dhcp configuration of ipsec tunnel mode n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
DHCP Configuration of IPSEC Tunnel Mode PowerPoint Presentation
Download Presentation
DHCP Configuration of IPSEC Tunnel Mode

Loading in 2 Seconds...

play fullscreen
1 / 9

DHCP Configuration of IPSEC Tunnel Mode - PowerPoint PPT Presentation


  • 152 Views
  • Uploaded on

DHCP Configuration of IPSEC Tunnel Mode. Draft-ipsec-dhcp-08.txt Bernard Aboba Microsoft. Outline. Update Configuration Requirements Security Requirements DHCP usage Address pool selection Walkthrough Summary. Update. Changes from draft –07

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'DHCP Configuration of IPSEC Tunnel Mode' - marlin


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
dhcp configuration of ipsec tunnel mode

DHCP Configuration of IPSEC Tunnel Mode

Draft-ipsec-dhcp-08.txt

Bernard Aboba

Microsoft

outline
Outline
  • Update
  • Configuration Requirements
  • Security Requirements
  • DHCP usage
  • Address pool selection
  • Walkthrough
  • Summary
update
Update
  • Changes from draft –07
    • Added references to IPSRA requirements draft, updated other references
    • Improved consistency of terminology
    • Added language on use of the assigned address in the quick mode exchange
  • Issues
    • Use of assigned address in quick mode exchange
    • Tear down or reuse of the DHCP SA
    • New htype for VPN
    • Contents of client-identifier option
configuration requirements
Configuration Requirements
  • To obtain an IP address and other configuration parameters appropriate to the class of host
  • To reconfigure when required
  • To support failover
    • Want to be able to maintain address/configuration state between VPN server failures
  • To integrate with existing IP address management facilities such as DHCP
    • Want single point of address and configuration management
security requirements
Security Requirements
  • To support address pool management
    • Examples
      • Extranet where vendors, contractors, employees have different access levels, allocated out of different address pools
      • Intranet where sales, marketing, engineering have different quality of service levels, allocated out of different pools
  • To authenticate where required
    • Since DHCP server typically not co-located with VPN server, can’t assume access to IKE credentials
    • DHCP authentication required to prove claim of identity in the client-identifier-option
dhcp packet body
DHCP Packet Body
  • Hardware address length (hlen), hardware type (htype), client hardware address (chaddr)
    • Should be unique to the segment client is connecting to
    • Hardware identifier tells VPN server/DHCP relay which VPN interface to forward DHCP messages to
      • Client-identifier-option isn’t returned by DHCP server
    • LAN: Use interface hardware address
    • Dialup with no LAN adapter
      • Use outer IP address + 2 random octets
      • Issue: Not consistent between reboots, would cause new configuration to be returned on reboot
  • Should a different htype be used for VPN?
    • Would make it easier for DHCP server to distinguish VPN clients
dhcp options
DHCP Options
  • Client-identifier-option
    • Must be unique to client
    • Consistency between reboots helpful
    • Can use Htype/Chaddr combination as suggested in RFC 2132
      • If a LAN interface exists, can use Chaddr from that interface
      • With no LAN interface (dialup case) can use IP address + two random octets
        • Not consistent between reboots, makes it difficult to support user or machine specific policies
    • Can use FQDN or NAI + interface number
      • Consistent between reboots
      • Makes it easier to administer DHCP authentication than using htype/chaddr; don’t want to change keys when LAN card changes
  • Classless static route option
    • Draft-ietf-dhc-csr-03.txt
    • Replacement for RFC 2132 static route option
address pool selection
Address Pool Selection
  • Support for existing methods for address pool selection
    • Client hardware address
    • Client-identifier option
    • Vendor-class-identifier option
    • Vendor-specific information option
    • Relay agent option
    • User class option
    • Subnet selection option
    • Host name option
    • Authentication option
  • Can leverage conditional behavior of popular DHCP servers
  • DHCP (even with authentication) is not an Access Control mechanism
    • Shouldn’t use address assignment as a way of restricting access; client can just choose its own IP address and get around the restrictions
walkthrough
Walkthrough
  • The remote host establishes an IKE MM or AM security association with the VPN server.
  • The remote host establishes a DHCP tunnel mode QM SA with the VPN server.
    • Filters
      • From client to server: Any to Any, destination: UDP port 67
      • From server to client: Any to Any, destination: UDP port 68
  • DHCP messages are exchanged between the remote host and the DHCP server, using the VPN server as a DHCP relay, configuring the intranet interface of the remote host.
    • Security gateway needs to snoop the DHCPACK to learn the IP address assigned to the VPN interfaces
  • The remote host MAY request deletion of the DHCP SA or the remote host and VPN server MAY continue to use the same SA for all subsequent traffic by adding temporary SPD selectors as with name ID types.
  • The remote host establishes a tunnel mode SA to the VPN server in a quick mode exchange.