[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

IKE Phase 1

Posted on 2011-02-16
6
Medium Priority
?
1,375 Views
Last Modified: 2012-05-11
Which of the following happens during IKE phase 1 (Two only):

1. Diffe Hellman exchange
2. IPSEC SA establishment
3. Negotiate IPSEC security policies
4.  Negotiate IKE policy and authenticate peers
5. Perform an optional Diffe-Hellman exchange
0
Comment
Question by:totaram
6 Comments
 
LVL 18

Expert Comment

by:decoleur
ID: 34912501
this looks like homework. the answer can be found with google or wikipedia. let us know if you do not understand the results.

-t
0
 
LVL 4

Expert Comment

by:bjove
ID: 34912521
1 & 4
0
 
LVL 7

Expert Comment

by:Waseems
ID: 34913076
1 & 4
0
Firewall Management 201 with Professor Wool

In this whiteboard video, Professor Wool highlights the challenges, benefits and trade-offs of utilizing zero-touch automation for security policy change management. Watch and Learn!

 

Author Comment

by:totaram
ID: 34913078
It does look like HW, but ironically the answer is 1.3 and was not sure....
0
 
LVL 7

Accepted Solution

by:
Waseems earned 500 total points
ID: 34913125
IPSec policy negotiation happen in Phase 2 after IKE is successful 1st router negotiate IKE policies to select mode (aggressive or main mode) then authenticating other parity using (certificate or preshared key) then it uses Diffe Hellman to securly exchange IKE SA once this done IPsec policies negotiate happens and then Ipsec SA exchanged
0

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

ITIL has an elaborate incident management framework. This article serves as a starter for those who'd like to know more or need to suss out the baseline elements in a typical incident response execution plan on the "need to have" and the "good to ha…
The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

591 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question