WireGuard VPN FAQs: Difference between revisions
From Edge Threat Management Wiki - Arista
Jump to navigationJump to search
Bcarmichael (talk | contribs) |
No edit summary |
||
(One intermediate revision by one other user not shown) | |||
Line 1: | Line 1: | ||
[[Category:FAQs]] | [[Category:FAQs]] | ||
=== How resilient is a WireGuard connection? === | === How resilient is a WireGuard connection? === | ||
Line 10: | Line 6: | ||
=== What cryptography is used in WireGuard? === | === What cryptography is used in WireGuard? === | ||
ChaCha20 | WireGuard uses several ciphers including ChaCha20, Curve25519, BLAKE2s, SipHash24, and HKDF. For more details refer to the [https://www.wireguard.com/protocol/ WireGuard Protocol & Cryptography documentation]. | ||
BLAKE2s | |||
SipHash24 | |||
HKDF | |||
=== What transport protocol and port does WireGuard use? === | === What transport protocol and port does WireGuard use? === | ||
WireGuard encapsulates and encrypts all data using UDP with default port 51820. There is a built-in access rule to allow WireGuard traffic on this port. | WireGuard encapsulates and encrypts all data using UDP with default port 51820. There is a built-in access rule to allow WireGuard traffic on this port. |
Latest revision as of 21:47, 14 September 2023
How resilient is a WireGuard connection?
WireGuard is built for roaming. If your device changes networks, e.g. from WiFi to a mobile/cellular, the connection will persist because as long as the client sends correctly authenticated data to the WireGuard VPN server, the server keeps the connection alive.
What cryptography is used in WireGuard?
WireGuard uses several ciphers including ChaCha20, Curve25519, BLAKE2s, SipHash24, and HKDF. For more details refer to the WireGuard Protocol & Cryptography documentation.
What transport protocol and port does WireGuard use?
WireGuard encapsulates and encrypts all data using UDP with default port 51820. There is a built-in access rule to allow WireGuard traffic on this port.