Elijah,

Thanks for your answer..  Here is also a little more info for anyone
interested that I found during my research..  


Heres why 1 to 1 static NAT should work with IPSEC VPN...

To be compliant as an IPSec VPN a product needs to support 2 things:   IKE
(Internet
Key Exchange which runs on UDP/500) and
IPSec (AH and/or ESP) which do NOT run on TCP or UDP at all.  IPSec is it's
own
protocol number, like ICMP, TCP, RIP, etc.
The reason that many to one NAT breaks most IPSec implementations is that it
changes
the TCP/UDP port numbers so that it
can map the connections to a single IP.  This breaks IKE because IKE has to
run on
UDP/500 and it can not be changed.
It also does not work for IPSec, because IPSec does not use UDP or TCP port
numbers
(although original user packets which
are TCP/UDP based are often tunneled inside of IPSec packets).

IPSec can be made to work when 1to1 NAT is used.   IKE will not be broken
because no
port mapping occurs.   IPSec can be
made to function as long as AH (which computes a checksum signature which
includes
the original IP address) is turned off.  ESP
also computes a checksum signature, but does not use the original IP as part
of it,
so therefore a NATted packet works in this
environment.

IPSec does support "TCP based" VPNs however, as tunnel-mode IPSec carries
TCP
sessions through the IPSec session.

Here is why PAT will work when using the VPN client...

Encapsulating Security Payload
Protocol 50 (Encapsulating Security Payload [ESP]) handles the
encrypted/encapsulated packets of IPSec. Most PAT devices don't work with
ESP since they have been programmed to work only with Transmission Control
Protocol (TCP), User Datagram Protocol (UDP), and Internet Control Message
Protocol (ICMP). In addition, PAT devices are unable to map multiple
security parameter indexes (SPIs). The NAT transparent mode in the VPN 3000
Client solves this problem by encapsulating ESP within UDP and sending it to
a negotiated port. The name of the attribute to activate on the VPN 3000
Concentrator is IPSec through NAT.

How Does NAT Transparent Mode Work?
Activating IPSec transparent mode on the VPN Concentrator creates
non-visible filter rules and applies them to the public filter. The
configured port number is then passed to the VPN Client transparently when
the VPN Client connects. On the inbound side, UDP inbound traffic from that
port passes directly to IPSec for processing. Traffic is decrypted and
decapsulated, and then routed normally. On the outbound side, IPSec
encrypts, encapsulates and then applies a UDP header (if so configured). The
runtime filter rules are deactivated and deleted from the appropriate filter
under three conditions: when IPSec over UDP is disabled for a group, when
the group is deleted, or when the last active IPSec over UDP SA on that port
is deleted. Keepalives are sent to prevent a NAT device from closing the
port mapping due to inactivity.

But even though the remote PIX is acting as a VPN client "easyvpn client"
it still can't use PAT because its not able to negotiate with the VPN
concentrator to encapsulate its packets in UDP and according to the TAC
engineer that I asked they have no plans of making that possible.




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=56615&t=56615
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to