Internet Key Exchange | |
---|---|
IKE Version 1 | |
Phase 1 |
Pre-shared key Private Keys ( exchange using PKI ) 3. Use the encrypted communication channel 4. Send IKE identification to authenticate itself
|
Phase 2 | |
IKE Version 2 | |
IKE-SA-INIT IKE-AUTH CREATE_CHILD_SA INFORMATIONAL | |
Tunnel Mode ( most used ) |
|
Transport Mode | encapsulation of layer 4 of the original packet |
PKI or Public Key Infrastructure Large Network Stronger Auth Security | Exchange of Asymmetrical Keys ( Private and Public ) Private key use to decrypt
Issuer, |
Digital certificate: | Based on X.509 Information: Issuer / ID Serial Number Expiration dates / Validity Digital signature ( from the Certificate Authority) |
Finger Print | File ( or Transaction) → hashed |
Encryption that use Asymmetrical Key | |
Encryption that use symmetrical Key | |
General
Content
Integrations