Presentation is loading. Please wait.

Presentation is loading. Please wait.

IPsec Remote Access Requirements Scott Kelly IPsec Remote Access Working Group 47th IETF.

Similar presentations


Presentation on theme: "IPsec Remote Access Requirements Scott Kelly IPsec Remote Access Working Group 47th IETF."— Presentation transcript:

1 IPsec Remote Access Requirements Scott Kelly IPsec Remote Access Working Group 47th IETF

2 Current Draft Terminology IRAC - IPsec Remote Access Client IRAS - IPsec Remote Access Server SGW - Security GateWay VIP - Virtual IP address

3 Requirements Classes Endpoint Authentication Remote Host Device Configuration Security Policy Configuration Mobility

4 Endpoint Authentication Machine Authentication User Authentication Combination Machine/User Authentication Legacy Compatibility

5 Remote Host Device Configuration IP address(es)subnet mask(s)broadcast addr(s) host name(s)domain name(s)static route(s) MTUdefault TTLrouter(s) arp cache timeoutip forwarding en/disable nis options source routing options router discovery options servers (smtp, pop, dns/nis, wins, etc) netbios optionsxwindows optionsother options

6 Security Policy Configuration Remote Client (IRAC) –unrestricted vs restricted internet access while accessing corporate network –permit/deny access to other corporate hosts Server (IRAS/SGW) –dynamic update of policies based on client identity vs. static address-based policies

7 Mobility Issues Client –IP address may change during session due to DHCP lease expiration Server –Not clear if there are issues here or not

8 Scenarios Overview dialup/dsl/cablemodem telecommuters extranet users calling home from another corporate net road warriors using arbitrary ISP dialup account roaming wireless users (?) borrowers (airport kiosk) local corp to extranet partner (?) remote user to remote user (?)

9 Common Requirements User-level authentication usually required for IRAC; user/machine auth sometimes useful Machine authentication for always required for IRAS Device configuration for IRAC almost always useful Some sort of dynamic policy configuration for IRAC is required Dynamic policy configuration for IRAS may be required


Download ppt "IPsec Remote Access Requirements Scott Kelly IPsec Remote Access Working Group 47th IETF."

Similar presentations


Ads by Google