I think that works out at around, 25,600 posible combinations. But I have probabaly missed some, also the standard is extensible allowing extra Encription or Hash algoritums to be added in as they are developed and implimented.
We now need to create the specifications for the Security Associations to be negotiated on the VPN to connect this LAN to the remote LAN, so traffic between the LAN's is encrypted.
This example will specify AH using SHA, and ESP using DES+MD5, and key management via ISAKMP.
The Firewall supports 256 Security Association Specifications. The defined SAspecifications are combined into upto 256 bundles, when negotiating with a potential peer it is the SAspecs within the bundle selected for use with the peer that are checked.
show IPSec SAspec
create IPSec SASpec=1 prot=esp hasha=null encalg=3des2key keyman=isakmp
create IPSec SASpec=2 prot=esp hasha=null encalg=3desinner keyman=isakmp
create IPSec SASpec=3 prot=esp hasha=null encalg=des keyman=isakmp
create IPSec SASpec=101 prot=ah mode=Transport hasha=sha keyman=isakmp
create IPSec SASpec=102 prot=ah mode=Transport hasha=md5 keyman=isakmp
create IPSec SASpec=103 prot=ah mode=Transport hasha=desmac keyman=isakmp
ISAKMP can use "Perfect Forward Secrecy" where braking one of the SA
keys will not compromise future keys.
ISAKMP can also negociate keys where one of the endpoint IP addreses is not
known in advance.
There are lots of options available with ISAKMP these must,
in most cases, match at both ends.
The following table represents those options available from version
1.8 of the software. Default options are in Bold,
entries added upto version 2.3 are in
italics.
Options are being continuously extended.
Note these examples all use the same preshared key
this is a very bad idea.
Roaming user can also be authenticated on a user name,
create IPSec SASpec=151 prot=ah hasha=sha keyman=isakmp
IPSec Bundle Definitions
show IPSec bundles
will list existing bundles.
create IPSec bundlespec=1 keym=isakmp string="1 on 2 or 3 and 101 or 102 or 103"
ISAKMP Policies
ISAKMP can be used to negociate a sequence of keys used for IPsec security
Associations. This has advantages as the keys are changed automaticaly.
To another Allied Router at a fixed IP address
# Remote site
create isakmp
policy=Fire2Fire
peer=193.133.123.213
hashalg=sha
key=1
set ISAkmp pol=Fire2Fire
senddeletes=on setcommitbit=on sendnotify=on
Roaming user with Allied IPsec client with Dynamic IP address
To state the obvious, if the client has a dynamic IP address
the client will have to initiate the connection.
create isakmp
policy=roaming1
peer=any
hashalg=sha
key=1
set isakmp
policy=roaming1
senddeletes=on setcommitbit=on sendnotify=on
set isakmp
policy=roaming1
xauth=server
xauthtype=generic
add user=mikey pass=ratspass login=false