walnut Posted March 3, 2006 Posted March 3, 2006 Hi there. I had set up a test lab comprising of 2 XP workstations.A router was placed in the middle, and the nodes are in different netws.I had tweaked the Local Group Policy Security settings to enable IPSEC for1. All ip traffic2. Any source to any destinationIPSEC negotiation was successful.I tried the following traffic:1. ICMP Ping2. FTP file transferI then run ethereal on a 3rd PC to sniff the traffic.Observation from ethereal captures:1. The payload is encrypted using ESP2. Source and Dest ip addresses are in the CLEAR.Questions: 1. If ESP mode is used, why is the source and dest ip addr still in the CLEAR? ESP mode is supposed to encrypted the original ip header, and replace with a new header.2. Are there any configuration options for windows built-in IPSEC? Eg. AH or ESP?Title edited -- Please, use [TAGS] in your topic's title.Please follow XP Forum Rules from now on.--Sonic
chilifrei64 Posted March 3, 2006 Posted March 3, 2006 2. Are there any configuration options for windows built-in IPSEC? Eg. AH or ESP?.... didnt you just configure this using Local Group Policy...anywaysESP work in 2 different modes Tunnel and transport modes. In transport mode, it leaves the original IP header and adds places the ESP header directly after it in the packetIn Tunnel mode, it actually takes the packet and places it directly inside of another packet. This way you actually end up with 2 IP addresses. 1 for the tunnel endpoint and 1 for the origination. So, most likely you have this configured in transport mode. These can be configured by adding an IP Security rules within the policy to specify your IPSec endpoints.There are built in configurations to this inside of windowsyou can configure ESP's encryption method with either DES or 3DES and verify its integrity with either SHA1 or MD5You can also configure AH integrity checking with SHA1 and MD5
chilifrei64 Posted March 3, 2006 Posted March 3, 2006 In response to your PMyou need to open the policy(right click -> edit) then under policy rules click add and here you can specify your tunnel endpoints
walnut Posted March 5, 2006 Author Posted March 5, 2006 Thanks for the replies.pardon me if i'm wrong. The settings available for specification of tunnel endpoints does not enable tunnel mode.I had tried to look for the setting for [tunnel/transport] setting option in the IPSEC policies but i could not find it.there is only options for the kind of algo[AH, ESP, DES, SHA1 etc... ] used for encryption and integrity.If this is true, does this mean that windows built-in IPSEC capability can only facilitate transport mode?What abt setting up a VPN for RRAS?Can a tunnel mode VPN be configured for RRAS?
MrBlack Posted April 4, 2006 Posted April 4, 2006 Hello, I am having this problem too. Where do I specify that I want to use tunnel mode? As it is right now, I cannot get Windows to send out anything to the IP specified in the tunnel-endpoint. Thanks in advance! Regards,Tony
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now