30. Tunnelling
ROX™ v2.2 User Guide
302
RuggedBackbone™ RX5000
30. Tunnelling
Figure 30.1. Tunnelling menu
The tunnelling menu is accessible from the main menu under tunnel. This menu provides access to
IPsec, L2TP, L2tunneld and GRE functions.
30.1. IPsec
30.1.1. VPN Fundamentals
IPsec (Internet Protocol SECurity) uses strong cryptography to provide both authentication and
encryption services. Authentication ensures that packets are from the right sender and have not been
altered in transit. Encryption prevents unauthorized reading of packet contents.
These services allow you to build secure tunnels through untrusted networks. Everything passing
through the untrusted network is encrypted by the IPsec gateway and decrypted by the gateway at the
other end. The result is a Virtual Private Network (VPN), a network which is effectively private even
though it includes machines at several different sites connected by the insecure Internet.
The IPsec protocols were developed by the Internet Engineering Task Force (IETF) and are required
as part of IP version 6.
Openswan is the open source implementation of IPsec used by ROX™.
The protocols used by IPsec are the Encapsulating Security Payload (ESP) and Internet Key Exchange
(IKE) protocols.
ESP provides encryption and authentication (ensuring that a message originated from the expected
sender and has not been altered on route).
IKE negotiates connection parameters, including keys, for ESP. IKE is based on the Diffie-Hellman key
exchange protocol, which allows two parties without any initial shared secret to create one in a manner
immune to eavesdropping.
30.1.1.1. IPsec Modes
IPSec has two basic modes of operation. In transport mode, IPSec headers are added as the original IP
datagram is created. The resultant packet is composed of an IP header, IPSec headers and IP payload
(including a transport header). Transport mode is most commonly used between IPsec end-stations,
or between an end-station and a gateway.
In tunnel mode, the original IP datagram is created normally and then encapsulated into a new IP
datagram. The resultant packet is composed of an new IP header, IPSec headers, old IP header and
IP payload. Tunnel mode is most commonly used between gateways, the gateway acting as a proxy
for the hosts behind it.