NETWORK PRESENCE ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT
 


Search
display results
words begin  exact words  any words part 

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [FW1] ISAKMP IP Protocol




Thanks Bob, that was well explained.  Things are clearer.

So the key exchange is on UDP500, and once complete IPSec/ESP starts on IP
50.

So suppose there is a whole bunch of VPN traffic going from one firewall to
another; all of it instigated from one of the firewalls.  So lots of IP50
traffic going back and forth.  Amongst this is a single connection that is
established in the other direction.

Can you think of a way that this connection can be detected using a sniffer?
Ie a new connection rather than a response to an existing connection.

I am thinking that that key exchange will have already happened, and this
data would go into the tunnel without a new key exchange being required.

Or am I missing something?


-----Original Message-----
From: Bob Brandt [mailto:[email protected]]
Sent: 08 November 2000 16:16
To: Murphy, Paul; fw-1-mailinglist
Subject: Re: [FW1] ISAKMP IP Protocol


Paul,

IPSec VPNs are really supported by a suite of protocols.     IKE (Internet
Key Exchange) is the protocol
which is used to generate crypto material safely over a public network for
the subsequent IPSec session(s).

IKE runs as IP protocol 17 (UDP) on port 500 (both source and dest port).
It is very important that port 500
is NOT port translated (which often happens with home broadband Internet
setups) so be careful to ensure that
the home equipment you use can keep state.   Linksys has a good home hub
that is IPSec aware.

After IKE completes the data transfer protocol for IPSec begins.   There are
a couple of protocols here.  AH and ESP.
AH is not really used a lot, it does not provide encryption, only a digital
signature.  The AH DS is also based on the
whole original IP header, including IP source address, therefore if NAT is
used at all, the AH DS will fail.

ESP provides encryption and a digital signature which includes most of the
source packet (excluding the source IP), so
it can be made to work with NATs.    Again, the home user equipment needs to
keep be able to keep state, because
neither AH nor ESP have a port number (like the UDP and TCP protocols do).

AH runs as IP protocol number 51.   ESP runs as IP protocol number 50.

Hope this helps.

Bob Brandt, 3M, [email protected]




----- Original Message -----
From: Murphy, Paul <[email protected]>
To: fw-1-mailinglist <[email protected]>
Sent: Wednesday, November 08, 2000 9:26 AM
Subject: [FW1] ISAKMP IP Protocol


>
>
> Hi group,
>
> Can anyone tell me the IP protocol/TCP port that the ISAKMP tunnel uses?
>
> Also, does anyone know the sequence of events that take place between the
> firewalls when a connection is being established?  I am presuming that
some
> sort of negotation takes place between the firewalls before any encrypted
> data is sent through (or this might be part of the stream I guess).
>
> I am trying to find a way that I can identify a new encrypted connection
> session being established between the firewalls when I put a sniffer on
the
> external interface on the firewall instigating the connection.  Is there a
> signature?
>
> Many thanks,
>
> Paul.
>
>
> --------------------------------------------------------------------------
---------------------------------------------
> This e-mail is intended only for the above addressee.  It may contain
> privileged information. If you are not the addressee you must not copy,
> distribute, disclose or use any of the information in it.  If you have
> received it in error please delete it and immediately notify the sender.
>
> evolvebank.com is a division of Lloyds TSB Bank plc.
> Lloyds TSB Bank plc, 71 Lombard Street, London EC3P 3BS.  Registered in
> England, number 2065.  Telephone No: 020 7626 1500
> Lloyds TSB Scotland plc, Henry Duncan House, 120 George Street,
> Edinburgh EH2 4LH.  Registered in Scotland, number 95237.  Telephone
> No:>
> Lloyds TSB Bank plc and Lloyds TSB Scotland plc are regulated by the
> Personal Investment Authority and represent only the Scottish Widows
> and Lloyds TSB Marketing Group for life assurance, pensions and
> investment business.
>
> Members of the UK Banking Ombudsman Scheme and signatories to the UK
> Banking Code.
> --------------------------------------------------------------------------
---------------------------------------------
>
>
>
============================================================================
====
>      To unsubscribe from this mailing list, please see the instructions at
>                http://www.checkpoint.com/services/mailing.html
>
============================================================================
====
>


================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================



 
----------------------------------

ABOUT SERVICES PRODUCTS TRAINING CONTACT US SEARCH SUPPORT SITE MAP LEGAL
   All contents © 2004 Network Presence, LLC. All rights reserved.