28-2
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 28 Configuring L2TP over IPSec
L2TP Overview
IPSec Transport and Tunnel Modes
By default, the security appliance uses IPSec tunnel mode—the entire original IP datagram is encrypted,
and it becomes the payload in a new IP packet. This mode allows a network device, such as a router, to
act as an IPSec proxy. That is, the router performs encryption on behalf of the hosts. The source router
encrypts packets and forwards them along the IPSec tunnel. The destination router decrypts the original
IP datagram and forwards it on to the destination system. The major advantage of tunnel mode is that
the end systems do not need to be modified to receive the benefits of IPSec. Tunnel mode also protects
against traffic analysis; with tunnel mode, an attacker can only determine the tunnel endpoints and not
the true source and destination of the tunneled packets, even if they are the same as the tunnel endpoints.
However, the Windows 2000 L2TP/IPSec client uses IPSec transport mode—only the IP payload is
encrypted, and the original IP headers are left intact. This mode has the advantages of adding only a few
bytes to each packet and allowing devices on the public network to see the final source and destination
of the packet.
Figure 28-1
illustrates the differences between IPSec Tunnel and Transport modes.
Therefore, In order for Windows 2000 L2TP/IPSec clients to connect to the security appliance, you must
configure IPSec transport mode for a transform set using the
crypto ipsec transform-set trans_name
mode transport
command. This command is the configuration procedure that follows,
“Configuring
L2TP over IPSec Connections” section on page 28-3
.
With this capability (transport), you can enable special processing (for example, QoS) on the
intermediate network based on the information in the IP header. However, the Layer 4 header will be
encrypted, limiting the examination of the packet. Unfortunately, transmitting the IP header in clear text,
transport mode allows an attacker to perform some traffic analysis.
Figure 28-1
IPSec in Tunnel and Transport Modes
IP HDR
23246
Data
Encrypted
Tunnel mode
IP HDR
Data
Encrypted
IPSec HDR
New IP HDR
IP HDR
Data
Transport mode
Data
IPSec HDR
IP HDR
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......