Introduction to WAN Macsec and Encryption Positioning

Introduction to WAN Macsec and Encryption Positioning

Introduction to WAN MACsec and Encryption Positioning Craig Hill – Distinguished SE (@netwrkr95) Stephen Orr – Distinguished SE (@StephenMOrr) BRKRST-2309 Cisco Spark Questions? Use Cisco Spark to chat with the speaker after the session How 1. Find this session in the Cisco Live Mobile App 2. Click “Join the Discussion” 3. Install Spark or go directly to the space 4. Enter messages/questions in the space Cisco Spark spaces will be cs.co/ciscolivebot#BRKRST-2309 available until July 3, 2017. © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public Session Presenters Craig Hill Stephen Orr Distinguished System Engineer Distinguished System Engineer US Public Sector US Public Sector CCIE #1628 CCIE #12126 BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 What we hope to Achieve in this session: • Understanding that data transfer requirements are exceeding what IPSec can deliver • Introduce you to new encryption options evolving that will offer alternative solutions to meet application demands • Enable you to understand what is available, when and how to position what solution • Understand the right tool in the tool bag to meet encryption requirements • Understand the pros/cons and key drivers for positioning an encryption solution • What key capabilities drive the selection of an encryption technology BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Session Assumptions and Disclaimers • Intermediate understanding of Cisco Site-to-Site Encryption Technologies • DMVPN • GETVPN • FlexVPN • Intermediate understanding of Ethernet, VLANs, 802.1Q tagging • Intermediate understanding of WAN design, IP routing topologies, peering vs. overlay • Basic understanding of optical transport and impact of OSI model on various layers (L0 – L3) of network designs • Many 2 hour breakout sessions will focus strictly on areas this presentation touches on briefly (we will provide references to those sessions) BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 Agenda • Introduction • Cisco’s Next Generation Encryption Initiative • Understanding Service Provider Transport options • WAN Encryption Options Existing Today • Introduction to MACsec • WAN MACsec Deployment Deep Dive and Use Cases • Putting it all together… Key Decision Criteria for Designs and Positioning • Solution Roadmap Cisco’s Next Generation Encryption Initiative Crytography is embedded in all of Cisco’s Cryptography products Cryptography is critical to every solution and The Universal market Security Feature Vital to Cybersecurity efforts within all of our customers BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Where Cryptography is Deployed Today Management Authentication Privacy/Confidentiality • TLS based Protocols • IPSec • SSH • EAP-TLS • SRTP • sFTP • PEAP • DTLS • SCP • EAP-FAST • SSL • HTTPS • Hashing • 802.1AE • FTPs • SHA1 • 802.11i (802.11-2012) • SHA256/384/512 • Radius Key-Wrap • Digital Signatures • Key Negotiation BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 10 Security at Different Layers BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 802.11i WPA2 Wireless Security Application 802.11i Presentation Session Transport Network Link Physical BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 Ethernet 802.1AE MACsec Application Presentation Session Transport MACsec Network Link Physical BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 IPsec Application IPsec Presentation Session Transport Network Link Physical BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 Transport Layer Security (TLS) Application Presentation Session Transport TLS Network Link Physical BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 Secure Shell (SSH) Application Presentation Session Transport Network SSH Link Physical BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 Secure RTP Application Presentation Session Transport SRTP Network Link Physical BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 Defense in Depth Application IPsec 802.11i Presentation Session MACsec Transport TLS SRTP Network SSH Link Physical BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 What is Next Generation Encryption (NGE)? • New/Upgraded algorithms, key sizes, Cryptographic protocols and entropy Technologies • Compatible with existing security architectures, • Algorithm efficiency enabling increased Secure and Efficient security • Scales well to high/low throughput Compatible with • Suite B (US) Government • FIPS-140 (US/Canada) Standards • NATO Security Briefings & Training BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 • Next Generation Encryption (NGE) • A widely accepted and consistent set of cryptographic algorithms that provide strong security and good performance • Best standards that can be implemented today to meet the security and scalability requirements for network security in the years to come • No attacks against these algorithms have been demonstrated. • Quantum Computing – a different paradigm in computing • A quantum computer could break public key cryptography standards in use today. • While no practical quantum computer is known to be available today, the risk does exist. • Information with long-term confidentiality requirements should be protected against future decryption (i.e., capture now, decrypt when quantum computers become viable.) • Data-in-transit (e.g., capture data communications) • Data-at-rest (e.g., capture file images) BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 Cryptography Recommendations Operation Algorithm Acceptable NGE (preferred) QCR Encryption AES-CBC mode — ✅ (256-bit) Authenticated encryption — AES-GCM mode ✅ (256-bit) Integrity — SHA-256 / 384 / 512 ✅ (384/512) Integrity HMAC-SHA-1 HMAC-SHA-256 ✅ (256-bit key) RSA: Key exchange / DH / RSA / DSA -2048 / Encryption / ECDH / ECDSA-384 / 521 3072 / 4096 Authentication ECC: Key exchange / ECDH / ECDSA-256 ECDH / ECDSA-384 / 521 Authentication QCR = quantum computer resistant. BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 Recommended algorithms per security level Algorithm Security level Acceptable NGE (preferred) AES-128-CBC AES-128-GCM DH, DSA, RSA-3072 ECDH, ECDSA-256 128 bits - SHA-256 HMAC-SHA-1 HMAC-SHA-256 AES-192-CBC AES-192-GCM - ECDH, ECDSA-384 192 bits - SHA-384 - HMAC-SHA-256 AES-256-CBC AES-256-GCM - ECDH, ECDSA-521 256 bits - SHA-512 - HMAC-SHA-256 For customers who are concerned that a quantum-computer might be built in the near future, we recommend using the larger keys algorithms (higher than 128-bit security level) recommended in NGE. BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 What is Suite B? “Suite B” is not a protocol – but a profile for consistent security when using multiple cryptographically strong protocols. WHY Suite B? • Enables government customers to adhere to stronger consistent security requirements • Suite B offers the best technologies for future-proof cryptography, setting the trend for the industry • Eliminates the “mix and match” selection of protocols and key lengths. The following documents provide guidance for using Suite B cryptography with internet protocols: IPsec using the Internet Key Exchange Version 2 (IKEv2): "Suite B Profile for Internet Protocol Security (IPsec)," RFC 6380 SSH: "Suite B Cryptographic Suites for Secure Shell (SSH),” RFC 6239 TLS: "Suite B Profile for Transport Layer Security (TLS)," RFC 6460 Enrollment over Secure Transport," RFC 7030 S/MIME: "Suite B in Secure/Multipurpose Internet Mail Extensions (S/MIME)," RFC 6318 BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 Next Generation Encryption vs Suite B ECDSA- AES-256-GCM ECDH-P521 P521 SHA-512 Encryption AES-192-GCM ECDH-P384 ECDSA-P384 SHA-384 Suite B mLoS Data Authentication 192 Key Establishment AES-128- ECDH-P256 ECDSA-P256 SHA-256 GCM Suite B mLoS Signatures 128 Hashing BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 NGE Enabled Encryption Architectures: Available Today GM3 GM4 GM2 ASA Firewall GM5 CSM / ASDM GM 1 GM6 . Remote GM9 KS Access VPNs GM8 GM7 Guest User Data sent in clear GETVPN Sp ok Authenticated Encrypt Decrypt User e-3 802.1X &^*RTW#(*J^*&*sd#J$%UJ&( &^*RTW#(*J^*&*sd#J$%UJWD &( Site to Site, Supplicant with DMVPN, and MACsec MACsec Capable FlexVPN MACsec Link Devices MACsec BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 Service Provider Transport Options Today’s WAN Transport Catalog Transport Transport Offerings Connectivity Layer MPLS IP VPN Layer 3 Any to Any Internet / Broadband Point to Point Layer 2 Ethernet (E-LINE, E-LAN) Point to Multipoint Multipoint to Multipoint OTN, SONET Layer 0 / 1 Point to Point DWDM / Dark Fiber Other L3: Carrier Supporting Carrier, IP SatCom Other L2: ATM/FR, Ethernet/E-TREE, L2 SatCom Other L1: T1/E1, T3/ E3, DSx, OC-3/12/48/192 BRKRST-2309 © 2017 Cisco and/or its affiliates. All rights reserved. Cisco Public 27 Layer 3 - Provider Offered Transport Options SP Offered IP VPN Service (Layer 3 Service) - Customer owns CE Layer 3 “IP

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    199 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us