- 最新
- 最多得票
- 最多評論
There's some detail missing here - how are the IPSEC tunnels being created? Are A and B instances or sites?
If I assume that you're using the AWS VPN service and that A and B are sites: The traffic within Transit Gateway is not encrypted. Think of Transit Gateway as a cloud-scale router. If you had a router that terminated two IPSEC tunnels and routed between them the traffic on the router is not encrypted as it passes through that device. That's because the router must decrypt the packet from (say) A, determine the appropriate destination (B in this case) and then encrypt it again before sending it onto B.
In general, there are many places in every network where (at least) the IP (and perhaps TCP) headers of a packet need to be visible in order to route the packet(s) correctly. For the payload to remain encrypted at that point requires application-layer security such as TLS. It's the only way to achieve end-to-end encryption between two hosts.
相關內容
- 已提問 2 年前
- AWS 官方已更新 2 年前
- AWS 官方已更新 2 年前
- AWS 官方已更新 2 年前
- AWS 官方已更新 2 年前
Thanks for your reply and sorry for not being entirely clear. Yes, A and B are meant to be sites using the AWS VPN service.
This is what I expected, I just wanted to make sure.