IPSEC VPN overview IPSEC VPN overview
Basic VPN Architecture • CPE/CLE • CPE/CLE • PE • PE • CPE/CLE • Host • PE • CPE to CPE • IPSEC can be used for : • PE to PE • PE to CPE Bryan Gleeson, Page-1
CPE to CPE IPSEC tunnels • CPE • IPSEC tunnel • CPE • PE • PE • CPE • PE • Host • Site to site IPSEC tunnels • Voluntary IPSEC tunneling Bryan Gleeson, Page-2
PE to PE IPSEC tunnels • CPE • IPSEC tunnel • CPE • PE • PE • CPE • PE • Host • Can be used for both Layer 3 + Layer 2 VPNs Bryan Gleeson, Page-3
CPE to PE IPSEC tunnels • CPE • IP/ MPLS • CPE • PE • PE • CPE/LNS • PE/ LAC • Host • Secure remote access to NB-VPN • Compulsory L2TP/IPSEC tunneling Bryan Gleeson, Page-4
Current IPSEC WGs • IPSEC • IPSEC Policy (IPSP) - allows configuration of IPSEC policy for hosts + security gateways, security gateway discovery for hosts etc • IPSEC Remote Access (IPSRA) - extend IPSEC to allow for remote client user authentication and configuration Bryan Gleeson, Page-5
Requirements Solicited - some possibilities are: • Ability to associate an IPSEC tunnel with a VPN (e.g. add VPN-ID to IKE phase 2 negotiation) • Ability to run routing protocols over an IPSEC tunnel (possible issue with wildcard QM client IDs) • Allow null encryption / null authentication option • More flexible diffserv marking rules Bryan Gleeson, Page-6
Thank You! Bryan Gleeson, Page-7
Recommend
More recommend