IPSec VPN is a technology with a very high click rate among current VPN technologies. It provides both VPN and information encryption technologies. This column will introduce the principles of IPSec VPN. IPSec VPN Application Scenarios IPSec VPN application scenarios are divided into three categories:
VPN is just an application of IPSec. IPSec is actually the abbreviation of IP Security. Its purpose is to provide high security features for IP. VPN is a solution generated under the way to achieve this security feature. IPSec is a framework architecture, which consists of two types of protocols:
Why is AH less used? Because AH cannot provide data encryption, all data is transmitted in plain text, while ESP provides data encryption; secondly, AH cannot traverse NAT because it provides data source confirmation (once the source IP address changes, AH verification fails). Of course, IPSec can use AH and ESP at the same time to achieve the most complete security features in extreme cases, but this solution is extremely rare. IPSec encapsulation mode After introducing the scenarios of IPSec VPN and the composition of the IPSec protocol, let's take a look at the two encapsulation modes provided by IPSec (Transport mode and Tunnel mode). The above figure shows the encapsulation structure of the transmission mode, and then compares it with the tunnel mode: You can find the difference between transport mode and tunnel mode:
From the above figure, we can also verify the difference between AH and ESP introduced in the previous section. The following figure explains the scenarios in which transport mode and tunnel mode are applicable. From the comparison of this picture we can see that:
Although the tunnel mode can be applied to any scenario, it requires an extra layer of IP header (usually 20 bytes in length) overhead, so in the PC-to-PC scenario, it is recommended to use the transport mode. To give you a more intuitive understanding, let's look at the following figure to analyze why only the tunnel mode can be used in the Site-to-Site scenario: As shown in the figure above, if the traffic sent from the initiator's intranet PC to the responder's intranet PC meets the gateway's interest flow matching condition, the initiator uses the transport mode for encapsulation:
We use this proof by contradiction to cleverly explain why the transport mode cannot be used in the Site-to-Site case. We also propose the necessary and sufficient conditions for using the transport mode: the interest flow must be completely within the IP address range of the initiator and responder. For example, in the figure, the initiator IP address is 6.24.1.2 and the responder IP address is 2.17.1.2. Then the interest flow can be source 6.24.1.2/32 and destination 2.17.1.2/32. The protocol can be arbitrary. If the source and destination IP addresses of the data packet are slightly different, sorry, please use the tunnel mode. IPSec Negotiation In addition to some IPSec protocol principles, we are more concerned with the content of the protocol involving solution formulation:
Let's take the most common IPSec tunnel mode as an example to explain the IPSec negotiation process: The figure above describes the IPSec negotiation process triggered by the interest flow. Native IPSec does not have a negotiation process such as identity confirmation, and there are many defects in the solution, such as the inability to support identity confirmation and dynamic key update when the initiator's address changes dynamically. The IKE (Internet Key Exchange) protocol that appeared with IPSec is specifically used to make up for these shortcomings:
The security of IPSec is also reflected in the fact that the SA in the second phase is always unidirectional: As can be seen from the figure above, when negotiating the second phase of SA, SA is directional. The SA used by the initiator to the responder and the SA of the responder to the initiator are negotiated separately. The advantage of this is that even if the SA in one direction is cracked, it will not affect the SA in the other direction. This design is similar to the two-way lane design. Although IPSec is just a combination of 5 letters, the protocol functions it involves are numerous and the solutions are extremely flexible. This issue mainly introduces the basic principles of IPSec, and other aspects of IPSec will be introduced in the future. |
<<: 5 Network Troubleshooting Software, Which One Do You Use?
>>: 5G is here, where will the next explosion point of the Internet be?
We have shared information about RackNerd many ti...
HTTP 1.0 was released in 1996, laying the foundat...
Cloud computing provides businesses with the oppo...
ServerKurma is a foreign hosting company founded ...
CloudCone's Hashtag 2022 VPS Sale this month ...
2015 was a year in which new technologies matured...
Telecommunications company Ericsson has released ...
The withdrawal of 2G/3G networks is not a new top...
The key to 5G is to provide diversified services ...
Serial links are responsible for transferring dat...
[[377418]] 1. Introduction CAN bus was developed ...
DMIT has released two special Christmas packages,...
VULTR is a foreign VPS merchant founded in 2014. ...
On December 20, Beijing time, China Mobile Chairm...
Many enterprises are deploying private 4G LTE (sh...