There are two main types of VPN in popular use today:
•
|
IPsec VPN: IPsec is a set of protocols for security at the packet processing layer of network communication. An advantage of IPsec is that security arrangements can be handled without requiring changes to individual user computers. SonicOS supports the creation and management of IPsec VPNs.
|
IPsec provides two choices of security service:
•
|
SSL VPN: Secure Socket Layer (SSL) is a protocol for managing the security of a message transmission on the Internet, usually by HTTPS. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. SSL uses the public-and-private key encryption system from RSA, which also includes the use of a digital certificate. An SSL VPN uses SSL to secure the VPN tunnel.
|
For information on Dell SonicWALL SRA/SMA appliances, see the Dell SonicWALL Mobile Security Products website: http://software.dell.com/products/secure-mobile-access/. |
IPsec VPN traffic is secured in two stages:
•
|
Authentication: The first phase establishes the authenticity of the sender and receiver of the traffic using an exchange of the public key portion of a public-private key pair. This phase must be successful before the VPN tunnel can be established.
|
•
|
Encryption: The traffic in the VPN tunnel is encrypted, using an encryption algorithm such as AES or 3DES.
|
IKE version 1 (IKEv1) uses a two phase process to secure the VPN tunnel.
•
|
IKE Phase 1 is the authentication phase. The nodes or gateways on either end of the tunnel authenticate with each other, exchange encryption/decryption keys, and establish the secure tunnel.
|
•
|
IKE Phase 2 is the negotiation phase. Once authenticated, the two nodes or gateways negotiate the methods of encryption and data verification (using a hash function) to be used on the data passed through the VPN and negotiate the number of secure associations (SAs) in the tunnel and their lifetime before requiring renegotiation of the encryption/decryption keys.
|
In IKEv1, there are two modes of exchanging authentication information:
•
|
Main Mode: The node or gateway initiating the VPN queries the node or gateway on the receiving end, and they exchange authentication methods, public keys, and identity information. This usually requires six messages back and forth. The order of authentication messages in Main Mode is:
|
•
|
Aggressive Mode: To reduce the number of messages exchanged during authentication by half, the negotiation of which cryptographic algorithm to use is eliminated. The initiator proposes one algorithm and the responder replies if it supports that algorithm:
|
The two types of security for individual packets are:
•
|
Encryption Secured Payload (ESP), in which the data portion of each packet is encrypted using a protocol negotiated between the parties.
|
•
|
Authentication Header (AH), in which the header of each packet contains authentication information to ensure the information is authenticated and has not been tampered with. No encryption is used for the data with AH.
|
SonicOS supports the following encryption methods for Traffic through the VPN:
|
|
||||
|
|
||||
|
•
|
http://www.faqs.org/rfcs/rfc2407.html – The Internet IP Security Domain of Interpretation for ISAKMP
|
•
|
http://www.faqs.org/rfcs/rfc2408.html – RFC 2408 - Internet Security Association and Key Management Protocol (ISAKMP)
|
•
|
http://www.faqs.org/rfcs/rfc2409.html – RFC 2409 - The Internet Key Exchange (IKE)
|
IKEv2 is the default proposal type for new VPN policies.
IKEv2 has the following advantages over IKEv1:
•
|
•
|
IKEv2 initializes a VPN tunnel with a pair of message exchanges (two message/response pairs).
For information on configuring VPNs in SonicOS, see: