Skip to main content

3. Encapsulating Security Protocol Processing

3. Encapsulating Security Protocol Processing

This section describes the processing of ESP packets in both outbound and inbound directions.

3.1. ESP Header Location

ESP may be employed in two ways: transport mode or tunnel mode.

3.1.1. Transport Mode Processing

Details of transport mode processing.

3.1.2. Tunnel Mode Processing

Details of tunnel mode processing.

3.2. Algorithms

The mandatory-to-implement algorithms for use with ESP.

3.2.1. Encryption Algorithms

Encryption algorithm specifications.

3.2.2. Integrity Algorithms

Integrity algorithm specifications.

3.2.3. Combined Mode Algorithms

Combined mode algorithm specifications.

3.3. Outbound Packet Processing

Processing of outbound ESP packets.

3.3.1. Security Association Lookup

SA lookup for outbound packets.

3.3.2. Packet Encryption and ICV Calculation

Encryption and ICV calculation procedures.

3.3.3. Sequence Number Generation

Sequence number generation rules.

3.3.4. Fragmentation

Fragmentation handling.

3.4. Inbound Packet Processing

Processing of inbound ESP packets.

3.4.1. Reassembly

Packet reassembly procedures.

3.4.2. Security Association Lookup

SA lookup for inbound packets.

3.4.3. Sequence Number Verification

Sequence number verification procedures.

3.4.4. Integrity Check Value Verification

ICV verification procedures.