RE: GRE VS. IPSEc

2000-11-24 Thread Liwanag, Manolito

See Below...

-Original Message-
From: Adam Quiggle [mailto:[EMAIL PROTECTED]]
Sent: Friday, November 24, 2000 4:20 PM
To: Liwanag, Manolito; [EMAIL PROTECTED]
Subject: RE: GRE VS. IPSEc


Manolito,

At 01:44 PM 11/23/00, you wrote:
Thanks for the detailed replied. BTW my first name is Manolito.  No big
deal.  Take a look at my comments below when you have a minute

-Original Message-
From: Adam Quiggle [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 23, 2000 1:13 PM
To: Liwanag, Manolito; 'Cisco Group Study'
Subject: Re: GRE VS. IPSEc


1) Are there just two sites that need to be connected together?
   (i.e. are there plans for a large scale deployment?)

  Right now yes..  This remote branch that I want to connect to corporate
is using ISDN to get to corporate and the Net.  Recent expansion have
raised
the number of ee to 40 and the bandwidth is now super saturated.  I was
planning on getting an ADSL connection to replace the ISDN.  Basically I
want that remote branch to access the internet locally - not to go through
our PIX at the corporate site - but other network traffic to go through an
IPSec tunnel to corporate.


What do you mean you have the number of ee to 40?  What is ee?

Answer : Employees

It is easy to encrypt traffic destined for the corporate site and
let the other "Internet" traffic go directly to it, not through
the corporate site.  Just make sure the access list used in your
crypto map only identifies traffic to the corporate office as
traffic to be encrypted.  If you are talking about PC's that need
this functionality it is a little bit more difficult.  Your VPN
client would have to support "split mode".  I believe the Cisco
3000 VPN router (formerly Altiga) can support this type of behavior,
although I don't have the details as to how it works.



2) Do you need encryption?
  Yes

3) Do you need authentication?

  I think yes as well
4) Do you need to protect against a replay attack?

  Yes
5) Who are you protecting your data from?

  everyone that is not an employee


With regard to protecting your data, will you be transmitting
trade secrets?  What would be the potential of having someone
intercept your messages?  Don't use a shotgun to kill a mosquito.



How about using IPSEc with GRE in it ?  Any suggestions are very helpfull
for me as I am new in this field.  I have set up an IPsec tunnel to our
other PIX in Australia and I figured that I could do the same for a 1605-R
router to the corporate PIX.


There is nothing wrong with using IPSec to encrypt a GRE tunnel,
it is perfectly acceptable.  The question is, do you want to spend
the time learning IPSec (this is a good thing) or do you just want
to get it done?  Realize that the skills required to implement CET
are not quite 1/2 the skills/knowledge you need to implement IPSec
(in your particular instance). Also realize that you can get bogged
down in the details once you realize the features that can be deployed
with IPSec.

AQ
p.s. Sorry about the name.  I did get it right this time. :-)

No worries Mate :D

Thank you very much for the feedback.  I am using this small project to
learn a bit more about IPsec and GRE.

**
  Adam Quiggle
  Senior Network Engineer
  MCI Worldcom/BP Amoco
  [EMAIL PROTECTED]
**

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: GRE VS. IPSEc

2000-11-24 Thread Adam Quiggle

Manolito,

At 01:44 PM 11/23/00, you wrote:
Thanks for the detailed replied. BTW my first name is Manolito.  No big
deal.  Take a look at my comments below when you have a minute

-Original Message-
From: Adam Quiggle [mailto:[EMAIL PROTECTED]]
Sent: Thursday, November 23, 2000 1:13 PM
To: Liwanag, Manolito; 'Cisco Group Study'
Subject: Re: GRE VS. IPSEc


1) Are there just two sites that need to be connected together?
   (i.e. are there plans for a large scale deployment?)

  Right now yes..  This remote branch that I want to connect to corporate
is using ISDN to get to corporate and the Net.  Recent expansion have raised
the number of ee to 40 and the bandwidth is now super saturated.  I was
planning on getting an ADSL connection to replace the ISDN.  Basically I
want that remote branch to access the internet locally - not to go through
our PIX at the corporate site - but other network traffic to go through an
IPSec tunnel to corporate.


What do you mean you have the number of ee to 40?  What is ee?

It is easy to encrypt traffic destined for the corporate site and
let the other "Internet" traffic go directly to it, not through
the corporate site.  Just make sure the access list used in your
crypto map only identifies traffic to the corporate office as
traffic to be encrypted.  If you are talking about PC's that need
this functionality it is a little bit more difficult.  Your VPN
client would have to support "split mode".  I believe the Cisco
3000 VPN router (formerly Altiga) can support this type of behavior,
although I don't have the details as to how it works.



2) Do you need encryption?
  Yes

3) Do you need authentication?

  I think yes as well
4) Do you need to protect against a replay attack?

  Yes
5) Who are you protecting your data from?

  everyone that is not an employee


With regard to protecting your data, will you be transmitting
trade secrets?  What would be the potential of having someone
intercept your messages?  Don't use a shotgun to kill a mosquito.



How about using IPSEc with GRE in it ?  Any suggestions are very helpfull
for me as I am new in this field.  I have set up an IPsec tunnel to our
other PIX in Australia and I figured that I could do the same for a 1605-R
router to the corporate PIX.


There is nothing wrong with using IPSec to encrypt a GRE tunnel,
it is perfectly acceptable.  The question is, do you want to spend
the time learning IPSec (this is a good thing) or do you just want
to get it done?  Realize that the skills required to implement CET
are not quite 1/2 the skills/knowledge you need to implement IPSec
(in your particular instance). Also realize that you can get bogged
down in the details once you realize the features that can be deployed
with IPSec.

AQ
p.s. Sorry about the name.  I did get it right this time. :-)



**
  Adam Quiggle
  Senior Network Engineer
  MCI Worldcom/BP Amoco
  [EMAIL PROTECTED]
**

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: GRE VS. IPSEc

2000-11-23 Thread Adam Quiggle

Liwang,

You aren't comparing apples to apples in your questions.  Let me
see if I can shed some light on the subject.

IPSec is a VPN technology that is responsible for securing a data
stream between two VPN peers.  It does not provide multi-protocol
support, so if you need to transport anything other than IP, you will
need to use a GRE tunnel.  (assuming you only connect to the outside
world using IP)

A GRE tunnel does not provide any security.  It is a tunneling
protocol that can give you the illusion that two tunnel interfaces
are connected together.  You can then set attributes within those two
tunnel interfaces as if you they are directly connected to each other
(not everything, but most everything).  Thus, GRE tunnels do provide
multi-protocol support.

In order to determine which technology would be best suited for your
needs, your VPN business case should provide you with answers to the
following questions:

1) Are there just two sites that need to be connected together?
  (i.e. are there plans for a large scale deployment?)
2) Do you need encryption?
3) Do you need authentication?
4) Do you need to protect against a replay attack?
5) Who are you protecting your data from?

Cisco Encryption Technology (CET), which is frequently used with GRE
tunnels, is a precursor to IPSec and has been available since IOS 11.2.
While there are similarities between IPSec and CET, they do not provide the
same functionality.  This is why I asked the previous questions.  CET
can only encrypt your data streams, while IPSec can encrypt, authenticate
and provide protection against a replay attack.

CET does not provide for a Public Key Infrastrucutre (PKI) and thus if you had
100's of sites to connect, CET could become an administrative nightmare.
On the other hand, IPSec does provide for a PKI which can ease administrative
burdens, but can give you a whole different set of problems.  For example, who
administers the Certificate Authority server and where do they get their 
authority.
This is important if it is an Extranet VPN.  In an Intranet VPN this is not 
nearly
as important since most Companies can inherently trust themselves (notice
I said MOST not ALL ;-).

CET is fairly simple to setup, especially since it only encrypts your
data streams.  IPSec, has a tremendous amount of flexibility and as we all
know the more flexibility a technology has, the more complicated it gets.
IPSec can take a while to understand all of the underlying technology, but
it can give you an extremely secure environment.

Personally, assuming that:

1) We want a simple Intranet VPN protecting our data crossing the public 
Internet
2) We aren't protecting trade secrets worth millions of dollars
3) There are no plans on increasing the number of VPN connections

I would go with a GRE tunnel with CET.  If any of the above criteria aren't 
met
I would go with IPSec.

HTH,
AQ


At 08:46 AM 11/23/00, Liwanag, Manolito wrote:
I have a remote site that I want to connect to our central site that has a
PIX.  I was thinking of using IPSec with context based access control.  But
I was wondering if GRE is just as good ? ( to Qualify - reliable, easy to
set up, secure and can handle plenty of tunnels) Can anyone advise ?

Manolito


_
FAQ, list archives, and subscription info: 
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


**
  Adam Quiggle
  Senior Network Engineer
  MCI Worldcom/BP Amoco
  [EMAIL PROTECTED]
**

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: GRE VS. IPSEc

2000-11-23 Thread Urooj's Hi-speed Internet

Great explanation!!! Adam Quiggle.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Adam Quiggle
Sent: Thursday, November 23, 2000 1:13 PM
To: Liwanag, Manolito; 'Cisco Group Study'
Subject: Re: GRE VS. IPSEc


Liwang,

You aren't comparing apples to apples in your questions.  Let me
see if I can shed some light on the subject.

IPSec is a VPN technology that is responsible for securing a data
stream between two VPN peers.  It does not provide multi-protocol
support, so if you need to transport anything other than IP, you will
need to use a GRE tunnel.  (assuming you only connect to the outside
world using IP)

A GRE tunnel does not provide any security.  It is a tunneling
protocol that can give you the illusion that two tunnel interfaces
are connected together.  You can then set attributes within those two
tunnel interfaces as if you they are directly connected to each other
(not everything, but most everything).  Thus, GRE tunnels do provide
multi-protocol support.

In order to determine which technology would be best suited for your
needs, your VPN business case should provide you with answers to the
following questions:

1) Are there just two sites that need to be connected together?
  (i.e. are there plans for a large scale deployment?)
2) Do you need encryption?
3) Do you need authentication?
4) Do you need to protect against a replay attack?
5) Who are you protecting your data from?

Cisco Encryption Technology (CET), which is frequently used with GRE
tunnels, is a precursor to IPSec and has been available since IOS 11.2.
While there are similarities between IPSec and CET, they do not provide the
same functionality.  This is why I asked the previous questions.  CET
can only encrypt your data streams, while IPSec can encrypt, authenticate
and provide protection against a replay attack.

CET does not provide for a Public Key Infrastrucutre (PKI) and thus if you
had
100's of sites to connect, CET could become an administrative nightmare.
On the other hand, IPSec does provide for a PKI which can ease
administrative
burdens, but can give you a whole different set of problems.  For example,
who
administers the Certificate Authority server and where do they get their
authority.
This is important if it is an Extranet VPN.  In an Intranet VPN this is not
nearly
as important since most Companies can inherently trust themselves (notice
I said MOST not ALL ;-).

CET is fairly simple to setup, especially since it only encrypts your
data streams.  IPSec, has a tremendous amount of flexibility and as we all
know the more flexibility a technology has, the more complicated it gets.
IPSec can take a while to understand all of the underlying technology, but
it can give you an extremely secure environment.

Personally, assuming that:

1) We want a simple Intranet VPN protecting our data crossing the public
Internet
2) We aren't protecting trade secrets worth millions of dollars
3) There are no plans on increasing the number of VPN connections

I would go with a GRE tunnel with CET.  If any of the above criteria aren't
met
I would go with IPSec.

HTH,
AQ


At 08:46 AM 11/23/00, Liwanag, Manolito wrote:
I have a remote site that I want to connect to our central site that has a
PIX.  I was thinking of using IPSec with context based access control.  But
I was wondering if GRE is just as good ? ( to Qualify - reliable, easy to
set up, secure and can handle plenty of tunnels) Can anyone advise ?

Manolito


_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


**
  Adam Quiggle
  Senior Network Engineer
  MCI Worldcom/BP Amoco
  [EMAIL PROTECTED]
**

_
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: GRE VS. IPSEc

2000-11-23 Thread Billha

Excellent reading !


Adam Quiggle [EMAIL PROTECTED] wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 Liwang,

 You aren't comparing apples to apples in your questions.  Let me
 see if I can shed some light on the subject.

 IPSec is a VPN technology that is responsible for securing a data
 stream between two VPN peers.  It does not provide multi-protocol
 support, so if you need to transport anything other than IP, you will
 need to use a GRE tunnel.  (assuming you only connect to the outside
 world using IP)

 A GRE tunnel does not provide any security.  It is a tunneling
 protocol that can give you the illusion that two tunnel interfaces
 are connected together.  You can then set attributes within those two
 tunnel interfaces as if you they are directly connected to each other
 (not everything, but most everything).  Thus, GRE tunnels do provide
 multi-protocol support.

 In order to determine which technology would be best suited for your
 needs, your VPN business case should provide you with answers to the
 following questions:

 1) Are there just two sites that need to be connected together?
   (i.e. are there plans for a large scale deployment?)
 2) Do you need encryption?
 3) Do you need authentication?
 4) Do you need to protect against a replay attack?
 5) Who are you protecting your data from?

 Cisco Encryption Technology (CET), which is frequently used with GRE
 tunnels, is a precursor to IPSec and has been available since IOS 11.2.
 While there are similarities between IPSec and CET, they do not provide
the
 same functionality.  This is why I asked the previous questions.  CET
 can only encrypt your data streams, while IPSec can encrypt, authenticate
 and provide protection against a replay attack.

 CET does not provide for a Public Key Infrastrucutre (PKI) and thus if you
had
 100's of sites to connect, CET could become an administrative nightmare.
 On the other hand, IPSec does provide for a PKI which can ease
administrative
 burdens, but can give you a whole different set of problems.  For example,
who
 administers the Certificate Authority server and where do they get their
 authority.
 This is important if it is an Extranet VPN.  In an Intranet VPN this is
not
 nearly
 as important since most Companies can inherently trust themselves (notice
 I said MOST not ALL ;-).

 CET is fairly simple to setup, especially since it only encrypts your
 data streams.  IPSec, has a tremendous amount of flexibility and as we all
 know the more flexibility a technology has, the more complicated it gets.
 IPSec can take a while to understand all of the underlying technology, but
 it can give you an extremely secure environment.

 Personally, assuming that:

 1) We want a simple Intranet VPN protecting our data crossing the public
 Internet
 2) We aren't protecting trade secrets worth millions of dollars
 3) There are no plans on increasing the number of VPN connections

 I would go with a GRE tunnel with CET.  If any of the above criteria
aren't
 met
 I would go with IPSec.

 HTH,
 AQ


 At 08:46 AM 11/23/00, Liwanag, Manolito wrote:
 I have a remote site that I want to connect to our central site that has
a
 PIX.  I was thinking of using IPSec with context based access control.
But
 I was wondering if GRE is just as good ? ( to Qualify - reliable, easy to
 set up, secure and can handle plenty of tunnels) Can anyone advise ?
 
 Manolito
 
 
 _
 FAQ, list archives, and subscription info:
 http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]


 **
   Adam Quiggle
   Senior Network Engineer
   MCI Worldcom/BP Amoco
   [EMAIL PROTECTED]
 **

 _
 FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html
 Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



_
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]