Which IKE Version Should I Select When I Create a VPN Connection?_Virtual Private Network_Huawei Cloud (2024)

IKEv2 is recommended because IKEv1 is not secure. In addition, IKEv2 outperforms IKEv1 in connection negotiation and establishment, authentication methods, dead peer detection (DPD) timeout processing, and security association (SA) timeout processing.

IKEv2 will be widely used, and IKEv1 will gradually phase out.

Introduction to IKEv1 and IKEv2

  • The complexity of IKEV1, a hybrid protocol, inevitably brings some security and performance defects. This has become the bottleneck for the current IPsec system.
  • The IKEv2 protocol reserves basic functions of IKEv1 and overcomes some problems brought by IKEv1. Moreover, for simplicity, efficiency, security, and robustness, RFC 4306, a document describes version 2 of IKE, combines the contents of what were previously separate IKEv1 documents. By minimizing core functions and default password algorithms, IKEv2 greatly improves the interoperation capability among different IPsec VPNs.

IKEv1 Security Vulnerabilities

  • The cryptographic algorithms supported by IKEv1 have not been updated for more than 10 years. Also, IKEv1 does not support strong cryptographic algorithms such as AES-GCM and ChaCha20-Poly1305. For IKEv1, the E (Encryption) bit in the ISALMP header specifies that the payloads following the ISALMP header are encrypted, but any data integrity verification of those payloads is handled by a separate hash payload. This separation of encryption from data integrity protection prevents the use of authenticated encryption (AES-GCM) with IKEv1.
  • IKEv1 protocol is vulnerable to DoS amplification attacks. IKEv1 is vulnerable to half-open connections.

    IKEv2 can defend against DoS attacks.

  • The IKEv1 aggressive mode is not secure enough. In aggressive mode, information packets are not encrypted. There are also brute-force attacks targeting at the aggressive mode, such as man-in-the-middle attacks.

Differences Between IKEv1 and IKEv2

  • Negotiation process
    • IKEv1 SA negotiation consists of two phases. IKEv1 is complex and occupies a large amount of bandwidth. IKEv1 phase 1 negotiation aims to establish the IKE SA. This process supports the main mode and aggressive mode. Main mode uses six ISAKMP messages to establish the IKE SA, but aggressive mode uses only three. Therefore, aggressive mode is faster in IKE SA establishment. However, aggressive mode does not provide peer identity protection because key exchange and identity authentication are performed at the same time. IKEv1 phase 2 negotiation aims to set up the IPsec SA for data transmission. This process uses the fast exchange mode (3 ISAKMP messages) to complete the negotiation.
    • Compared with IKEv1, IKEv2 simplifies the SA negotiation process. IKEv2 uses two exchanges (a total of 4 messages) to create an IKE SA and a pair of IPsec SAs. To create multiple pairs of IPsec SAs, only one additional exchange is needed for each additional pair of SAs.

      Which IKE Version Should I Select When I Create a VPN Connection?_Virtual Private Network_Huawei Cloud (1)

      For IKEv1 negotiation, its main mode requires nine (6+3) packets in total and its aggressive mode requires 6 (3+3) packets. IKEv2 negotiation requires only 4 (2+2) packets.

  • Authentication methods
    • Only IKEv1 (requiring an encryption card) supports digital envelope authentication (HSS-DE).
    • IKEv2 supports Extensible Authentication Protocol (EAP) authentication. IKEv2 can use an AAA server to remotely authenticate mobile and PC users and assign private IP addresses to these users. IKEv1 does not provide this function and must use L2TP to assign private IP addresses.
    • Only IKEv2 supports IKE SA integrity algorithms.
  • DPD timeout
    • Only IKEv1 supports the retry-interval parameter. If a device sends a DPD packet but receives no reply within the specified retry-interval, the device records a DPD failure event. When the number of failure events reaches five, both the IKE SA and IPsec SA are deleted. The IKE SA negotiation will be started again when the device has IPsec traffic to handle.
    • In IKEv2 mode, the retransmission interval increases from 1, 2, 4, 8, 16, 32 to 64 seconds. If no reply is received within eight consecutive transmissions, the peer end is considered dead, and the IKE SA and IPsec SA will be deleted.
  • IKE SA timeout processing and IPsec SA timeout processing

    In IKEv2, the IKE SA soft lifetime is 9/10 of the IKE SA hard lifetime plus or minus a random value to reduce the likelihood that two ends initiate re-negotiation at the same time. Therefore, soft lifetime does not require manual settings in IKEv2.

Advantages of IKEv2 Over IKEv1

  • Simplified SA negotiation process and improved negotiation efficiency.
  • Closed many cryptographic loopholes, improving security.
  • Supports EAP authentication, improving authentication flexibility and scalability.
  • EAP is an authentication protocol that supports multiple authentication methods. The biggest advantage of EAP is scalability. That is, new authentication modes can be added without changing the original authentication system. EAP authentication has been widely used in dial-up access networks.
  • IKEv2 employs an encrypted payload that is based on the design of ESP. The IKEv2 encrypted payload associates encryption and data integrity protection in a fashion that makes it possible to use authenticated encryption algorithms. AES-GCM ensures confidentiality, integrity, and authentication.
Which IKE Version Should I Select When I Create a VPN Connection?_Virtual Private Network_Huawei Cloud (2024)

FAQs

Should I use IKEv1 or IKEv2? ›

IKEv2 provides the following benefits over IKEv1: IKEv2 mode is considered to be more secure,reliable and faster. In IKEv2 Tunnel endpoints exchange fewer messages to establish a tunnel. IKEv2 uses four messages; IKEv1 uses either six messages (in the main mode) or three messages (in aggressive mode).

Should I use IKEv2 or OpenVPN? ›

IKEv2 and OpenVPN are both solid choices when it comes to speed, security, and reliability. IKEv2 has the edge when it comes to speed and is a better choice for mobile devices due to its stability. However, OpenVPN is the stronger option if security is the top priority, and it still offers a fast connection.

What is a IPSec IKE IKEv1 or IKEv2 VPN tunnel? ›

IKEv2 and IKEv1 are the two iterations of IKE, which stands for Internet Key Exchange—a protocol used to set up a secure communication channel between two networks. IKEv2 is an enhanced version of IKEv1.

What is the IKE key for VPN? ›

Internet Key Exchange (IKE) protocol— IPsec supports automated generation and negotiation of keys and security associations using the IKE protocol. Using IKE to negotiate VPNs between two endpoints provides more security than the manual key exchange.

What are two functions of IKEv1 but not IKEv2? ›

What are differences between IKEv1 and IKEv2? (IKEv1 vs. IKEv2)
IKEv1IKEv2 (SIMPLE and RELIABLE!)
Multi-hosting: Basically, NOT supported.Supported by using multiple IDs on a single IP address and port pair.
Rekeying: NOT defined.Defined.
NAT Traversal: Defined as an extension.Supported by default.
14 more rows

Is IKEv2 good for streaming? ›

IKEv2 is suitable for streaming because of its fast connection speeds and ability to maintain a stable connection.

What is the best VPN connection type? ›

The best VPN protocol for you depends on a number of factors, including what device you're using, how much balance between security and speed you want, what type of activities you're doing online, and more. OpenVPN and WireGuard are generally considered the best VPN protocols for day-to-day use.

What is IKEv2 VPN used for? ›

IKEv2 is used for secure VPN communication between VPN-capable devices and defines the negotiation and authentication for IPsec security associations. As it's one of the most popular VPN tunneling protocols, let's take a deeper look at it in this article.

Which VPN solution is more secure, IKEv2 or IPsec? ›

Which VPN solution is more secure, IKEv2 or IPsec? IPsec, because IKEv2 does not perform does not perform any encryption. IKEv2, because it operates at Layer 4, encapsulating all lower-layer headers.

Is IKEv2 more secure? ›

Verdict. IKEv2 is an excellent choice, it is extremely fast, secure and reliable.

What does IKE mean in VPN? ›

Internet Key Exchange (IKE) is a standard protocol used to set up a secure and authenticated communication channel between two parties via a virtual private network (VPN).

Is IKE version 1 secure? ›

IKEv1 was designed in the late 1990s, so it is unlikely that most IKE protocols are vulnerable to this attack, however, it is known that some legacy systems enable this version of IKE by default. Additionally, there are a handful of Cisco devices/versions that are vulnerable to CVE-2016-6415.

What is the IKE version? ›

In computing, Internet Key Exchange (IKE, versioned as IKEv1 and IKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol suite. IKE builds upon the Oakley protocol and ISAKMP.

What is the difference between IKE version 1 and 2? ›

IKEv2 can use an AAA server to remotely authenticate mobile and PC users and assign private addresses to these users. IKEv1 does not provide this function and must use L2TP to assign private addresses. IKE SA integrity algorithms are supported only in IKEv2. The retry-interval parameter is supported only in IKEv1.

How to setup IKEv2 VPN connection? ›

Select Network and Internet Options.
  1. On the VPN tab, click Add VPN Connection.
  2. In the Subscriptions section, look for domains of IKEv2 VPN servers, as well as the Username and Password VPN.
  3. Choose: Windows (Built-in) ...
  4. Connect to IKEv2 VPN server on Windows 10.
  5. Connection to IKEv2 VPN established successfully.

Is IKEv1 still secure? ›

The only reason why you should be running ikev1 should be if you are using an old device which does not support ikev2. If you implement your VPNs in a correct and way with strong crypto, it's very likely that your VPNs are the strongest element of your complete security-chain.

What are the disadvantages of IKEv1? ›

IKEv1 is more complex and prone to errors and misconfigurations. It also has more overhead and latency due to the multiple messages and modes. IKEv1 is less resilient to network changes and interruptions, such as switching from Wi-Fi to cellular data, or losing connectivity temporarily.

Is IKEv1 obsolete? ›

IKEv1 and its related documents for the Internet Security Association and Key Management Protocol (ISAKMP) and IPsec DOI were obsoleted by IKEv2 in December 2005.

What is the difference between IKEv1 and IKEv2 rekey? ›

Rekeying. In comparison to IKEv1, which only supports reauthentication (see below), IKEv2 provides proper inline rekeying of IKE SAs by use of CREATE_CHILD_SA exchanges. This means that new keys may be established without any interruption of the existing IKE and IPsec SAs.

Top Articles
Car Payments: The Basics Explained
How to Get Around Hinge Ban in 2024
Warren Ohio Craigslist
His Lost Lycan Luna Chapter 5
Mustangps.instructure
Truist Drive Through Hours
DIN 41612 - FCI - PDF Catalogs | Technical Documentation
Urban Dictionary Fov
Methodist Laborworkx
Miss America Voy Forum
Uhcs Patient Wallet
Moparts Com Forum
Baywatch 2017 123Movies
Michael Shaara Books In Order - Books In Order
Daylight Matt And Kim Lyrics
Water Trends Inferno Pool Cleaner
Metro Pcs.near Me
T Mobile Rival Crossword Clue
Prep Spotlight Tv Mn
1773x / >
Receptionist Position Near Me
Unity Webgl Car Tag
Alternatieven - Acteamo - WebCatalog
Amazing Lash Bay Colony
Bridgestone Tire Dealer Near Me
Guide to Cost-Benefit Analysis of Investment Projects Economic appraisal tool for Cohesion Policy 2014-2020
Obsidian Guard's Skullsplitter
R/Sandiego
Life Insurance Policies | New York Life
Roadtoutopiasweepstakes.con
The Menu Showtimes Near Amc Classic Pekin 14
Chapaeva Age
2015 Chevrolet Silverado 1500 for sale - Houston, TX - craigslist
The Mad Merchant Wow
AI-Powered Free Online Flashcards for Studying | Kahoot!
9 oplossingen voor het laptoptouchpad dat niet werkt in Windows - TWCB (NL)
Pro-Ject’s T2 Super Phono Turntable Is a Super Performer, and It’s a Super Bargain Too
Stewartville Star Obituaries
1Exquisitetaste
Luvsquad-Links
Ssc South Carolina
Costco The Dalles Or
Frequently Asked Questions
Workday Latech Edu
Germany’s intensely private and immensely wealthy Reimann family
53 Atms Near Me
Craigslist Cars For Sale By Owner Memphis Tn
Cars & Trucks near Old Forge, PA - craigslist
Causeway Gomovies
18443168434
Coleman Funeral Home Olive Branch Ms Obituaries
Ark Silica Pearls Gfi
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 5544

Rating: 4.4 / 5 (55 voted)

Reviews: 86% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.