ipsec vpn overview ipsec vpn overview basic vpn
play

IPSEC VPN overview IPSEC VPN overview Basic VPN Architecture - PowerPoint PPT Presentation

IPSEC VPN overview IPSEC VPN overview Basic VPN Architecture CPE/CLE CPE/CLE PE PE CPE/CLE Host PE CPE to CPE IPSEC can be used for : PE to PE PE to CPE Bryan Gleeson, Page-1 CPE to CPE IPSEC tunnels


  1. IPSEC VPN overview IPSEC VPN overview

  2. Basic VPN Architecture • CPE/CLE • CPE/CLE • PE • PE • CPE/CLE • Host • PE • CPE to CPE • IPSEC can be used for : • PE to PE • PE to CPE Bryan Gleeson, Page-1

  3. CPE to CPE IPSEC tunnels • CPE • IPSEC tunnel • CPE • PE • PE • CPE • PE • Host • Site to site IPSEC tunnels • Voluntary IPSEC tunneling Bryan Gleeson, Page-2

  4. PE to PE IPSEC tunnels • CPE • IPSEC tunnel • CPE • PE • PE • CPE • PE • Host • Can be used for both Layer 3 + Layer 2 VPNs Bryan Gleeson, Page-3

  5. CPE to PE IPSEC tunnels • CPE • IP/ MPLS • CPE • PE • PE • CPE/LNS • PE/ LAC • Host • Secure remote access to NB-VPN • Compulsory L2TP/IPSEC tunneling Bryan Gleeson, Page-4

  6. Current IPSEC WGs • IPSEC • IPSEC Policy (IPSP) - allows configuration of IPSEC policy for hosts + security gateways, security gateway discovery for hosts etc • IPSEC Remote Access (IPSRA) - extend IPSEC to allow for remote client user authentication and configuration Bryan Gleeson, Page-5

  7. Requirements Solicited - some possibilities are: • Ability to associate an IPSEC tunnel with a VPN (e.g. add VPN-ID to IKE phase 2 negotiation) • Ability to run routing protocols over an IPSEC tunnel (possible issue with wildcard QM client IDs) • Allow null encryption / null authentication option • More flexible diffserv marking rules Bryan Gleeson, Page-6

  8. Thank You! Bryan Gleeson, Page-7

Recommend


More recommend