Improve company productivity with a Business Account.Sign Up


IKE Phase 1

Posted on 2011-02-16
Medium Priority
Last Modified: 2012-05-11
Which of the following happens during IKE phase 1 (Two only):

1. Diffe Hellman exchange
2. IPSEC SA establishment
3. Negotiate IPSEC security policies
4.  Negotiate IKE policy and authenticate peers
5. Perform an optional Diffe-Hellman exchange
Question by:totaram
LVL 18

Expert Comment

ID: 34912501
this looks like homework. the answer can be found with google or wikipedia. let us know if you do not understand the results.


Expert Comment

ID: 34912521
1 & 4

Expert Comment

ID: 34913076
1 & 4
Easily Design & Build Your Next Website

Squarespace’s all-in-one platform gives you everything you need to express yourself creatively online, whether it is with a domain, website, or online store. Get started with your free trial today, and when ready, take 10% off your first purchase with offer code 'EXPERTS'.


Author Comment

ID: 34913078
It does look like HW, but ironically the answer is 1.3 and was not sure....

Accepted Solution

Waseems earned 500 total points
ID: 34913125
IPSec policy negotiation happen in Phase 2 after IKE is successful 1st router negotiate IKE policies to select mode (aggressive or main mode) then authenticating other parity using (certificate or preshared key) then it uses Diffe Hellman to securly exchange IKE SA once this done IPsec policies negotiate happens and then Ipsec SA exchanged

Featured Post

Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

It's not just another paperwork submission. Serious planning and rigour to managing the whole thought processes need to be put in place. The intent is not on drilling into the details, but to share tips in getting the first thing right to kick-start…
The Windows Firewall provides an important layer of protection and a rich interface to configure it. Unfortunately, it lacks item level filtering. This article details my process of implementing firewall-as-code to reduce GPO bloat.
Sending a Secure fax is easy with eFax Corporate ( First, just open a new email message. In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

595 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question