Securing the Network in Oracle® Solaris 11.2

Exit Print View

Updated: August 2014

IPsec Packet Flow

Figure 6–1 shows how an IP packet proceeds when IPsec has been invoked on an outbound packet. The flow diagram illustrates where authentication header (AH) and encapsulating security payload (ESP) entities can be applied to the packet. Subsequent sections describe how to apply these entities, as well as how to choose the algorithms.

Figure 6–2 shows the IPsec inbound process.

Figure 6-1  IPsec Applied to Outbound Packet Process

image:Flow diagram shows that the outbound packet is first protected by ESP, and then by AH. The packet then goes to a tunnel or a physical interface.

Figure 6-2  IPsec Applied to Inbound Packet Process

image:Flow diagram shows that IPsec first processes the AH header, then the ESP header on inbound packets. A packet that is not protected enough is dropped.