What is IPsec? Internet Protocol Security Explained
IPsec (Internet Protocol Security) is a suite of protocols that authenticates and encrypts every IP packet flowing between two endpoints. It's defined across RFC 4301 onwards and it's the standard way merchants and processors build site-to-site VPN tunnels for sending card data over the public internet under PCI DSS Requirement 4.
IPsec (Internet Protocol Security) is a suite of network-layer protocols that authenticates and encrypts each IP packet travelling between two endpoints. It runs in two modes: transport mode protects only the packet payload and is used host-to-host, while tunnel mode wraps the entire packet inside a new one and is what powers site-to-site and remote-access VPNs. PCI DSS Requirement 4 lists IPsec VPN as an acceptable way to transmit cardholder data across open, public networks, which is why it still underpins most acquirer and processor links.
IPsec, sometimes called an IP-layer VPN, sits below the application layer. That's the bit that matters for payments. TLS protects a single application connection (one HTTPS request, one API call). IPsec protects every packet leaving one network for another, no matter what application sent it. So when a merchant data centre talks to its processor over a leased private link, an IPsec tunnel can carry authorisation traffic, settlement files, batch reconciliation, and management traffic all at once, without each app having to worry about its own crypto.
How IPsec actually works
Three components do the work. The Authentication Header (AH) confirms a packet hasn't been tampered with and came from who it claims, but doesn't encrypt it. Encapsulating Security Payload (ESP) is the one most deployments use — it encrypts the payload (and in tunnel mode, the whole packet) and can also authenticate it. Internet Key Exchange version 2 (IKEv2) is the negotiation layer: it's how the two endpoints agree on which ciphers to use, prove their identities to each other, and rotate keys before they get stale.
Once the tunnel is up, packets get rewritten on the way out and rewritten back on the way in. Anyone sniffing the public internet between the two sites just sees encrypted blobs with the public IPs of the two gateways on them — they can't tell whether it's a card authorisation or someone's email.
Where IPsec shows up in payments
Card processing has used IPsec for the better part of two decades, mostly because acquirers wanted private connectivity to their merchants without the cost of actual leased lines. A typical pattern looks like this:
- Merchant data centre to acquirer or processor — the classic site-to-site IPsec tunnel, usually carrying ISO 8583 authorisation messages, settlement batches, and chargeback files
- POS estate to head office — store routers terminate an IPsec tunnel back to a central concentrator, so card data captured at the till never crosses the public internet in clear
- Cloud workload to on-prem — when a payment app runs in a VPC and needs to talk to a legacy on-prem CRM or ledger
- Remote engineer to production — a few processors still require IPsec remote-access VPN before you can hit the management plane of card systems
For a PCI DSS assessor, an IPsec tunnel is one of the easier ways to satisfy Requirement 4. The cipher suite has to be current (AES-GCM, SHA-256 or better, 2048-bit RSA or ECDSA for IKE auth — DES, MD5, and weak Diffie-Hellman groups are out), the keys have to rotate, and you need to be able to prove all of that. But it's a well-trodden path.
IPsec vs TLS
The honest answer is most new payment integrations skip IPsec and use TLS 1.2 or 1.3 over HTTPS. It's simpler — there's no tunnel to provision, no NAT-traversal headaches, no certificate exchange between two firewalls. A REST API call to an acquirer goes out over the internet protected by TLS, the same way any other web traffic does.
Where IPsec still wins is on the older, chattier links. A site-to-site tunnel is one piece of infrastructure protecting hundreds of flows; TLS would have to be set up, monitored, and renewed for each one. So you'll see TLS for new gateway APIs and IPsec for the legacy 24/7 batch and authorisation links that processors aren't in a hurry to re-platform.
What it means for phone payments
For Paytia and other contact-centre payment platforms, IPsec rarely shows up in the customer-facing path — that's all TLS now. Where it does matter is the back-end leg: the encrypted card data leaving our PCI DSS Level 1 environment for the acquiring bank. Whether that hop runs over IPsec or TLS depends entirely on the acquirer's preference, and several of the larger UK acquirers still mandate IPsec for production card flows.
The customer-to-Paytia leg of every payment is TLS — that's what your phone and our DTMF capture infrastructure speak. Where IPsec tends to come in is the next hop: from our PCI DSS Level 1 platform through to the acquiring bank or processor. Several UK acquirers still prefer IPsec site-to-site tunnels for production card traffic, and we run those alongside TLS-based gateway APIs depending on what each acquirer requires.
For merchants, this is mostly invisible — you don't have to stand up a VPN to use DTMF masking or contact centre payments. The card data is captured by us, encrypted in transit, and forwarded to the acquirer over whichever protected channel they've certified. The PCI scope reduction comes from removing card data from your environment, not from the choice of transport on our side.
Frequently Asked Questions
Is IPsec the same as a VPN?
IPsec is one of the protocols a VPN can be built on. When people say 'VPN' they usually mean either an IPsec tunnel or an SSL/TLS-based VPN. IPsec works at the network layer and protects every packet; TLS-based VPNs work above it and tend to protect specific applications.
Does PCI DSS require IPsec?
No. PCI DSS Requirement 4 says cardholder data must be protected by strong cryptography over open networks, and it lists IPsec as one acceptable mechanism. TLS 1.2 or higher is just as acceptable, and most modern integrations use it instead.
What's the difference between IPsec transport mode and tunnel mode?
Transport mode encrypts only the packet payload and leaves the original IP header readable — it's used for direct host-to-host traffic. Tunnel mode encrypts the whole original packet and wraps it inside a new one, which is what makes site-to-site and remote-access VPNs possible.
Is IPsec still being used for card payments in 2026?
Yes, especially for site-to-site links between merchant data centres and acquiring banks. New API integrations almost always use TLS now, but the older authorisation and settlement flows that move billions of pounds a day still ride IPsec tunnels.
See how Paytia handles ipsec (internet protocol security)
Book a personalised demo and we'll show you how our platform works with your setup.
Trusted by law firms, insurers, healthcare providers and regulated businesses worldwide. Learn more about Paytia