Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Virtual private networks, Part 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
4. IPSec basics
  


IPSec Tunneling II page 3 of 4


How exactly does this address protection work? Tunneling requires some intermediate processing, and this is usually done at the Internet gateway. The gateway (most likely an IPSec firewall or router) must have some public IP address or it cannot function. The endpoints of the publicly-exposed tunnel are established at these gateways. If IP/IP tunneling is in effect, the gateway is the destination specified in the "outer" address. The gateway obtains the encrypted packet, decodes it for the "inside" address, and then sends it. This, of course, assumes that a secured internal network is in place and that it is not vulnerable to eavesdropping or MITM attacks.

More details about this protocol this can be found in RFC 2003 "IP encapsulation within IP" (see the Resources section).


Main menuSection menuGive feedback on this tutorialPreviousNext
PrivacyLegalContact