Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

IKE Phase 1

Posted on 2011-02-16
6
Medium Priority
?
1,352 Views
Last Modified: 2012-05-11
Which of the following happens during IKE phase 1 (Two only):

1. Diffe Hellman exchange
2. IPSEC SA establishment
3. Negotiate IPSEC security policies
4.  Negotiate IKE policy and authenticate peers
5. Perform an optional Diffe-Hellman exchange
0
Comment
Question by:totaram
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 18

Expert Comment

by:decoleur
ID: 34912501
this looks like homework. the answer can be found with google or wikipedia. let us know if you do not understand the results.

-t
0
 
LVL 4

Expert Comment

by:bjove
ID: 34912521
1 & 4
0
 
LVL 7

Expert Comment

by:Waseems
ID: 34913076
1 & 4
0
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

 

Author Comment

by:totaram
ID: 34913078
It does look like HW, but ironically the answer is 1.3 and was not sure....
0
 
LVL 7

Accepted Solution

by:
Waseems earned 500 total points
ID: 34913125
IPSec policy negotiation happen in Phase 2 after IKE is successful 1st router negotiate IKE policies to select mode (aggressive or main mode) then authenticating other parity using (certificate or preshared key) then it uses Diffe Hellman to securly exchange IKE SA once this done IPsec policies negotiate happens and then Ipsec SA exchanged
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question