Site-to-site VPN (2024)

IP Security (IPsec) is a standard for securing Internet Protocol (IP) communications by encrypting and/or authenticating all IP packets.

The IPsec standard defines two service modes and two protocols:

  • Transport mode
  • Tunnel mode
  • Authentication Header (AH) authentication protocol
  • Encapsulated Security Payload (ESP) encryption (and authentication) protocol

IPsec also offers methods for manual and automatic management of Security Associations (SAs) as well as key distribution. These characteristics are consolidated in a Domain of Interpretation (DOI).

IPsec Modes

IPsec can work in either transport mode or tunnel mode. In principle, a host-to-host connection can use either mode. If, however, one of the endpoints is a security gateway, the tunnel mode must be used. The IPsec VPN connections on this Sophos UTM always use the tunnel mode.

In transport mode, the original IP packet is not encapsulated in another packet. The original IP header is retained, and the rest of the packet is sent either in clear text (AH) or encrypted (ESP). Either the complete packet can be authenticated with AH, or the payload can be encrypted and authenticated using ESP. In both cases, the original header is sent over the WAN in clear text.

In tunnel mode, the complete packet—header and payload—is encapsulated in a new IP packet. An IP header is added to the IP packet, with the destination address set to the receiving tunnel endpoint. The IP addresses of the encapsulated packets remain unchanged. The original packet is then authenticated with AH or encrypted and authenticated using ESP.

IPsec Protocols

IPsec uses two protocols to communicate securely on the IP level.

  • Authentication Header (AH): A protocol for the authentication of packet senders and for ensuring the integrity of packet data.
  • Encapsulating Security Payload (ESP): A protocol for encrypting the entire packet and for the authentication of its contents.

The Authentication Header protocol (AH) checks the authenticity and integrity of packet data. In addition, it checks that the sender and receiver IP addresses have not been changed in transmission. Packets are authenticated using a checksum created using a Hash-based Message Authentication Code (HMAC) in connection with a key. One of the following hashing algorithms will be used:

  • Message Digest Version 5 (MD5): This algorithm generates a 128-bit checksum from a message of any size. This checksum is like a fingerprint of the message, and will change if the message is altered. This hash value is sometimes also called a digital signature or a message digest.
  • The Secure Hash (SHA-1): This algorithm generates a hash similar to that of MD5, though the SHA-1 hash is 160 bits long. SHA-1 is more secure than MD5, due to its longer key.

Compared to MD5, an SHA-1 hash is somewhat harder to compute, and requires more CPU time to generate. The computation speed depends, of course, on the processor speed and the number of IPsec VPN connections in use at Sophos UTM.

In addition to encryption, the Encapsulated Security Payload protocol (ESP) offers the ability to authenticate senders and verify packet contents. If ESP is used in tunnel mode, the complete IP packet (header and payload) is encrypted. New, unencrypted IP and ESP headers are added to the encapsulating packet: The new IP header contains the address of the receiving gateway and the address of the sending gateway. These IP addresses are those of the VPN tunnel.

For ESP with encryption normally the following algorithms are used:

  • Triple Data Encryption Standard (3DES)
  • Advanced Encryption Standard (AES)

Of these, AES offers the highest standard of security. The effective key lengths that can be used with AES are 128, 192 and 256 bits. Sophos UTM supports a number of encryption algorithms. Either the MD5 or SHA-1 algorithms can be used for authentication.

NAT Traversal (NAT-T)

NAT Network Address Translation traversal is a technology for establishing connections between hosts in TCP/IP networks which use NAT devices. This is achieved by using UDP encapsulation of the ESP packets to establish IPsec tunnels through NAT devices. UDP encapsulation is only used if NAT is detected between the IPsec peers; otherwise normal ESP packets will be used.

With NAT traversal you are able to place the gateway or a road warrior behind a NAT router and still establish an IPsec tunnel. Both IPsec peers must support NAT traversal if you want to use this feature, which is automatically negotiated. Make sure that the NAT device has IPsec-passthrough turned off, because this could impair the use of NAT traversal.

If road warriors want to use NAT traversal, their corresponding user object in WebAdmin must have a static remote access IP address (RAS Remote Access Server address) set (see also Use Static Remote Access IP on the Userspage in WebAdmin).

By default, a NAT traversal keep-alive signal is sent at intervals of 60 seconds to prevent an established tunnel from expiring when no data is transmitted. The keep-alive messages are sent to ensure that the NAT router keeps the state information associated with the session so that the tunnel stays open.

TOS

Type of Service bits (TOS bits) are several four-bit flags in the IP header. These bits are referred to as Type of Service bits because they allow the transferring application to tell the network which type of service quality is necessary.

With the IPsec implementation of Sophos UTM the TOS value is always copied.

Site-to-site VPN (2024)
Top Articles
How to buy Tether USDt (USDT) in India – Binance
Tether Programs | Washtenaw County, MI
Camera instructions (NEW)
Urist Mcenforcer
Frank Lloyd Wright, born 150 years ago, still fascinates
Nfr Daysheet
What to Serve with Lasagna (80+ side dishes and wine pairings)
Triumph Speed Twin 2025 e Speed Twin RS, nelle concessionarie da gennaio 2025 - News - Moto.it
How to change your Android phone's default Google account
Sprague Brook Park Camping Reservations
Apnetv.con
Graveguard Set Bloodborne
Strange World Showtimes Near Cmx Downtown At The Gardens 16
Culver's Flavor Of The Day Monroe
Obituary Times Herald Record
Washington, D.C. - Capital, Founding, Monumental
Available Training - Acadis® Portal
Beebe Portal Athena
Nail Salon Goodman Plaza
Vrachtwagens in Nederland kopen - gebruikt en nieuw - TrucksNL
Craigslist Southern Oregon Coast
Vigoro Mulch Safe For Dogs
Www Craigslist Com Bakersfield
Sulfur - Element information, properties and uses
Iroquois Amphitheater Louisville Ky Seating Chart
Air Quality Index Endicott Ny
St Clair County Mi Mugshots
Inkwell, pen rests and nib boxes made of pewter, glass and porcelain.
Craigslist Lake Charles
Tmj4 Weather Milwaukee
Miss America Voy Board
Flaky Fish Meat Rdr2
Free Robux Without Downloading Apps
Shoreone Insurance A.m. Best Rating
Weather Underground Bonita Springs
Mvnt Merchant Services
Craigslist Free Manhattan
Puretalkusa.com/Amac
60 X 60 Christmas Tablecloths
Henry Ford’s Greatest Achievements and Inventions - World History Edu
062203010
Executive Lounge - Alle Informationen zu der Lounge | reisetopia Basics
Pulitzer And Tony Winning Play About A Mathematical Genius Crossword
Payrollservers.us Webclock
Levi Ackerman Tattoo Ideas
Craigslist/Nashville
Barber Gym Quantico Hours
10 Best Tips To Implement Successful App Store Optimization in 2024
Cryptoquote Solver For Today
Wvu Workday
O.c Craigslist
Latest Posts
Article information

Author: Virgilio Hermann JD

Last Updated:

Views: 6276

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Virgilio Hermann JD

Birthday: 1997-12-21

Address: 6946 Schoen Cove, Sipesshire, MO 55944

Phone: +3763365785260

Job: Accounting Engineer

Hobby: Web surfing, Rafting, Dowsing, Stand-up comedy, Ghost hunting, Swimming, Amateur radio

Introduction: My name is Virgilio Hermann JD, I am a fine, gifted, beautiful, encouraging, kind, talented, zealous person who loves writing and wants to share my knowledge and understanding with you.