The on-premises end of any IPsec VPN must be configured to match the settings you specified for the SDDC end of that VPN.
Information in the following tables summarizes the available SDDC IPsec VPN settings. Some of the settings can be configured. Some are static. Use this information to verify that your on-premises VPN solution can be configured to match the one in your SDDC. Choose an on-premises VPN solution that supports all the static settings and any of the configurable settings listed in these tables.
Understanding how Diffie-Hellman Groups Affect IPsec VPN Performance and Security
As a best practice, configurable settings should be the same for both phases.
Phase 1 (IKE Profile) IPsec VPN Settings
Attribute | Allowed Values | Recommended Value |
---|---|---|
Protocol | IKEv1, IKEv2, IKE FLEX | IKEv2 |
Encryption Algorithm | AES (128, 256), AES-GCM (128, 192, 256) | AES GCM Encryption with higher bit depths is harder to crack but creates more load on your endpoint device. |
Tunnel/IKE Digest Algorithm | SHA1, SHA2 (256, 384, 512) | If you specify a GCM-based cipher for IKE Encryption, set IKE Digest Algorithm to None. The digest function is integral to the GCM cipher. You must use IKE V2 if you use a GCM-based cipher |
Diffie Hellman | DH Groups 2, 5, 14-16, 19-21 | DH Groups 19-21 or 14-16 |
Attribute | Value |
---|---|
ISAKMP mode | Main mode |
ISAKMP/IKE SA lifetime | 86400 seconds (24 hours) |
IPsec Mode | Tunnel |
IKE Authentication | Pre-Shared Key |
Phase 2 (IPsec Profile) IPsec VPN Settings
Configurable settings are the same for Phase 1 and Phase 2.
Attribute | Allowed Values | Recommended Value |
---|---|---|
Protocol | IKEv1, IKEv2, IKE FLEX | IKEv2 |
Encryption Algorithm | AES (128, 256), AES-GCM (128, 192, 256) | AES GCM Encryption with higher bit depths is harder to crack but creates more load on your endpoint device. |
Tunnel/IKE Digest Algorithm | SHA-1, SHA2 (256, 384, 512) | If you specify a GCM-based cipher for IKE Encryption, set IKE Digest Algorithm to None. The digest function is integral to the GCM cipher. You must use IKE V2 if you use a GCM-based cipher |
Diffie Hellman | DH Groups 2, 5, 14-16, 19-21 | DH Groups 19-21 or 14-16 |
Attribute | Value |
---|---|
Tunnel Mode | Encapsulating Security Payload (ESP) |
SA lifetime | 3600 seconds (one hour) |