Question: Part 2 : Implement a Custom IPsec PolicyAfter taking part in a recent impact analysis, you have determined that on the production VPN , a

Part 2: Implement a Custom IPsec PolicyAfter taking part in a recent impact analysis, you have determined that on the production VPN, a compromise of key material used in the initial IKE exchange could provide information to help an attacker decrypt past and future IPsec tunnel sessions.The problem is that each IPsec SA derives encryption keys based partially on the Diffie-Hellman (DH) keys constructed in the IKE phase. This deterministic approach, while more performant, allows a bad actor to use these keys to discover information about current session keys, and vice versa. Recalling the impact of the Heartbleed bug, where attackers were able to obtain a private key and use it to decrypt secure communication across a large swath of the internet, you resolve to employ Perfect Forward Secrecy to avoid a similar pitfall. With PFS, you will force a new DH exchange each time the IPsec SA/tunnel is renewed, effectively rekeying the IKE SAs as well.You have decided to utilize an elliptical curve cryptography for the exchange, which provides equivalent security with shorter key lengths, in order to mitigate any performance losses resulting from the additional DH exchanges.You plan is to first apply this configuration to the test VPN. To prepare, you have documented the transform set (collectively, the list of algorithms in the SA used to protect the tunnel) currently in use on the production VPN, and replaced the PFS group value with ECP256, a NIST-endorsed implementation of the Elliptical Curve Diffie-Hellman (ECDH) algorithm. You have also selected ECP256 for the DH group, used in the initial IKE exchange, to reap the same performance benefits there.1. Use the Set-VpnConnectionIPsecConfiguration PowerShell cmdlet to apply your changes via a custom IPsec policy for your VPN connection.Connection Name: yourname_IPsec2, where yourname is your own nameAuthentication Transform Constants:SHA256128Cipher Transform Constants:AES256DH Group:ECP256Encryption Method:AES256Integrity Check Method:SHA256PFS group:ECP2562. Make a screen capture showing the successfully executed Set-VpnConnectionIPsecConfiguration command in PowerShell.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!