We have a Fortigate in HQ connected to a bunch of branch offices with IPsec VPN in a hub & spoke configuration.
Speeds varies from 10mbps to 100 mbps pr. Branch office.
Currently phase2 is set up with: aes128 and SHA256.
Fortigate now supports AES GCM and can be used in phase2 for IPsec VPN tunnels.
There something new & fancy out there, but I have no idea if it's better.
Hope some of you in here can enlighten me :)
1. Does GCM provide better throughput and/or is less CPU intensive?
2. Does it provide better security?
Understand the principle of encryption but not the inner workings, please take that into consideration.
Regards.
* FortigateVPNInternet Protocol Security
Last Comment
btan
8/22/2022 - Mon
John
A VPN tunnel usually delivers the slow side of an ADSL link. You are probably getting the speed (10 Mbits/sec) that you can. The type of encryption affects security but not speed so much. Your encryption looks fine.
I have not yet used AES GCM so cannot comment on that part.
gheist
Last time I measured it was 2-3Gbps with AES+SHA2 per AES-NI CPU core, well in excess of your needs. There is no weaknesses solved by bigger encryption blocks, small ones should be fine too if you can measure speed difference (you need at least 10GbE network to saturate CPU)
I have not yet used AES GCM so cannot comment on that part.