186
Chapter 6 IP security and VPN
300868-G
How a tunnel is initiated
Neither the Instant Internet unit nor the CES can manually initiate a branch office
connection. To initiate a VPN tunnel, some activity must be performed to initiate a
tunnel connection. Some ways that a tunnel may be initiated include: using a ping
or browsing to a site that uses the tunnel. For example, a host on one LAN could
ping a host on another LAN where the packet is expected to travel through a
configured VPN tunnel.
Tunnel validity
Currently, the IPsec protocol does not provide a “keep-alive” mechanism as part
of its standard. If one endpoint of a tunnel disconnects without the knowledge of
the other (for example, if the server on one end is rebooted), the remaining “live”
endpoint still attempts to send traffic through the tunnel. In this situation, the
tunnel status may appear to be valid to the live endpoint, but communications are
not possible. However, after the disconnected endpoint (the end that was
rebooted) initiates a new tunnel as warranted by traffic, the tunnel is reestablished
and operates properly.
Instant Internet provides a Ping utility as a “keep-alive” mechanism in order to
circumvent the problems associated with losing one end of a tunnel. For more
information refer to
“Using Pings” on page 173
.
Dial-up environments and tunnel validity
In a dial-up or equivalent (analog, ISDN, PPPoE) environment, the Internet
connection may not exist at all times which can cause a problem when a tunnel is
no longer valid. A tunnel connection is completely independent of the dial-up
connection to the Internet and remains valid and expires as configured regardless
of whether or not the dial-up connection is active. Because static IP addressing is
required for a VPN, this is of little consequence because as soon as the connection
is reestablished, the tunnel traffic can continue.
If, however, the dial-up connection is interrupted (inadvertently or intentionally
due to an idle timeout), and the gateway at one endpoint of the tunnel informs the
other endpoint that the tunnel is to be deleted, this information cannot reach the
remote gateway and it will not know that the tunnel is no longer valid. After the
dial-up connection is re-established, it continues to attempt to use this now invalid
tunnel (as described above regarding one endpoint disconnecting).
Содержание 400
Страница 16: ...16 Contents 300868 G ...
Страница 22: ...22 Figures 300868 G ...
Страница 24: ...24 Tables 300868 G ...
Страница 92: ...92 Chapter 2 User access administration 300868 G ...
Страница 114: ...114 Chapter 3 Internet activity logging 300868 G ...
Страница 166: ...166 Chapter 5 Advanced IP configuration 300868 G ...
Страница 200: ...200 Chapter 6 IP security and VPN 300868 G ...
Страница 256: ...256 Chapter 8 Advanced communications configuration 300868 G ...
Страница 302: ...302 Chapter 10 Instant Internet unit configuration support and diagnostics 300868 G ...
Страница 314: ...314 Appendix A Troubleshooting and error messages 300868 G ...
Страница 344: ......