Research On High Security of IP Tunnel in Virtual Private Network
Research On High Security of IP Tunnel in Virtual Private Network
Abstract. IPSec encrypts and authenticates the packets of IP protocol. Both sides of IP network
layer communication use encryption authentication, data source authentication and integrity
verification to ensure the integrity, confidentiality and anti replay of IP protocol packet
transmission. In enterprise network management, we can usually use IPSec VPN technology to
establish a secure channel to realize the secure communication between headquarters and
branches.[1]
1. Introduction
The old TCP/IP network is lack of security authentication and secrecy mechanism. With the expansion
of the scale of enterprise network development and the increasing importance of network security
technology, the problem of security policy is becoming more and more necessary, and the introduction
of IPSec Security policy is becoming more and more important to ensure the security of the traditional
TCP/ IP protocol network data communication, the sender can encrypt the data in the form of ciphertext,
and the receiver can verify the data to ensure that the data packets are not tampered in the transmission
process. Using a good security strategy can not only ensure the security of the communication data, but
also prevent the unknown users from sending the captured data packets repeatedly a malicious attack.
2. Application scenarios
In enterprise network management, network administrators usually use IPSec VPN technology to ensure
the security of some private data in the public network transmission, and ensure the confidentiality and
integrity of data. Administrators often set up IPSec tunnels between the edge routers of enterprise
headquarters and branch routers, deploy IPSec VPN technology solutions, and realize network security
transmission of data traffic from designated departments. [2]
3. IPSec architecture
IPSec mainly includes three protocols: AH (authentication header), ESP (encapsulating security
payload) and IKE (Internet Key Exchange). AH protocol is mainly used for data source verification, data
integrity verification, anti message replay and other functions. ESP protocol is mainly used to encrypt
ip message data, in this way, ip data packets can be transmitted in a secure network. IKE protocol is
mainly used for automatic negotiation of cryptographic algorithms used by ah and ESP, establishment
and maintenance of SA and other services
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
CNSSE 2021 IOP Publishing
Journal of Physics: Conference Series 1856 (2021) 012014 doi:10.1088/1742-6596/1856/1/012014
4.1. In transmission mode, AH or ESP header is located between IP header and TCP header. Before
and after AH and ESP processing, the IP header remains unchanged, which is mainly used in end to
end application scenarios. That is, it can only be suitable for PC to PC scenarios, style and spacing.
AH:
ESP:
AH-ESP:
4.2. In tunnel mode, IPSec will generate a new IP header in front of AH or ESP header. After AH and
ESP processing, an external IP header is encapsulated, which is mainly used for site-to-site application
scenarios. It can also be applied to any scenario. As tunnel mode requires more IP header overhead, it
is recommended to use transmission mode in PC to PC scenario.
AH:
ESP:
AH-ESP:
2
CNSSE 2021 IOP Publishing
Journal of Physics: Conference Series 1856 (2021) 012014 doi:10.1088/1742-6596/1856/1/012014
3
CNSSE 2021 IOP Publishing
Journal of Physics: Conference Series 1856 (2021) 012014 doi:10.1088/1742-6596/1856/1/012014
7.Conclusion
This paper mainly introduces the principle of IPSec protocol, the design and implementation process of
application scenario, architecture and security policy of IPSec VPN. It focuses on IPSec proposals,
policies and binding methods, defines traffic of interest through ACL application policies,The data flow
of interest filtered by IPSec will process and encapsulate the negotiation parameters, and then forward
through IPSec tunnel.
References
[1] Tang Xiaomeng, Liu Chang,J.(2016-08)Principle and configuration of IPSec VPN. China
cable TV.
4
CNSSE 2021 IOP Publishing
Journal of Physics: Conference Series 1856 (2021) 012014 doi:10.1088/1742-6596/1856/1/012014