What do the port numbers in an IPSEC-ESP session represent?

What do the port numbers in an IPSEC-ESP session represent?

119563
Created On 09/25/18 19:24 PM - Last Modified 11/19/19 05:15 AM


Environment


Exception : PA-7000, PA-5200 and PA-3200 series

Resolution


 

Upon a successful IPSec tunnel establishment, a session with application 'IPSEC-UDP' and protocol 50 (ESP) display source and destination port numbers. Since a Non-TCP and a Non-UDP protocol cannot support ports, the port numbers shown are actually the Decimal Equivalent values of the SPIs that are negotiated in the IPSEC tunnel establishment.

IPSECSPI.png

 

 

Port numbers for IPSec session creation are derived from SPI values that remote IPSec peers exchange during IKE phase 2 of tunnel establishment. This method can be applied only in case one of IPSec peers is the firewall itself, or only if IPSec tunnel is terminated on the firewall.

 

In case of pass-through IPSec traffic, where the Palo Alto Networks firewall is just an intermediate device between two IPSec peers, it is practically impossible to create a session based on negotiated SPI values since IKE phase 2 is encrypted and its content is not visible to the firewall.

 

Since SPI values can’t be seen in advance, for IPSec pass-through traffic the Palo Alto Networks firewall creates a session by using generic value 20033 for both source and destination port.

 

In this example below we can see that source and destination ports of both c2s and s2c flows are given the same value 20033:

 

admin@vm-300> show session id 791

Session 791

c2s flow:
source: 192.168.0.11 [trust]
dst: 129.187.7.11
proto: 50
sport: 20033          dport: 20033
state: ACTIVE          type: FLOW
src user: unknown
dst user: unknown

s2c flow:
source: 129.187.7.11 [untrust]
dst: 192.168.0.11
proto: 50
sport: 20033          dport: 20033
state: ACTIVE          type: FLOW
src user: unknown
dst user: unknown

start time : Thu June 10 11:58:59 2015
timeout : 3600 sec
time to live : 3142 sec
total byte count(c2s) : 1080
total byte count(s2c) : 1014
layer7 packet count(c2s) : 8
layer7 packet count(s2c) : 5
vsys : vsys1
application : ipsec-esp
rule : any-any
session to be logged at end : True
session in session ager : True
session updated by HA peer : False
layer7 processing : completed
URL filtering enabled : True
URL category : any
session via syn-cookies : False
session terminated on host : False
session traverses tunnel : False
captive portal session : False
ingress interface :    ethernet1/2
egress interface :     ethernet1/1
session QoS rule :     N/A (class 4)
tracker stage l7proc : ctd app has no decoder
end-reason : unknown

 

 

owner: anatrajan



Additional Information


On PA-7000, PA-5200 and PA-3200 series, due to an architectural difference, we use a different technique for session creation of IPSec pass-through traffic.
Please refer to this article.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClpXCAS


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXiCAK&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language