25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Case 1: End-to-end security<br />

As shown in Figure 22-32, two hosts are connected through the Internet (or an<br />

intranet) without any <strong>IP</strong>Sec gateway between them. They can use ESP, AH, or<br />

both. Either transport or tunnel mode can be applied.<br />

Figure 22-32 End-to-end security<br />

The following combinations are required to be supported by any <strong>IP</strong>Sec<br />

implementation:<br />

► Transport mode<br />

H1 Internet/<br />

H2<br />

intranet<br />

Connection <strong>IP</strong>Sec tunnel<br />

– AH alone<br />

– ESP alone<br />

– AH applied after ESP (transport adjacency)<br />

► Tunnel mode<br />

– AH alone<br />

– ESP alone<br />

Case 2: Basic VPN support<br />

We describe virtual private networks (VPNs) in 22.10, “Virtual private networks<br />

(VPNs) overview” on page 861.<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 825

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!