Prestige 2602HW Series User’s Guide

17.8.1 NAT Traversal Configuration

For NAT traversal to work you must:

Use ESP security protocol (in either transport or tunnel mode).

Use IKE keying mode.

Enable NAT traversal on both IPSec endpoints.

In order for IPSec router A (see Figure 88 on page 206) to receive an initiating IPSec packet from IPSec router B, set the NAT router to forward UDP port 500 to IPSec router A.

17.9 ID Type and Content

With aggressive negotiation mode (see Section 17.12.1 on page 216), the Prestige identifies incoming SAs by ID type and content since this identifying information is not encrypted. This enables the Prestige to distinguish between multiple rules for SAs that connect from remote IPSec routers that have dynamic WAN IP addresses. Telecommuters can use separate passwords to simultaneously connect to the Prestige from IPSec routers with dynamic IP addresses (see Section 17.18 on page 225 for a telecommuter configuration example).

Regardless of the ID type and content configuration, the Prestige does not allow you to save multiple active rules with overlapping local and remote IP addresses.

With main mode (see Section 17.12.1 on page 216), the ID type and content are encrypted to provide identity protection. In this case the Prestige can only distinguish between up to 12 different incoming SAs that connect from remote IPSec routers that have dynamic WAN IP addresses. The Prestige can distinguish up to 12 incoming SAs because you can select between three encryption algorithms (DES, 3DES and AES), two authentication algorithms (MD5 and SHA1) and two key groups (DH1 and DH2) when you configure a VPN rule (see Section

17.13on page 216). The ID type and content act as an extra level of identification for incoming SAs.

The type of ID can be a domain name, an IP address or an e-mail address. The content is the IP address, domain name, or e-mail address.

Chapter 17 VPN Screens

207