R3303-HP HSR6800 Routers Security Configuration Guide

64
Configuring group domain VPN
Group domain Virtual Private Network (group domain VPN) provides a point-to-multipoint tunnel-less
VPN solution. It is mainly used to protect multicast traffic.
Overview
Group domain VPN uses a group-based IPsec model. Members in a group use a common IPsec policy,
which includes security protocols, algorithms, and keys.
Group domain VPN has the following advantages over conventional IPsec VPN:
Better network scalability—Conventional IPsec VPNs require that each pair of communication
peers establish independent IKE SAs and IPsec SAs. In group domain VPNs, members in a group
use the same pair of IPsec SAs, simplifying network management and improving scalability.
Without routing re-deployment—Conventional IPsec VPNs establish connections over tunnels that
encapsulate new IP headers for packets. You must reconfigure routes to forward tunneled packets.
In group domain VPNs, the outer IP header is the same as the inner IP header. You do not need to
change existing route configurations.
Better QoS—In conventional IPsec VPNs, you must reconfigure QoS policies because a new IP
header is added before the original IP header. Group domain VPN keeps the original IP header,
simplifying QoS deployment.
Higher multicast efficiency—Conventional IPsec VPNs use point-to-point tunnels. A tunnel-end
device must send an encrypted multicast packet to each tunnel peer in the multicast group. Group
domain VPNs use tunnel-less connections. A tunnel-end device sends only one encrypted packet to
all members in a group.
Any-to-any connectivity—In a group domain VPN, all members in a group share the same pair of
IPsec SAs. Any two members in the same group can encrypt and de-encrypt packets of each other,
implementing any-to-any connectivity.
Group domain VPN structure
As shown in Figure 151, a typical group domain VPN comprises a key server (KS) and group members
(GM).