Virtual Private Networks
8-2
■
IP Security (IPSec - RFC 2401, RFC 2402, RFC 2406).
■
Point-to-Point Tunneling Protocol (PPTP - RFC 2637).
■
Layer 2 Tunneling Protocol (L2TP - RFC 2661).
IPSec Overview
IP Security (IPSec) protects IP traffic with two protocols, Authentication
Header (AH), and Encapsulating Security Payload (ESP). AH integrity
ensures data integrity by authenticating a packet’s IP header and payload. If
a system intruder alters an IP packet and replays it, the intended recipient is
made aware by AH that the packet underwent modification during
transmission.
ESP confidentiality guarantees data confidentiality by encrypting IP packets
so that intruders can’t decode them. ESP confidentiality is mandatory in
IPSec. The difference between AH integrity and ESP integrity is that ESP
integrity does not authenticate IP headers. ESP integrity is an option in
IPSec implementation and can be used with ESP confidentiality for high
security. However, if you use Network Address Translation (NAT) to
translate your private IP addresses into Internet addresses, you can only
use ESP integrity because AH integrity manipulates IP headers, while ESP
integrity does not.
IPSec operates in transport and tunnel mode. In transport mode, AH or ESP
resides in the original IP packet between the IP header and upper-layer
extension header information. IPSec uses transport mode to provide end-
to-end security between two end systems. For example, between a
Windows 2000 workstation and a Windows 2000 server. In tunnel mode,
IPSec places an original IP packet in a new IP packet and inserts AH or
Summary of Contents for BG-2000
Page 20: ...Hardware Description 2 12...
Page 24: ...Networking Options 3 4...
Page 28: ...The Management Tool 4 4 Figure 4 1 Home Main Area...
Page 33: ...Basic Settings 5 3 Figure 5 1 Internet Address TCP IP Settings Basic Settings...
Page 36: ...Basic Settings 5 6 Figure 5 2 PPPoE Basic Settings...
Page 41: ...Basic Settings 5 11 Figure 5 3 Wireless Settings Basic Settings...
Page 43: ...Basic Settings 5 13 Figure 5 4 Local Network Settings Basic Settings...
Page 44: ...Basic Settings 5 14...
Page 51: ...Advanced Settings 6 7 Figure 6 3 Port Filtering Advanced Settings...
Page 53: ...Advanced Settings 6 9 Figure 6 4 Protocol Filtering Advanced Settings...
Page 57: ...System Tools 7 3 Figure 7 1 Profile Management Tool Page...
Page 61: ...System Tools 7 7 Figure 7 4 Web Access Tools Page...
Page 63: ...System Tools 7 9 Figure 7 5 Terminal Access Tools Page...
Page 65: ...System Tools 7 11 Figure 7 6 SNMP Access Tools Page...
Page 77: ...System Tools 7 23 Figure 7 7 Statistics Tools Page...
Page 78: ...System Tools 7 24...
Page 96: ...Troubleshooting 9 14...
Page 128: ...Glossary B 26...