IPsec Limitations (2024)

The usage of IPsec has the following limitations:

  • Network Address Translation (NAT) is not supported.

  • Authentication Header (AH) is not supported.

  • IPsecsupportsIPv6 andIPv4-based tunnels.

  • IPsecis not allowed with the

    --connection-typetunnel

    option set to anything other than the default.

Creating and usingIPsecpolicies is recommended for securing data transmission across a network, especially a network beyond the confines of a secure data center.IPsecis enabled at the tunnel level, not the circuit level, which means all of a circuit of a tunnel is encrypted and use the sameIPsecsettings. Different tunnels can have uniqueIPsecsettings.IPsecuses Internet Key Exchange (IKE) to set up the security association. The key exchange can be through apre-shared key (PSK) or a public-key infrastructure (PKI).

When runningIPsec, both sides of the extension tunnel mustbe running the same Fabric OS version.When you use aPSK, both ends of the secure tunnel must be configured with the same key string. If both ends are not configured with the same key, theIKE session will not start and the extension tunnel will not be able to be established.

Thepre-shared key must be a string of 16 to 64 alpha-numeric characters.The following are the requirements for PKI:

  • X.509 certificates are supported.

  • ECDSAcertificates are supported only on the Brocade Extension platforms.

  • Non-ECDSA certificates are not supported.

  • PKI support is restricted to key-size P384 and hash-type SHA384.

For more information about configuring and managing certificates using the

secCertMgmt

command, refer to “SSLConfiguration Overview” in the

Brocade Fabric OS Administration Guide

.

An IPsec policy must be defined before IPsec can be enabled on a tunnel. Multiple IPsec policies can be defined; however, only one policy can be applied to a tunnel. All circuits in the tunnel use the same IPsec policy.

An IPsec policy can be modified while the policy is assigned to a tunnel or WAN Tool session.Sometimes, the local and remote sides become out of sync, preventing the tunnel from coming up and displaying an authentication error.

For more information on how to restart IKE authentication, see IPsec IKE Authentication Failures.

When you use thePSK, the IPsec policy must be configured with the same PSK on each end of the tunnel. The policy name can be different at each end, but the key must be the same.

Use the following steps to create, enable, or disable the IPsec policy:

  1. Connect to the switch and log on as an admin.

  2. Enter the

    ipsec-policy--help

    command. For example,

    portcfgipsec-policy--help

    .

    switch:FID128:admin> portcfg ipsec-policy --helpUsage: portCfg ipsec-policy <name> { create [<args>] | modify [<args>] | delete | restart | --help }Name Format: <string> - The IPSec Policy name(Min 1 character, Max 31 characters). Cannot contain the following special characters: ;$!#`/\><&'"=,?.*^{}()Option: create - Create the specified IPSec Policy modify - Modify the specified IPSec Policy delete - Delete the specified IPSec Policy restart - Restart all inactive IKE sessions for this policy help - Show this usage messageOptional Arguments: -p,--profile { preshared | pki } - - Set the IPSec-Profile. -k,--preshared-key <16-64> - - String value for preshared key (for authentication method "SHARED_KEY"). -K,--keypair <keypair name> - Name of the keypair. Max 31 Chars (for authentication method "ECDSA_P384"). -h,--help - Show the IPSec-Policy configuration usage statement.Example: portcfg ipsec-policy myPolicy create --preshared-key 1234567890abcdef

  3. Use the

    portcfg ipsec-policy create

    command to define a policy. The pre-shared key must be 16 through 64 characters long.The following example creates an IPsec policy with the name myPolicy1.

    switch:admin> portcfg ipsec-policy myPolicy1 create -k "123ashorttestkey" Operation Succeeded.

  4. After creating the IPsec policy, apply it to the tunnel. Use the

    portcfg fciptunnel modify

    command to enable a policy on a tunnel.

    Applying anIPsecpolicy to a tunnel is disruptive when modifying anonlinetunnel.

    The following example uses the

    portcfg fciptunnel<ve> modify

    command to enable the policy myPolicy1 for an existing tunnel. IPsec must be enabled on both ends of the tunnel.

    switch:admin> portcfg fciptunnel 24 modify --ipsec myPolicy1!!!! WARNING !!!!Modify operation can disrupt the traffic on the fciptunnel specified for a brief period of time. This operation will bring the existing tunnel down (if tunnel is up) before applying new configuration.Continue with Modification (Y,y,N,n): [ n]y Operation Succeeded

  5. Use the

    portshow ipsec-policy

    command to display the available IPsec policies.The following example displays the IPsec policy name and policy key. You must use the

    --password

    option to display the key; otherwise, it is represented as a string of asterisks.

    switch:admin> portshow ipsec-policy --password IPSec Policy Flg Authentication data-------------------------------------------------------------------------------- MyIPsec S-- CwYQBFJUAo87zGRApVvIWxiINtmAZJtn MyIPsec2 S-- abcdefghijklmnopqrstuvwxyz1234567890--------------------------------------------------------------------------------Flags: *=Name Truncated. Use "portshow ipsec-policy -d for details". P=PKI Profile S=Shared-Key Profile X=Expired Cert M=Hash Mismatch

    The following example displays IKE information on a tunnel with IPsec enabled. Notice that the

    --password

    option is not used.

    switch:admin> portshow ipsec-policy --ikeIPSec Policy Flg Authentication dataIKE-ID Oper Flg Local-Addr Remote-Addr IKE Rekey ESP Rekey-------------------------------------------------------------------myPolicy1 S-- ****************dp0.0 UP I 192.168.0.1 192.168.0.2 5h59m51s 303 3h20m10s 1080dp0.1 UP R 192.168.1.1 192.168.1.2 - - - -dp1.0 UP R 192.168.2.1 192.168.2.2 - - - --------------------------------------------------------------------Flags: *=Name Truncated. Use "portshow ipsec-policy -d for details". P=PKI Profile S=Shared-Key Profile X=Expired Cert M=Hash Mismatch I=Initiator R=Responder

    The following example displays additional detail information on a tunnel with IPsec enabled:

    switch:admin> portshow ipsec-policy --detail IPSec-policy: MyIPsec------------------------------------------------ Preshared-Key: ******************************** Profile: preshared Authentication: SHARED_KEY Encryption: AES_256_GCM Integrity: NONE Diffie Hellman: MODP_2048 Pseudo Random Function: HMAC_512 Num IKE Sessions: 1

  6. To disable an IPsec policy on a tunnel, use the

    portcfg fciptunnel<ve> modify

    command. The following example disables the IPsec policy on tunnel 24:

    switch:admin> portcfg fciptunnel 24 modify --ipsec none!!!! WARNING !!!!Modify operation can disrupt the traffic on the fciptunnel specified for a brief period of time. This operation will bring the existing tunnel down (if tunnel is up) before applying new configuration.Continue with Modification (Y,y,N,n): [ n] y Operation Succeeded

  7. To delete an IPsec policy, use the

    portcfg ipsec-policy delete

    command.The following example deletes the IPsec policy, myPolicy1. You cannot delete a policy that is in use.

    switch:admin> portcfg ipsec-policy myPolicy1 delete Operation Succeeded

  8. To create an IPsec policy using public-key infrastructure (PKI), use the

    portcfg ipsec-policy policy1 create--profilepki

    command.

    A certificate must have previously been generated either by self-signing or through aCSRfrom a CA, refer to the

    seccertmgmt

    command for more information.

    The following example creates a PKI policy:

    switch:admin> portcfg ipsec-policy policy1 create –-profile pki --key-pair MyKeyPair Operation Succeeded

  9. Use the

    portshow ipsec-policy --detail

    command to display the details.The following example shows IPsec with active IKE sessions. The summary info for the IKE data includes the remote certificate that is requested and an indicator if the hash matches or not.

    switch:admin> portshow ipsec-policy -iIPSec Policy Flg Authentication dataIKE-ID Oper Flg Local-Addr Remote-Addr IKE Rekey ESP Rekey-------------------------------------------------------------------ec_pol2 Loc Cert: ven60.pem Hash: Matcheddp0.0 UP R 172.16.0.0 172.16.0.1 - - - - Rem Cert: sb65.pem Hash: Matcheddp0.1 UP R 172.16.0.2 172.16.0.3 - - - - Rem Cert: sb125.pem Hash: Matched--------------------------------------------------------------------Flags: *=Name Truncated. Use "portshow ipsec-policy -d for details".I=Initiator R=Responder

  10. To modify a PSK policy, only the pre-shared key must be modified.

    switch:admin> portcfg ipsec-policy MyPSKPolicy modify --preshared-key asdf1234asdf1234!!!! WARNING !!!!Modify operation can disrupt the traffic on any tunnel using this IPSec policy. This operation may bring the existing tunnel down (if tunnel is up) before applying new configuration.Continue with Modification (Y,y,N,n): [ n] y Operation Succeeded

  11. To modify a PKI policy, modify the profile and the authentication data. Both actions must occur at the same time.

    switch:admin> portcfg ipsec-policy MyPKIPolicy modify --profile pki --keypair MyKeyPair!!!! WARNING !!!!Modify operation can disrupt the traffic on any tunnel using this IPSec policy. This operation may bring the existing tunnel down (if tunnel is up) before applying new configuration.Continue with Modification (Y,y,N,n): [ n] y Operation Succeeded

    switch:admin> portshow ipsec-policy --detail IPSec-policy: policy1---------------------------------------------------------Profile: PKIEncryption: AES-256-CBCPseudo-Random: PRF-HMAC-384Integrity: HMAC-SHA-384-192Diffie-Hellman: ECDH-P384 Authentication: ECDSA-P384Key-Pair: MyKeyPairCertificate: MyKeyPair_cert.pemCertificate Hash: aff6fea1b19d81ea43aa72f4275a9cf550edadc0Num IKE Session: 0

IPsec Limitations (2024)

FAQs

What is the biggest limitation of IPsec? ›

The usage of IPsec has the following limitations:
  • Network Address Translation (NAT) is not supported.
  • Authentication Header (AH) is not supported.
  • IPsec supports IPv6 and IPv4-based tunnels.
  • IPsec is not allowed with the. --connection-type tunnel. option set to anything other than the default.
Mar 4, 2024

What is the limit of IPsec throughput? ›

Bi-directional throughput for traffic across IPsec tunnel is limited to 600 Mbps which results in application slowness, latency and packet loss issues for data traversing across the tunnel.

What are the challenges of IPsec? ›

While IPSec provides robust security for IP communications, its major drawback lies in its complexity and the administrative burden it places on network administrators.

What is the speed limit for IPsec? ›

As of right now, the same tunnel limits apply to IPSec as before: 200 Mbps (per Phase 1 SA) - i.e. 200 Mbps upload and 200 Mbps download. Even if you build multiple Phase 2 SAs, the maximum bandwidth is still limited to 200 Mbps.

Is IPsec outdated? ›

The Dated Legacy: IPsec

IPsec, once a stalwart in secure communications, is now facing its reckoning. As a complex and aging technology, its shortcomings have become increasingly apparent.

What is better than IPsec? ›

SSL VPN. An SSL VPN (secure sockets layer) runs over the Internet like an IPsec VPN. However, it is usually running through the web browser (among other application layer protocols) instead of having to install an actual application on the client computer. This makes it much easier to manage.

How to increase IPsec tunnel bandwidth? ›

The higher the upload, the better performance you will have. Also you need to look at what speed your router can handle for IPsec VPN's. If your router is rated for 10 Mbps IPsec speed and your upload is 20, you would want a better router capable of higher IPsec speeds to match or exceed what your bandwidth is.

What is the recommended lifetime for IPsec? ›

8 hours

What is the maximum IPsec overhead? ›

This 58 bytes is the maximum IPsec overhead when using IPsec ESP and ESPauth. The real IPsec overhead may be as much as 7 bytes less then this value. Host 1 records this information, usually as a host route for the destination (Host 2), in its routing table.

Is IPsec better than OpenVPN? ›

IPsec is typically faster. IPsec also benefits from its integration into the operating system's kernel, allowing for efficient packet processing and less overhead. OpenVPN is slightly slower because of double encryption, but it still offers adequate performance for most enterprise applications.

What are the 3 major components of IPsec? ›

IPSec contains the following elements:
  • Encapsulating Security Payload (ESP): Provides confidentiality, authentication, and integrity.
  • Authentication Header (AH): Provides authentication and integrity.
  • Internet Key Exchange (IKE): Provides key management and Security Association (SA) management.

Why not use IPsec? ›

Because IPsec requires third-party client software, it is more complicated and expensive to set up and maintain. However, this also makes it more secure. It's tough for a hacker to penetrate an IPsec system without knowing which client it uses and the exact settings to get that client to work properly.

What is the maximum IPsec throughput? ›

If using the gateway for both IPsec and GRE connectivity, you can provision maximum 5 Gbps of IPsec throughput or maximum 15 Gbps of GRE throughput. So, for example, if you provision 2 Gbps of IPsec throughput, you have 3 Gbps of IPsec throughput left to provision on the gateway or 9 Gbps of GRE throughput left.

Is IPsec faster than SSL VPN? ›

SSL VPNs can be slower than IPsec due to the overhead of SSL/TLS encryption and the browser based delivery method, which can be less efficient than IPsec's network level integration.

Is IPsec faster than IKEv2? ›

IPsec is a data-transporting tunnel that establishes a secure data transmission to a VPN server. That is why IKEv2 needs IPsec – thanks to this combination, the connection is both fast and well-protected. So in the IKEv2 vs. IPsec dispute, there is no winner.

What is the limitation of IPsec tunnel in zscaler? ›

Zscaler IPSec tunnels support a limit of 400 Mbps for each public source IP address. If your organization wants to forward more than 400 Mbps of traffic, Zscaler recommends using one of the following configurations: Configure multiple IPSec tunnels with different public source IP addresses.

What are the advantages and disadvantages of IPsec? ›

Advantages of IPsec
  • Security at the network layer level. Being based at the network level, this technology is completely invisible in its operation. ...
  • No application dependence. ...
  • CPU overhead. ...
  • Compatibility issues. ...
  • Broken algorithms.
Jul 23, 2024

What are the vulnerabilities of IPsec protocol? ›

Man in the middle attack

As we already saw, IPSec VPN uses keys to identify each other. In this vulnerability, an attacker may be able to recover a weak Pre-Shared Key. Thus, this attack targets IKE's handshake implementation used for IPsec-based VPN connections. Using these keys, it can decrypt connections.

Which of the following is a limitation of Internet Protocol security IPsec )? ›

Which of the following is a limitation of Internet Protocol Security (IPSec)? It is not reliable for network encryption.

Top Articles
Open A Bank Account Online
Czym jest gas fee w Ethereum? Słownik kryptograficzny - Green Parrot
Craigslist Santa Fe New Mexico
"R. Kelly" Sentenced to 30 Years in Prison
Marshfieldnewsherald Obituary
Elements Of Modernism Mastery Test
Apartments / Housing For Rent near Trenton, NJ - craigslist
Fish Counts - Sport Fish
Kate Shumskaya Only Fans Leaked
My Unt Hr
Boyfriend (2018) | KDrama Recaps on Dramabeans
Daves Supermarket Weekly Ad
Mychart.solutionhealth.org Mychartprd/Billing/Guest Pay/Pay As Guest
Forexfactory Calendar Today
Lake County Florida Trash Collection Schedule
Missed Connections Buffalo Ny
Funny Marco Birth Chart
J Crew Great Lakes Crossing
Burlington Antioch Ca
Liquor Store Open Till Midnight Near Me
Huniepop Jessie Questions And Answers
Scratch Off Remaining Prizes Nc
Pokemon Emerald Crest Legendary Locations
Youtube To Mp3 Snapsave
Southwest Flight 238
Imvu Hov
90 Cent Store Near Me
Ixl Ld Northeast
Chase Bank Hours Drive Thru
Les 4 meilleures cartes SIM prépayées (2024) - NON sponsorisé
Beth Israel Farr Building Parking
Skip The Games Rapid City
Bay Area Craigslist Cars For Sale By Owner
866-308-1159
Bailu Game8
Merging Rooms Fallout Shelter
Oreillys O Reilly Auto Parts
Community near Panama City Beach, FL 32413 - craigslist
How Much Does Grupo Firme Charge Per Hour
Maryland Craiglist
Ucsd Sfs
609-718-7432
Kitco 24
Wow Fang Adornments
Ixl Mililani High School
H'aanit's Third Chapter | Gamer Guides: Your ultimate sou...
24 Hour Arrest List Knox County
Barbari – Neskorá antika
Cookie Clicker The Advanced Method
Walking the Grænagil-Laugavegur loop - I Am a Polar Bear
Latest Posts
Article information

Author: The Hon. Margery Christiansen

Last Updated:

Views: 5894

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: The Hon. Margery Christiansen

Birthday: 2000-07-07

Address: 5050 Breitenberg Knoll, New Robert, MI 45409

Phone: +2556892639372

Job: Investor Mining Engineer

Hobby: Sketching, Cosplaying, Glassblowing, Genealogy, Crocheting, Archery, Skateboarding

Introduction: My name is The Hon. Margery Christiansen, I am a bright, adorable, precious, inexpensive, gorgeous, comfortable, happy person who loves writing and wants to share my knowledge and understanding with you.