Page 2 of 220
© 2018 Cisco Systems, Inc. Cisco Confidential/Proprietary
GETVPN Design and Implementation Guide
Contents
1. About Group Encrypted Transport Virtual Private Networks ..................................................3
1.1 Key GETVPN Benefits ............................................................................................................4
1.2 Technology Overview..............................................................................................................4
1.3 GETVPN Solution Positioning .................................................................................................9
1.4 GETVPN Solution Comparison ............................................................................................. 10
1.5 Further Reading .................................................................................................................... 11
2. GETVPN Configuration ............................................................................................................. 12
2.1 Implementing GETVPN ......................................................................................................... 12
2.2 KS Configuration ................................................................................................................... 13
2.3 GM Configuration .................................................................................................................. 22
2.4 COOP KS Configuration ....................................................................................................... 23
2.5 G-IKEv2 Configuration .......................................................................................................... 27
2.6 Suite-B Support for GETVPN ................................................................................................ 30
3. GETVPNSystem Design ............................................................................................................ 31
3.1 Platform Support ................................................................................................................... 31
3.2 IOS Software Releases ......................................................................................................... 31
3.3 KS Selection ......................................................................................................................... 32
3.4 GM Selection ........................................................................................................................ 32
3.5 KS Design Considerations .................................................................................................... 33
3.6 GM Design Considerations .................................................................................................. 46
3.7 COOP Design Considerations ............................................................................................. 56
3.8 Designing Around MTU Issues ............................................................................................. 89
3.9 VRF-Aware GETVPN ............................................................................................................ 90
3.10 GETVPN Support for IPv6 in the Data Plane .................................................................... 100
3.11 GETVPN Support for LISP ................................................................................................ 103
3.12 GETVPN GDOI Bypass .................................................................................................... 105
3.13 GETVPN Routing Awareness ........................................................................................... 105
3.14 IPsec Inline Tagging for Cisco TrustSec on GETVPN ...................................................... 106
3.15 GETVPN Software versioning ........................................................................................... 108
3.16 GM Removal and Policy Replacement.............................................................................. 111
4. Enterprise Deployment ........................................................................................................... 116
4.1 DC and Branch Designs...................................................................................................... 116
4.2 DC Design ........................................................................................................................... 118
4.3 Branch Design .................................................................................................................... 131
4.4 Deploying GETVPN ............................................................................................................ 159
5. Provisioning, Verification, and Monitoring ........................................................................... 165
5.1 Deploying GETVPN using CSM .......................................................................................... 165
5.2 GETVPN Syslog Capabilities .............................................................................................. 173
5.3 GDOI Event Trace .............................................................................................................. 176
5.4 GETVPN Verification........................................................................................................... 178
5.5 SNMP Monitoring using GDOI MIB ..................................................................................... 191
Appendix A. Complete Configurations for Section 2................................................................ 196
A.1 Using Pre-Shared Keys ...................................................................................................... 199
A.2 Using Public Key Infrastructure (PKI) ................................................................................. 203
A.3 IOS Certificate Authority ..................................................................................................... 207
A.4 G-IKEv2 Configuration Using PKI ....................................................................................... 209
Appendix B. Steps to upgrade Key Servers and Group Members .......................................... 214
Appendix C. Steps to change RSA Keys on Key Servers ........................................................ 215
Appendix D. Recent Features and Enhancements ................................................................... 217
Appendix E. Abbreviations and Acronyms ............................................................................... 218