At 10:00 AM +0530 2/19/10, Syed Ajim Hussain wrote:
Hi Yoav Nir & All Group Member

   Thanks for your quick response. I think, instead of user takes special
   care by adding extra Rule to allow un-encrypted ND traffic(unicast) ,
   There should be some RFC guidelines, such that IPSEC/IKE protocol itself
   can take care.  It will be problem in Interop also.

   Below guidelines can be used.

   1. if packet is of IPv6 NS/NA types , IPSEC  Policy matches , but
Security Association(SA ) not yet established , then send can send Un- encrypted packets.

      Also Receiver should accept an un-encrypted packet for  NS/NA when
      IPsec policy  matches But  No Security Association(SA) presents.


With Regards
Syed Ajim

Syed,

We don't generally provide exceptions for control traffic to cross the IPsec boundary. Note the extensive discussion in 4301 on ICMP traffic. What you described above is a policy decision and it needs to be explicitly stated in the SPD. At most we might remind folks to configure such SPD entries in an IPv6 environment.

Steve
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec

Reply via email to