Both AH (Authentication Header)
and ESP (Encapsulation Security Payload) support two modes of use: transport
and tunnel mode . The operation of these two modes is best understood in the
context of a description of ESP.
Transport
Mode: Transport mode provides protection primarily for
upper-layer protocols. That is, transport mode protection extends to the
payload of an IP packet. Examples include a TCP or UDP segment or an ICMP
packet, all of which operate directly above IP in a host protocol stack.
Typically, transport mode is used for end-to-end communication between two
hosts (e.g., a client and a server, or two workstations).When a host runs AH or
ESP over IPv4, the payload is the data that normally follow the IP header. For
IPv6, the payload is the data that normally follow both the IP header and any
IPv6 extensions headers that are present, with the possible exception of the
destination options header, which may be included in the protection. ESP in
transport mode encrypts and optionally authenticates the IP payload but not the
IP header. AH in transport mode authenticates the IP payload and selected
portions of the IP header.
Tunnel
Mode: Tunnel mode provides protection to
the entire IP packet. To achieve this, after the AH or ESP fields are added to
the IP packet, the entire packet plus security fields is treated as the payload
of new outer IP packet with a new outer IP header. The entire original, inner,
packet travels through a tunnel from one point of an IP network to another; no
routers along the way are able to examine the inner IP header. Because the
original packet is encapsulated, the new, larger packet may have totally
different source and destination addresses, adding to the security. Tunnel mode
is used when one or both ends of a security association (SA) are a security
gateway, such as a firewall or router that implements IPsec. With tunnel mode,
a number of hosts on networks behind firewalls may engage in secure
communications without implementing IPsec. The unprotected packets generated by
such hosts are tunneled through external networks by tunnel mode SAs set up by
the IPsec software in the firewall or secure router at the boundary of the
local network.
Here is an example of how tunnel mode IPsec
operates. Host A on a network generates an IP packet with the destination
address of host B on another network. This packet is routed from the
originating host to a firewall or secure router at the boundary of A’s network.
The firewall filters all outgoing packets to determine the need for IPsec
processing. If this packet from A to B requires IPsec, the firewall performs IPsec
processing and encapsulates the packet with an outer IP header. The source IP
address of this outer IP packet is this firewall, and the destination address
may be a firewall that forms the boundary to B’s local network. This packet is
now routed to B’s firewall, with intermediate routers examining only the outer
IP header. At B’s firewall, the outer IP header is stripped off, and the inner
packet is delivered to B.
No comments:
Post a Comment