CCNAS - IPSec and Tunnels Flashcards
Phase 1
- negotiate IKE policy sets
- DH Key exchange
- verify peer identity
Phase 2
Used to negotiate IPSec security parameters that will be used to secure the tunnel
IKE
protocol that uses UDP 500, exchanges keys
ISAKMP
combined protocols to build secure IPSec connections.
same as IKE
Diffie-Hellman
used to initiate a key exchange, public key exchange
transform sets
set of rules that must be similar across devices - Used in Phase 2
IKE Phase 1
- IKE Policy sets exchanged
- DH key exchange establishes a a shared secret key
- Devices authenticate each other using PSK or RSA
SA (Security Associations)
Negotiated parameters between two devices
IKE Phase 2
Negotiates IPSec security parameters (transform sets)
IPSec VPN Negotiation
- Determine interesting traffic using crypto acls
- IKE Phase 1 begins (ISAKMP creates secure tunnel)
- IKE Phase 2 begins (IPSec SA transforms are negotiated - this is how the tunnel will be established)
- IPSec tunnel created and data securely transfered
- IPSec tunnel terminates when SAs are deleted or expired.
Symmetric
same key decrypts and encrypts
Asymmetric
One Encrypts, another decrypts
Asymmetic: Public Key & Private Key
The public key is given to everyone, not the private one
Two different types of keys
Symmetric and Asymmetric
Phase 1 - Aggressive Mode
Faster than traditional exchange, cuts between steps 2 & 3