ZyWALL 10/10 II/50 Internet Security Gateway
Introduction to IPSec
25-5
25.3 Encapsulation
The two modes of operation for IPSec VPNs are
Transport
mode and
Tunnel
mode.
Figure 25-4 Transport and Tunnel Mode IPSec Encapsulation
25.3.1 Transport Mode
Transport
mode is used to protect upper layer protocols and only affects the data in the IP packet. In
Transport
mode, the IP packet contains the security protocol (
AH
or
ESP
) located after the original IP
header and options, but before any upper layer protocols contained in the packet (such as TCP and UDP).
With
ESP,
protection is applied only to the upper layer protocols contained in the packet. The IP header
information and options are not used in the authentication process. Therefore, the originating IP address
cannot be verified for integrity against the data.
With the use of
AH
as the security protocol, protection is extended forward into the IP header to verify the
integrity of the entire packet by use of portions of the original IP header in the hashing process.
25.3.2 Tunnel Mode
Tunnel
mode encapsulates the entire IP packet to transmit it securely. A
Tunnel
mode is required for
gateway services to provide access to internal systems.
Tunnel
mode is fundamentally an IP tunnel with
authentication and encryption. This is the most common mode of operation.
Tunnel
mode is required for
gateway to gateway and host to gateway communications.
Tunnel
mode communications have two sets of
IP headers:
Outside header
: The outside IP header contains the destination IP address of the VPN gateway.
Inside header
: The inside IP header contains the destination IP address of the final system behind
the VPN gateway. The security protocol appears after the outer IP header and before the inside IP
header.
25.4 IPSec and NAT
Read this section if you are running IPSec on a host computer behind the ZyWALL.
NAT is incompatible with the
AH
protocol in both
Transport
and
Tunnel
mode. An IPSec VPN using the
AH
protocol digitally signs the outbound packet, both data payload and headers, with a hash value appended
to the packet. When using
AH
protocol, packet contents (the data payload) are not encrypted.
Summary of Contents for ZyWALL 10/10
Page 1: ...ZyWALL 10 10 II 50 Internet Security Gateway User s Guide Version 3 50 June 2002...
Page 32: ......
Page 36: ......
Page 42: ......
Page 58: ......
Page 78: ......
Page 80: ......
Page 92: ......
Page 96: ......
Page 122: ......
Page 140: ......
Page 166: ......
Page 186: ......
Page 206: ......
Page 212: ......
Page 226: ......
Page 244: ......
Page 252: ......
Page 258: ......
Page 260: ......
Page 290: ......
Page 294: ......
Page 300: ......
Page 302: ......
Page 308: ......
Page 314: ......
Page 316: ......
Page 318: ......
Page 322: ......
Page 334: ......
Page 342: ...ZyWALL 10 10 II 50 Internet Security Gateway JJ Index Introduction 10 2...