Solved

IKE Phase 1

Posted on 2011-02-16
6
1,319 Views
Last Modified: 2012-05-11
Which of the following happens during IKE phase 1 (Two only):

1. Diffe Hellman exchange
2. IPSEC SA establishment
3. Negotiate IPSEC security policies
4.  Negotiate IKE policy and authenticate peers
5. Perform an optional Diffe-Hellman exchange
0
Comment
Question by:totaram
6 Comments
 
LVL 18

Expert Comment

by:decoleur
ID: 34912501
this looks like homework. the answer can be found with google or wikipedia. let us know if you do not understand the results.

-t
0
 
LVL 4

Expert Comment

by:bjove
ID: 34912521
1 & 4
0
 
LVL 7

Expert Comment

by:Waseems
ID: 34913076
1 & 4
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 

Author Comment

by:totaram
ID: 34913078
It does look like HW, but ironically the answer is 1.3 and was not sure....
0
 
LVL 7

Accepted Solution

by:
Waseems earned 125 total points
ID: 34913125
IPSec policy negotiation happen in Phase 2 after IKE is successful 1st router negotiate IKE policies to select mode (aggressive or main mode) then authenticating other parity using (certificate or preshared key) then it uses Diffe Hellman to securly exchange IKE SA once this done IPsec policies negotiate happens and then Ipsec SA exchanged
0
 
LVL 4

Expert Comment

by:bjove
ID: 34913314
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
SonicWall Max Connection Setting 7 45
SOC, SIEM, IPS and FW 4 52
Palo Alto site-to-site vpn monitoring 5 53
FSRREMOS 7 63
It’s the first day of March, the weather is starting to warm up and the excitement of the upcoming St. Patrick’s Day holiday can be felt throughout the world.
Ransomware is a malware that is again in the list of security  concerns. Not only for companies, but also for Government security and  even at personal use. IT departments should be aware and have the right  knowledge to how to fight it.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

697 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question