IPSec (2nd Edition)

   

Chapters 3 and 4 discussed the IPSec architecture and the relationship between the various protocols that are traditionally referred to as "IPSec" and databases such as the SADB and SPD, but omitted the details of how the policies are enumerated in the SPD and get defined and installed. IPSec allows for very complex policy definitions. Because of its notion of selectors, the policy rules applied to inbound and outbound packets is very rich. Selectors can be gross an entire subnet or fine a specific port and protocol to a specific host.

The design for a policy definition and management system must not constrain the richness of IPSec. Therefore, there are several requirements imposed on any policy system. These requirements are very high level because there is no single mechanism for policy definition and management. Different IPSec implementations will have different constraints imposed on them for instance, most routers do not have a hard disk or a floppy drive and these constraints will dictate how policy is managed.

As IPSec is neither host-oriented nor router-oriented, the requirements for policy definition should be broad enough to encompass both of them. These are not an all-encompassing set of policy requirements but merely a large set that any system will abide by:

The various components of a policy system are discussed below.


   
Top

Категории

© amp.flylib.com,