Chapter 19 VPN
VMG1312-B10C User’s Guide
219
19.3.6 VPN, NAT, and NAT Traversal
NAT is incompatible with the AH protocol in both transport
and tunnel
mode. An IPSec VPN using
the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash
value appended to the packet, but a NAT device between the IPSec endpoints rewrites the source or
destination address. As a result, the VPN device at the receiving end finds a mismatch between the
hash value and the data and assumes that the data has been maliciously altered.
NAT is not normally compatible with ESP in transport mode either, but the Device’s
NAT Traversal
feature provides a way to handle this. NAT traversal allows you to set up an IKE SA when there are
NAT routers between the two IPSec routers.
Figure 125
NAT Router Between IPSec Routers
Normally you cannot set up an IKE SA with a NAT router between the two IPSec routers because
the NAT router changes the header of the IPSec packet. NAT traversal solves the problem by adding
a UDP port 500 header to the IPSec packet. The NAT router forwards the IPSec packet with the UDP
port 500 header unchanged. In the above figure, when IPSec router
A
tries to establish an IKE SA,
IPSec router
B
checks the UDP port 500 header, and IPSec routers
A
and
B
build the IKE SA.
For NAT traversal to work, you must:
• Use ESP security protocol (in either transport or tunnel mode).
• Use IKE keying mode.
• Enable NAT traversal on both IPSec endpoints.
• Set the NAT router to forward UDP port 500 to IPSec router
A
.
Finally, NAT is compatible with ESP in tunnel mode because integrity checks are performed over the
combination of the "original header plus original payload," which is unchanged by a NAT device. The
compatibility of AH and ESP with NAT in tunnel and transport modes is summarized in the following
table.
Y* - This is supported in the Device if you enable NAT traversal.
19.3.7 Pre-Shared Key
A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see
for more on IKE phases). It is called “pre-shared” because you have to share it
with another party before you can communicate with them over a secure connection.
Table 94
VPN and NAT
SECURITY PROTOCOL
MODE
NAT
AH
Transport
N
AH
Tunnel
N
ESP
Transport
Y*
ESP
Tunnel
Y
A
B
Summary of Contents for VMG1312-B10C
Page 4: ...Contents Overview VMG1312 B10C User s Guide 4 Diagnostic 265 Troubleshooting 271 ...
Page 14: ...Table of Contents VMG1312 B10C User s Guide 14 ...
Page 15: ...15 PART I User s Guide ...
Page 16: ...16 ...
Page 22: ...Chapter 1 Introducing the Device VMG1312 B10C User s Guide 22 ...
Page 33: ...33 PART II Technical Reference ...
Page 34: ...34 ...
Page 64: ...Chapter 5 Broadband VMG1312 B10C User s Guide 64 ...
Page 100: ...Chapter 6 Wireless VMG1312 B10C User s Guide 100 ...
Page 124: ...Chapter 7 Home Networking VMG1312 B10C User s Guide 124 ...
Page 166: ...Chapter 10 Network Address Translation NAT VMG1312 B10C User s Guide 166 ...
Page 176: ...Chapter 12 Interface Group VMG1312 B10C User s Guide 176 ...
Page 192: ...Chapter 14 Firewall VMG1312 B10C User s Guide 192 ...
Page 198: ...Chapter 16 Parental Control VMG1312 B10C User s Guide 198 ...
Page 208: ...Chapter 18 Certificates VMG1312 B10C User s Guide 208 ...
Page 211: ...Chapter 19 VPN VMG1312 B10C User s Guide 211 Figure 121 IPSec VPN Add ...
Page 224: ...Chapter 20 Log VMG1312 B10C User s Guide 224 ...
Page 234: ...Chapter 24 IGMP Status VMG1312 B10C User s Guide 234 ...
Page 238: ...Chapter 25 xDSL Statistics VMG1312 B10C User s Guide 238 ...
Page 242: ...Chapter 27 User Account VMG1312 B10C User s Guide 242 ...
Page 248: ...Chapter 30 TR 064 VMG1312 B10C User s Guide 248 ...
Page 252: ...Chapter 31 Time Settings VMG1312 B10C User s Guide 252 ...
Page 264: ...Chapter 35 Configuration VMG1312 B10C User s Guide 264 ...
Page 270: ...Chapter 36 Diagnostic VMG1312 B10C User s Guide 270 ...
Page 288: ...Appendix B Legal Information VMG1312 B10C User s Guide 288 ...