You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**IKEv2**|**Encryption**| Algorithm to encrypt IKE negotiation messages | ✅ Yes |
41
-
|**IKEv2**|**Integrity**| HMAC-based algorithm to verify IKE negotiation messages have not been tampered with| ✅ Yes |
41
+
|**IKEv2**|**Integrity**| HMAC-based algorithm to verify IKE negotiation messages have not been tampered with. <br/><br/>Only set an HMAC integrity algorithm if **not** using an AEAD algorithm for IKEv2 encryption (see below). Otherwise, integrity is built in, and you do not need to set an IKEv2 integrity algorithm. | ❓ Depends|
42
42
|**IKEv2**|**Key Exchange Method**| DH group to define strength of key exchange | ✅ Yes |
43
43
44
44
| Protocol | Element | Description | User must define? |
|**ESP**|**Encryption**| Algorithm to encrypt traffic's data payloads | ✅ Yes |
47
47
|**ESP**|**Integrity**| HMAC-based algorithm to verify data payloads have not been tampered with. <br/><br/>Only set an HMAC integrity algorithm if **not** using an AEAD algorithm for ESP encryption (see below). Otherwise, integrity is built in, and you do not need to set an ESP integrity algorithm. | ❓ Depends |
48
-
|**ESP**|**Key Exchange Method**| Not applicable to ESP. | ❌ No |
49
-
50
-
?? Pseudorandom function ??
48
+
|**ESP**|**Key Exchange Method**| DH group to define strength of key exchange | ❌ No |
51
49
52
50
## Encryption algorithms
53
51
@@ -65,7 +63,7 @@ The following encryption algorithms are available.
65
63
|`aes192` (AES-CBC) | non-AEAD | 192 | ⚠️ Medium | Rarely used, `aes256` is preferred. | ⚠️ Use with caution |
66
64
|`aes128` (AES-CBC) | non-AEAD | 128 | ⚠️ Medium | Suitable for performance-sensitive VPNs, where constraints don't allow `aes256`| ⚠️ Use with caution |
67
65
68
-
\***A**uthenticated **E**ncryption with **A**ssociated **D**ata (**AEAD**) algorithms provide both encryption and authentication in a single step. They are more secure and efficient than non-AEAD algorithms, but are not supported by all legacy devices. We recommend that you always prefer AEAD algorithms (`aes256gcm16` or `chacha20poly1305`) for performance and security. Choosing an AEAD algorithm for ESP encryption means you do **not** need to define an algorithm for ESP integrity.
66
+
\***A**uthenticated **E**ncryption with **A**ssociated **D**ata (**AEAD**) algorithms provide both encryption and authentication in a single step. They are more secure and efficient than non-AEAD algorithms, but are not supported by all legacy devices. We recommend that you always prefer AEAD algorithms (`aes256gcm16` or `chacha20poly1305`) for performance and security. Choosing an AEAD algorithm for IKEv2/ESP encryption means you do **not** need to define an algorithm for IKEv2/ESP integrity.
0 commit comments