Hi All
I have some doubt about NAT With IPSEC/IKE ,
Example Take a Topology :
IKE_PEER1 ----------- NAT1 ----------------NAT2 Server---IKE_PEER3
(1.1.1.1) | (1.1.1.10) (2.1.1.1) (2.1.1.2) (3.1.1.1)
|
IKE_PEER2 |
(1.1.1.2)
IKE_PEER1 and IKE_PEER2 , behind Same NAT Device NAT1 , Want to
Establish IPSEC Tunnel with IKE_PEER3, which is Behind a NAT Server (
Service Running Behind a NAT).
For IKE_PEER1, IKE_PEER2, NAT2 Server Address (2.1.1.2) is the Peer
Address, Since IKE_PEE3 running behind a NAT Server.
Questions1:
1. For IKE_PEER3, 2.1.1.1 is the Peer Address for both IKE_PEER1 &
IKE_PEER2. If IKE ID Type is IP Address then, how IKE SA can be
Established, between IKE_PEER1& IKE_PEER3 and IKE_PEER2 & IKE_PEER3,
2. If ID Type is based on Name (FQDN), Say IPSEC Tunnel is
Established Between IKE_PEER1 & IKE_PEER3. If IPSEC SA Mode is
Tunnel, Now Inner IP Header may have Destination IP Address as NAT2
Server's Address that is (2.1.1.2). This Original IP Packet will be a
payload of IPSEC Encapsulated packet.
Since NAT2 Server, will Change only Outer IP Header Destination
Address, to Forward the packet to IKE_PEER3.
Now in IKE_PEER3 after IPSEC Decapsulation, original Packet will
Have 2.1.1.2 (NAT Server's Address) as Destination Address. Now How
This packet can be processed in IKE_PEER3.
Does tunnel Mode Can not be supported in such Topology??
If RFC is not clear about such Solution, then we can have one RFC
To solve this scenario.
With Regards
Syed Ajim
****************************************************************************
This e-mail and attachments contain confidential information from HUAWEI,
which is intended only for the person or entity whose address is listed
above. Any use of the information contained herein in any way (including,
but not limited to, total or partial disclosure, reproduction, or
dissemination) by persons other than the intended recipient's) is
prohibited. If you receive this e-mail in error, please notify the sender by
phone or email immediately and delete it!
***************************************************************************
_______________________________________________
IPsec mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ipsec