IPsec VPN

Quick and easy site to site communication

IPsec leverages powerful encryption algorithms in order to protect your data as it passes over the public internet.

Quick to implement, flexible, and secure, Point to Point IPsec VPN’s represent the simplest, and least intrusive, way to connect two or more remote locations, when scalability and high throughput are not the primary concerns.

IPsec explained

IPsec (Internet Protocol Security) is not a protocol in itself, but rather an umbrella term for a suite of protocols that, when combined, secure traffic at the IP layer. The ultimate aim is to simulate the functionality you would get from connecting two remote locations by a single (potentially very long) cable.

HOW DOES IT WORK? ...

A dialogue is initiated between the two ends of the point to point link, they negotiate the initial security settings, and exchange authentication information, either in the form of digital certificate or, more commonly, a pre-shared key. When authentication has been successful a tunnel is established between the routers. Traffic sent over this tunnel is encrypted using one of a number of pre-defined cryptographic algorithms. This makes the contents unreadable to anyone that intercepts the traffic.

WHY DO YOU NEED IT? ...

A VPN allows you share resources between sites seamlessly. With a VPN everything available to you in your head office could potentially be available to your branch office as well. IPsec gives you the added peace of mind from knowing your data is secure as is traverses the internet.

*Please note certain routers may require an additional licence in order to enable VPN functionality.

    ARE IPsec VPNs RIGHT FOR YOU? ...

    IPsec VPNs are perfect for small scale deployments with only a one or two remote sites, or as an interim solution when migrating to other technologies such as MPLS.IPsec relies on processor intensive cryptographic algorithms in order secure data transmission; as such the throughput of a VPN is often lower than normal maximum throughput of your hardware. IPsec VPNs also incur larger transmission overheads, reducing the efficiency of this type of VPN connection.

    Network Security

    Spitfire FWaaS provides a fully managed, Unified Threat Managed service to secure your network perimeter.

    Gophers create a complex network of private underground tunnels that are intrinsic to their protection and survival.

    Make your site to site connections more secure with a Spitfire IPsec VPN

    Gophers create a complex network of private underground tunnels that are intrinsic to their protection and survival.

    Make your site to site connections more secure with a Spitfire IPsec VPN

    Gophers create a complex network of private underground tunnels that are intrinsic to their protection and survival.

    Make your site to site connections more secure with a Spitfire IPsec VPN