Solved

IKE Phase 1

Posted on 2011-02-16
6
1,301 Views
Last Modified: 2012-05-11
Which of the following happens during IKE phase 1 (Two only):

1. Diffe Hellman exchange
2. IPSEC SA establishment
3. Negotiate IPSEC security policies
4.  Negotiate IKE policy and authenticate peers
5. Perform an optional Diffe-Hellman exchange
0
Comment
Question by:totaram
6 Comments
 
LVL 18

Expert Comment

by:decoleur
ID: 34912501
this looks like homework. the answer can be found with google or wikipedia. let us know if you do not understand the results.

-t
0
 
LVL 4

Expert Comment

by:bjove
ID: 34912521
1 & 4
0
 
LVL 7

Expert Comment

by:Waseems
ID: 34913076
1 & 4
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 

Author Comment

by:totaram
ID: 34913078
It does look like HW, but ironically the answer is 1.3 and was not sure....
0
 
LVL 7

Accepted Solution

by:
Waseems earned 125 total points
ID: 34913125
IPSec policy negotiation happen in Phase 2 after IKE is successful 1st router negotiate IKE policies to select mode (aggressive or main mode) then authenticating other parity using (certificate or preshared key) then it uses Diffe Hellman to securly exchange IKE SA once this done IPsec policies negotiate happens and then Ipsec SA exchanged
0
 
LVL 4

Expert Comment

by:bjove
ID: 34913314
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Enterprise Password Manager Suites as well as Local Password managers are covered in this article.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question