08-08-2013 01:03 PM
Hello Guys,
I currently have a VPN site to site setup between my ASA and cisco router without Perfect Forward Secrecy enabled (no Diffie-Hellman Group) and I also have another the VPN site to site setup between my ASA and cisco router with Perfect Fprward Secrecy enabled and Diffie-Hellman Group (group 5). Both setups are working fine so far since they've been up for few weeks. My question are:
What do Perfect Fprward Secrecy enabled and Diffie-Hellman Group really do in the VPN?
What if I don't have Perfect Fprward Secrecy enabled and Diffie-Hellman Group setup, will it affect my VPN performance?
Thanks.
Solved! Go to Solution.
08-08-2013 01:24 PM
Hi,
Perfect Forward Secrecy (PFS)—PFS ensures that a given IPsec SA key was not derived from any other secret, like some other keys. In other words, if someone breaks a key, PFS ensures that the attacker is not able to derive any other key. If PFS is not enabled, someone can potentially break the IKE SA secret key, copy all the IPsec protected data, and then use knowledge of the IKE SA secret in order to compromise the IPsec SAs setup by this IKE SA. With PFS, breaking IKE does not give an attacker immediate access to IPsec. The attacker needs to break each IPsec SA individually. The Cisco IOS IPsec implementation uses PFS group 1 (D-H 768 bit) by default.
Depends on how much is your VPN used, but basically it will not affect your VPN performance in regards of few connections.
But on the other side it means "Each Diffie-Hellman exchange requires large exponentiations, thereby increasing CPU use and exacting a performance cost"
Best Regards,
Jan
08-08-2013 01:24 PM
Hi,
Perfect Forward Secrecy (PFS)—PFS ensures that a given IPsec SA key was not derived from any other secret, like some other keys. In other words, if someone breaks a key, PFS ensures that the attacker is not able to derive any other key. If PFS is not enabled, someone can potentially break the IKE SA secret key, copy all the IPsec protected data, and then use knowledge of the IKE SA secret in order to compromise the IPsec SAs setup by this IKE SA. With PFS, breaking IKE does not give an attacker immediate access to IPsec. The attacker needs to break each IPsec SA individually. The Cisco IOS IPsec implementation uses PFS group 1 (D-H 768 bit) by default.
Depends on how much is your VPN used, but basically it will not affect your VPN performance in regards of few connections.
But on the other side it means "Each Diffie-Hellman exchange requires large exponentiations, thereby increasing CPU use and exacting a performance cost"
Best Regards,
Jan
08-09-2013 06:23 AM
Thanks for the useful information.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide