Mani Raj Paul - Interesting Traffic

Interesting Traffic

traffic is deemed interesting is part of formulating a security policy for use of a VPN. The policy is then implemented in the configuration interface for each particular IPSec peer. For example, in Cisco routers and PIX Firewalls, access lists are used to determine the traffic to encrypt. 

IKE Phase One

The basic purpose of IKE phase one is to authenticate the IPSec peers and to set up a secure channel between the peers to enable IKE exchanges. IKE phase one performs the following functions:
  • Authenticates and protects the identities of the IPSec peers
  • Sets up a secure tunnel to negotiate IKE phase two parameters
IKE phase one occurs in two modes:
  • Main mode
  • Aggressive mode

IKE Phase Two

The purpose of IKE phase two is to negotiate IPSec SAs to set up the IPSec tunnel

IPSec Encrypted Tunnel

After IKE phase two is complete and quick mode has established IPSec SAs, information is exchanged by an IPSec tunnel. 

Tunnel Termination

IPSec SAs terminate through deletion or by timing out

Comments

Popular posts from this blog

Mani Raj Paul - DPCM

Mani Raj Paul - Quantization