Let me guess, the clients are behind a Linksys router doing PAT
(NAPT)?
PATing devices typically cannot allow more than 1 IPSec session
to pass-thru. The reason for this is that the inbound IPSec SA is
only determined by 3 things: dst addr, protocol (ESP or AH) and
the Security Parameter Index (SPI). The dst addr and protocol will
be the same, only ESP will work, so that only leaves the SPI to
differentiate inbound SA's.
The SPI is chosen by the destination and given to the sender
during the initial ISAKMP negotiation. The PATing device can't see
this negotiation, so it would be very difficult to allow multiple IPSec
stations to establish connections. i.e. how can the PATing device
determine which internal station the traffic is being sent to?
One way you could do this would be to make an assumption that
any new inbound SA's belong to the last inside station to initiate a
connection and just keep track of all IPSec initiations from internal
stations and map it to inbound SPI's. This would work in some
cases, but then there are potential problems if you have lots of
internal clients making requests about the same time.
Bottom line, don't expect anyone to implement this functionality
any time soon, if ever. What is more likely is that vendors will
implement proprietary schemes to allow their VPN clients to talk
through a NAT/PAT gateway to their VPN gateway as Cisco has
done with the VPN 3000. (ala wrapping the IPSec packets with a
UDP header)
An option would be to terminate the IPSec tunnels on a common
perimeter device for all internal clients, or use an alternative VPN
protocol, like SSL ala the Aventail product.
HTH,
Kent
On 29 Mar 2001, at 13:22, The.Rock wrote:
> Here's the problem:
>
> 2 clients,both sharing a DSL line. both use VPN client for 5001
>
> When one is connected it is fine and if you add another connection off
> the same dsl while the other computer is connected, the VPN tunnel
> keeps dropping. Any ideas ?
>
>
> _________________________________
> FAQ, list archives, and subscription info:
> http://www.groupstudy.com/list/cisco.html Report misconduct and
> Nondisclosure violations to [EMAIL PROTECTED]
_________________________________
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]