Question: Part 2 : Implement a Custom IPsec PolicyAfter taking part in a recent impact analysis, you have determined that on the production VPN , a
Part : Implement a Custom IPsec PolicyAfter taking part in a recent impact analysis, you have determined that on the production VPN a compromise of key material used in the initial IKE exchange could provide information to help an attacker decrypt past and future IPsec tunnel sessions.The problem is that each IPsec SA derives encryption keys based partially on the DiffieHellman DH keys constructed in the IKE phase. This deterministic approach, while more performant, allows a bad actor to use these keys to discover information about current session keys, and vice versa. Recalling the impact of the Heartbleed bug, where attackers were able to obtain a private key and use it to decrypt secure communication across a large swath of the internet, you resolve to employ Perfect Forward Secrecy to avoid a similar pitfall. With PFS you will force a new DH exchange each time the IPsec SAtunnel is renewed, effectively rekeying the IKE SAs as well.You have decided to utilize an elliptical curve cryptography for the exchange, which provides equivalent security with shorter key lengths, in order to mitigate any performance losses resulting from the additional DH exchanges.You plan is to first apply this configuration to the test VPN To prepare, you have documented the transform set collectively the list of algorithms in the SA used to protect the tunnel currently in use on the production VPN and replaced the PFS group value with ECP a NISTendorsed implementation of the Elliptical Curve DiffieHellman ECDH algorithm. You have also selected ECP for the DH group, used in the initial IKE exchange, to reap the same performance benefits there. Use the SetVpnConnectionIPsecConfiguration PowerShell cmdlet to apply your changes via a custom IPsec policy for your VPN connection.Connection Name: yournameIPsec where yourname is your own nameAuthentication Transform Constants:SHACipher Transform Constants:AESDH Group:ECPEncryption Method:AESIntegrity Check Method:SHAPFS group:ECP Make a screen capture showing the successfully executed SetVpnConnectionIPsecConfiguration command in PowerShell.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
