Does any one see a problem with this;


        --------------------------        router
-------------------       FW          ----------------    LDAP
---------------------------   Internal Network
                          handles IPSec                         
                                
                                
        the encrypted tunnel is created from the source.  In this case using
a smart card set up.  CISCO router decrypts the packets, fwd to the FW and
authentication occurs at the LDAP server which only accepts packets from the
router doing the decrypting.  NAT is still done by the FW.  Everything b/t
the router and the FW is not encrypted.





        From:   Valerie Anne Bubb <[EMAIL PROTECTED]> on 07/26/2000 10:56 AM
        To:     [EMAIL PROTECTED]@SMTP@Aus Exchange, John G
Taylor/NZIAU/AU@General Accident Group
        cc:      

        Subject:        Re: IPSEC


        John -

        While I haven't set up a smart card system, there is a
        general guideline for handling encryption and NAT.

        Basicly, you need NAT to occur before the packet 
        is encrypted, or not at all*.

        For your setup, you can put the LDAP server on the inside
        of your network, so that the traffic does not need to
        be NATed.  Or, you can set up your firewall to
        do both the encryption and the NAT (most firewalls will
        do the NAT on the packet first, then encrypt, so that
        the hash values work out).

        Another option is to have the firewall tunnel these
        packets over the wire to another firewall that will return
        the packets to their original IP state before forwarding
        onto the LDAP server.

        hth
        Valerie

        (* you can also not use MD5 authentication, in which 
        case the fact that the IP header has changed won't
        matter.  Also, some crypto tools have a special
        authentication that doesn't take the IP header into 
        account in the hash.)


        > Delivered-To: [EMAIL PROTECTED]
        > From: John G Taylor <[EMAIL PROTECTED]>
        > 
        > Has anyone set up a smart card system or similar on their site?
If so, can
        > someone please offer some suggestions as how they over came the
following
        > problem.
        > 
        > 
        > IPSEC packets sent are NATed by the firewall and of course, as a
result the
        > hash value is changed due to the header of the incoming packet
having to
        > change for the addressing to the LDAP server.  Now the main
question is, how
        > did anyone overcome this?  Where did they put the LDAP server?
DMZ,
        > Internal, External?  My thoughts aret hat you would put the LDAP
server in
        > the DMZ and direct address it from the source.
        > 
        > Any thoughts would be good.
        > 
        > John Taylor
        > 



-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to