>Ben Nagy <[EMAIL PROTECTED]> 
>
>IPSec works fine with NAT. It's just IP.

Well, maybe....

>
>Well...pretty damn cool IP, but still IP.
>
>Usually, you IPSec stuff between two network edges, right? Like your
>external router to the other team's external router. So, at that point, like
>the very outside of all your NAT and routing and stuff, you're doing
>excryption things [1]. As far as internal clients know, the network is
>running as per usual.

Actually I have been deploying a bit of host to security gateway IPSec lately. IPSec 
is definitely IP, but not all IP is supported equally in many circumstances. In the 
best case scenario, the hosts transiting traffic on the IPSec SAs are not aware of its 
existence, but in many cases this means manually reducing the MTU size of the hosts. 
If the clients that you refer to are the human users on the hosts, than an IP stack on 
a host that properly supports Path MTU discovery may make the clients (or admins) life 
much simpler. 

NAT is really problematic when it happens between the IPSec endpoints. Although an 
IPSec implementation could possibly have a provision to handle authentication on 
transport mode SAs in this circumstance, I have not seen it. IKE can also be a hassle 
in this circumstance also - if you translate more than one IPSec endpoint address to a 
single IP, than the IKE exchange must use aggressive mode which may not be acceptable 
in some cases. 

>All you need to do for people inside the networks is make sure that they
>know how to get to the other side. You can route, apply NAT mappings, use
>HOSTS files, basically whatever you like, and it should work fine.
>
>
>Cheers,
>
>[1] Yeah, well this is a simplified explanation, okay? There are some minor
>brain benders in setting up edge routers to do IPSec tunnels in NAT
>environments, but nothing too hard.
>- —
>Ben Nagy
>Network Consultant, CPM&S Group of Companies
>Direct: +61 8 8422 8319    Mobile: +61 414 411 520
>
>
>- -----Original Message-----
>From: Jean-Frantois Grenier [mailto:[EMAIL PROTECTED]] 
>Sent: Tuesday, August 03, 1999 12:52 AM
>To: [EMAIL PROTECTED] 
>Subject: IPSEC + IPNAT possibilities ?
>
>
>Hi,
>
>Is it possible to use IPNAT with IPSEC ?
>
>Here's the problem :
>
>Supposed that the internal LAN is
>
>192.168.1.0/24 NAT'ted 205.205.102.2/32 portmap tcp/udp 10000:60000
>
>The IPSEC tunnel is
>
>205.205.102.2    to    205.205.103.2
>tunnel
>10.0.1.0/24     to    10.0.2.0/24
>
>Could it be possible for an internal client (lets say 192.168.1.100) to
>reach 10.0.2.0 simply by routing/mapping or do I need something else, like a
>proxy ?
>
>Jean-Francois Grenier
>Comact Optimisation
>
You are already tunneling some private address space, why translate the 192.168.1.0/24 
space? Solving an overlapping address problem may be simpler than verifying that the 
device at 205.205.102.2 handles all cases of NAT in conjunction with  IPSec in a 
reasonable manner. 

-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to