NAT traversal for IPsec

نویسنده

  • Heikki Ollikainen
چکیده

Network Address Translator (NAT) is a technology that is used for allowing multiple computers in the network to share a single public IP address for accessing the Internet. The basic reason for NAT usage is the limited number of IPv4 addresses. NAT is widely used in the current networks where it is also used as cloaking service for computers in internal network, since all computers behind the NAT router are hidden from external networks i.e. Internet. In the same time, this may cause connectivity problems (e.g. P2P) for terminals and applications since connections to outside has only one public IP address depending on the mode how NAT is handling the address translation. Therefore, in order to guarantee smooth and feasible traffic pass-through, several NAT traversal mechanisms has been designed and deployed. IPsec is a security protocol that is used for securing the IP (L3) level traffic. The key functionality of IPSec is to protect the confidentiality of the data, assure the authenticity of the sender, and the integrity of the data that it has not been changed in transition. Internet Key Exchange (IKE) protocol uses IPsec for embedding the IP address of sending computer into its payload. When the IKE packet that contains the embedded IPsec address is sent through NAT, the sender IP address is changed to match the address of NAT box. Therefore, when the receiver notifies that the IP address of the IKE packet do not match to sender’s original IP address, it drops the packet. The key problem of NAT with IPsec is that NAT must change information in the packet headers in order to perform the packet pass-through. This feature in NAT causes a conflict with IPsec, and the packets will be dropped. This paper discusses of existing method related to IPsec NAT traversal and the problematics regarding the IPsec NAT traversal. The goal of this paper is to present the mainstream solution how to provide NAT traversal for IPsec.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NAT Traversal Capability and Keep-Alive Functionality with IPSec in IKEv2 Implementation

Since IPv4 Private Networks are behind NAT (Network Address Translation) devices. So, to bypass the Binding Update and Binding Acknowledgment by NAT, we need to encapsulate it in UDP (User datagram Protocol) Packets. Hence, the Dual Stack Mobile IPv6 should support NAT Traversal and Detection. So for proper securing and fully functionality of NAT traversal, it should be IP Security Protected. P...

متن کامل

RFC 3947 Negotiation of NAT - Traversal in the IKE

Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document describes how to d...

متن کامل

IPSec over Heterogeneous IPv4 and IPv6 Networks: ISSUES AND IMPLEMENTATION

In the face of looming IPv4 address exhaustion and the slow pace of IPv4 to IPv6 migration, this work deploys the IPv4/IPv6 translation gateway as a mechanism to ensure most of IPv6 mission critical applications to continuously interoperate with legacy IPv4 nodes. However, the existence of translation gateway between two IPSec nodes from disparate address realms imposes some incompatibility iss...

متن کامل

RFC 5770 Basic NAT

This document specifies extensions to the Host Identity Protocol (HIP) to facilitate Network Address Translator (NAT) traversal. The extensions are based on the use of the Interactive Connectivity Establishment (ICE) methodology to discover a working path between two end-hosts, and on standard techniques for encapsulating Encapsulating Security Payload (ESP) packets within the User Datagram Pro...

متن کامل

Internet Key Exchange (IKEv2) Protocol

This document describes version 2 of the Internet Key Exchange (IKE) protocol. IKE is a component of IPsec used for performing mutual authentication and establishing and maintaining security associations. This version of the IKE specification combines the contents of what IKEv2 draft-ietf-ipsec-ikev2-15.txt [Page 1] Internet-Draft August 13, 2004 were previously separate documents, including IS...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005