IPSEC in SD-WAN | Challenges and Considerations

Ronald BartelsRonald Bartels
6 min read

IPSEC (Internet Protocol Security) has long been a cornerstone of secure networking, providing encryption and authentication for data transmitted over untrusted networks. In the context of Software-Defined Wide Area Networking (SD-WAN), IPSEC is commonly used to establish secure tunnels between branch offices, data centers, and cloud environments. However, while IPSEC remains a critical component for securing SD-WAN deployments, its complexities and limitations pose significant challenges. This chapter explores the role of IPSEC in SD-WAN, its operational pain points, and why emerging alternatives like WireGuard are gaining traction.

The Role of IPSEC in SD-WAN

SD-WAN leverages IPSEC to create encrypted tunnels over the public internet, ensuring data confidentiality and integrity for enterprise traffic. Unlike traditional MPLS networks, which rely on private circuits, SD-WAN uses broadband, LTE, or other cost-effective links, with IPSEC providing the security needed to protect sensitive data. IPSEC tunnels in SD-WAN are typically configured to connect branch offices to central hubs or cloud resources, enabling secure communication in a distributed network.

IPSEC operates in two modes: Tunnel Mode, which encrypts the entire IP packet, and Transport Mode, which encrypts only the payload. In SD-WAN, Tunnel Mode is more common, as it encapsulates the original packet within a new IP header, making it suitable for site-to-site VPNs. IPSEC uses protocols like Encapsulating Security Payload (ESP) for encryption and Authentication Header (AH) for integrity, often combined with Internet Key Exchange (IKE) for secure key management.

Challenges of Using IPSEC in SD-WAN

While IPSEC is a proven technology, its integration into SD-WAN environments introduces several challenges that can frustrate network administrators and impact performance.

1. Complexity of Configuration & Management

IPSEC is notoriously complex to configure and maintain. Setting up an IPSEC tunnel requires defining parameters such as encryption algorithms (e.g., AES), authentication methods (e.g., SHA), key exchange protocols (e.g., IKEv1 or IKEv2), and security associations (SAs). Mismatches in these settings between endpoints can lead to tunnel failures, requiring hours of troubleshooting. For SD-WAN deployments with hundreds or thousands of sites, manually managing IPSEC configurations becomes a logistical nightmare, often described as a "networking pain that makes you question your life choices" (Amastélek, 2023).

2. Performance Overhead

IPSEC introduces significant processing overhead due to encryption and decryption, particularly in large-scale SD-WAN deployments. Each packet must be encapsulated, encrypted, and authenticated, which can strain the CPU and memory of edge devices, especially low-cost routers used at branch sites. This overhead can lead to latency and reduced throughput, undermining the performance benefits SD-WAN promises over traditional WANs.

3. Scalability Issues

As enterprises expand their SD-WAN deployments, the hub-and-spoke model often relies on IPSEC tunnels terminating at a central firewall or hub. However, scaling this architecture is challenging. A single firewall managing hundreds of IPSEC tunnels can become a bottleneck, as it struggles to handle the computational load of encryption and key management. This is likened to "hiring drunken security guards" to manage a high-traffic network, where performance and reliability suffer (Amastélek, 2023).

4. Compatibility & Interoperability

IPSEC’s flexibility in supporting various encryption algorithms and configurations is a double-edged sword. Different vendors implement IPSEC differently, leading to interoperability issues when connecting SD-WAN devices from multiple vendors. For example, a Cisco SD-WAN appliance may struggle to establish a stable tunnel with a Fortinet firewall due to mismatched IKE settings or proprietary extensions. This lack of standardization complicates multi-vendor environments, a common reality in modern enterprises.

The Rise of Alternatives | Why WireGuard is Gaining Traction

Recent advancements in networking have highlighted the limitations of IPSEC, paving the way for modern alternatives like WireGuard. WireGuard, a newer VPN protocol, is gaining popularity in SD-WAN deployments due to its simplicity, performance, and security.

Simplicity & Ease of Use

Unlike IPSEC, which requires configuring multiple parameters, WireGuard uses a streamlined approach with minimal configuration. It employs a single cryptographic suite (ChaCha20 for encryption, Poly1305 for authentication), reducing the risk of misconfiguration. WireGuard’s configuration files are human-readable and concise, making it easier to deploy and manage in large-scale SD-WAN environments (Amastélek, 2024).

Performance Advantages

WireGuard is designed for efficiency, with a lightweight codebase and minimal overhead. It performs encryption and authentication faster than IPSEC, resulting in lower latency and higher throughput. This is particularly beneficial for SD-WAN, where edge devices often have limited processing power. WireGuard’s performance makes it a compelling choice for organizations prioritizing speed and scalability.

Security & Modern Cryptography

WireGuard uses state-of-the-art cryptography, including Curve25519 for key exchange and BLAKE2 for hashing, which are considered more secure and efficient than IPSEC’s older algorithms. Additionally, WireGuard’s smaller codebase (around 4,000 lines compared to IPSEC’s hundreds of thousands) reduces the attack surface, making it less prone to vulnerabilities (Amastélek, 2024).

IPSEC in Hosted Firewalls | A Cautionary Tale

Many SD-WAN deployments rely on hosted firewalls to terminate IPSEC tunnels, centralizing security and traffic management. However, this approach has significant drawbacks. Hosted firewalls often struggle to scale with the dynamic nature of SD-WAN, where traffic patterns shift based on application needs or network conditions. A single firewall managing multiple IPSEC tunnels can become a single point of failure, leading to performance degradation or outages. As noted, this is akin to relying on “drunken security guards” who can’t keep up with the demands of a modern network (Amastélek, 2023).

Moreover, hosted firewalls with IPSEC tunnels often lack the flexibility to support SD-WAN’s application-aware routing. SD-WAN is designed to optimize traffic based on real-time conditions, such as latency or bandwidth availability, but rigid IPSEC configurations can hinder this dynamic routing, reducing the overall effectiveness of the SD-WAN solution.

Debunking Myths | SD-WAN is More Than IPSEC

A common misconception is that SD-WAN is merely “branch networking with IPSEC.” This oversimplification ignores SD-WAN’s broader capabilities, such as application-aware routing, centralized orchestration, and integration with cloud services. While IPSEC provides the security foundation, SD-WAN’s value lies in its ability to intelligently manage traffic across diverse links, prioritize critical applications, and simplify network management. Focusing solely on IPSEC undermines the transformative potential of SD-WAN, which is about “saying farewell to the dinosaurs” of rigid, hardware-centric networking (Amastélek, 2023).

Best Practices for Using IPSEC in SD-WAN

To mitigate the challenges of IPSEC in SD-WAN, organizations can adopt the following best practices:

  1. Automate Configuration Management: Use SD-WAN orchestration tools to automate IPSEC tunnel setup and management, reducing human error and administrative overhead.

  2. Optimize Hardware Resources: Deploy edge devices with sufficient processing power to handle IPSEC encryption without compromising performance.

  3. Monitor and Scale: Regularly monitor IPSEC tunnel performance and scale hub resources to avoid bottlenecks. Consider distributed architectures to reduce reliance on a single firewall.

  4. Evaluate Alternatives: Explore WireGuard or other modern VPN protocols for new SD-WAN deployments, especially in environments prioritizing simplicity and performance.

  5. Standardize Configurations: Ensure consistent IPSEC settings across vendors and devices to minimize interoperability issues.

Wrap

IPSEC remains a critical component of SD-WAN, providing the encryption and authentication needed for secure communication over public networks. However, its complexity, performance overhead, and scalability challenges make it a less-than-ideal solution for modern SD-WAN deployments. As alternatives like WireGuard gain traction, organizations must weigh the trade-offs between IPSEC’s established reliability and the simplicity and efficiency of newer protocols. By understanding these challenges and adopting best practices, enterprises can maximize the benefits of SD-WAN while mitigating the pain points of IPSEC.

10
Subscribe to my newsletter

Read articles from Ronald Bartels directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Ronald Bartels
Ronald Bartels

Driving SD-WAN Adoption in South Africa