Implementing IPSec for PDN Access Applications
This section assumes that ISAKMP crypto maps are used as opposed to manual crypto maps.
How IPSec-based PDN Access Configuration Works
The following figure and the text that follows describe how sessions accessing a PDN using IPSec are processed by StarOS.
Step | Description |
---|---|
1 |
A subscriber session or PDP context Request, in GGSN service, arrives at the system. |
2 |
The system processes the subscriber session or request as it would typically. |
3 |
Prior to routing the session packets, the system compares them against configured Access Control Lists (ACLs). |
4 |
The system determines that the packet matches the criteria of an ACL that is associated with a configured crypto map. |
5 |
|
6 |
To initiate the IKE SA negotiation, the system performs a Diffie-Hellman exchange of the pre-shared key specified in the crypto map with the specified peer security gateway. |
7 |
The system and the security gateway negotiate an ISAKMP policy (IKE SA) to use to protect further communications. |
8 |
Once the IKE SA has been negotiated, the system negotiates an IPSec SA with the security gateway using the transform method specified in the transform sets. |
9 |
Once the IPSec SA has been negotiated, the system protects the data according to the IPSec SAs established during step 8 and sends it over the IPSec tunnel. |
Configuring IPSec Support for PDN Access
This section provides a list of the steps required to configure IPSec functionality on the system in support of PDN access. Each step listed refers to a different section containing the specific instructions for completing the required procedure.
Important |
These instructions assume that the system was previously configured to support subscriber data sessions either as a core service or an HA. In addition, parameters configured using this procedure must be configured in the same destination context on the system. |
Procedure
Step 1 |
Configure one or more IP access control lists (ACLs) according to the information and instructions located in the IP Access Control Lists chapter of the product Administration Guide. |
Step 2 |
Configure one or more transform sets according to the instructions located in the Transform Set Configuration chapter of this guide. |
Step 3 |
Configure one or more ISAKMP policies according to the instructions located in the ISAKMP Policy Configuration chapter of this guide. |
Step 4 |
Configure an ipsec-isakmp crypto map according to the instructions located in the ISAKMP Crypto Map Configuration section of the Crypto Maps chapter in this guide. |
Step 5 |
Apply the crypto map to an interface on the system according to the instructions located in the Crypto Map and Interface Association section of the Crypto Maps chapter in this guide. |
Step 6 |
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command save configuration. For additional information on how to verify and save configuration files, refer to the System Administration Guide and the Command Line Interface Reference. |