Cisco IOS XR Configuration Manual page 116

System security configuration guide
Hide thumbs Also See for IOS XR:
Table of Contents

Advertisement

How to Implement General IPSec Configurations for IPSec Networks
VRF-aware IPSec
Each IPSec tunnel is associated with two VRF domains. The outer encapsulated domain belongs to one
VRF domain, which is called the front door VRF (FVRF), while the inner, protected IP packet belongs
to another domain called inside VRF (IVRF). Therefore, the local endpoint of the IPSec tunnel belongs
to the FVRF, while the source and destination addresses of the inside packet belong to the IVRF.
Clear IP traffic is forwarded from an internal VRF to a remote site or host within the VRF over IPSec
tunnels. The IVRF is determined on the SVI by using the vrf command. The encrypted packets going
over the IPSec tunnel are forwarded over the FVRF, which is configured on the SVI by using the tunnel
vrf command. The tunnel source and destination are addresses of the FVRF. The encapsulated packets
and the ACLs, which are configured in the IPSec profile, are all part of the IVRF.
MPLS Encapsulated Packets on Inbound Direction
The Multiprotocol Label Switching (MPLS) distribution protocol is a high-performance
packet-forwarding technology that integrates the performance and traffic management capabilities of
data link switching with the scalability, flexibility, and performance of network-layer routing.
The IPSec packet arrives from the Internet and is destined for the provider edge (PE) 2, which is also
called the IPSec terminator. If the packet arrives at a PE1 outside of a VRF (for example, in the global
table), the ingress PE1 pushes a label switched path (LSP) label onto the IPSec packet. The LSP packet
is used to tunnel the IPSec packet to the egress PE, which is the IPSec terminator.
How to Implement General IPSec Configurations for IPSec
Networks
This section contains the following procedures:
Cisco IOS XR System Security Configuration Guide
SC-104
Setting Global Lifetimes for IPSec Security Associations, page SC-105
Creating Crypto Access Lists, page SC-106
Defining Transform Sets, page SC-108
Configuring Crypto Profiles, page SC-109
Applying Crypto Profiles to tunnel-ipsec Interfaces, page SC-130
Applying Crypto Profiles to Crypto Transport, page SC-131
Configuring the DF Bit for the Encapsulating Header in IPSec Tunnels, page SC-114
Configuring the IPSec Antireplay Window: Expanding and Disabling, page SC-115
Configuring IPSec NAT Transparency, page SC-118
Configuring IPSec Security Association Idle Timers, page SC-120
Disabling Prefragmentation for Cisco IPSec VPN SPAs, page SC-124
Configuring Reverse-Route Injection in a Crypto Profile, page SC-127
Configuring IPSec Failure History Table Size, page SC-128
Implementing IPSec Network Security on Cisco IOS XR Software
(required)
(required)
(required)
(required)
(optional)
(required)

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ios xr 3.5

Table of Contents