Internet Protocol Security |
Now that the function of each component has been explained individually, a comprehensive picture is necessary to complete an understanding of the architecture, as shown in Figure 8.8.
Figure 8.8 Overview: the IPSec Process
For simplicity, this is an intranet computer example. Each computer has an active IPSec policy.
Note
If Host A and Computer B already have an Phase I SA in place from a previous communication (and Phase I PFS is not enabled nor have key lifetimes expired), the two computers can go directly to establishing the Phase II SA.
Although this appears to be a long series of time-consuming and complicated steps, it actually all happens quickly and transparently to each user.
Any routers or switches in the data path between the communicating computers simply forward the encrypted IP packets to their destination. However, if there is a firewall, security router, or proxy server, it must have IP forwarding enabled, so that IPSec and IKE protocol traffic will pass through and not be rejected. Security negotiations are not able to pass through a network address translator (NAT). The IKE negotiation contains IP addresses in the encrypted messages which can not be changed by a NAT because the integrity hash will be broken, or because the packets are encrypted.