D-Link DFL-2500 User Guide - Page 237

Key Exchange, NAT Traversal

Page 237 highlights

218 Chapter 22. VPN Protocols & Tunnels PFS is very resource and time consuming and is generally disabled, since it is very unlikely that any encryption or authentication keys will be compromised. Key Exchange IKE exchanges the symmetric encryption key using Diffie-Hellman key exchange protocol. The level of security it offers is configurable by specifying the Diffie-Hellman(DH) group. The Diffie-Hellman groups supported by D-Link VPN are: • DH group 1 (768-bit) • DH group 2 (1024-bit) • DH group 5 (1536-bit) The security of the key exchanges increases as the DH groups grow larger, as does the time of the exchanges. NAT Traversal One big problem encountered by the IKE and IPsec protocols is the use of NAT, since the IKE and IPsec protocols were not designed to work through NATed network. Because of this, something called "NAT traversal " has evolved. NAT traversal is an add-on to the IKE and IPsec protocols that makes them work when being NATed. In short, NAT traversal is divided into two parts: • Additions to IKE that lets IPsec peers tell each other that they support NAT traversal, and the specific versions of the draft they support. • Changes to the ESP encapsulation. If NAT traversal is used, ESP is encapsulated in UDP, which allows for more flexible NATing. NAT traversal is only used if both ends has support for it. For this purpose, NAT traversal aware VPNs send out a special "vendor ID", telling the other end that it understand NAT traversal, and which specific versions of the draft it supports. To detect the necessity of using NAT traversal, both IPsec peers send hashes of their own IP addresses along with the source UDP port used in the IKE negotiations. This information is used to see whether the IP D-Link Firewalls User's Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365

218
Chapter 22. VPN Protocols & Tunnels
PFS is very resource and time consuming and is generally disabled, since it
is very unlikely that any encryption or authentication keys will be
compromised.
Key Exchange
IKE exchanges the symmetric encryption key using
Diffie-Hellman key
exchange protocol
. The level of security it offers is configurable by
specifying the
Diffie-Hellman(DH) group
.
The Diffie-Hellman groups supported by D-Link VPN are:
DH group 1 (768-bit)
DH group 2 (1024-bit)
DH group 5 (1536-bit)
The security of the key exchanges increases as the DH groups grow larger,
as does the time of the exchanges.
NAT Traversal
One big problem encountered by the IKE and IPsec protocols is the use of
NAT, since the IKE and IPsec protocols were not designed to work through
NATed network. Because of this, something called ”
NAT traversal
” has
evolved. NAT traversal is an add-on to the IKE and IPsec protocols that
makes them work when being NATed.
In short, NAT traversal is divided into two parts:
Additions to IKE that lets IPsec peers tell each other that they
support NAT traversal, and the specific versions of the draft they
support.
Changes to the ESP encapsulation. If NAT traversal is used, ESP is
encapsulated in UDP, which allows for more flexible NATing.
NAT traversal is only used if both ends has support for it. For this
purpose, NAT traversal aware VPNs send out a special ”vendor ID”, telling
the other end that it understand NAT traversal, and which specific versions
of the draft it supports.
To detect the necessity of using NAT traversal, both IPsec peers send
hashes of their own IP addresses along with the source UDP port used in
the IKE negotiations. This information is used to see whether the IP
D-Link Firewalls User’s Guide