Skip to content

Commit 929dea7

Browse files
committed
README.notes.org
1 parent f90a207 commit 929dea7

File tree

1 file changed

+17
-5
lines changed

1 file changed

+17
-5
lines changed

README.notes.org

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,21 @@ Why UDP?
269269
- In the Cloud per flow limitation, without NAT
270270
- Wide spread RSS Support for UDP when using RFC9611
271271

272+
** UDP Encap Source port
273+
274+
Current IKEv2 and ESP encapsulation in UDP are specified in
275+
[[RFC3947]] and [[RFC3948]. ESP can use the same port opened by IKE.
276+
If look at Section 4 of [[RFC3947]] "The initiator MUST set
277+
both UDP source and destination ports to 4500." This means IKE at
278+
the source CAN only use source port 4500. HOwever, the RFC further
279+
allows inter mediate NAT gateways to change the source port from 4500
280+
to X. This causes split among IPsec adminstrators.
281+
282+
IPsec adminstrators open only out going firewall on the peer for 4500-4500.
283+
While the incoming firewall is open for X:4500.
284+
272285
** Use cases for UDP Encapsulation without NAT
286+
273287
*** UDP Encapsulation in Cloud Provider
274288

275289
A common question is why use UDP when there is no NAT, especially in
@@ -293,11 +307,8 @@ improves throughput. Test results supporting this were presented in
293307
[[AWS-IPsec-NetDev]].
294308

295309
For further details, see:
296-
[[Azure-Network]]
297-
298-
[[AWS-Network]]
299-
300-
[[GCP-Network]]
310+
[[Azure-Network]], [[AWS-Network]], [[GCP-Network]],
311+
[[I-D.bottorff-ipsecme-mtdcuc-ipsec-lb]]
301312

302313

303314
* WESP UDP Encap
@@ -369,6 +380,7 @@ ESP SPI the bit 31 should be zero.
369380
** I-D.ietf-ipsecme-g-ikev2
370381
** I-D.irtf-cfrg-aead-properties
371382
** I-D.mattsson-cfrg-aes-gcm-sst
383+
** I-D.bottorff-ipsecme-mtdcuc-ipsec-lb
372384

373385
** Azure-Network
374386
:PROPERTIES:

0 commit comments

Comments
 (0)