|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: IPsec Usage QuestionPaul, "2-site tunnel scenario" is not exactly "2-tunnel scenario". It all started with my response to your original scenario: "Scenario: two sites, each with an IPsec gateway, and an IPsec tunnel set up between the two sites. All traffic between the two sites goes through the tunnel. (This is the classic IPsec based VPN scenario.)" But then you resent anyway more suitable scenarios, so I don't think we have any real disagreement. Regards, Ofer Ofer Biran Storage and Systems Technology IBM Research Lab in Haifa biran@il.ibm.com 972-4-8296253 Paul Koning <pkoning@equallogic.com> on 11/02/2002 16:34:05 To: Ofer Biran/Haifa/IBM@IBMIL cc: ips@ece.cmu.edu Subject: RE: IPsec Usage Question >>>>> "Ofer" == Ofer Biran <BIRAN@il.ibm.com> writes: Ofer> Paul, Ofer> I only meant that the 2-site tunnel scenario has nothing to do Ofer> with the IPsec protection mandated to be implemented (yes, Ofer> implemented, not used) by iSCSI. So I would not use this Ofer> scenario at all to conclude about iSCSI security requirements Ofer> (outer=inner etc.). What 2-tunnel scenario? My scenario is a one-tunnel scenario, where one end of the tunnel terminates an an iSCSI device and the other terminates at an IPsec gateway. That's a perfectly standard tunnel configuration. In fact, it's the most obvious example of why tunnel mode support (in addition to transport mode) is required for IPsec hosts. In that scenario, you can have inner==outer for one of the endpoint addresses (the host) but not for the other. Unless it is your goal to disallow IPsec gateways talking to iSCSI devices, you have to support this configuration if you're going to support IPsec at all. paul
Home Last updated: Mon Feb 11 22:18:05 2002 8727 messages in chronological order |