At 10:00 AM +0530 2/19/10, Syed Ajim Hussain wrote:
Hi Yoav Nir & All Group Member
Thanks for your quick response. I think, instead of user takes special
care by adding extra Rule to allow un-encrypted ND traffic(unicast) ,
There should be some RFC guidelines, such that IPSEC/IKE protocol itself
can take care. It will be problem in Interop also.
Below guidelines can be used.
1. if packet is of IPv6 NS/NA types , IPSEC Policy matches , but
Security Association(SA ) not yet established , then send can send
Un- encrypted packets.
Also Receiver should accept an un-encrypted packet for NS/NA when
IPsec policy matches But No Security Association(SA) presents.
With Regards
Syed Ajim
Syed,
We don't generally provide exceptions for control traffic to cross
the IPsec boundary. Note the extensive discussion in 4301 on ICMP
traffic. What you described above is a policy decision and it needs
to be explicitly stated in the SPD. At most we might remind folks to
configure such SPD entries in an IPv6 environment.
Steve
_______________________________________________
IPsec mailing list
IPsec@ietf.org
https://www.ietf.org/mailman/listinfo/ipsec