![]() |
Network Security refers to the measures taken by any enterprise or organization to secure its computer network and data using both hardware and software systems. Internet Key Exchange(IKE) is a key management protocol used to secure communication and key exchange between two devices over any network. Key exchange is done in two ways: Manual Key ExchangeIn Manual Key Exchange, the system administrator manually configures each system with their keys. This method is suitable for small and static systems. Automated Key ExchangeThe keys will be created or generated based on the demand or requirement. This method is suitable for large and distributed systems. Automated Key Exchange has two main methods:
Phases of Internet Key Exchange(IKE)IKE can be done in two phases: IKE Phase-1There will be two devices i.e. sender and receiver. Initially, the sender will exchange the proposals for security services like encryption algorithms. authentication algorithm, hash function, etc. The sender and receiver will form a security association which is a collection of parameters that the two devices use. Here, the ISAKMP session is established and called the ISAKMP tunnel or Internet Key Exchange(IKE) Phase-1 tunnel which is bi-directional. When both ends of the tunnel agree to accept a set of security parameters, Phase-1 is done. Modes in Phase-1: In Phase-1, we have two modes:
![]() Phase-1 IKE Phase-2There will be two devices i.e. sender and receiver. Once the sender and receiver established the ISAKMP tunnel in phase-1 they move to phase-2. phase-2 always operates in Quick mode. Here the security associations and services between the two devices are negotiated. The devices will choose which protocol(Authentication Header or Encapsulation Security Protocol) and which algorithm to use. ![]() Phase-2 |
Reffered: https://www.geeksforgeeks.org
Misc |
Type: | Geek |
Category: | Coding |
Sub Category: | Tutorial |
Uploaded by: | Admin |
Views: | 13 |