Chapter 8 Security
BM2022 Users Guide
141
The Authentication Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-1 (RFC 2404, provide an
authentication mechanism for the
AH
and
ESP
protocols.
Key Management
Key management allows you to determine whether to use IKE (ISAKMP) or manual key
configuration in order to set up a VPN.
8.12.2 Encapsulation
The two modes of operation for IPSec VPNs are
Transport
mode and
Tunnel
mode. At the time of
writing, the BM2022 supports
Tunnel
mode only.
Figure 71
Transport and Tunnel Mode IPSec Encapsulation
Transport Mode
Transport
mode is used to protect upper layer protocols and only affects the data in the IP packet.
In
Transport
mode, the IP packet contains the security protocol (
AH
or
ESP
) located after the
original IP header and options, but before any upper layer protocols contained in the packet (such
as TCP and UDP).
With
ESP,
protection is applied only to the upper layer protocols contained in the packet. The IP
header information and options are not used in the authentication process. Therefore, the
originating IP address cannot be verified for integrity against the data.
With the use of
AH
as the security protocol, protection is extended forward into the IP header to
verify the integrity of the entire packet by use of portions of the original IP header in the hashing
process.
Tunnel Mode
Tunnel
mode encapsulates the entire IP packet to transmit it securely. A
Tunnel
mode is required
for gateway services to provide access to internal systems.
Tunnel
mode is fundamentally an IP
tunnel with authentication and encryption. This is the most common mode of operation.
Tunnel
mode is required for gateway to gateway and host to gateway communications.
Tunnel
mode
communications have two sets of IP headers:
Outside header
: The outside IP header contains the destination IP address of the VPN gateway.
Summary of Contents for BM2022
Page 12: ...15 PART I User s Guide ...
Page 22: ...Chapter 2 Introducing the Web Configurator BM2022 User s Guide 26 ...
Page 55: ...59 PART II Technical Reference ...
Page 56: ...60 ...
Page 60: ...Chapter 5 System Status BM2022 User s Guide 64 ...
Page 86: ...Chapter 6 WiMAX BM2022 User s Guide 90 ...
Page 187: ...Chapter 12 Maintenance BM2022 User s Guide 192 ...
Page 193: ...Chapter 13 Troubleshooting BM2022 User s Guide 198 ...
Page 203: ...Appendix A WiMAX Security BM2022 User s Guide 208 ...
Page 237: ...Appendix C Pop up Windows JavaScript and Java Permissions BM2022 User s Guide 242 ...
Page 273: ...Appendix E Importing Certificates BM2022 User s Guide 278 ...