The ESP Protocol
Previous Top Next


A secure Transport Protocol must be used to exchange the encrypted traffic between Peers once parameters and key material have become available. Two options have been defined for use with IPSEC. The first being the Authentication Header Protocol ( or AH ) and the second being the Encapsulating Security Payload Protocol ( or ESP ). Some details unique to the AH protocol prevent it from being used when a device performing Network Address Translation ( or NAT ) exists between two Peers.

The only transport protocol currently supported by the Shrew Soft VPN Client is the ESP protocol.

Both Transport Protocols offer two different modes of operation. These are referred to as Transport and Tunnel mode. Transport mode is used to protect the data contained within an IP packet payload. Tunnel mode is used to protect an entire IP datagram by encrypting the original header along with the payload data. This encrypted data is then encapsulated in a new IP datagram using header information that is suitable for public network routing. Since Tunnel mode retains the original IP header information, it can be used to process network traffic on behalf of other hosts. This allows an IPSEC Peer to function as a security gateway by encrypting and encapsulating all traffic that matches a security policy and then forwarding the protected traffic to an appropriate peer gateway. The peer gateway then decapsulates and decrypts the traffic which can then be routed based on the original IP header information.

The only mode of operation currently supported by the Shrew Soft VPN Client is Tunnel mode.