>>>>> "Mike" == Mike Sullenberger <[email protected]> writes:
    Mike> We use other tunnel mechanisms (GRE), because IPsec tunneling
    Mike> mode is lacking in functionality. For example, when you use
    Mike> GRE for the tunneling you also reduce the IPsec SA's that are
    Mike> needed to "describe" the traffic for IPsec to encrypt.  If you
    Mike> use IPsec tunnel mode only then for each pairing of subnets
    Mike> behind each peer you need a separate IPsec SA. For example if
    Mike> there are 5 subnets each behind two peers then you need up to
    Mike> 25 SA pairs to describe exactly what needs to be encrypted and
    Mike> nothing more.  If you tunnel the data traffic first then you
    Mike> only need 1 SA pair for all traffic, since IPsec encrypts the
    Mike> tunnel itself and not the traffic within the tunnel.
    >> So, you trade IPsec SAs ("security ACLs") for extended
    >> access-lists and routing tables.  I don't see a difference if
    >> both are automatically updated by a policy engine.
    >> 
    >> I can see that this might matter for devices with fixed purpose
    >> ASICs that accelerate one kind of access list, but not another..

    Mike> I am not sure where you are getting a set of extended
    Mike> access-lists. There aren't any extended access-lists added.
    Mike> If a packet is routed through the tunnel it is encapsulated
    Mike> and then encrypted. There isn't any access-list necessary. 

Oh, I'm sorry, I thought you were creating a secure network!

What you are saying is that you are creating an overlay network, where
different sites can impersonate each other!

    Mike> What you call other fancy features is what I call functional
    Mike> separation. IPsec does encryption well, but in reality it does
    Mike> a fairly poor job of tunneling. So lets have IPsec do what it
    Mike> does well and have GRE do what it does well and that is
    Mike> tunneling.  Then you add NHRP do to next-hop

    >> I'm curious if you've worked with any other vendor's IPsec?
    >> Because the issues you describe seem to be implementation
    >> limitations.

    Mike> I have worked some with other vendor's IPsec when
    Mike> troubleshooting interaction issues.  I still believe that
    Mike> IPsec at the base is not a good tunneling protocol.

CISCO IOS IPsec is a poor tunneling protocol.
Many other vendors do a better job.

-- 
]       He who is tired of Weird Al is tired of life!           |  firewalls  [
]   Michael Richardson, Sandelman Software Works, Ottawa, ON    |net architect[
] [email protected] http://www.sandelman.ottawa.on.ca/ |device driver[
   Kyoto Plus: watch the video <http://www.youtube.com/watch?v=kzx1ycLXQSE>
                       then sign the petition. 
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to