IPsec is an IETF standard that enables mutual authentication between hosts and also facilitates negotiation of cryptographic keys that will be used in encrypting the IP packets. Even though IPsec support encryption without authentication, that is really not a good idea for security. With the latest news about NSA tools potentially being stolen and available in the black market to crack routers from Cisco Systems, Juniper Networks and Fortinet; the immediate question arises: is IPsec security good enough, or do you need to rely on a transport layer (such as TLS) or application layer (such as SSH) security that is not necessarily tied to the router?
If you believe that the NSA code is available (for NSA or for hackers at large) to intercept and “hack” the IPsec tunnel, then having the IPSec initiating and terminating on these type of routers will not provide security against those threats, i.e. if the traffic can be mangled at the router on the path, that certainly will nullify the IPsec security.
However, if your site-to-site network is utilizing overlay tunnels between hosts (or gateways), you can use the security functionality of the overlay tunnels (if they have those features) to add another layer of authentication and encryption. No hacker tool will be capable of hacking into 2 layers of security, implemented via two separate layers, in two different routers. So the idea is the to inject the already encrypted IPSec packets into the SD-WAN router that is capable of creating a non-layer 3 overlay tunnel, that is also capable of encryption and authentication, so that the SD-WAN router can take those already encrypted packets as datagrams and further encrypt on top. If the SD-WAN router is also capable of Broadband Bonding, you will also benefit from the flow traffic being distributed over 2 or more transports – so even though this is not a standardized security feature, it clearly provides a strong additional level of security.
No matter your approach, you should always keep your routers up to date with their latest security patches and firmware upgrades to make sure there are no vulnerabilities. If you want to be extra cautious, we recommend the encrypted Broadband Bonding tunnels provided by SD-WAN routers on top of your legacy IPSec.
Cahit Akin, CEO, Mushroom Networks, Inc.
Mushroom Networks is the provider of SD-WAN (Software Defined WAN) and NFV solutions capable of Broadband Bonding that enables self-healing WAN networks that route around network problems such as latency, jitter and packet loss.
© 2004 – 2018 Mushroom Networks Inc. All rights reserved.
Let's get started. Please call us at +1 (858) 452-1031, or fill the form: