HP-UX IPSec and IPFilter

When Traffic Appears to be BlockedWhen Traffic Appears to be Blocked

In the following scenario there is overlap in the configurations of IPFilter and IPSec. To get this negotiation through, you must configure IPFilter rules to let TCP traffic through.

Figure 6-4

Scenario Three

 

 

 

A

 

B

 

10.10.10.10

 

15.15.15.15

 

IPSec <---------------

> TCP <

-----------------> IPSec

 

IPFilter

 

 

 

---TCP-----

 

 

In Scenario Three, IPSec is configured to encrypt TCP traffic between machine A and machine B and IPFilter is configured to block all TCP traffic with the following rules:

block in proto TCP block out proto TCP

Chapter 6

195