Black Box ET0010A, ET1000A, EncrypTight, ET0100A manual Using Non-contiguous Network Masks

Models: EncrypTight ET0100A ET0010A ET1000A

1 352
Download 352 pages 21.02 Kb
Page 161
Image 161

Managing IP Networks

Figure 56 Two networks with contiguous addressing defined as a supernet

If you group the two networks into a supernet and the policy encrypts traffic between these two networks and five other networks, the PEP for this network set would contain only five SAs and keys for each direction, instead of 10.

NOTE

Where the subnetwork addresses are not completely contiguous, grouping these networks can result in the inclusion of an unintended subnetwork.

Using Non-contiguous Network Masks

Non-contiguous masks are useful when you want to create a policy for devices in a network that contain a specific octet within an IP address. Non-contiguous network masks are available on ETEP PEPs version 1.4 and later.

The following example demonstrates the use of non-contiguous network masks to pass unencrypted traffic from specific addresses while encrypting everything else. Figure 57 depicts a mesh network in which all traffic on each subnet is encrypted. A router is located on each of the PEP’s remote ports, which means that all traffic to it is encrypted. However, the router port that is connected to the PEP’s remote port is the default gateway for the site. In order to manage the router, traffic from the laptop needs to pass in the clear. VoIP traffic also needs to pass in the clear. Each site uses IP addresses of x.x.x.129 and x.x.x.1 for the default gateway.

162

EncrypTight User Guide

Page 161
Image 161
Black Box ET0010A, ET1000A, EncrypTight, ET0100A manual Using Non-contiguous Network Masks