Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Dynamic Host Configuration Protocol (DHCPv4) Configuration of IPsec Tunnel Mode (RFC3456)

IP.com Disclosure Number: IPCOM000011192D
Original Publication Date: 2003-Jan-01
Included in the Prior Art Database: 2003-Feb-13
Document File: 19 page(s) / 40K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

B. Patel: AUTHOR [+4]

Abstract

This memo explores the requirements for host configuration in IPsec tunnel mode, and describes how the Dynamic Host Configuration Protocol (DHCPv4) may be leveraged for configuration. In many remote access scenarios, a mechanism for making the remote host appear to be present on the local corporate network is quite useful. This may be accomplished by assigning the host a "virtual" address from the corporate network, and then tunneling traffic via IPsec from the host's ISP-assigned address to the corporate security gateway. In IPv4, DHCP provides for such remote host configuration.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 7% of the total text.

Network Working Group� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � B. Patel

Request for Comments: 3456� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � Intel Corp

Category: Standards Track� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � B. Aboba

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � Microsoft

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � S. Kelly

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � Airespace

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � V. Gupta

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � Sun Microsystems, Inc.

� � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � � January 2003

� � � � � � � � � � � � � Dynamic Host Configuration Protocol (DHCPv4)

� � � � � � � � � � � � � � � � � � Configuration of IPsec Tunnel Mode

Status of this Memo

� � This document specifies an Internet standards track protocol for the

� � Internet community, and requests discussion and suggestions for

� � improvements.� Please refer to the current edition of the "Internet

� � Official Protocol Standards" (STD 1) for the standardization state

� � and status of this protocol.� Distribution of this memo is unlimited.

Copyright Notice

� � Copyright (C) The Internet Society (2003).� All Rights Reserved.

Abstract

� � This memo explores the requirements for host configuration in IPsec

� � tunnel mode, and describes how the Dynamic Host Configuration

� � Protocol (DHCPv4) may be leveraged for configuration.� In many remote

� � access scenarios, a mechanism for making the remote host appear to be

� � present on the local corporate network is quite useful.� This may be

� � accomplished by assigning the host a "virtual" address from the

� � corporate network, and then tunneling traffic via IPsec from the

� � host's ISP-assigned address to the corporate security gateway.� In

� � IPv4, DHCP provides for such remote host configuration.

Patel, et. al.� � � � � � � � � � � � � Standards Track� � � � � � � � � � � � � � � � � � � � [Page 1]

RFC 3456� � � � � � � � � DHCPv4 Config. of IPsec Tunnel Mode� � � � � � January 2003

Table of Contents

� � 1. Introduction...................................................� 2

� � � � 1.1 Terminology.................................................� 2

� � � � 1.2 Requirements Language.......................................� 3

� � 2. IPsec tunnel mode configuration requirements...................� 3

� � � � 2.1 DHCP configuration evaluation...............................� 3

� � � � 2.2 Summary.................................