication. To ensure replay protection, AH uses a sequence number field within the AH header. It is

worth noting here, that these three distinct functions are often lumped together and referred to as

authentication. In the simplest terms, AH ensures that your data has not been tampered with en route to

its final destination.
Although AH authenticates as much of the IP datagram as possible, the values of certain fields in the IP

header cannot be predicted by the receiver. AH does not protect these fields, known as mutable fields.

However, AH always protects the payload of the IP packet.
The Internet Engineering Task Force (IETF) formally defines AH in Request for Comment (RFC) 4302, IP

Authentication Header. You can view this RFC on the Internet at the following Web site: http://www.rfc-

editor.org.

Virtual Private Networking 3

background image

Ways of using AH
You can apply AH in two ways: transport mode or tunnel mode. In transport mode, the IP header of the

datagram is the outermost IP header, followed by the AH header and then the payload of the datagram.

AH authenticates the entire datagram, except the mutable fields. However, the information contained in

the datagram is transported in the clear and is, therefore, subject to eavesdropping. Transport mode

requires less processing overhead than tunnel mode, but does not provide as much security.
Tunnel mode creates a new IP header and uses it as the outermost IP header of the datagram. The AH

header follows the new IP header. The original datagram (both the IP header and the original payload)

comes last. AH authenticates the entire datagram, which means that the responding system can detect

whether the datagram changed while in transit.
When either end of a security association is a gateway, use tunnel mode. In tunnel mode the source and

destination addresses in the outermost IP header do not need to be the same as those in the original IP

header. For example, two security gateways might operate an AH tunnel to authenticate all traffic

between the networks they connect together. In fact, this is a very typical configuration.
The main advantage to using tunnel mode, is that tunnel mode totally protects the encapsulated IP

datagram. In addition, tunnel mode makes it possible to use private addresses.

Why AH?
In many cases, your data only requires authentication. While the Encapsulating Security Payload (ESP)

protocol can perform authentication, AH does not affect your system performance as does ESP. Another

advantage of using AH, is that AH authenticates the entire datagram. ESP, however, does not authenticate

the leading IP header or any other information that comes before the ESP header.
In addition, ESP requires strong cryptographic algorithms in order to be put into effect. Strong

cryptography is restricted in some regions, while AH is not regulated and can be used freely around the

world.

Using ESN with AH
If you use the AH protocol then you might want to enable Extended Sequence Number (ESN). ESN allows

you to transmit large volumes of data at a high speed with out re-keying. The VPN connection uses a 64-

bit sequence numbers instead of 32-bit numbers over IPSec. Using 64-bit sequence numbers allows

more time before re-keying, which prevents sequence number exhaustion and minimizes the use of

system resources.

What algorithms does AH use to protect my information?
AH uses algorithms known as hashed message authentication codes (HMAC). Specifically, VPN uses

HMAC-MD5, HMAC-SHA, HMAC-SHA-256,HMAC-SHA384, HMAC-SHA512, or AES-XCBC-MAC. Each of

the algorithms take variable-length input data and a secret key to produce fixed-length output data

(called a hash or MAC value). If the hashes of two messages match, then it is likely that the messages are

the same.
The Internet Engineering Task Force (IETF) formally defines the algorithms in the following Request for

Comments (RFC):
• HMAC-MD*************, HMAC-MD5 IP Authentication with Replay Prevention
• HMAC-SHA in RFC 2404, The Use of HMAC-******** within ESP and AH
• HMAC-SHA_****************, and HMAC-SHA-***************, Using HMAC-SHA-256, HMAC-

SHA-384, and HMAC-SHA-512 with IPsec

• AES-XCBC-MAC in RFC 3566, The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec
You can view these RFCs on the Internet at the following Web site: http://www.rfc-editor.org.
Related concepts
Encapsulating Security Payload (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#11)

4 IBM i: Virtual Private Networking

background image

The Encapsulating Security Payload (ESP) protocol provides data confidentiality, and also optionally

provides data origin authentication, data integrity checking, and replay protection.
Enhanced Cryptographic Algorithms (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#12)

Cryptographic algorithms supported in the VPN selection for Key Exchange Policy and Data policy security

association attributes.
Related information
http://www.rfc-editor.org (http://www.rfc-editor.org)

Encapsulating Security Payload

The Encapsulating Security Payload (ESP) protocol provides data confidentiality, and also optionally

provides data origin authentication, data integrity checking, and replay protection.
The difference between ESP and the Authentication Header (AH) protocol is that ESP provides encryption,

while both protocols provide authentication, integrity checking, and replay protection. With ESP, both

communicating systems use a shared key for encrypting and decrypting the data they exchange.
If you decide to use both encryption and authentication, then the responding system first authenticates

the packet and then, if the first step succeeds, the system proceeds with decryption. This type of

configuration reduces processing overhead, as well as reduces your vulnerability to denial-of-service

attacks.

Two ways of using ESP
You can apply ESP in two ways: transport mode or tunnel mode. In transport mode, the ESP header

follows the IP header of the original IP datagram. If the datagram already has an IPSec header, then the

ESP header goes before it. The ESP trailer and the optional authentication data follow the payload.
Transport mode does not authenticate or encrypt the IP header, which might expose your addressing

information to potential attackers while the datagram is in transit. Transport mode requires less

processing overhead than tunnel mode, but does not provide as much security. In most cases, hosts use

ESP in transport mode.
Tunnel mode creates a new IP header and uses it as the outermost IP header of the datagram, followed

by the ESP header and then the original datagram (both the IP header and the original payload). The ESP

trailer and the optional authentication data are appended to the payload. When you use both encryption

and authentication, ESP completely protects the original datagram because it is now the payload data for

the new ESP packet. ESP, however, does not protect the new IP header. Gateways must use ESP in tunnel

mode.

What algorithms does ESP use to protect my information?
ESP uses a symmetric key that both communicating parties use to encrypt and decrypt the data they

exchange. The sender and the receiver must agree on the key before secure communication takes place

between them. VPN uses Data Encryption Standard (DES), triple-DES (3DES), Advanced Encryption

Standard (AES), or AES-CBC and AES-CTR for encryption.
If you choose the AES algorithm for encryption then you might want to enable Extended Sequence

Number (ESN). ESN allows you to transmit large volumes of data at a high speed. The VPN connection

uses a 64-bit sequence numbers instead of 32-bit numbers over IPSec. Using 64-bit sequence numbers

allows more time before re-keying, which prevents sequence number exhaustion and minimizes the use

of system resources.
The Internet Engineering Task Force (IETF) formally defines the algorithms in the following Request for

Comments (RFC):
• DES in Request for Comment (RFC) 1829, The ESP DES-CBC Transform
• 3DES in RFC 1851, The ESP Triple DES Transform
• AES-CBC in RFC 3602, The AES-CBC Cipher Algorithm and Its Use with IPsec
• AES-CTR in RFC 3686, Using Advanced Encryption Standard (AES) Counter Mode with IPSec

Encapsulating Security Payload (ESP)

Virtual Private Networking 5

background image

You can view these and other RFCs on the Internet at the following Web address: http://www.rfc-

editor.org.
ESP uses HMAC-MD5, HMAC-SHA, HMAC-SHA-*****************, HMAC-SHA-512, and AES-XCBC-

MAC algorithms to provide authentication functions. Each of the algorithms take variable-length input

data and a secret key to produce fixed-length output data (called a hash or MAC value). If the hashes of

two messages match, then it is likely that the messages are the same.
The Internet Engineering Task Force (IETF) formally defines the algorithms in the following Request for

Comments (RFC):
• HMAC-MD*************, HMAC-MD5 IP Authentication with Replay Prevention
• HMAC-SHA in RFC 2404, The Use of HMAC-******** within ESP and AH
• HMAC-SHA_*****************, and HMAC-SHA-***************, Using HMAC-SHA-256, HMAC-

SHA-384, and HMAC-SHA-512 with IPsec

• AES-XCBC-MAC in RFC 3566, The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec
You can view these RFCs on the Internet at the following Web address: http://www.rfc-editor.org.
ESP uses AES-CCM and AES-GCM to provide encryption and authentication. An authentication algorithm

cannot be selected if one of these "combined" algorithms is chosen.
• AES-CCM in RFC 4309, Using Advanced Encryption Standard (AES) CCM mode with IPSec Encapsulating

Security Payload (ESP)

• AES-GCM in RFC 4106, The Use of Galios/Counter Mode (GCM) in IPSec Encapsulating Security Payload

(ESP)

ESP uses AES-GMAC (Galios Message Authentication Code) to provide authentication, but not encryption.
• AES-GMAC in RFC 4543, The Use of Galios Message Authentication Code (GMAC) in IPSec ESP and AH.
Related concepts
Authentication Header (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#9)

The Authentication Header (AH) protocol provides data origin authentication, data integrity, and replay

protection. However, AH does not provide data confidentiality, which means that all of your data is sent in

the clear.
Enhanced Cryptographic Algorithms (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#12)

Cryptographic algorithms supported in the VPN selection for Key Exchange Policy and Data policy security

association attributes.
Related information
http://www.rfc-editor.org (http://www.rfc-editor.org)

AH and ESP combined

VPN allows you to combine AH and ESP for host-to-host connections in transport mode.
Combining these protocols protects the entire IP datagram. Although combining the two protocols offers

more security, the processing overhead involved might outweigh the benefit.

Enhanced Cryptographic Algorithms

Cryptographic algorithms supported in the VPN selection for Key Exchange Policy and Data policy security

association attributes.
Key Exchange Policy:
• Encryption

– 3DES-CBC
– AES-CBC (128, ************ bit)
– AES-CTR (128, ************ bit)

• Hash/PRF

6 IBM i: Virtual Private Networking

background image

– SHA
– HMAC-SHA-256
– HMAC-SHA-384
– HMAC-SHA-512
– AES-XCBC-MAC (HASH 96 bits; PRF 128 bits)

• Diffie-Hellman

– Group 1
– Group 2
– Group 14
– Group 19 (256 ECP)
– Group 20 (384 ECP)
– Group 24

Data Policy:
• Authentication

– SHA
– HMAC-SHA-256
– HMAC-SHA-384
– HMAC-SHA-512
– AES-XCBC-MAC

• Diffie-Hellman for PFS

– Group 1
– Group 2
– Group 14
– Group 19 (256 bit ECP)
– Group 20 (384 bit ECP)
– Group 24

• Encryption

– 3DES-CBC
– AES-CBC (128, ************ bit)
– AES-CTR (128, ************ bit)
– AES-CCM (128, ************ bit)
– AES-GCM (128, ************ bit)
– AES-GMAC (128, ************ bit)

In addition to the enhanced cryptographic algorithms being supported, the following algorithms are de-

emphasized. They are still supported, but the direction is to use them less.
• Hash

– MD5

• Encryption

– DES
– RC4
– RC5

Virtual Private Networking 7

background image

The Internet Engineering Task Force (IETF) formally defines the algorithms in the following Request for

Comments (RFC):
• AES-CBC in RFC 3602, The AES-CBC Cipher Algorithm and Its Use with IPsec
• AES-XCBC-MAC in RFC 3566, The AES-XCBC-MAC-96 Algorithm and Its Use With IPsec
• HMAC-SHA_*****************, and HMAC-SHA-***************, Using HMAC-SHA-256, HMAC-

SHA-384, and HMAC-SHA-512 with IPsec

• HMAC-MD*************, HMAC-MD5 IP Authentication with Replay Prevention
• DES in Request for Comment (RFC) 1829, The ESP DES-CBC Transform
• DH groups ********* in RFC 4754, IKE and IKEV2 Authentication Using the Elliptical Curve Digital

Signature Algorithm (ECDSA)

• AES-CTR in RFC 3686, Using Advanced Encryption (AES) Counter Mode with IPSec Encapsulating

Security Payload (ESP)

• AES-CCM in RFC 4309, Using Advanced Encryption Standard (AES) CCM mode with IPSec Encapsulating

Security Payload (ESP)

• AES-GCM in RFC 4106, The Use of Galios/Counter Mode (GCM) in IPSec Encapsulating Security Payload

(ESP)

• AES-GMAC in RFC 4543, The Use of Galios Message Authentication Mode (GMAC) in IPSec ESP and AH
You can view these RFCs on the Internet at the following Web address: http://www.rfc-editor.org.
Related concepts
Authentication Header (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#9)

The Authentication Header (AH) protocol provides data origin authentication, data integrity, and replay

protection. However, AH does not provide data confidentiality, which means that all of your data is sent in

the clear.
Encapsulating Security Payload (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#11)

The Encapsulating Security Payload (ESP) protocol provides data confidentiality, and also optionally

provides data origin authentication, data integrity checking, and replay protection.

Key management

A dynamic VPN provides additional security for your communications by using the Internet Key Exchange

(IKE) protocol for key management. IKE allows the VPN servers on each end of the connection to

negotiate new keys at specified intervals.
With each successful negotiation, the VPN servers regenerate the keys that protect a connection, thus

making it more difficult for an attacker to capture information from the connection. Additionally, if you use

perfect forward secrecy, attackers cannot derive future keys based on past keying information.
The VPN key manager is IBM's implementation of the Internet Key Exchange (IKE) protocol. The key

manager supports the automatic negotiation of security associations (SAs), as well as the automatic

generation and refresh of cryptographic keys.
A security association (SA) contains information that is necessary to use the IPSec protocols. For

example, an SA identifies algorithm types, key lengths and lifetimes, participating parties, and

encapsulation modes.
Cryptographic keys, as the name implies, lock, or protect, your information until it safely reaches its final

destination.
Note: Securely generating your keys is the most important factor in establishing a secure and private

connection. If your keys are compromised, then your authentication and encryption efforts, no matter

how strong, become worthless.
Phases of key management

The VPN key manager uses two distinct phases in its implementation.

8 IBM i: Virtual Private Networking

background image

Phase 1

Phase 1 establishes a master secret from which subsequent cryptographic keys are derived in

order to protect user data traffic. This is true even if no security protection yet exists between the

two endpoints. VPN uses either RSA signature mode, ECDSA signature mode, or preshared keys to

authenticate phase 1 negotiations, as well as to establish the keys that protect the IKE messages

that flow during the subsequent phase 2 negotiations.
A preshared key is a nontrivial string up to 128 characters long. Both ends of a connection must

agree on the preshared key. The advantage of using preshared keys is their simplicity, the

disadvantage is that a shared secret must be distributed out-of-band, for example over the

telephone or through registered mail, before IKE negotiations. Treat your preshared key like a

password.
RSA Signature authentication provides more security than preshared keys because this mode uses

digital certificates to provide authentication. You must configure your digital certificates using

Digital Certificate Manager. VPN has no limit on the RSA key lengths it supports. The certificates

that you use must come from certificate authorities that both key servers trust.
ECDSA Signatures are smaller than RSA Signatures of similar cryptographic strength, resulting is

improved communication efficiency. ECDSA Signatures supports three key lengths, ECDSA-256,

ECDSA-******************. You must configure your digital certificates using Digital Certificate

Manager. The certificates that you use must come from certificate authorities that both key

servers trust. ECDSA Signatures are not supported in IKEv1.

Phase 2

Phase 2, however, negotiates the security associations and keys that protect the actual

application data exchanges. Remember, up to this point, no application data has actually been

sent. Phase 1 protects the phase 2 IKE messages.
Once phase 2 negotiations are complete, your VPN establishes a secure, dynamic connection over

the network and between the endpoints that you defined for your connection. All data that flows

across the VPN is delivered with the degree of security and efficiency that was agreed on by the

key servers during the phase ************* negotiation processes.
In general, phase 1 negotiations are negotiated once a day, while phase 2 negotiations are

refreshed every 60 minutes or as often as every five minutes. Higher refresh rates increase your

data security, but decrease system performance. Use short key lifetimes to protect your most

sensitive data.

When you create a dynamic VPN by using IBM Navigator for i, you must define an IKE policy to enable

phase 1 negotiations and a data policy to govern phase 2 negotiations. Optionally, you can use the New

Connection wizard. The wizard automatically creates each of the configuration objects VPN requires to

work properly, including an IKE policy, data policy.

Suggested reading
If you want to read more about the Internet Key Exchange (IKE) protocol and key management, review

these Internet Engineering Task Force (IETF) Request for Comments (RFC):
IKEv1

• RFC 2407, The Internet IP Security Domain of Interpretation for ISAKMP
• RFC 2408, Internet Security Association and Key Management Protocol (ISAKMP)
• RFC 2409, The Internet Key Exchange (IKE)
These RFCs are currently supported for IKEv1.

You can view these RFCs on the Internet at the following Web site: http://www.rfc-editor.org.
Related concepts
Scenario: Firewall friendly VPN (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#37)

Virtual Private Networking 9

background image

In this scenario, a large insurance company wants to establish a VPN between a gateway in Chicago and a

host in Minneapolis when both networks are behind a firewall.
IP Security protocols (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#8)

IP Security (IPSec) provides a stable, long lasting base for providing network layer security.
IKE version 2 (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#16)

IKE version 2 is an enhancement to the Internet key exchange protocol.
Related tasks
Configuring an Internet Key Exchange policy (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#55)

The Internet Key Exchange (IKE) policy defines what level of authentication and encryption protection

IKE uses during phase 1 negotiations.
Configuring a data policy (a9dde851bd65dabb548d19d7478a12f6_197**********51636457827.1636457827.html#56)

A data policy defines what level of authentication or encryption protects data as it flows through the VPN.
Related information
http://www.rfc-editor.org (http://www.rfc-editor.org)

IKE version 2

IKE version 2 is an enhancement to the Internet key exchange protocol.
IKE version 2 (IKEv2) was developed by the IETF with RFC4306. IKEv2 enhances the function of

negotiating the dynamic key exchange and authentication of the negotiating systems for VPN.
IKEv2 also simplifies the key exchange flows and introduces measures to fix ambiguities and

vulnerabilities inherent in IKEv1.
• IKEv2 provides a simpler message flow for key exchange negotiations.
• IKEv2 provides options to rekey the IKE_SA without reauthentication.
• With IKEv2, the key life times for the IKE_SA and CHILD_SA are managed independent of the peer

system.

• IKEv2 is the basis for future enhancements to the key exchange protocol.
Both IKEv1 and IKEv2 protocols operate in two phases. The differences between the two protocols

include:
• The first phase in IKEv2 is IKE_SA, consisting of the message pair IKE_SA_INIT. The attributes of the

IKE_SA phase are defined in the Key Exchange Policy.

• The second phase in IKEv2 is CHILD_SA. The first CHILD_SA is the IKE_AUTH message pair. More

CHILD_SA message pairs can be sent for rekey and informational messages. The CHILD_SA attributes

are defined in the Data Policy.

IKEv2 provides a simpler and more efficient exchange.
• IKEv********* has two possible exchanges: main mode and aggressive mode. With main mode, the

phase ************* negotiations are in two separate phases. Phase 1 main mode uses six messages to

complete; phase 2 in quick mode uses three messages.

• IKEv2

‹›×
    Рубрика:
    • IT: Специалисты, PM, Lead
    Резюме опубликовано:
    09 ноября 2021 (13:38)
    Код резюме:
    540244
    • К списку резюме
    Пожаловаться на это резюме
    Распечатать
    Talent.UA
    ВакансииРезюмеsearchКадровые агентстваevent_seatСеминары и тренинги
    info_outlineО проектеcommentНовостиbookБиблиотекаsettingsAPI
    Библиотека
    ВУЗы УкраиныПТУ УкраиныОбразцы резюме
    Помощь
    Услуги
    work Услуги работодателям Услуги соискателям
    Контакты
    Отправить сообщениеinfo@talent.ua
    • Русский
    •  
    • Українська
    •  
    • English
    •  
    Пользовательское соглашениеКарта сайта©2025 Talent.UA
    Администрация сервера не несет ответственности за содержание частных объявлений
    QR code
    ©2025 Talent.UA