> > A slight correction.  IPSec is also NATable if you are not using the
> > Authentication Header (AH). Use of AH or AH/ESP mode through NAT
> >breaks because NAT packet mangling makes HMAC checksums calculate
> >to an incorrect value.  (See RFC 2709)

<Ben Nagy wrote>
> Um, and if your auth is not based on IP addresses, and if you're not doing
> PAT, and if the moon is in Jupiter, preferably waxing.

Ouch, he comes out with no gloves on.  I will address this response in two
portions.

1) I am fairly certian that use of heavenly bodies as premises to arguments
is "off topic for this list."
2)  Ben is right.  The circumstances in which IPSec/NAT are implemented may
be dependant on several
variables and thus limit the circumstances it can/should be used. So I will
further qualify my previous statement a bit more as
I am still a bit sore from the slap in the face from Ben.  IPSec/NAT is
supported.  From a security perspective, implementation
of IPSec/NAT will not support AH for integrity/authenticity protection.
>From a reality standpoint, IPSec/NAT is around in
a large number of environments.

Best Regards,

Sam

> >If you are going to understand IPSec I suggest first finding documents
> >relating to the overall architecture.  With reference to IPSec you should
> >understand ESP and AH and their uses in the architecture before you try
to
> >comprehend the specific algorithms used to implement IPSec.  Search for
> >articles/RFCs written by Stephen Kent.  This is a good source for
foundational
> >documents on IPSec.
http://www.networksorcery.com/enp/authors/KentStephen.htm


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to