25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Case 4: Remote access<br />

This case, shown in Figure 22-37, applies to remote hosts that use the Internet to<br />

reach a server in the organization protected by a firewall. The remote host<br />

typically uses a PPP dial-in connection to an ISP.<br />

H1<br />

Internet/<br />

intranet<br />

Figure 22-37 Remote access<br />

Between the remote host H1 <strong>and</strong> the firewall G2, only tunnel mode is required.<br />

The choices are the same as in case 2. Between the hosts themselves, either<br />

tunnel mode or transport mode can be used, with the same choices as in case 1.<br />

A typical setup is to use AH in tunnel mode between H1 <strong>and</strong> G2 <strong>and</strong> ESP in<br />

transport mode between H1 <strong>and</strong> H2. Older <strong>IP</strong>Sec implementations that do not<br />

support AH in tunnel mode cannot implement this.<br />

It is also common to create a combined AH-ESP tunnel between the remote host<br />

H1 <strong>and</strong> the gateway G2. In this case, H1 can access the whole intranet using just<br />

one SA bundle, while if it were using the setup shown in Figure 22-37, it only<br />

could access one host with one SA bundle.<br />

22.4.5 Internet Key Exchange (IKE) protocol<br />

The Internet Key Exchange (IKE) framework, previously referred to as<br />

ISAKMP/Oakley, supports automated negotiation of Security Associations, <strong>and</strong><br />

automated generation <strong>and</strong> refresh of cryptographic keys. The ability to perform<br />

these functions with little or no manual configuration of machines is a critical<br />

element to any enterprise-scale <strong>IP</strong>Sec deployment.<br />

G2<br />

Connection <strong>IP</strong>Sec tunnels<br />

intranet<br />

H2<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 829

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!