|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: IPsec Usage QuestionPaul, >This example MUST work. So you cannot require inner == outer >address, because that translates into saying that IP Storage cannot be >protected by a site to site IPsec tunnel. This is not Kansas any more... The iSCSI devices on both sites (assuming that's their only IPsec protection) are not iSCSI compliant. This definitely doesn't cover the IPsec protection mandated by iSCSI. Regards, Ofer Ofer Biran Storage and Systems Technology IBM Research Lab in Haifa biran@il.ibm.com 972-4-8296253 Paul Koning <ni1d@arrl.net>@ece.cmu.edu on 05/02/2002 00:17:54 Sent by: owner-ips@ece.cmu.edu To: Black_David@emc.com cc: marjorie_krueger@hp.com, ips@ece.cmu.edu Subject: RE: IPsec Usage Question >>>>> "BlackG" == Black David <Black_David@emc.com> writes: BlackG> AFAIK, IPsec has no standard or widely deployed mechanism for BlackG> handling gateway discovery or address association BlackG> dynamically. True. But let's consider a very common IPsec deployment scenario. I think this is actually the predominant one, but let's not argue about that; it certainly is quite common. Scenario: two sites, each with an IPsec gateway, and an IPsec tunnel set up between the two sites. All traffic between the two sites goes through the tunnel. (This is the classic IPsec based VPN scenario.) The way this is handled is simply by configuring the routing tables on the two IPsec gateways to forward to the other site through the tunnel. As far as the other nodes on the two sites is concerned, the other site is simply reachable via ordinary IP mechanisms, and the existence of the tunnel, or the addresses used in the outer headers, are none of its concern. And of course the IP addresses of the inner header cannot possibly equal those of the outer header in this example. This example MUST work. So you cannot require inner == outer address, because that translates into saying that IP Storage cannot be protected by a site to site IPsec tunnel. Now for a different case: if you use tunnel mode to protect traffic for a single node (a common case for laptops, so this is often called the "road warrior" case) then it may well be useful to allow inner == outer. Some road warrior OS types will want that, others don't care so much, so it can be a simplifying approach. I have no objection at all to saying that inner == outer is useful, and for that matter I can go along with saying inner == outer should be supported. But, either way, inner != outer must be supported. paul
Home Last updated: Tue Feb 05 12:17:58 2002 8638 messages in chronological order |