<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Tunnel Archives - Think Netsec</title>
	<atom:link href="https://www.thinknetsec.com/tag/tunnel/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.thinknetsec.com/tag/tunnel/</link>
	<description>Think Network Security</description>
	<lastBuildDate>Fri, 16 Mar 2018 23:48:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.1</generator>

<image>
	<url>https://www.thinknetsec.com/wp-content/uploads/2017/08/cropped-ThinkNetsec-Full-Logo-1-32x32.png</url>
	<title>Tunnel Archives - Think Netsec</title>
	<link>https://www.thinknetsec.com/tag/tunnel/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">133674323</site>	<item>
		<title>ASA Route Based VPN</title>
		<link>https://www.thinknetsec.com/asa-route-based-vpn/</link>
					<comments>https://www.thinknetsec.com/asa-route-based-vpn/#comments</comments>
		
		<dc:creator><![CDATA[John Finnegan]]></dc:creator>
		<pubDate>Sat, 06 Jan 2018 00:40:42 +0000</pubDate>
				<category><![CDATA[ASA]]></category>
		<category><![CDATA[Firewalls]]></category>
		<category><![CDATA[Policy]]></category>
		<category><![CDATA[Route]]></category>
		<category><![CDATA[Route Based]]></category>
		<category><![CDATA[Tunnel]]></category>
		<guid isPermaLink="false">https://www.thinknetsec.com/?p=378</guid>

					<description><![CDATA[<p>ASA Route Based VPN The ASA only performed Policy Based VPNs prior to 9.7 code which can cause a lot of issues when connecting to other vendors. If you are running 9.7+, you will now be able to create a proper Route Based VPN which will allow you to connect<a class="moretag" href="https://www.thinknetsec.com/asa-route-based-vpn/"> Read more&#8230;</a></p>
<p>The post <a href="https://www.thinknetsec.com/asa-route-based-vpn/">ASA Route Based VPN</a> appeared first on <a href="https://www.thinknetsec.com">Think Netsec</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><strong>ASA Route Based VPN</strong></h2>
<p>The ASA only performed Policy Based VPNs prior to 9.7 code which can cause a lot of issues when connecting to other vendors. If you are running 9.7+, you will now be able to create a proper Route Based VPN which will allow you to connect to all other vendors with a lot less headache and overhead.</p>
<h2><strong>Route Based VPN</strong></h2>
<p>Route Based VPNs differ from Policy Based in the fact that you will only have one IPSec Security Association for each peer. In Policy Based, you would have multiple SAs (Phase 2s) as each tunnel had a Identifier using each Network combination of your Encryption Domain. You can force multiple SAs for the Route Based VPN but all in all, it is generally just the one SA for  the entire Encryption Domain.</p>
<h2><strong>Basic VPN Configuration Start:</strong></h2>
<p>We will start by creating the basics of the Site to Site. This first part will be true whether this is a Route Based or Policy Based.</p>
<p>Here is our requirements for the VPN:<br />
<strong>Remote Peer IP:</strong>    2.2.2.2<br />
<strong>Remote Network: </strong>10.10.0.0/16<br />
<strong>Local Peer IP:</strong>        1.1.1.1<br />
<strong>Local Network:</strong>      172.24.0.0/16<strong><br />
</strong><strong>Phase 1 Parameters:<br />
</strong>     <em>Encryption:   </em>AES -128<em><br />
</em>     <em>Hash Alg.</em>:     SHA1<br />
<em>     Lifetime(S):   </em>86400<br />
<em>     DH Group:</em>     Group2<br />
<strong>Phase 2 Parameters:<br />
</strong><em>     Encryption:   </em>AES -256<em><br />
</em>     <em>Hash Alg.</em>:     SHA1<br />
<em>     Lifetime(S):   </em>28800<br />
<em>     PFS DH:</em>        Group5<br />
<strong>Pre-Shared-Key: </strong>Th1nkN3t$Ec</p>
<p>To configure this on the ASA, the commands would look like the following. Please note that I am simulating as if this is my first VPN on my ASA so some commands you may not need: <em>(Note: If you already have VPNs configured, make sure you are not overwriting your ikev1 policy.)<br />
</em></p>
<pre>crypto ikev1 enable <span style="color: #33cccc;">OUTSIDE</span>
crypto ikev1 policy 1
encryption aes
hash sha
authentication pre-share
group 2
lifetime 86400

tunnel-group 2.2.2.2 type ipsec-l2l
tunnel-group 2.2.2.2 ipsec-attributes
ikev1 pre-shared-key Th1nkN3t$Ec

crypto ipsec ikev1 transform-set ESP-AES128-SHA esp-aes esp-sha-hmac

</pre>
<h2></h2>
<h2><strong>New Configuration for Route Based</strong></h2>
<p>This next bit of configuration is new and is what is needed to get the Route Based VPN completed. We will be creating an IPSec Profile to reference the settings we created prior. We will bind this to a new VTI (Virtual Tunnel Interface) on the ASA which will be used to specify the Phase 2 configuration. Notice though that we have not used the Remote Network anywhere in this configuration yet. We will configure this next after we create the VTI.</p>
<pre>crypto ipsec profile ROUTE-BASED-PROFILE
  set ikev1 transform-set ESP-AES128-SHA
  set security-association lifetime seconds 28800
  set pfs group5

interface Tunnel0
   nameif ROUTE-BASED
   ip address 169.254.224.253 255.255.255.252
   tunnel source interface OUTSIDE
   tunnel destination 2.2.2.2
   tunnel mode ipsec ipv4
   tunnel protection ipsec profile ROUTE-BASED-PROFILE</pre>
<h2><strong>Routing Traffic over the Route Based VPN</strong></h2>
<p>In my use case, we will not be doing dynamic routing, but rather, static routing. The Routes will be what defines the encryption domain for the Route Based VPN. Since the ASA can not reference a interface for Routing and needs a Next-Hop, I will use an APIPA IP to simulate the Next-Hop. This APIPA does not have to be configured on the other side of the VPN. This will only be needed to trick the Local ASA and to allow for a static route to be created for the new VTI.</p>
<pre>route ROUTE-BASED 10.10.0.0 255.255.0.0 169.254.224.254</pre>
<p>&nbsp;</p>
<p>If you would like to know more or see more articles on VPNs, please let me know. You can <a href="https://www.thinknetsec.com/contact/">contact</a> me and I will do what I can to help.</p>
<p>The post <a href="https://www.thinknetsec.com/asa-route-based-vpn/">ASA Route Based VPN</a> appeared first on <a href="https://www.thinknetsec.com">Think Netsec</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.thinknetsec.com/asa-route-based-vpn/feed/</wfw:commentRss>
			<slash:comments>11</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">378</post-id>	</item>
	</channel>
</rss>
