[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
How NAT-T Works
By default, NAT-T is enabled on every virtual router
configured on the system. With NAT-T enabled, IPSec traffic flows
transparently through a NAT device, thereby allowing one or more remote
hosts located behind the NAT device to use secure L2TP/IPSec tunnel
connections to access the router.
After NAT-T is enabled on a specific virtual router,
either by default or by using the ipsec option nat-t command, the router performs the following actions, in this order:
- The router monitors the exchange of private vendor ID
(VID) payloads between the client PC and the E-series router during
the IKE SA negotiation to determine whether both sides of the negotiation
support NAT-T.
- If both sides of the negotiation support NAT-T, the router
detects whether a NAT device resides between the IPSec remote peers.
- If a NAT device is detected between the remote peers,
the router negotiates the appropriate type of UDP encapsulation as
part of the IKE SA and uses this encapsulation method to process the
IPSec traffic.
The ipsec option nat-t command affects only those IKE SAs negotiated on the virtual router after the command is issued. The command has no effect
on IKE SAs that were previously negotiated.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]