梦到下雪是什么意思| burberry是什么档次| 大便很粗是什么原因| 身上有斑点是什么原因| 旖旎是什么意思| 躺下就头晕是什么原因| 火龙果吃了有什么好处| 长明灯是什么意思| 十一月九号是什么星座| 梦见打架是什么意思| 什么可以治早泄| 帝陀表什么档次| 空是什么生肖| 什么药| 阿莫西林是治什么的| 骨质断裂是什么意思| 凤辇是什么意思| 同房后出血什么原因| 痛风挂什么科| 吃什么降血压效果最好| 青榄配什么煲汤止咳做法| 羊齿状结晶代表什么| 备孕要注意什么| 胃部间质瘤是什么性质的瘤| 什么天长地久| 宅基地是什么意思| 50年是什么婚| 哪吒妈妈叫什么| 脂肪肝吃什么中药| 咽喉炎吃什么消炎药| 邪是什么意思| 灰指甲是什么原因引起| 踩雷是什么意思| 喝水不排尿是什么原因| 90年是什么年| 两个人在一起的意义是什么| 长孙皇后叫什么名字| freeze是什么意思| 呼吸内科主要看什么病| 慢性浅表性胃炎吃什么药好| 甲减检查什么项目| 喝啤酒尿多是什么原因| 车牌颜色代表什么| 旦辞爷娘去的旦是什么意思| 儿童补钙吃什么| 211和985什么意思| 雅痞是什么意思| 1967年是什么年| 师姐是什么意思| 异想天开什么意思| 舒字属于五行属什么| 牛仔裤配什么鞋好看| 黄花梨树长什么样| 肛瘘是什么病| elaine是什么意思| 生物工程是什么专业| 内火旺是什么原因| 挂名什么意思| 卫生棉条是什么| 猪朋狗友是什么意思| 验尿白细胞高是什么原因| 毕罗是什么食物| 从容面对是什么意思| 6.3是什么星座| 直接胆红素偏高是什么意思| 紫水晶五行属什么| 柔顺和拉直有什么区别| 什么是静息心率| rsa是什么意思| 富不过三代是什么意思| 肌酸激酶高挂什么科| 1993年属什么| 声情并茂的意思是什么| 跑步肚子疼是什么原因| 窦性心律过缓吃什么药| 什么叫逻辑思维| 晚上8点到9点是什么时辰| ck香水属于什么档次| 见多识广是什么生肖| 什么是电商平台| 肝内血管瘤是什么意思| 凿壁偷光告诉我们什么道理| 有出息是什么意思| 升字是什么生肖| 颞下颌关节炎吃什么药| 35岁属什么生肖| 百年好合是什么意思| 尿急是什么症状| 回盲部憩室是什么意思| 吃什么可以增强免疫力| AB型血型有什么优势| 岁月的痕迹是什么意思| 乡镇派出所所长是什么级别| 赤色是什么颜色| 兵马俑是什么意思| 网球肘用什么药| b是什么| 武警支队长是什么级别| 梦见女尸是什么预兆| 盘根是什么| 什么是it行业| 益生元和益生菌有什么区别| 地球代表什么生肖| 二十七岁属什么生肖| 脸上长痘挂什么科| 行李为什么叫行李| 四肢麻木是什么病| 灰指甲用什么药好| 三白眼是什么意思| 输氨基酸对身体有什么好处和坏处| 已是什么意思| 什么情况下会流前列腺液| 颖五行属什么| 79年出生属什么生肖| 开封有什么好玩的地方| ics是什么药| 女人吃什么养颜又美白| 有什么作用| 门槛费是什么意思| 常吃南瓜有什么好处和坏处| 减肥平台期什么意思| 改名字需要什么手续| 吃饭老是噎着是什么原因| 炖鸡汤放什么调料| 易孕体质有什么特征| 淡定自若什么意思| 巨蟹座和什么最配| 天津是什么省| 扁桃体发炎引起的发烧吃什么药| 阑尾炎吃什么消炎药| 苯醚甲环唑防治什么病| 驻马店以前叫什么名字| 子宫纵隔什么意思| 母字是什么结构| 心电图逆钟向转位什么意思| 戏耍的近义词是什么| oa是什么意思| 什么是机械键盘| 竖心旁的字与什么有关| 欧豪资源为什么这么好| 平权是什么意思| 肚子胀气吃什么| 烘培是什么意思| 为什么微信附近的人看不到我| 海棠花什么时候开| 月经不调去医院挂什么科| 空姐在飞机上干什么| 智齿有什么作用| 五台山是什么菩萨的道场| 吃得什么填词语| 肠道有息肉有什么症状| 三月14号是什么星座| 护肝养肝吃什么好| 梦见喝酒是什么意思| 隐性梅毒是什么意思| ad是补什么的| 梦见蛇咬我是什么意思| 缅甸的首都叫什么名字| 早上起来口苦吃什么药| 什么是酮体| 相夫教子是什么意思| 33是什么意思| 杺是什么意思| 棺材用什么木材做最好| 留个念想是什么意思| 人为什么要有性生活| 晚上喝牛奶有什么好处| 血热吃什么药好| 垂头丧气什么意思| 男人吃荔枝有什么好处| 石敢当是什么神| 烤冷面的面皮是什么面| 什么人容易怀葡萄胎| 系统是什么| 梦见包被偷了什么预兆| 为什么一进去就软了| 低血压高是什么原因造成的| 热量是什么意思| 10月5号什么星座| 异常白细胞形态检查是查什么病| 脂肪肝浸润是什么意思| 内痔疮吃什么药好得快| 好学不倦什么意思| 便秘有什么症状| 肉蒲团是什么| 和尚代表什么生肖| 直接胆红素高是什么病| 金针菇为什么叫明天见| 异丙醇是什么东西| 停经闭经吃什么药调理| 绿色加什么颜色是蓝色| 什么钱最值钱| 打篮球有什么好处| 慢性疾病都包括什么病| 丼什么意思| 为什么会静脉曲张| 螺旋ct检查什么| 扁桃体发炎不能吃什么| 江苏属于什么方向| 偶尔失眠是什么原因| fdi是什么意思| 名不见经传是什么意思| 精益求精下一句是什么| 福是什么生肖| 交警中队长是什么级别| 哮喘有什么症状| 5月是什么季节| 有所作为的意思是什么| 大摇大摆是什么生肖| 舌苔厚发黄是什么原因| 受用是什么意思| cp感什么意思| 每天吃一个鸡蛋有什么好处| 尿酸高能喝什么酒| 肩周炎是什么原因造成的| 夜黑风高什么意思| 李白是什么| 糖类抗原ca125偏高是什么原因| 拉缸是什么意思| 北字五行属什么| 吃什么水果对肝好| 血去掉一撇念什么| 情绪化什么意思| 肌腱炎吃什么药| 男生叫你姑娘什么意思| 早餐吃什么简单又营养| 甲状腺结节忌口什么| 水火不容是什么意思| 74年大溪水命缺什么| 93年鸡五行属什么| 小便无力是什么原因| 柠檬配什么泡水喝最好| 人流后吃什么水果好| 低血糖什么症状有哪些| 无纺布是什么材料做的| 今年为什么这么热| 高血压属于什么科| 包的部首是什么| 化工厂是干什么的| 女的肾虚是什么原因引起的| 高血压可以喝什么饮料| 婴儿蓝是什么颜色| 鱼龙是什么| 谷氨酰转肽酶高是什么原因| 学士学位证书有什么用| 什么血型容易溶血| 1947年属猪的是什么命| 肠溶片是什么意思| 老是口干舌燥是什么原因| lh是什么| 月经后期是什么意思| 罡什么意思| 觊觎什么意思| 热脸贴冷屁股是什么意思| 跟腱断裂是什么感觉| 双子座女和什么星座最配| 三角梅什么时候换盆| 小三阳吃什么食物好得快| 连奕名为什么娶杨若兮| 容易长痣是什么原因| 生物包括什么| 为什么很困却睡不着| 7月8日是什么星座| ganni是什么牌子| 百度

烟台扎实推进水土流失综合治理 取得明显成效

百度 经新一届董事会的推选,孟晚舟女士出任公司副董事长职务,她将在公司职能体系的进一步建设与完善中发挥更大的作用。

IPsec is a group of networking protocols used for setting up secure encrypted connections, such as VPNs, across publicly shared networks.

Learning Objectives

After reading this article you will be able to:

  • Learn about the IPsec protocol suite
  • Understand how IPsec VPNs work
  • Compare IPsec tunnel mode and IPsec transport mode

Related Content


Want to keep learning?

Subscribe to theNET, Cloudflare's monthly recap of the Internet's most popular insights!

Refer to Cloudflare's Privacy Policy to learn how we collect and process your personal data.

Copy article link

What is IPsec?

IPsec is a group of protocols for securing connections between devices. IPsec helps keep data sent over public networks secure. It is often used to set up VPNs, and it works by encrypting IP packets, along with authenticating the source where the packets come from.

Within the term "IPsec," "IP" stands for "Internet Protocol" and "sec" for "secure." The Internet Protocol is the main routing protocol used on the Internet; it designates where data will go using IP addresses. IPsec is secure because it adds encryption* and authentication to this process.

*Encryption is the process of concealing information by mathematically altering data so that it appears random. In simpler terms, encryption is the use of a "secret code" that only authorized parties can interpret.

Whitepaper
How to break free from network hardware
Guide
The Zero Trust guide to securing aplication access

Why is IPsec important?

Security protocols like IPsec are necessary because networking methods are not encrypted by default.

When sending mail through a postal service, a person typically would not write their message on the outside of the envelope. Instead, they enclose their message inside the envelope so that no one who handles the mail between sender and recipient can read their message. However, networking protocol suites like TCP/IP are only concerned with connection and delivery, and messages sent are not concealed. Anyone in the middle can read them. IPsec, and other protocols that encrypt data, essentially put an envelope around data as it traverses networks, keeping it secure.

What is a VPN? What is an IPsec VPN?

A virtual private network (VPN) is an encrypted connection between two or more computers. VPN connections take place over public networks, but the data exchanged over the VPN is still private because it is encrypted.

VPNs make it possible to securely access and exchange confidential data over shared network infrastructure, such as the public Internet. For instance, when employees are working remotely instead of in the office, they often use VPNs to access corporate files and applications.

Many VPNs use the IPsec protocol suite to establish and run these encrypted connections. However, not all VPNs use IPsec. Another protocol for VPNs is SSL/TLS, which operates at a different layer in the OSI model than IPsec. (The OSI model is an abstract representation of the processes that make the Internet work.)

How do users connect to an IPsec VPN?

Users can access an IPsec VPN by logging into a VPN application, or "client." This typically requires the user to have installed the application on their device.

VPN logins are usually password-based. While data sent over a VPN is encrypted, if user passwords are compromised, attackers can log into the VPN and steal this encrypted data. Using two-factor authentication (2FA) can strengthen IPsec VPN security, since stealing a password alone will no longer give an attacker access.

Sign Up
Security & speed with any Cloudflare plan

How does IPsec work?

IPsec connections include the following steps:

Key exchange: Keys are necessary for encryption; a key is a string of random characters that can be used to "lock" (encrypt) and "unlock" (decrypt) messages. IPsec sets up keys with a key exchange between the connected devices, so that each device can decrypt the other device's messages.

Packet headers and trailers: All data that is sent over a network is broken down into smaller pieces called packets. Packets contain both a payload, or the actual data being sent, and headers, or information about that data so that computers receiving the packets know what to do with them. IPsec adds several headers to data packets containing authentication and encryption information. IPsec also adds trailers, which go after each packet's payload instead of before.

Authentication: IPsec provides authentication for each packet, like a stamp of authenticity on a collectible item. This ensures that packets are from a trusted source and not an attacker.

Encryption: IPsec encrypts the payloads within each packet and each packet's IP header (unless transport mode is used instead of tunnel mode — see below). This keeps data sent over IPsec secure and private.

Transmission: Encrypted IPsec packets travel across one or more networks to their destination using a transport protocol. At this stage, IPsec traffic differs from regular IP traffic in that it most often uses UDP as its transport protocol, rather than TCP. TCP, the Transmission Control Protocol, sets up dedicated connections between devices and ensures that all packets arrive. UDP, the User Datagram Protocol, does not set up these dedicated connections. IPsec uses UDP because this allows IPsec packets to get through firewalls.

Decryption: At the other end of the communication, the packets are decrypted, and applications (e.g. a browser) can now use the delivered data.

What protocols are used in IPsec?

In networking, a protocol is a specified way of formatting data so that any networked computer can interpret the data. IPsec is not one protocol, but a suite of protocols. The following protocols make up the IPsec suite:

Authentication Header (AH): The AH protocol ensures that data packets are from a trusted source and that the data has not been tampered with, like a tamper-proof seal on a consumer product. These headers do not provide any encryption; they do not help conceal the data from attackers.

Encapsulating Security Protocol (ESP): ESP encrypts the IP header and the payload for each packet — unless transport mode is used, in which case it only encrypts the payload. ESP adds its own header and a trailer to each data packet.

Security Association (SA): SA refers to a number of protocols used for negotiating encryption keys and algorithms. One of the most common SA protocols is Internet Key Exchange (IKE).

Finally, while the Internet Protocol (IP) is not part of the IPsec suite, IPsec runs directly on top of IP.

What is the difference between IPsec tunnel mode and IPsec transport mode?

IPsec tunnel mode is used between two dedicated routers, with each router acting as one end of a virtual "tunnel" through a public network. In IPsec tunnel mode, the original IP header containing the final destination of the packet is encrypted, in addition to the packet payload. To tell intermediary routers where to forward the packets, IPsec adds a new IP header. At each end of the tunnel, the routers decrypt the IP headers to deliver the packets to their destinations.

In transport mode, the payload of each packet is encrypted, but the original IP header is not. Intermediary routers are thus able to view the final destination of each packet — unless a separate tunneling protocol (such as GRE) is used.

What port does IPsec use?

A network port is the virtual location where data goes in a computer. Ports are how computers keep track of different processes and connections; if data goes to a certain port, the computer's operating system knows which process it belongs to. IPsec usually uses port 500.

How does IPsec impact MSS and MTU?

MSS and MTU are two measurements of packet size. Packets can only reach a certain size (measured in bytes) before computers, routers, and switches cannot handle them. MSS measures the size of each packet's payload, while MTU measures the entire packet, including headers. Packets that exceed a network's MTU may be fragmented, meaning broken up into smaller packets and then reassembled. Packets that exceed the MSS are simply dropped.

IPsec protocols add several headers and trailers to packets, all of which take up several bytes. For networks that use IPsec, either the MSS and MTU have to be adjusted accordingly, or packets will be fragmented and slightly delayed. Usually, the MTU for a network is 1,500 bytes. A normal IP header is 20 bytes long, and a TCP header is also 20 bytes long, meaning each packet can contain 1,460 bytes of payload. However, IPsec adds an Authentication Header, an ESP header, and associated trailers. These add 50-60 bytes to a packet, or more.

Learn more about MTU and MSS in "What is MTU?"

Does Cloudflare support IPsec?

Cloudflare supports IPsec as an on-ramp for our Secure Access Service Edge (SASE) solution, Cloudflare One.

To secure traffic, IPsec requires an SA to be set up between two points, creating a tunnel for the traffic to travel through. Depending on the implementation model, this can introduce some challenges. For example, in a mesh model, all nodes (or locations) are connected to each other by dedicated tunnels. However, this requires creating and managing several IPsec tunnels, which is difficult to scale.

Cloudflare, however, uses the Anycast IPsec model. (An Anycast network is one that routes incoming requests to a variety of nodes.) With Anycast IPsec, users only need to set up one IPsec tunnel to Cloudflare to gain connectivity to the over 250+ locations in our global network.

To make Anycast IPsec possible, Cloudflare duplicates and distributes SAs across the servers in the Cloudflare edge network. This means that the entire Cloudflare network functions as a single IPsec tunnel to your network.

Learn more about Anycast IPsec and Cloudflare One.

滴虫性阴道炎用什么药效果最好 肝血虚吃什么食物调理 直升是什么意思 饕餮长什么样 细菌性阴道炎用什么药效果好
雾霾是什么意思 肝囊肿挂什么科 mrd是什么意思 梦见死尸什么预兆 物色是什么意思
璨字五行属什么 动物园里有什么游戏 八院是什么医院 磨砂膏是什么 免疫组织化学染色诊断是什么
佐餐是什么意思 眼痒用什么眼药水 什么食物补锌效果最好 鼻窦炎有什么症状 肛周瘙痒用什么药
尿里有潜血是什么原因hcv7jop7ns3r.cn 不善言辞是什么意思mmeoe.com 脑门痒痒是什么预兆hcv8jop0ns8r.cn 霉菌性阴炎用什么药好得快hcv9jop1ns2r.cn 鱼字五行属什么hcv9jop5ns6r.cn
电解质水是什么sanhestory.com 眼睛不舒服是什么原因引起的mmeoe.com 什么的珍珠hcv8jop4ns9r.cn 睡觉趴着睡是什么原因zhongyiyatai.com 过期的维生素e有什么用途hcv7jop7ns2r.cn
眼袋重是什么原因cj623037.com 帕金森病是什么原因引起的hcv9jop1ns4r.cn 屈原是什么朝代hcv9jop1ns1r.cn 梦见枪毙人是什么意思hcv9jop7ns4r.cn 高血压什么症状表现hcv9jop6ns2r.cn
原始鳞状上皮成熟是什么意思hcv8jop3ns9r.cn 梦见种地是什么意思hcv9jop4ns5r.cn 榜眼是什么意思hcv9jop4ns8r.cn 生理期可以吃什么水果hcv8jop2ns5r.cn 塑料是什么材料ff14chat.com
百度