Mike,

Thanks for the responses to my comments, including ones from yesterday's meeting.
Steve,
Sorry, I wasn't clear on our use of IPsec. We definitely use both the authentication and encryption capabilities of IPsec. We do the following when bringing up a new tunnel.

 1. Trigger ISAKMP/IKEv2/IPsec with an SPD of (LocalPeer IP,
    RemotePeer IP, GRE).
 2. ISAKMP/IKEv2 authenticates the peers, creates the IKE SAs and the
    IPsec/Child encryption SAs.
 3. IPsec signals it has authenticated and encryption is ready, the
    GRE tunnel is activated.
 4. NHRP registration (for spoke-hub) or resolution reply (for final
    phase of spoke-spoke) are sent over the tunnel.
 5. Routing is brought up over the spoke-hub tunnels.

If a shortcut between two spokes is available, as advised by a hub, that requires an SDP entry. Did that entry preexist in the spoke, or was it provisioned by a hub in some fashion? If it existed in the spoke, initially, "normal" IPsec operation would cause traffic to that spoke to trigger formation of an SA to that destination. Can you clarify?
As for scaling, we already have DMVPN networks of 10000+ nodes and looking at building networks of 40000+ nodes. In many cases customers have multiple subnets behind each node, therefore with just IPsec I would need to have multiple SAs/encryption between the same two nodes, even if you are only doing subnet to subnet SPDs. Take the case of two nodes that each have 4 subnets. I could need as many as 16 SAs to cover all cases. Or even a simpler case between a host (1 local address) and a node at a data center (say 20 subnets), I would need up to 20 SAs to cover this. In many of our networks we are asked to support at least 5 (sometimes 10) subnets per spoke location.
That's a helpful clarification. It does not appear to be the sort of environment that initially seemed to be the focus of this work, e.g., road warriors calling home or home/satellite offices for a moderate size enterprise.
As far as IPv4 and IPv6 support, you are correct it would only double the number of SAs needed, assuming that there are the same number of subnets for IPv4 and IPv6. From what I have seen IPv6 tends to increase the number of subnets.
I'm glad we're on the same page here.
For end-to-end encryption, take the case where a spoke node is a host. Then initially the spoke/host will connect to one or more hubs (we recommend at least 2 for redundancy). Communication between two such connected hosts would be through the hub and would be two hops (Host1 encrypt-decrypt Hub encrypt-decrypt Host2). Once the shortcut tunnel is setup then communication would be direct between the hosts (Host1 encrypt-decrypt Host2).
see my question re the shortcut SPD entries.

Steve
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to