ํƒœ๊ทธ ๋ณด๊ด€๋ฌผ: IPSec

IPSec VPN 2: ์„ค์ •(Site-to-Site IPSEC, GRE over IPSec VPN)

‘IPSec VPN 1’์—์„œ ํ•™์Šตํ•œ ๊ฐœ๋…์„ ๋ฐ”ํƒ•์œผ๋กœ ์—ฌ๋Ÿฌ๊ฐ€์ง€ VPN์„ ์„ค์ •ํ•ด๋ณด๋„๋ก ํ•˜์ž.

  1. Site-to-Site IPSec VPN
  2. GRE over IPSec VPN

1. Site-to-Site IPSec VPN

[์„ค์ •]
– IKE 1๋‹จ๊ณ„ ISAKMP SA ๋ฐ ๊ณต์œ ํ‚ค ์„ค์ • (R4, R5)

R4(config)# crypto isakmp policy 10
R4(config-isakmp)# encryption 3des
R4(config-isakmp)# hash md5
R4(config-isakmp)# authentication pre-share
R4(config-isakmp)# lifetime 2600
R4(config-isakmp)# group2
R4(config-isakmp)# exit
R4(config)# 
R4(config)# crypto isakmp key cisco address 13.13.12.2

R5(config)# crypto isakmp policy 10
R5(config-isakmp)# encryption 3des
R5(config-isakmp)# hash md5
R5(config-isakmp)# authentication pre-share
R5(config-isakmp)# lifetime 2600
R5(config-isakmp)# group2
R5(config-isakmp)# exit
R5(config)# 
R5(config)# crypto isakmp key cisco address 13.13.10.1

– IKE 2๋‹จ๊ณ„ IPSec SA ์„ค์ • (R4,R5)

R4(config)# access-list 100 permit ip 192.168.0.0 0.0.0.255 172.30.1.0 0.0.0.255
R4(config)# crypto ipsec transform-set CISCO esp-3des esp-sha-hmac
R4(config)# 
R4(config)# crypto map IPSEC 10 ipsec-isakmp
R4(config-crypto-map)# set peer 13.13.12.2
R4(config-crypto-map)# set transform-set CISCO
R4(config-crypto-map)# match address 100
R4(config-crypto-map)# exit
R4(config)# 
R4(config)# int fa0/0
R4(config)# crypto map IPSEC

R5(config)# access-list 100 permit ip 172.30.1.0 0.0.0.255 192.168.0.0 0.0.0.255
R5(config)# crypto ipsec transform-set CISCO esp-3des esp-sha-hmac
R5(config)# 
R5(config)# crypto map IPSEC 10 ipsec-isakmp
R5(config-crypto-map)# set peer 13.13.10.1
R5(config-crypto-map)# set transform-set CISCO
R5(config-crypto-map)# match address 100
R5(config-crypto-map)# exit
R5(config)# 
R5(config)# int fa0/0
R5(config)# crypto map IPSEC

[๋™์ž‘ ํ™•์ธ]
– R4 PC โ†’ R5 PC๋กœ PING ํ…Œ์ŠคํŠธ ํ›„ isakmp sa ํ™•์ธ.

‘show crypto isakmp sa’๋ฅผ ํ–ˆ์„ ๋•Œ, dst์™€ src๊ฐ€ ์กฐํšŒ๋˜๋Š” ๊ฑธ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋‹ค.

– ์ •์ฑ… ๋‚ด์šฉ ํ™•์ธ (์ˆœ์„œ๋Œ€๋กœ 1๋‹จ๊ณ„, 2๋‹จ๊ณ„)


2. GRE over IPSec VPN

GRE over IPSec VPN์€ Tunnel ๋งŒ ์ถ”๊ฐ€ ๊ตฌ์„ฑํ•˜๋Š” ๊ฒƒ ์™ธ์—๋Š”Site-to-Site์™€ ํฌ๊ฒŒ ๋‹ค๋ฅด์ง€ ์•Š๋‹ค.

[์„ค์ •]
– Tunnel Interface ๊ตฌ์„ฑ

R4(config)# int tunnel 10
R4(config-if)# ip addr 10.250.10.1 255.255.255.240
R4(config-if)# tunnel source 13.13.10.1
R4(config-if)# tunnel destination 13.13.12.2
R4(config-if)# exit
R4(config)#
R4(config)# ip route 172.30.1.0 255.255.255.0 tunnel 10

R4(config)# int tunnel 10
R4(config-if)# ip addr 10.250.10.2 255.255.255.240
R4(config-if)# tunnel source 13.13.12.2
R4(config-if)# tunnel destination 13.13.10.1
R4(config-if)# exit
R4(config)#
R4(config)# ip route 192.168.0.0 255.255.255.0 tunnel 10

– IKE 1๋‹จ๊ณ„ ISAKMP SA ๋ฐ ๊ณต์œ ํ‚ค ์„ค์ • (R4, R5)
Site-to-Site IPSec VPN ์„ค์ • ์ฐธ๊ณ 

– IKE 2๋‹จ๊ณ„ IPSec SA ์„ค์ • (R4,R5)
Site-to-Site IPSec VPN ์„ค์ • ์ฐธ๊ณ 

IPSec VPN 1: ๊ฐœ๋…(AH, ESP, SA, IKE)

IPSec Protocol..

์ผ๋ฐ˜์ ์œผ๋กœ IPv4๋Š” ํŒจํ‚ท์„ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•œ ๋ณด์•ˆ์ ์ธ ํ•„๋“œ๊ฐ€ ์—†๋‹ค. ๊ทธ๋ž˜์„œ ๋ˆ„๊ตฐ๊ฐ€ ์Šค๋‹ˆํ•‘(๋„์ฒญ)์„ ํ•œ๋‹ค๋ฉด ํ—ค๋”๋Š” ๋ฌผ๋ก  ๋‚ด๋ถ€ ๋ฐ์ดํ„ฐ๋„ ์‰ฝ๊ฒŒ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋Š” ์œ„ํ—˜์ด ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ IPSec Protocol์„ ์ด์šฉํ•ด ํŒจํ‚ท์„ ์•”ํ˜ธํ™”ํ•˜๊ณ  ์ธ์ฆ์„ ์‹ค์‹œํ•˜์—ฌ ๋ฐ์ดํ„ฐ์˜ ๊ธฐ๋ฐ€์„ฑ๊ณผ ๋ฌด๊ฒฐ์„ฑ์„ ๋ณด์žฅํ•  ์ˆ˜ ์žˆ๋‹ค.

  1. Authenticaton Header
  2. Encapsulating Security Protocol
  3. Security Associations
  4. Internet Key Exchange

IPsec Protocol ์œ ํ˜•์€
AH(Authentication Header Protocol)์™€
ESP(Encapsulating Security Payload Protocol)๋กœ ๋‚˜๋‰œ๋‹ค.

1. Authentication Header

  • ๋‘ ๊ฐœ์˜ ์‹œ์Šคํ…œ์ด ์†ก์ˆ˜์‹ ํ•˜๋Š” IPํŒจํ‚ท์— ๋Œ€ํ•œ ์ธ์ฆ์„ ์ œ๊ณตํ•œ๋‹ค. ๋ฐ์ดํ„ฐ์˜ ๋ฌด๊ฒฐ์„ฑ์„ ๋ณด์žฅํ•œ๋‹ค. ์ด ๋•Œ, ์ธ์ฆ์€ ๋‹จ๋ฐฉํ–ฅ ํ•ด์‹œ ํ•จ์ˆ˜(MD5, SHA)๋ฅผ ํŒจํ‚ท์— ์ ์šฉ์‹œํ‚จ ํ›„ Message Digest1๋ฅผ ์ƒ์„ฑํ•˜์—ฌ ์‹ค์‹œํ•œ๋‹ค.
    ๋‹จ, ํŒจํ‚ท์„ ์•”ํ˜ธํ™”ํ•˜์ง„ ์•Š๋Š”๋‹ค. ๊ธฐ๋ฐ€์„ฑ์„ ๋ณด์žฅํ•˜์ง€ ์•Š๋Š”๋‹ค.
  • RFC 2402์— ์ •์˜๋˜์–ด์žˆ์œผ๋ฉฐ, IPv4 ํ”„๋กœํ† ์ฝœ ํ•„๋“œ์—์„œ 51๋ฒˆ์„ ์‚ฌ์šฉํ•œ๋‹ค.
  • IPSec VPN์— ์ ์šฉ ์‹œ ์ธ์ฆ ์•Œ๊ณ ๋ฆฌ์ฆ˜(MD5-HMAC, SHA-HMAC)์„ ์ง€์›ํ•œ๋‹ค.

1: Message Digest๋ž€, ๋‹จ๋ฐฉํ–ฅ ํ•ด์‹ฑ ํ•จ์ˆ˜์— ์˜ํ•ด ์ƒ์„ฑ๋˜๋Š” ์ˆซ์ž ๋ฌธ์ž์—ด์„ ํฌํ•จํ•œ ์•”ํ˜ธํ™” ํ•ด์‹œ ํ•จ์ˆ˜์ด๋‹ค. (์ž์„ธํ•œ ๋‚ด์šฉ-techopedia)

1-1. AH Mode

AH Mode์— ๋”ฐ๋ผ encapsulation ๋ฒ”์œ„๊ฐ€ ๋‹ฌ๋ผ์ง„๋‹ค.

AH Transport Mode : ์ƒ์œ„ ๊ณ„์ธต์˜ Payload(ํ—ค๋”๊ฐ€ ํฌํ•จ๋œ ์ „์ฒด ๋ฐ์ดํ„ฐ)๋งŒ ๋ณดํ˜ธํ•œ๋‹ค. ์ฆ‰, IPํ—ค๋”๋ฅผ ์ œ์™ธํ•œ IPํŒจํ‚ท์˜ Payload๋งŒ ๋ณดํ˜ธํ•œ๋‹ค. AH Header๋งŒ ๋ถ™๋Š”๋‹ค.

AH Tunnel Mode : Original IP Header ์ผ๋ถ€๋ฅผ ์ œ์™ธํ•œ IP ํŒจํ‚ท ์ „์ฒด๋ฅผ ๋ณดํ˜ธํ•œ๋‹ค. AH Header์™€ New IP Header๊ฐ€ ๋ถ™๋Š”๋‹ค.

2. Encapsulating Security Payload

  • ๋‘ ๊ฐœ์˜ ์‹œ์Šคํ…œ์ด ์†ก์ˆ˜์‹ ํ•˜๋Š” IPํŒจํ‚ท์— ๋Œ€ํ•œ ์ธ์ฆ๊ณผ ์•”ํ˜ธํ™”๋ฅผ ์‹ค์‹œํ•œ๋‹ค. ๋ฐ์ดํ„ฐ์˜ ๋ฌด๊ฒฐ์„ฑ๊ณผ ๊ธฐ๋ฐ€์„ฑ์„ ๋ณด์žฅํ•œ๋‹ค.
  • RFC 2406์— ์ •์˜๋˜์–ด ์žˆ์œผ๋ฉฐ, IPv4 ํ”„๋กœํ† ์ฝœ ํ•„๋“œ์—์„œ 50๋ฒˆ์„ ์‚ฌ์šฉํ•œ๋‹ค.
  • ์ธ์ฆ ์•Œ๊ณ ๋ฆฌ์ฆ˜(MD5-HMAC, SHA-HMAC)๊ณผ ๋Œ€์นญํ‚ค ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜(DES, 3DES, AES)๋ฅผ ์ง€์›ํ•œ๋‹ค.

2-1. ESP Mode

ESP Mode์— ๋”ฐ๋ผ encapsulation ๋ฒ”์œ„๊ฐ€ ๋‹ฌ๋ผ์ง„๋‹ค.

ESP Transport Mode : ์ƒ์œ„ ๊ณ„์ธต์˜ Payload(ํ—ค๋”๊ฐ€ ํฌํ•จ๋œ ์ „์ฒด ๋ฐ์ดํ„ฐ)๋งŒ ๋ณดํ˜ธํ•œ๋‹ค. ์ฆ‰, IPํ—ค๋”๋ฅผ ์ œ์™ธํ•œ IPํŒจํ‚ท์˜ Payload๋งŒ ๋ณดํ˜ธํ•œ๋‹ค. AH Header๋งŒ ๋ถ™๋Š”๋‹ค.

ESP Tunnel Mode : AH Tunnel๊ณผ ๋‹ฌ๋ฆฌ IP ํŒจํ‚ท ์ „์ฒด๋ฅผ ๋ณดํ˜ธํ•œ๋‹ค. AH Header์™€ New IP Header๊ฐ€ ๋ถ™๋Š”๋‹ค.


3. Security Associations

AH์™€ ESP๋กœ IPSec ์„œ๋น„์Šค๋ฅผ ๊ตฌํ˜„ํ•  ๋•Œ, ์•”ํ˜ธํ™” ๋ฐ ์ธ์ฆ์— ์‚ฌ์šฉํ•  ์š”์†Œ๋ฅผ SA๋กœ ์ •์˜ํ•œ๋‹ค. ๊ฐ€์žฅ ์ค‘์š”ํ•œ ์š”์†Œ๋Š” ์•”/๋ณตํ˜ธํ™” ํ‚ค์˜ ์ˆ˜๋ช…์ด๋‹ค.

์กฐ๊ธˆ ๋” ์‰ฝ๊ฒŒ ์ด์•ผ๊ธฐํ•˜์ž๋ฉด,,

ํ•œ๊ณณ์—์„œ ์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ค๋ฅธ ๊ณณ์—์„œ ๋ณตํ˜ธํ™”ํ•˜๊ธฐ ์œ„ํ•ด ์„œ๋กœ ์•”ํ˜ธํ™” ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ •ํ•ด์„œ ์‚ฌ์šฉํ•ด์•ผํ•˜๊ณ , ์•”/๋ณตํ˜ธํ™” ํ‚ค์— ๋Œ€ํ•ด ์•Œ๊ณ  ์žˆ์–ด์•ผํ•œ๋‹ค. ์ด๊ฒƒ์„ SA๋ผ๊ณ  ํ•œ๋‹ค.

3-1. SA ์ƒ์„ฑ

SA ์ƒ์„ฑ๋ฐฉ๋ฒ•์€ ์ˆ˜๋™์œผ๋กœ ์ƒ์„ฑํ•˜๋Š” ๋ฐฉ๋ฒ•๊ณผ IKE๋ฅผ ํ†ตํ•ด์„œ ์ƒ์„ฑํ•˜๋Š” ๋ฐฉ๋ฒ•์ด ์žˆ๋‹ค.

๊ด€๋ฆฌ์ž๊ฐ€ ์ˆ˜๋™์œผ๋กœ ํ‚ค๋ฅผ ์ž…๋ ฅํ•˜์—ฌ SA๋ฅผ ์ƒ์„ฑํ–ˆ์„ ๊ฒฝ์šฐ,
SA์˜ ์‚ญ์ œ ๋งŒ๋ฃŒ ์‹œ๊ฐ„์ด ์—†๊ณ  SA๊ฐ€ ์ƒ์„ฑ๋˜์ž๋งˆ์ž ๋ฐ”๋กœ ์—ฐ๊ฒฐ๋œ๋‹ค.

IKE Protocol์„ ์ด์šฉํ•œ ํ˜‘์ƒ์— ์˜ํ•ด SA๋ฅผ ์ƒ์„ฑํ–ˆ์„ ๊ฒฝ์šฐ,
SA๋Š” 3,600์ดˆ ๋˜๋Š” 4,608,000KB ์ฒ˜๋ฆฌํ–ˆ์„ ๋•Œ ์‚ญ์ œ๋˜๊ณ , ํ•„์š”ํ•  ๋•Œ SA๋ฅผ ์—ฐ๊ฒฐํ•œ๋‹ค. ์ด๋•Œ, ํŠน์ • ์‹œ๊ฐ„์ด๋‚˜ ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ ํ›„ ์‚ญ์ œํ•˜๋Š” ์ด์œ ๋Š” ์ฃผ๊ธฐ์ ์ธ SA ๊ฐฑ์‹ ๊ณผ ํ‚ค ์—…๋ฐ์ดํŠธ๋ฅผ ํ†ตํ•ด ํ•ดํ‚น ๋ฐฉ์ง€๋ฅผ ํ•˜๊ธฐ ์œ„ํ•จ์ด๋‹ค.

3-2. SA ๊ณ„์ธต ๊ตฌ์กฐ

SA๋Š” 1๋‹จ๊ณ„ SA, 2๋‹จ๊ณ„ SA๋กœ ๊ณ„์ธต์  ๊ตฌ์กฐ๋ฅผ ๊ฐ–๋Š”๋‹ค.

1๋‹จ๊ณ„ SA: ISAKMP SA ์ƒ์„ฑ ๋‹จ๊ณ„
๋‘ IPSec ๊ฐœ์ฒด ๊ฐ„ ์ธ์ฆ๊ณผ 2๋‹จ๊ณ„ SA๋ฅผ ์„ฑ๋ฆฝํ•˜๋Š” ๋ฉ”์„ธ์ง€๋ฅผ ๋ณดํ˜ธํ•˜๊ธฐ ์œ„ํ•œ ์„ธ์…˜ํ‚ค๋ฅผ ํ˜‘์ƒํ•œ๋‹ค. ์ˆ˜๋™์œผ๋กœ SA๋ฅผ ์ƒ์„ฑํ•  ๊ฒฝ์šฐ 1๋‹จ๊ณ„ SA๋Š” ์ƒ์„ฑ๋˜์ง€ ์•Š๋Š”๋‹ค.

2๋‹จ๊ณ„ SA: IPSec SA ์ƒ์„ฑ ๋‹จ๊ณ„
์‹ค์ œ IPSec์„ ์ด์šฉํ•ด ํŒจํ‚ท ์ „์†ก์— ์‚ฌ์šฉํ•  SA์ด๋‹ค. ์ธ๋ฐ”์šด๋“œ, ์•„์›ƒ๋ฐ”์šด๋“œ SA ์ด 2๊ฐœ๋ฅผ ์ƒ์„ฑํ•˜๊ฒŒ ๋œ๋‹ค.


4. Internet Key Exchange

ISAKMP์™€ Oakley Protocol์œผ๋กœ ๊ฒฐํ•ฉ๋œ (IPSec์—์„œ ์‚ฌ์šฉ๋˜๋Š”) ํ‚ค ๊ด€๋ฆฌ ํ”„๋กœํ† ์ฝœ์ด๋‹ค. IKE๋Š” ์ƒํ˜ธ ๊ฐœ์ฒด๊ฐ„ ์ธ์ฆ๋œ ๋ณด์•ˆ ํ†ต์‹  ์ฑ„๋„์„ ์ƒ์„ฑํ•˜๊ณ , SA ์ •๋ณด๋ฅผ ํ˜‘์ƒํ•œ๋‹ค.

4-1. IKE ํ˜‘์ƒ ๊ณผ์ •

ํ˜‘์ƒ๊ณผ์ •์€ 1๋‹จ๊ณ„์™€ 2๋‹จ๊ณ„๋กœ ๊ตฌ์„ฑ๋˜์–ด ์žˆ๋‹ค.

IKE 1๋‹จ๊ณ„: ISAKMP SA ์ƒ์„ฑ
๋ณด์•ˆ์„ฑ์ด ์—†๋Š” ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•ด ์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ๋ฅผ ์†ก์ˆ˜์‹ ํ•˜๊ธฐ ์œ„ํ•œ ์ค€๋น„ ๋‹จ๊ณ„๋‹ค. ๊ธฐ๋ณธ์ ์œผ๋กœ Main Mode๋กœ ๋™์ž‘ํ•œ๋‹ค. 6๊ฐœ ๋ฉ”์„ธ์ง€๋ฅผ ๊ตํ™˜ํ•˜์—ฌ IKE 1๋‹จ๊ณ„๋ฅผ ์„ฑ๋ฆฝํ•œ๋‹ค. ์ฒ˜์Œ ์š”์ฒญํ•˜๋Š” ๊ฐœ์ฒด๋ฅผ Initiator, ์‘๋‹ตํ•˜๋Š” ๊ฐœ์ฒด๋ฅผ Responder๋ผ๊ณ  ํ•œ๋‹ค.

โ‘  ISKAMP SA ์ •์ฑ… ํ˜‘์ƒ ๋‚ด์šฉ
– VPN ์žฅ๋น„๊ฐ„ ์ธ์ฆ ๋ฐฉ์‹: Pre-Shared Key, RSA Encrytion, RSA Signature
– ์•”ํ˜ธํ™” ๋ฐฉ์‹: DES, 3DES, AES
– ๋ฌด๊ฒฐ์„ฑ ํ™•์ธ ๋ฐฉ์‹: MD5, SHA
– ๋ณด์•ˆ ์ •์ฑ… ์‚ฌ์šฉ ๊ธฐ๊ฐ„: 60~86,400 seconds

โ‘ก Diffie-Hellman Key
์•”ํ˜ธํ™”๋˜์ง€ ์•Š์€ ํ†ต์‹ ๋ง์„ ํ†ตํ•ด ๊ณตํ†ต์˜ ๋น„๋ฐ€ ํ‚ค๋ฅผ ๊ณต์œ ํ•˜๋Š” ํ‚ค ๊ตํ™˜ ๋ฐฉ์‹.
์•”ํ˜ธ์˜ ํฌ๊ธฐ๊ฐ€ ํด์ˆ˜๋ก ๋ณด์•ˆ์ด ์ฆ๊ฐ€ํ•˜์ง€๋งŒ, ๊ณ„์‚ฐํ•˜๋Š” ์‹œ๊ฐ„์ด ์˜ค๋ž˜๊ฑธ๋ ค ์„ฑ๋Šฅ์ด ๋–จ์–ด์ง€๊ฒŒ ๋œ๋‹ค.
Group 1 – 768Bit, Group 2- 1,024Bit, Group 5 – 1,536 Bit
(์ฐธ๊ณ -์œ„ํ‚ค๋ฐฑ๊ณผ)

โ‘ข ์ธ์ฆ์„œ ๊ตํ™˜์„ ํ†ตํ•ด ์ธ์ฆ
โ‘ ๊ณผ โ‘ก๋‹จ๊ณ„์—์„œ ๊ฒฐ์ •๋œ ์•”ํ˜ธํ™” ๋ฐฉ์‹๊ณผ ๊ณ„์‚ฐ๋œ ํ‚ค๋ฅผ ์‚ฌ์šฉํ•ด ํŒจํ‚ท์„ ์•”ํ˜ธํ™”ํ•˜๊ณ , ๋ฌด๊ฒฐ์„ฑ ํ™•์ธ์„ ์œ„ํ•œ ํ•ด์‹œ ์ฝ”๋“œ๋ฅผ ์ƒ์„ฑํ•˜์—ฌ ์ฒจ๋ถ€ํ•œ๋‹ค. Initiator๊ฐ€ ๋จผ์ € ์ž์‹ ์˜ ID์™€ ์ธ์ฆ์ •๋ณด๋ฅผ Responder์—๊ฒŒ ์•”ํ˜ธํ™”ํ•˜์—ฌ ์ „์†กํ•œ๋‹ค. ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ Responder๋„ Initiator์—๊ฒŒ ์ž์‹ ์˜ ID์™€ ์ธ์ฆ์ •๋ณด๋ฅผ ์ „์†กํ•˜๋ฉด์„œ ์ธ์ฆ์„ ๋งˆ์นœ๋‹ค.

IKE 2๋‹จ๊ณ„: IPSec SA ์ƒ์„ฑ
1๋‹จ๊ณ„ ์„ฑ๋ฆฝ ์ดํ›„ Main mode์—์„œ Quick mode๋กœ ์ „ํ™˜๋œ๋‹ค. ์‹ค์ œ ์•”ํ˜ธํ™”๋œ ๋ฐ์ดํ„ฐ๋ฅผ ์†ก์ˆ˜์‹ ํ•˜๋Š” ๋‹จ๊ณ„์ด๋ฉฐ, 3๊ฐœ์˜ ๋ฉ”์„ธ์ง€๋ฅผ ๊ตํ™˜ํ•˜์—ฌ IKE 2๋‹จ๊ณ„๋ฅผ ์„ฑ๋ฆฝํ•œ๋‹ค.

โ‘  IPSec SA ์ •์ฑ… ํ˜‘์ƒ ๋‚ด์šฉ
– ๋ณดํ˜ธ ๋Œ€์ƒ ํŠธ๋ž˜ํ”ฝ: ‘access-list’ ์‚ฌ์šฉ
– IKE 1๋‹จ๊ณ„, 2๋‹จ๊ณ„ ์ •์ฑ… ์—ฐ๋™: ‘crypto map’ ์‚ฌ์šฉ
– IPSec Protocol: AH, ESP
– ์•”ํ˜ธํ™” ๋ฐฉ์‹: DES, 3DES, AES
– ๋ฌด๊ฒฐ์„ฑ ํ™•์ธ ๋ฐฉ์‹: MD5, SHA
– ๋ณด์•ˆ ์ •์ฑ… ์‚ฌ์šฉ ๊ธฐ๊ฐ„: 120~86,400 seconds / 2,560~536,870,912 KB

โ‘ก IPSec SA ์ •์ฑ… ํ™•์ธ / ์ธ์ฆ ์‹œ๋„
์ตœ์ข… IPSec SA ์ •์ฑ…์„ ํ™•์ธ ๋ฐ Initiator์—๊ฒŒ ์ธ์ฆ ์‹œ๋„.

โ‘ข ์ธ์ฆ ๋ฐ ์ข…๋ฃŒ
Reply Attack ๋ฐฉ์ง€ ๋ฐ ๋ฐ์ดํ„ฐ ์›์ฒœ ์ธ์ฆ ๋ณด์žฅ์„ ์œ„ํ•ด Hash Payload๊ฐ€ ๋‹ด๊ธด ํŒจํ‚ท์„ ์‘๋‹ตํ•œ๋‹ค.