Policy-based vs Route-based VPN: What to Choose in 2026 and How to Avoid Pitfalls
Content of the article
- Introduction: why your vpn routing choice determines half your success
- Basic theory: how ipsec gets along with routing
- Policy-based vpn: essence, strengths, and weaknesses
- Route-based vpn: interfaces, dynamics, and scale
- Comparing policy-based and route-based: selection criteria
- Use cases and architectures in 2026
- Configuration practice: popular platforms
- Performance, mtu, and qos
- High availability and monitoring
- Security and compliance
- Testing, troubleshooting, and common mistakes
- Automation and infrastructure as code for vpn
- Economics and choice
- Checklists and best practices
- Real-world cases and solution templates
- Common pitfalls and how to avoid them
- Migration plan: policy-based to route-based without pain
- Faq
Introduction: Why Your VPN Routing Choice Determines Half Your Success
The Debate: Policy-based vs Route-based
Let’s be honest: when building a corporate VPN, the key decision isn’t just which encryption or vendor to pick. The heart of the matter is how to route traffic. Policy-based or route-based? These are two distinct styles, two philosophies. Policy-based relies on rules that specify which traffic to encrypt and where to send it. Route-based creates virtual interfaces and lets the router handle traffic. Sounds simple? On paper, yes; in production, it’s a gamble.
In 2026, the stakes are higher than ever: hybrid clouds, SASE and SD-WAN, IPv6-only segments, and strict observability demands. Traffic bounces between branches, clouds, partners, and remote workers. We need a routing choice that scales, meets regulations, and supports seamless upgrades without SLA hits. And yes, let’s avoid any clunky moves that force engineers to rebuild the plane mid-flight.
In this article, we’ll honestly explore VPN routing types, explain the difference between policy-based and route-based, show where each shines or causes headaches, share practical setup recipes for popular platforms, and provide checklists so you get it right the first time.
Why It Matters More Than Ever
The 2026 trend is unifying the network fabric. Organizations align WAN, cloud VPCs/VNets, and campuses under a single routing, observability, and automation policy. Policy-based IPsec sometimes struggles with this dynamism: end-to-end telemetry, ECMP, BFD, traffic interception for inspection, multicloud with BGP over IPsec — all easier under a route-based architecture. But! When tunnels require strict per-app security over flexibility, policy-based remains king. We’re not about dogma; we advocate for a pragmatic mix.
Meanwhile, growing WireGuard and QUIC tunnels push vendors toward interface-centric models. Even traditional IPsec stalwarts no longer resist: VTI, route-based, SD-WAN fabric — the new normal. So a skilled engineer must understand both sides and blend them elegantly to the task.
Three Common Mistakes That Cause Headaches
First, trying to force policy-based VPN where routing and dynamic protocols clearly fit better. Second, the 'tunnel triangle': building dozens of static links where one evening with BGP would solve half your problems. Third, underestimating MTU and MSS. VPN performance depends on payload. One wrong DF bit setting, and the CEO’s video calls turn into slideshows. Details matter. Always.
Basic Theory: How IPsec Gets Along with Routing
IKE, SA, and Traffic Selectors
IPsec splits into two main parts: IKE (key exchange phase) and SAs (Security Associations), which protect traffic. In IKEv2, we negotiate encryption, authentication, and lifetimes, then create SA pairs for each side. In policy-based setups, an SA selector is a trio: source, destination, and protocol/port. The catch: the more unique pairs and apps you have, the more SAs you grow, making management tricky.
Route-based handles this differently: the selector often becomes 'any-to-any' inside the tunnel, with traffic filtered and routed by firewall policies on interfaces. This adds flexibility, especially for dynamic routing and multipath. Selectors stop being a headache, and you no longer juggle dozens of ACLs for every new service.
SPD, SAD, and Encryption Policies
To know what goes into the VPN, the device checks the SPD (Security Policy Database). It holds traffic matching rules: encrypt with these parameters or pass through openly. The SAD (Security Association Database) stores current SAs — live tunnels with SPI, keys, and lifetimes. In policy-based models, SPD is the glue holding it all together; in route-based, SPD’s simpler since all traffic hitting the tunnel interface is encrypted by default.
Sounds like a win for route-based? Almost. If you need strict isolation with only certain subnets allowed through the tunnel, policy-based lays it out more explicitly. In route-based, you achieve the same via filters and ACLs on interfaces, plus VRFs if needed.
VTI, GRE over IPsec, and Why Interfaces Rule
By 2026, most vendors support VTI — virtual tunnel interfaces providing logical point-to-point links. Assign IPs, run OSPF or BGP, done. GRE over IPsec adds GRE encapsulation inside encryption to support multiprotocol and simplify some scenarios (like multicast), but it adds overhead and MTU considerations. Usually, unless you really need GRE, VTI suffices. Your stack gets simpler, monitoring clearer, automation more direct.
Policy-based VPN: Essence, Strengths, and Weaknesses
How Policies Are Built: ACLs, Crypto Maps, and Selectors
Policy-based VPN works on “if traffic matches this rule, encrypt it.” Practically, ACLs or equivalents define source and destination subnets, sometimes ports and protocols. These rules attach to crypto profiles via crypto maps or similar. Each rule can potentially create a separate SA.
Advantages: clear, transparent isolation. No need for a separate interface. No tunnel IPs, less surface complexity. Downsides: scaling. Once you want dozens of apps tunneled across zones with asymmetric cloud routes, integration headaches start. Rules multiply, and each change becomes "zero-error mode."
Where Policy-based Excels
Policy-based shines for specific tasks. For example, data exchange with one partner: one or two subnets, strict boundaries, minimal dynamics. Or when you have a perimeter firewall mainly doing app inspection and tunnels are secondary. Another case: high-security zones with attack surface minimization — no extra interfaces, everything tightly controlled by explicit selectors.
Some older cloud gateways still prefer policy-based, especially where providers only support selector-based scenarios. Not common, but such cases exist in MPLS/VPN provider infrastructures where policy-based proves more reliable.
Pitfalls and Limitations
The main drawback is flexibility. If you want dynamic routing, ECMP, BFD, or to quickly reroute traffic across clouds based on SLA, policy-based resists. Some vendors have pseudo-dynamic support for policy-based, but that’s compromise, not a smooth ride.
Another headache: NAT and asymmetry. Placing NAT before IPsec risks selector desync. Couple that with varying MTUs across links, and apps mysteriously stall. Also, telemetry is harder: monitoring a tunnel interface beats gathering indirect SA and ACL metrics. In big networks, this feels very real.
Route-based VPN: Interfaces, Dynamics, and Scale
Virtual Tunnel Interfaces and Their Magic
Route-based VPN builds on tunnel interfaces: you assign IPs on each side, then do normal routing. Need OSPF? No problem. BGP? Easily. Multiple paths and load balancing? Bring on ECMP, policy routing, PBR on the interface. Simple: traffic entering the tunnel interface is encrypted. Selectors lose their central role.
Big plus: standard diagnostic tools. Ping, traceroute, SNMP, flow telemetry, real SLA. No more blind fixes; you live like a real network engineer: if an interface flaps, you find out why, alerts fly to NOC and SIEM.
Routing: Static, OSPF, BGP
Static routes still fit small networks. But in 2026, with more than five to ten branches plus cloud, BGP over IPsec is basically the norm. Why not OSPF? It’s fine, especially for simple hub-and-spoke designs. But BGP is more flexible across autonomous segment boundaries, easier to manage paths and announcements, more stable with frequent changes. Plus, major public cloud providers are BGP-friendly on their VPN gateways.
Dynamic routing isn’t just for show. It gives fast failover, smooth subnet additions without manual workarounds, and clear path preference policies. It’s not luxury—it’s business-critical SLO/SLA support.
Performance and Looking Ahead
In 2026 routers and NGFWs hardware-accelerate AES-GCM, many add ChaCha20-Poly1305 for devices lacking AES-NI — awesome. Route-based architecture makes adding tunnels for migrations easier, attaching QoS per interface, applying per-tunnel SLA checks. Plus, SD-WAN usually builds on route-based: centralized management, segmentation, business-policy steering. Policy-based can do this too but costs more time and nerves, especially in mixed environments.
Comparing Policy-based and Route-based: Selection Criteria
Complexity and Scalability
For two offices and three servers, policy-based might be simpler to configure and maintain. But as scale grows, route-based wins. You don’t juggle hundreds of selectors. You work with interfaces, routes, and policies. Human error risk drops. Automation becomes accessible. Meaning fewer late-night crises.
Rule of thumb: if there’s cloud, multiple providers, telemetry demands, and rapid convergence needed — go route-based. For point-to-point partner exchange with strict limits — policy-based.
Security and Transparency
Policy-based is inherently locked down. It encrypts only what’s specified. Auditors appreciate this, and some standards prefer it. Route-based is just as secure but works differently: filtering on interfaces, using zones, VRFs, ACLs. If your team is fluent with firewall policies and segmentation, route-based offers equal control with the bonus of scalability.
Compatibility and Multi-vendor
In mixed-device networks, route-based tends to be more predictable. Selectors and IKE extensions vary by vendor. The interface approach smooths rough edges, especially transitioning to IPv6-only and BGP over IPsec. Still, legacy and service-provider limitations exist where policy-based remains the only option. Common sense and pilots matter.
Use Cases and Architectures in 2026
Branch-to-Branch: From Simple to Mature
Entry level: policy-based between two sites with one or two subnets. Cheap, effective, clear. Mid-level: hub-and-spoke where branches build tunnels to the center. Route-based rules here: you add a branch, start dynamics, announcements flow, policies set at the hub. Mature: two hubs in different regions, ECMP, BFD, SLA on tunnels, traffic interception for inspection, QoS. Almost SD-WAN level—route-based is unmatched.
Hybrid Cloud: AWS, Azure, GCP
Public clouds favor route-based. AWS VGW and Accelerated GW, Azure VPN Gateway, GCP Cloud VPN all speak fluent BGP. You spin up VTI, set ASN, advertise prefixes, done. Some policy-based modes exist, especially in basic SKUs or cross-platform limits, but route-based is easier for flexibility, DR, and multicloud. Many clouds move to IPv6 in VPCs/VNets in 2026, and BGP saves the day for managed prefix announcements.
SD-WAN, SASE, and ZTNA
SD-WAN controllers almost always run overlays on route-based tunnels, whether proprietary protocols or IPsec underneath. SASE integrates on your perimeter, relying on interfaces for metrics export, balanced traffic, and business policy enforcement — all simpler via VTI. ZTNA is a different beast, but hybrid setups need backhaul into your networks, where interfaces again prove convenient. The recipe: mix it up. Use policy-based for sensitive, risky traffic and route-based for everything else and management.
Multi-vendor Connectivity and M&A
Mergers and acquisitions often require rapid network integration. If vendors and policies differ, route-based speeds this up. Just create VTIs, establish BGP, add filtering, and gradually expand the perimeter. If security demands surgical precision, use policy-based for critically limited links initially, then migrate to interface-based once dust settles.
Configuration Practice: Popular Platforms
Cisco: ASA/FTD and IOS-XE
ASA/FTD traditionally prefer policy-based via crypto maps and ACLs. But newer ASA versions support VTI for route-based, though ASA has quirks in diagnostics and management. For many branches and BGP, IOS-XE (ISR/ASR/Catalyst) is better — native VTI, IPsec profiles, DMVPN, FlexVPN. Practice tip: keep policy-based on ASA for simple partner point-to-point cases; run your main network on IOS-XE with VTI and dynamic routing.
Basic steps: define IKEv2 policies and encryption, set IPsec transform-sets/profiles, add VTI with IPs, enable IGP or BGP, apply ACLs or zone-based firewall on tunnel interfaces. Don’t forget MSS clamp and PMTUD.
Juniper SRX and Fortinet FortiGate
SRX excels at route-based with st0 interfaces, solid OSPF/BGP support, and rich policy tools. FortiGate also strong with VTI and BGP over IPsec plus user-friendly GUI wizards that save tired evenings. Both support policy-based, but we recommend it for limited selectors, partner exchanges, or small projects. For enterprise fabric, interfaces and dynamics are the way to go.
Practical tips: On FortiGate, set phase2 selectors to 0.0.0.0/0 in route-based to remove traffic restrictions and filter with policies. On SRX, monitor security zones and policies to/from st0 interfaces to avoid gaps. Always enable DPD.
MikroTik, pfSense/OPNsense, StrongSwan
MikroTik RouterOS 7 greatly improved IPsec and BGP: route-based works well, though interface and monitoring nuances remain. pfSense/OPNsense with StrongSwan offer both: policy-based via Phase 2 with specific networks, route-based via VTI. Advice: if planning cloud or growth, go VTI; otherwise migration can be rough.
StrongSwan on Linux defaults to route-based: create tunnel interfaces (xfrm or vti), configure static routes or BGP (FRRouting), filter with iptables/nftables. For per-app protection and attack surface minimization, keep separate policy-based instances with selectors — but they’re niche.
Cloud: AWS, Azure, GCP
— AWS: Use AWS Site-to-Site VPN with BGP for dynamics. For high throughput, use Accelerated VPN or Transit Gateway; route-based with BGP is the standard. Policy-based is possible for legacy cases.
— Azure: VPN Gateway (RouteBased) supports IKEv2, BGP, and active-active mode. PolicyBased SKUs are niche and limited.
— GCP: HA VPN with BGP is the standard; Classic VPN is legacy. Everywhere: test end-to-end MTU, filter prefix announcements, ensure uptime via dual tunnels and ECMP if supported.
Performance, MTU, and QoS
MTU, MSS, and PMTUD: Small Details, Huge Impact
IPsec adds overhead. VTI and GRE over IPsec add even more. Practically, this reduces effective MTU along the path. Misconfigured DF bits and blocked ICMP 'Fragmentation Needed' messages often break large packets. The fix: enable PMTUD, allow ICMP type 3 code 4, set MSS clamping to 1360–1380 for TCP tunneling overhead, measure safe MTU. Check both ends to avoid asymmetry.
Good practice: document your MTU/MSS settings right next to tunnel configs so no one trips over the same issues later. Keep test templates for sending large packets when tweaking policies.
Cryptography and Hardware Acceleration
By 2026, AES-GCM is hardware-accelerated almost everywhere. ChaCha20-Poly1305 is an excellent alternative on devices lacking AES-NI. Cipher choice affects latency and throughput. Real-world tests show switching from AES-CBC+SHA1 to AES-GCM can yield 20–40% performance gains—and less CPU load, jitter, and happier voice and video.
Remember PFS (Perfect Forward Secrecy): it’s not a checkbox but a crucial security guarantee. IKEv2 over IKEv1 is an undisputed choice. Set SA lifetimes smartly: shorter means safer but don’t overdo it to avoid CPU burnout from frequent key renegotiation.
QoS and Prioritization
Route-based allows applying QoS directly on tunnel interfaces, preserving or rewriting DSCP, and class-based shaping. Policy-based QoS is more vendor-dependent and trickier. If you carry voice/video over VPN, QoS is a must. Don’t hesitate to implement per-tunnel SLA policies: if packet loss exceeds thresholds, failover to another link. That’s sound engineering, not paranoia.
High Availability and Monitoring
DPD, SLA, and BFD: Fast Detection and Reaction
Dead Peer Detection keeps you aware if a peer is alive. For real speed, add BFD over tunnels in route-based setups and integrate it with IGP/BGP. This enables convergence in hundreds of milliseconds instead of seconds. IP SLA or equivalent probes measure actual path quality: latency, jitter, packet loss. Routing decisions then base on real metrics, not guesswork.
Insider tip: set standard timing profiles and thresholds for typical links. Automate responses. Humans analyze, but don’t scramble at 3 a.m.
Active-active, ECMP, and Multipath
If providers allow, set up two tunnels to different access points. ECMP with SLA is standard practice. For critical services, it eliminates single points of failure. Policy-based can sometimes do this but rarely elegantly. Route-based handles multiple interfaces, weights, probes, and load profiles naturally.
Observability: Logs, Flows, Telemetry
In 2026, we live in an era of observable networking. IKE/IPsec logs feed SIEMs, NetFlow/IPFIX from tunnels flow to analytics, interface metrics go to monitoring systems. This isn’t optional. Alerts on SLA degradation and tunnel flaps are mandatory. And yes, craft dashboards beautifully: when you need to quickly show leadership where the pain points lie, visual truth saves the day.
Security and Compliance
Modern Ciphers and Crypto Agility
Choose IKEv2, PFS, and ciphers like AES-GCM or ChaCha20-Poly1305. Drop deprecated algorithms. Update profiles with vendor recommendations. Crypto agility—the ability to quickly switch cipher suites—became a compliance must. Document, test ahead, and keep a switch plan ready.
Certificates instead of pre-shared keys are nearly mandatory in mid-to-large networks. Simplify PKI with ACME or corporate CA integration. This disciplines both engineers and processes.
Segmentation, VRF, and Micro-isolation
VRF in route-based setups is powerful. You can separate tunnels by VRF, apply policies, restrict routes. An attack in one segment won’t spill to another. Policy-based tries similar effects with rulesets but VRF is easier to maintain and explain. Add micro-segmentation via NGFW for a robust 'least necessary access' model.
Audits and Retrospectives
Conduct regular reviews: which selectors remain needed, which routes are redundant, where policies got too broad. Correlate IKE, IPsec, firewall, and BGP logs for a unified picture. Incidents hate noise—don’t give them silence. After each major change, hold retrospectives and record lessons in your playbook.
Testing, Troubleshooting, and Common Mistakes
Tunnel Construction Checkpoints
Check order: Is IKE SA established? Great. Is IPsec SA up? Are selectors and SPD correct? Can you ping over the tunnel interface? Trace routes and verify path visibility? For policy-based, ensure ACLs are precise and NAT doesn’t break selectors. For route-based, verify inbound/outbound ACLs on interfaces and IGP/BGP adjacency.
Then test applications. Layer 7 surprises lurk: MTU, timeouts, reconnects. Build a 'test script' with pings, curl, iperf, and varied packet sizes. Less improvisation means fewer sneaky bugs.
MTU, Fragmentation, and DF Bit
Classic error: blocking ICMP or ignoring DF bits causes silent packet drops. The solution: enable PMTUD, permit ICMP Type 3 Code 4, set MSS clamp, and test both ends. Watch out for asymmetry: 1476 one way, 1454 back, and apps misbehave. This is physics, not voodoo.
NAT Traversal and Asymmetric Routing
NAT-T fixes cases where a peer sits behind NAT but introduces challenges: port collisions, session drift, rare firmware bugs. Keep firmware updated and enable detailed IKE/IPsec diagnostics. Asymmetric routing is a separate pain point: half the flow uses one tunnel, the reply another—stateful firewalls drop responses. Design for symmetry, use per-tunnel policies or session synchronization in clusters.
Automation and Infrastructure as Code for VPN
Terraform, Ansible, and GitOps
Terraform suits clouds and some vendors; Ansible handles network configs; Git is the single source of truth. Route-based automation fits naturally: parameterize tunnel interfaces, ASNs, prefix lists, SLAs. Policy-based is possible but managing many selectors and ACLs needs extra precision and templates.
GitOps approach: all changes via PR, policy checks with linters, automated tests on staging, scheduled deploys during off-peak hours. No, it’s not ‘too complex.’ It’s cheaper than the first big outage.
Testing and Verification
Follow 'validate-before-merge': run tests before changes hit production. Bring up temporary tunnels in staging, check BGP sessions, pings, MTU, QoS marks. For policy-based, verify selectors align with design, no conflicts, NAT handled correctly. For route-based, confirm routes are proper, no VRF leaks, policies match.
Secrets and Security in Automation
Store PSKs and certificates in vaults (HashiCorp Vault, KMS, Kubernetes secrets if using CNI). Never place keys in plain repos. Log who and when changed crypto policies. And most importantly, schedule regular key rotation, not an afterthought.
Economics and Choice
Licenses, Performance, and Hardware
Be upfront: some vendors license VPN tunnels, bandwidth, crypto acceleration separately. Route-based may use more interface objects but isn’t necessarily pricier—platform-dependent. Hardware AES-GCM acceleration saves CPU and costs: less gear for the same SLA. Policy-based can hit performance limits faster on cheaper gear when many SAs exist.
Operational Costs
Life is maintenance. Route-based is cheaper where topology changes, networks grow, and clouds expand. Monitoring, automation, consistent templates are friends. Policy-based wins in small, fixed scenarios. The choice isn’t dogma, it’s a spreadsheet with risks and goals.
The Price of the Wrong Choice
Typical case: a company triples in size with a hundred policy-based tunnels, each with its ACLs. Every change is a minefield. Route-based migration becomes urgent and overnight. Months wasted if they’d planned VTI and dynamics upfront. Reverse cases too: turning interface-based on everywhere, then discovering a partner only allows specific subnets, forcing local ACL complexity. Golden rule: design a hybrid.
Checklists and Best Practices
Choosing Architecture
- Have cloud and growth planned? Pick route-based, VTI, BGP.
- Point-to-point partner exchange? Policy-based with tight selectors.
- Need tunnel SLA? Route-based with IP SLA/BFD.
- Strict segmentation requirements? VRF + interface firewall or tight selectors.
Implementation
- Define crypto policy: IKEv2, PFS, AES-GCM/ChaCha20.
- Check end-to-end MTU, enable PMTUD and MSS clamp.
- For route-based: plan ASN, prefix filtering, BGP attributes.
- For policy-based: minimize selectors, avoid port-specific rules without reason.
Operation
- Send IKE/IPsec logs to SIEM, interface metrics to monitoring, alert on degradation.
- Rotate keys and certificates regularly; update firmware.
- Run autotests after changes, hold incident retrospectives, update playbooks.
- Quarterly audits of routes and access policies.
Real-world Cases and Solution Templates
Case 1: Growing from 20 to 60 Branches in a Year
Started policy-based: two providers, three partners, straightforward. Then 40 new sites and two cloud regions opened in a year. Migrated to route-based: two VTIs per site, BGP with communities, ECMP, VoIP prioritization. Result: sub-second convergence, flexible subnet addition, 30% fewer NOC incidents.
Case 2: Partner with Regulatory Constraints
Partner accepted only policy-based with strict selectors and IKE params. Solution: keep policy-based for that link, use route-based for all internal traffic. Added DSCP tagging and dual inspection on NGFW at perimeter. Set shared SLA monitoring and stress-tested. Everyone happy; no standards rewritten.
Case 3: Migrating IPv4-only to Hybrid IPv6
Clouds and branches gradually enabled IPv6. On route-based VTI, ran BGP with dual address families, carefully advertised prefixes, preserved QoS and telemetry. Tweaked MSS for legacy apps that didn’t like big packets. Transition occurred without downtime thanks to the interface approach running both 'eras' in parallel.
Common Pitfalls and How to Avoid Them
Too Many Selectors
If your policy-based rules list grows faster than your playbook, you’re at risk. Solution: group subnets, raise interface tunnels, shift filtering to firewall policies. Build phased migrations: create parallel route-based channels first, then gradually switch routes.
Blind Spots in Monitoring
Policy-based lacks an interface, so metrics vanish. Don’t ignore this. Extract dedicated telemetry from SAs, use IKE/IPsec system logs, gather NetFlow before/after. Or switch to route-based, where the interface is your best observability friend.
"It Worked — Then Suddenly Broke"
Usually a case of rekey on one side, buggy firmware on the other, or tired NAT-T. Update firmware, enable detailed diagnostics, compare crypto profiles and lifetimes. Keep vendor/version compatibility matrix. Boring but saves sleepless nights.
Migration Plan: Policy-based to Route-based Without Pain
Stepwise Migration
Create parallel VTIs, add static routes with higher administrative cost. Run tests, enable telemetry. Then move parts of your prefixes to BGP with low risk. Ensure interface ACLs align with security policies. Gradually disable policy-based selectors; don’t cut corners.
Quality Control
Agree on SLOs: latency, loss, jitter. Specify how monitoring detects degradations. Enable BFD if supported. Run failover drills intentionally: shut a link, verify convergence, alert thresholds, app behavior. This crash test will save hours of stress.
Communication and Documentation
Document schemes, prefixes, ASNs, crypto policies, MTU/MSS, and troubleshooting commands. Share visuals and checklists with support teams. Set change windows and fallback plans — often what separates controlled migration from chaos.
FAQ
Quick Answers, Part 1
- Question: What to choose for a small office without cloud? Answer: Policy-based if subnets are small and changes rare. Simpler and cheaper.
- Question: What to choose for hybrid cloud with growth? Answer: Route-based with VTI and BGP. Offers flexibility, telemetry, and smoother automation.
- Question: Can approaches be mixed? Answer: Yes, it’s normal. Partners and point integrations on policy-based; main perimeter on route-based.
Quick Answers, Part 2
- Question: How about QoS inside IPsec? Answer: DSCP preservation and interface policy work better in route-based; policy-based depends on vendor and is trickier.
- Question: How to fix large packet stalls? Answer: Enable PMTUD, allow ICMP Fragmentation Needed, configure MSS clamp. Check MTU both ways.
- Question: Is IKEv2 necessary? Answer: Yes. More stable, flexible, secure than IKEv1 and better supported in clouds.
Quick Answers, Part 3
- Question: Dynamics or static routes? Answer: Static fine for five sites. BGP for dozens and cloud. Standard practice today.
- Question: How many tunnels per site? Answer: At least two to different peers/regions for resilience and maintenance without downtime.
- Question: How to convince auditors? Answer: Document crypto policies, segmentation, logs, key rotation procedures. Show access control on interfaces when running route-based.