EasyManuals Logo

Cisco IOS XR User Manual

Cisco IOS XR
254 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #116 background imageLoading...
Page #116 background image
Implementing IPSec Network Security on Cisco IOS XR Software
How to Implement General IPSec Configurations for IPSec Networks
SC-104
Cisco IOS XR System Security Configuration Guide
VRF-aware IPSec
Each IPSec tunnel is associated with two VRF domains. The outer encapsulated domain belongs to one
VRF domain, which is called the front door VRF (FVRF), while the inner, protected IP packet belongs
to another domain called inside VRF (IVRF). Therefore, the local endpoint of the IPSec tunnel belongs
to the FVRF, while the source and destination addresses of the inside packet belong to the IVRF.
Clear IP traffic is forwarded from an internal VRF to a remote site or host within the VRF over IPSec
tunnels. The IVRF is determined on the SVI by using the vrf command. The encrypted packets going
over the IPSec tunnel are forwarded over the FVRF, which is configured on the SVI by using the tunnel
vrf command. The tunnel source and destination are addresses of the FVRF. The encapsulated packets
and the ACLs, which are configured in the IPSec profile, are all part of the IVRF.
MPLS Encapsulated Packets on Inbound Direction
The Multiprotocol Label Switching (MPLS) distribution protocol is a high-performance
packet-forwarding technology that integrates the performance and traffic management capabilities of
data link switching with the scalability, flexibility, and performance of network-layer routing.
The IPSec packet arrives from the Internet and is destined for the provider edge (PE) 2, which is also
called the IPSec terminator. If the packet arrives at a PE1 outside of a VRF (for example, in the global
table), the ingress PE1 pushes a label switched path (LSP) label onto the IPSec packet. The LSP packet
is used to tunnel the IPSec packet to the egress PE, which is the IPSec terminator.
How to Implement General IPSec Configurations for IPSec
Networks
This section contains the following procedures:
Setting Global Lifetimes for IPSec Security Associations, page SC-105 (optional)
Creating Crypto Access Lists, page SC-106 (required)
Defining Transform Sets, page SC-108 (required)
Configuring Crypto Profiles, page SC-109 (required)
Applying Crypto Profiles to tunnel-ipsec Interfaces, page SC-130 (required)
Applying Crypto Profiles to Crypto Transport, page SC-131 (required)
Configuring the DF Bit for the Encapsulating Header in IPSec Tunnels, page SC-114
Configuring the IPSec Antireplay Window: Expanding and Disabling, page SC-115
Configuring IPSec NAT Transparency, page SC-118
Configuring IPSec Security Association Idle Timers, page SC-120
Disabling Prefragmentation for Cisco IPSec VPN SPAs, page SC-124
Configuring Reverse-Route Injection in a Crypto Profile, page SC-127
Configuring IPSec Failure History Table Size, page SC-128

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco IOS XR and is the answer not in the manual?

Cisco IOS XR Specifications

General IconGeneral
Operating SystemCisco IOS XR
ArchitectureMicrokernel
High AvailabilityYes
TypeNetwork operating system
Developed byCisco Systems
LicenseProprietary
Programming LanguageC, C++
KernelQNX
Supported PlatformsCisco ASR9000, NCS series
Security FeaturesRole-Based Access Control (RBAC), Secure Boot, Encryption
Management InterfaceCLI, SNMP, NETCONF, RESTCONF
Release Date2004
Target DevicesHigh-end core routers, service provider edge routers, data center interconnect (DCI) routers
Supported HardwareCisco routers and switches
Networking ProtocolsBGP, OSPF, IS-IS, MPLS
Virtualization SupportVirtualization-ready, supports network function virtualization (NFV) and containerization technologies.

Related product manuals