IPsec Ciphers List

Overview

In this article, you will get a full list of IPsec ciphers supported by Acreto platform.

Problem statement

When configuring IPsec connectivity to a Gateway, you can encounter issues during negotiation of IPsec ciphers.

Info

Example errors in IPsec logs: NO_PROPOSAL_CHOSEN

Solutions

To see recommended ciphers, display details of your Gateway on the Acreto Platform and check Recommended Ciphers in the VPN Parameters section.

Note

An example of recommended ciphers:

  • IKE: aes256gcm16-sha256-ecp256
  • ESP: aes256gcm16-sha256-ecp256

Show recommended ciphers Show recommended ciphers

Show recommended ciphers Show recommended ciphers

Animated GIF - how to checj recommended ciphers Animated GIF - how to checj recommended ciphers

Solution 2: Use all supported ciphers

This solution allows the Acreto IPSec tunnel to support all supported ciphers.

  1. Ensure that checkbox “Allow all supported ciphers” in Gateway definition on Acreto platform is checked

    Allow all supported ciphers Allow all supported ciphers

    Allow all supported ciphers Allow all supported ciphers

  2. Ensure your Ecosystem has been committed

  3. On your end, select one of the supported ciphers

All combinations of allowed algorithms can be found here:

Below you can find a list of all ciphers supported by Acreto.

Encryption

  • aes256gcm16
  • aes256
  • aes256ctr
  • aes256ccm16
  • aes128gcm16
  • aes128[!]
Note

We consider aes128 as insecure, but we still have it supported for legacy systems, as per user request.

DH groups

  • ecp384
  • ecp256
  • ecp512
  • modp4096
  • modp6144
  • modp8192
  • modp2048
  • modp3072

Integrity

  • sha384
  • sha256
  • sha512

FAQ - Frequently Asked Questions

Which SHA-2 ciphers are supported by Acreto IPsec?

We support the following ciphers from the SHA-2 family:

  • SHA-256
  • SHA-384
  • SHA-512

See also

A list of default ciphers is created based on guidelines from: