This topic lists the supported phase 1 (ISAKMP) and phase 2 (IPSec) configuration parameters for Site-to-Site VPN. Oracle chose these values to maximize security and to cover a wide range of CPE devices. If the CPE device isn't on the list of verified devices, use the information here to configure the device.
You can also use the CPE Configuration Helper to gather information that a network engineer uses when configuring the CPE device.
Important
Oracle uses asymmetric routing across the tunnels that make up the IPSec connection. Even if you configure one tunnel as primary and another as backup, traffic from a VCN to an on-premises network can use any tunnel that's "up" on a device. Configure firewalls as appropriate. Otherwise, ping tests or application traffic across the connection won't reliably work.
Supported Encryption Domain or Proxy ID
The values for the encryption domain (also known as a proxy ID, security parameter index (SPI), or traffic selector) depend on whether a CPE supports route-based tunnels or policy-based tunnels. For more information about the correct encryption domain values to use, see Supported Encryption Domain or Proxy ID.
Custom IKE and IPSec Parameters
When using custom internet key exchange (IKE) or IPSec parameters, if you select
custom phase 1 proposals the CPE must be configured to accept the exact proposal. A
mismatch prevents IKE from setting up the IPSec tunnel phase one security
association.
For custom phase 2 IPSec proposals, expect the following behavior:
When Oracle initiates a new phase 2 IPSec security association, IKE only
proposes the custom values.
When the CPE initiates a new phase 2 IPSec security association, the phase 2
security association is established as long as Oracle supports the
parameters.
Oracle IKE Initiation and IP Fragments
The default set of Oracle IKE parameter proposals is too large to fit into a single
UDP packet, so the Oracle end of the IPSec connection fragments the initiation
request. To successfully initiate a new IKE security association, any firewall or
security list between the Oracle VPN Public IP and the CPE must allow IP
fragments.
Supported Parameters for the Commercial Cloud
This section lists the supported parameters for Site-to-Site VPN in the commercial cloud. For a list of the commercial cloud regions, see Regions and Availability Domains.
For some parameters, Oracle supports several values, and the recommended one is noted.
Oracle supports the following parameters for IKEv1 or IKEv2. Check the documentation for a particular CPE to confirm which parameters the CPE supports for IKEv1 or IKEv2.
Phase 1 (ISAKMP)
Parameter
Options
ISAKMP Protocol
Version 1
Exchange type
Main mode
Authentication method
Pre-shared keys *
Encryption algorithm
AES-256-CBC (recommended)
AES-192-CBC
AES-128-CBC
Authentication algorithm
SHA-2 384 (recommended)
SHA-2 256
SHA-1 (also called SHA or SHA1-96) **
Diffie-Hellman group
group 2 (MODP 1024-bit)
group 5 (MODP 1536-bit)
group 14 (MODP 2048-bit)
group 19 (ECP 256-bit random)
group 20 (ECP 384-bit random) (recommended)
IKE session key lifetime
28800 seconds (8 hours)
* Only numbers, letters, and spaces are allowed characters in
pre-shared keys.
** We recommend against the use of SHA-1. NIST formally deprecated use of SHA-1 in 2011 and disallowed its use for digital signatures in 2013.
Phase 2 (IPSec)
Parameter
Options
IPSec Protocol
ESP, tunnel mode
Encryption algorithm
AES-256-GCM (recommended)
AES-192-GCM
AES-128-GCM
AES-256-CBC
AES-192-CBC
AES-128-CBC
Authentication algorithm
If using GCM, no authentication algorithm is required because
authentication is included with GCM encryption.
If not using GCM, the following options are supported:
HMAC-SHA-256-128 (recommended)
HMAC-SHA1-128 *
IPSec session key lifetime
3600 seconds (1 hour)
Perfect Forward Secrecy (PFS)
Enabled, group 5 (default, recommended)
Supports disabled and enabled for group 2, 5, 14, 19, 20, 24.
* We recommend against the use of SHA-1. NIST formally deprecated use of SHA-1 in 2011 and disallowed its use for digital signatures in 2013.