EMAIL SUPPORT

dclessons@dclessons.com

LOCATION

US

Viptela Security Components

Viptela Security Components

In order to see the Security in SD-WAN, first we should sow what are the issue with traditional method of securing networks.

  • Very little security options on authenticating of devices who are involved in communication
  • Manual intervention for generating keys and passwords for securing link between devices
  • Less Securely scalable and high available solutions

Viptela Security Components

There are following three Viptela security components used to secure Viptela overlay network infrastructure.

  • Authentication: It allow only authentic devices to send traffic to each other.
  • Encryption: All communication between devices are encrypted, secure.
  • Integrity: No group keys and key servers are involved in providing security including infrastructure

In Viptela network, the connection between devices like vBond, vSmart, vEdge in control plane and data plane are provided by Secure DTLS or TLS and IPsec method.

Security Provided by NAT Devices

In order to enhance security at branch side, a branch vEdge router can also be installed behind any NAT device. Now in this case, vEdge router can interact with NAT devices configured with method like Session Traversal Utilities for NAT (STUN) given below:

Full-Cone-NAT or One to One NAT: In this internal IP address and port is mapped to external IP address and Port.

Address-Restricted cone NAT or restricted-cone-NAT: In this internal IP address and port is mapped to external IP address and Port, but external host can send packets to the internal device only if external address has received a packet from internal address and port.

Port-restricted cone NAT: This method is highly restricted than the above NAT method, in which external host can send packet to internal address and port only if external address and port pair has received a packet from that internal address and port. In this external device must send packet from specific port to internal specific port.

Symmetric NAT:

In this each single request from same internal IP and Port to external IP and port is mapped to a unique external source IP address and port uniquely. Now when external host that receive packets from internal host can send a packet back.

In Cisco Viptela network, only one end of the NAT devices at either side of tunnel can use symmetric NAT. VEdge router behind Symmetric NAT cannot establish BFD tunnel with remote vEdge router that is behind Symmetric NAT, Port-restricted cone NAT, Address-Restricted cone NAT.

Security for Connections to External Devices

Viptela vEdge router uses Internet Key Exchange (IKE) when IPSEC tunnel between a devices with in overlay network and a device which is external to overlay network. Viptela Device uses IKEv2 to provide CIA feature that is Confidentially , data Integrity , and Authentication .

GENERAL FAQ

Traditional networks rely heavily upon hand-written key management as well as device identification. This makes them more difficult to expand and less reliable when high availability is needed.

Viptela security is built around three components of security: authentication, encryption, and integrity. Together, they guarantee security by ensuring that only authorized devices are able to communicate and that all data is secured.

All communications that occur between vBond, vSmart, and vEdge devices are protected by either DTLS as well as TLS to protect the control plane, as well as IPsec in the data plane. This shields the traffic from interference or interference.

Yes. The vEdge router can function behind NAT devices by using STUN-based strategies. It can support full-cone, restricted-cone, and port-restricted cone NAT kinds, but with a few limitations.

One side only may utilize the symmetric NAT. A vEdge router that is behind the symmetric NAT type cannot create BFD tunnels by combining with another vEdge behind a restricted or symmetric type of NAT.

When connecting to devices outside the vEdge router employs IPsec and IKEv2. This ensures privacy, security, and security for the traffic that leaves an SD-WAN layer.


Comment

    You are will be the first.

LEAVE A COMMENT

Please login here to comment.