Table 1 lists the algorithms recommended for VPN in descending order of security.
Parameter |
Description |
|
---|---|---|
IKE Policy |
Version |
The default value is v2. |
Authentication Algorithm |
Hash algorithm used for authentication. The following algorithms are supported:
By default, the SHA2-256 algorithm is used. |
|
Encryption Algorithm |
The following encryption algorithms are supported:
By default, the AES-128 algorithm is used. |
|
DH Algorithm |
The following algorithms are supported:
By default, Group 15 is used. |
|
IPsec Policy |
Authentication Algorithm |
Hash algorithm used for authentication. The following algorithms are supported:
By default, the SHA2-256 algorithm is used. |
Encryption Algorithm |
The following encryption algorithms are supported:
By default, the AES-128 algorithm is used. |
Perfect Forward Secrecy (PFS) ensures that the compromise of the keys of an IPsec tunnel does not affect the security of other tunnels by leveraging that the keys of these tunnels are irrelevant to each other. By default, the PFS function is enabled for VPN.
Each IPsec VPN connection consists of at least one IPsec tunnel, each of which uses an independent set of keys to protect user traffic.
VPN supports the following algorithms:
Anti-replay uses sequence numbers to protect IPsec encrypted packets against replay attacks, which are initiated by repeatedly sending intercepted data packets. By default, the anti-replay function is enabled for the VPN service.
A VPN gateway is exclusive to a tenant. As such, tenants are isolated from each, ensuring tenant data security.