Local security breakout
cont
vEdge router bringup
Only one peer per OMP session
Show control connections from the WAN Edge router
- Two control connections
- Only one omp peer
OMP Routes
OMP update
Let’s look at an example
OMP peers for E32
TLOC
TLOC {10.4.0.1, private1, ipsec}
IPSec Tunnel established
Route Selection
TLOC {System-ip,color,encp-IPSec}
Service VPN – data, voice, partners, Service VPNS (1 to 65530 except 512) Site IDs: 1 to 2^32
Security levels (0 and 100) - internet 0, internal 100, external – 40
Intent-based networking – applications can request for network resources
ISR – integrated services routers – (SD-WAN services + more – cloud computing, security) – small/medium size branches
ASR – Aggregation Service routers – (SD-WAN services) – large branches and DC CSR – Cloud Service Routers – implement virtualized environment
Nat traversal Sdwan
vEdge, vSmart, vManage, vAnalytics, vBond – nat traversal
Ip nat tanslations
Color – identifying connection for each transport type – MPLS and 5G OMP routes
3 routes – vRoute, TLOCs, Service Route (Service Insertion – process service chaining ) SDWAN node
- System-IP - Site-ID
Multiprotocol BGP or MPBGP (because of RD an RT)
Security levels
Application
Example of route leaking
0 and 0 = 0 1 XOR 0 = 1 x XOR 1 = 0 Stream cipher
Block cipher
Martin --- 001010010101110 Symmetric Encryption
- Uses same key to encrypt and decrypt the data
- Safer than stream, fast, uses less computing resources con: single point of attack (same key) Asymmetric Encryption
- Two different sets of keys: public and private - Public is known by everyone
- Private is unkown to everyone and not shared - When sending data encypt using public key
- When receiving you only use your private key to decrypt
Martin --- Martin Cipher amtinr Martin - 001000100111000
Stream cipher – encryption bit by bit – fast, uses less computing resources con: is not very secure Block cipher -
Asymmetric Encryption
Public key cryptography
Pros: securest –the best con: slow and computing-intensive e.g. RSA algorithm
SDWAN Hybrid
1. Use Asymmetric algorithm to share key (one off event) – vBond-vEdge 2. Actual data symmetric (regular event) vEdge - vEdge
Aspects of ipsec
1. Confidentiality – by encryption
2. Integrity – hashing algorithms (MD5, SHA)
IKE protocol – brings these security protcols to gether to create a secure IP tunnel (IPSec) Has two phases:
1. Phase: - authentication and exchange keys Use Asymmetric Algorithms e.g. RSA, DH
End of this phase – IKE Security Association Tunnel (IKE SA tunnel) 2. Follows phase 1
Exchanging encypted data – fast and less computing load Use symmetric algorithms e.g. AES, 3DES, DES
End of this phase – IPSec Security Association tunnel (IPSec SA)
1. Confidentiality 2. Integrity 3. Authentication 4. Anti-replay
Control elements – vBond, vManage, vSmart, vAnalytics
IPSEC IKE Phases
Control plane – we pass OMP control messages(vSmart), authentication configurations(vManage), Performances (vAnalytics)vEdge (vBond),
Single Tenancy management headache
Multi-tenant