@@ -269,7 +269,21 @@ Why UDP?
269269- In the Cloud per flow limitation, without NAT
270270- Wide spread RSS Support for UDP when using RFC9611
271271
272+ ** UDP Encap Source port
273+
274+ Current IKEv2 and ESP encapsulation in UDP are specified in
275+ [[RFC3947]] and [[RFC3948]. ESP can use the same port opened by IKE.
276+ If look at Section 4 of [[RFC3947]] "The initiator MUST set
277+ both UDP source and destination ports to 4500." This means IKE at
278+ the source CAN only use source port 4500. HOwever, the RFC further
279+ allows inter mediate NAT gateways to change the source port from 4500
280+ to X. This causes split among IPsec adminstrators.
281+
282+ IPsec adminstrators open only out going firewall on the peer for 4500-4500.
283+ While the incoming firewall is open for X:4500.
284+
272285** Use cases for UDP Encapsulation without NAT
286+
273287*** UDP Encapsulation in Cloud Provider
274288
275289A common question is why use UDP when there is no NAT, especially in
@@ -293,11 +307,8 @@ improves throughput. Test results supporting this were presented in
293307[[AWS-IPsec-NetDev]].
294308
295309For further details, see:
296- [[Azure-Network]]
297-
298- [[AWS-Network]]
299-
300- [[GCP-Network]]
310+ [[Azure-Network]], [[AWS-Network]], [[GCP-Network]],
311+ [[I-D.bottorff-ipsecme-mtdcuc-ipsec-lb]]
301312
302313
303314* WESP UDP Encap
@@ -369,6 +380,7 @@ ESP SPI the bit 31 should be zero.
369380** I-D.ietf-ipsecme-g-ikev2
370381** I-D.irtf-cfrg-aead-properties
371382** I-D.mattsson-cfrg-aes-gcm-sst
383+ ** I-D.bottorff-ipsecme-mtdcuc-ipsec-lb
372384
373385** Azure-Network
374386:PROPERTIES:
0 commit comments