silver-peak-whitepaper-ipsec-udp-1018_1
silver-peak-whitepaper-ipsec-udp-1018_1
in Silver Peak
Unity EdgeConnect
OPERATING WITH ADDRESS TRANSLATION When 4G LTE WAN circuits are used, network admins
In order to conserve and protect private address cannot dedicate public static IP addresses. A relia-
spaces, enterprises deploy Network Address trans- ble mechanism is needed to connect the different
lation (NAT) which can be limited to just addresses branch appliances through different carrier networks
(NAT) or ports (PAT). This can be implemented by and addressing schemes.
enterprise IT teams or by carriers that provide WAN DISABLING STOLEN DEVICES
transport or by both. When implemented by carriers,
IPsec with IKE was designed for an environment
it is referred to as Carrier-Grade NAT (CG-NAT). The
where the parties on both sides of a connection
NAT traversal feature in IKE helps solve the address
don’t trust each other. IKE traditionally provides
translation problem to some extent. However, it fails
pre-shared keys or certificate-based authentication.
if there are multiple devices at the branch, including
Public Key Infrastructure (PKI) or Certificate authenti-
other non-Silver Peak devices like client machines,
cation is considered better than pre-shared keys for
laptops, mobile devices, other branch firewalls and
authentication and key distribution, as it is based on
routers that may have their own VPN requirements.
digital signatures and a trusted hierarchical model.
Blocking & rate Easy to block ports 500, Easy to block ports 500, Cannot block changing
limiting 4500 4500 UDP ports
Multiple VPN devices Cannot distinguish multi- Cannot distinguish multi- NAT discovery and NAT
behind NAT ple IPsec devices behind ple IPsec devices behind traversal helps solve the
upstream NAT upstream NAT multiple devices with VPNs
and NAT problem
Scalability Though pre-shared keys Uses device certificates Key negotiation, rotation
(PSKs) are simpler to for authentication; still re- happens automatically
manage, it still requires quires n2 key negotiations and in a timely manner for
n2 key negotiations for n and extensive certificate hundreds/thousands of
sites in full mesh lifecycle management appliances
Key distribution and Uses insecure common Uses unique keys per tun- Uses unique keys per
management shared secrets to build nel, per device pair, per tunnel, per device pair,
tunnels direction but requires ex- per direction, and they are
tensive certificate lifecycle automatically maintained
management maintained by the Orchestrator for
by IT admins hundreds/thousands of
appliances
Device level authentication is performed through In all cases, an unauthorized or stolen device cannot
secure TLS in the management plane. The Silver Peak connect to the SD-WAN network; it cannot download
Cloud Portal and Orchestrator are trusted entities. a configuration or build tunnels and is excluded from
joining the network.
Currently, CG-NAT or PAT at both ends is not supported. This is usually eliminated by
having one-to-one NAT or public IP addresses on the other end as depicted in the
earlier use case.
Outer IP Header UDP (Src, Dest 500) ISAKMP Header Control Data (part encrypted)
Data Plane
TRADITIONAL IKE, IPSEC PACKET FORMATS
Outer IP Header ESP Header Encrypted Packet ESP Trailer ESP Auth
Outer IP Header UDP Header-NAT-T ESP Encrypted ESP Trailer ESP Auth
(src, dest port 4500) Header Packet
Outer IP Header ESP GRE Silver Peak Encrypted ESP Trailer ESP Auth
Header Header Header Packet
When NAT Traversal is on in the legacy IPsec mode (with IKE), the UDP source/desti-
nation ports are 4500. They can be easily blocked by ISPs or nation state firewalls.
Outer IP Header UDP ESP GRE Silver En- ESP Trailer ESP Auth
Header-NAT-T Header Header Peak crypted
(src, dest port Header Packet
4500)
Figure 9: Traditional IPsec (ESP) packet with NAT-Traversal and Silver Peak encapsulation
IPsec UDP with Silver Peak encapsulations use configurable UDP ports for source and
destination which makes it difficult to block by ISPs or nation state firewalls.
Outer IP Header UDP ESP GRE Silver En- ESP Trailer ESP Auth
Header Header Header Peak crypted
(configurable Header Packet
UDP,src, dest
ports)
Figure 10: IPsec UDP (ESP) packet with Silver Peak encapsulation
Certificate Authorities like Verisign, Comodo are Silver Peak Cloud Portal, Orchestrator are trusted (organi-
trusted. zational compliance ensures this).
Stolen appliances - Certificate expiry and revocation Stolen appliances – Customer revokes access through the
handles device lifecycle, managed by customer’s IT Orchestrator; simpler lifecycle management by Silver Peak.
admins.
Unauthorized appliances – cannot establish TLS Unauthorized appliances – drop all traffic, additional
connection, needs revocation by enterprise IT. advantage: cannot download configuration.
Non-repudiation – The assurance that someone can- Non-repudiation – This assurance is provided when
not deny something is provided via digital signature in customer clicks ‘authorize’ in the Orchestrator.
the certificate.
Company Address Phone & Fax Online
Silver Peak Systems, Inc Phone: +1 888 598 7325 Email: [email protected]
2860 De La Cruz Blvd. Local: +1 408 935 1800 Website: www.silver-peak.com
Santa Clara, CA 95050
© 2018 Silver Peak Systems, Inc. All rights reserved. Silver Peak, the Silver Peak logo, and all Silver Peak product names, logos, and brands are
trademarks or registered trademarks of Silver Peak Systems, Inc. in the United States and/or other countries. All other product names, logos,
and brands are property of their respective owners.
SP-WP-IPSEC-UDP-102218