Mani Raj Paul - Interesting Traffic
Interesting Traffic
traffic is deemed interesting is part of formulating a security policy for use of a VPN. The policy is then implemented in the configuration interface for each particular IPSec peer. For example, in Cisco routers and PIX Firewalls, access lists are used to determine the traffic to encrypt.
IKE Phase One
The basic purpose of IKE phase one is to authenticate the IPSec peers and to set up a secure channel between the peers to enable IKE exchanges. IKE phase one performs the following functions:
- Authenticates and protects the identities of the IPSec peers
- Sets up a secure tunnel to negotiate IKE phase two parameters
IKE phase one occurs in two modes:
- Main mode
- Aggressive mode
IKE Phase Two
The purpose of IKE phase two is to negotiate IPSec SAs to set up the IPSec tunnel
IPSec Encrypted Tunnel
After IKE phase two is complete and quick mode has established IPSec SAs, information is exchanged by an IPSec tunnel.
Tunnel Termination
IPSec SAs terminate through deletion or by timing out
Comments
Post a Comment