Limitations when using NAT exchanges
Endpoints behind NAT devices must protect their traffic using the ESP protocol.
ESP is the predominate header selected for IP Security, and will
be usable for most customer applications. ESP includes hashing of
the user data, but not of the IP Header. The integrity checking in
the AH header incorporates the IP source and destination addresses
in the keyed message integrity check. NAT or reverse NAT devices that
make changes to the address fields invalidate the message integrity
check. Therefore, if only the AH protocol is defined in the phase
2 policy for a tunnel, and NAT is detected in a phase 1 exchange,
a Notify Payload saying NO_PROPOSAL_CHOSEN is sent.
Additionally, a connection using NAT must select tunnel mode so
that the original IP address is encapsulated in the packet. Transport
mode and addresses with NAT are not compatible. If a NAT is detected
and only transport mode is proposed in phase 2, a Notify Payload saying NO_PROPOSAL_CHOSEN is sent.