North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical


  • From: Vandy Hamidi
  • Date: Thu Sep 13 21:49:39 2001

It is working now.  I've done it with Linksys and Netopia DSL routers.
Software client on the laptop that DOES tunnel mode ESP.  No AH and running
through a PAT and it works flawlessly.  I just want to know how it works,
I've already determined that it does.
The point where my logic fails is where PAT relies on modifying the TCP/UDP
port numbers, an ESP packet has a standard IP header with an additional
protocol 50 ESP header.  Since there is no ports to change to create a table
to keep track of which packet came from which internal client, what is used
to keep track.
Someone said something about the UDP encapsulation, but what about the
NETOPIA which doesn't do that?


-----Original Message-----
From: Steven M. Bellovin [mailto:[email protected]]
Sent: Thursday, September 13, 2001 5:21 PM
To: Vandy Hamidi
Cc: [email protected]
Subject: Re: IPSEC and PAT 

In message
<[email protected].co
m>, Vandy Hamidi writes:
>I know that in Tunnel Mode, IPsec can be NATed and PATed (without IKE on
>500 being used), but as I'm trying to break down the process of  how it is
>working, I've been stumped by this:
>NAT - Changes source IP during translation
>PAT - Changes source IP and TCP/UDP port to another to track multiple to
>My question is, how does PAT track the packets with their internal hosts
>when there is not a TCP/UDP header to translate.
>How does it know which "internal" host a returning ESP packet must be
>forwarded to after it un PATs the incoming packet?
>thanks and I hope this isn't a totally stupid question.  If it is, humor me

IPsec can't be PATted, because the TCP and UDP port numbers are in the 
protected part of the packet.

		--Steve Bellovin,