Real Time Ascend Maling List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: (ASCEND)IPSEC over NAT for Pipe75
Hi
On 19 August 1999, Edwin_Everett@cargill.com <Edwin_Everett@cargill.com> wrote:
> Does anyone have any information on IPSEC over a NAT'ed IP to the ISP
> for VPN?
> (gawd, look at all those acronyms in one sentence!)
>
> I was told there's a problem with this...can anyone confirm?
Yes there is.
I will try to explain why, but there is other more knowledgable people
(Matt Holdrege and others...?) on this list.
IPSEC's job is to make packets unintelligible and unalterable, and NAT
relies on being able to understand packets and make helpful modifications
to them en route. Because of this IPSEC an NAT doesn't coexist very well.
However, if I have got it right, there are circumstances when you can use
IPSEC ESP over NAT (but currently not when using a Pipe75 and single
IP NAT), IPSEC AH can not be used over a NATed connection.
P75 using single IP NAT acctually "mostly" do PAT (Port Address Translation).
This is a problem because IPSEC doesn't use any ports for ESP (Encapsulated
Security Payload, IP protocol 50) and AH (Authentication Header, IP
protocol 51), only the key exchange via IKE use UDP port 500.
What Ascend probably could do to allow IPSEC ESP in single IP NAT
=================================================================
Ascend have recently (b2.p75-7.3.0) added a "Tunnel Server" option in
the NAT configuration. This is for GRE (General Routing Encapsulation,
protocol 47) based tunnels such as PPTP and ATMP.
To me this solution could easily(?) be used to allow *one* IPSEC
workstation behind a P75 configured for single IP NAT, by adding similar
support for the ESP protocol.
To allow more than one IPSEC workstation behind a P75 using single IP NAT,
it would be required by the P75 to understand IPSEC SPIs (Security
Parameters Index). Very few ISDN SOHO routers claim to do this, but
I have read in some newsgroup that Nortel has it in theirs..
Another solution for *one* workstation access would be that the NAT
"Default Server" option actually worked as stated in the manual. That
*all* traffic that are NOT redirected in the "Static Mappings" should go
to the "Default Server" (this would remove the current need for many
static mappings to the defult server too, like port 6000 for X11, port 22
for SSH etc).
Last time I checked this, only traffic to a limited number of well know
TCP/UDP ports did get trough to the default server (and "portless"
protocols is of course not handled at all).
>
> edwin_everett@cargill.com
>
> ++ Ascend Users Mailing List ++
> To unsubscribe: send unsubscribe to ascend-users-request@bungi.com
> To get FAQ'd: <http://www.nealis.net/ascend/faq>
Regards Thomas
--
Thomas Falk Claezon ERICSSON, AXE Research and Development
Phone: +46 8 727 34 12 Box 1505
Mobile: +46 70 536 31 01 S-125 25 ALVSJO
Fax: +46 8 647 82 76 SWEDEN
Email: falk@uab.ericsson.se
URL: http://www.elfi.org/~falk/
PGP Public Key: http://www.elfi.org/~falk/PGP.html
PGP Fingerprint: 0E 0F 39 7C 1D C4 7E 2C 66 DB 20 49 9B DB BB 56
++ Ascend Users Mailing List ++
To unsubscribe: send unsubscribe to ascend-users-request@bungi.com
To get FAQ'd: <http://www.nealis.net/ascend/faq>