Internet Key Exchange
The IPSec protocol suite uses Internet Key Exchange (IKE) to securely handle the security associations in the creation of an IPSec VPN. Before the IPSec VPN is established, IKE needs to establish an IKE phase 1 tunnel and an IKE phase 2 tunnel.
IKE phase 1
The IKE phase 1 is used to authenticate the IPSec VPN peers and established a secure, encrypted tunnel to further allow the peers to exchange IKE information.
The main characteristics of the IKE phase 1 are as follows:
- The phase 1 tunnel is used to exchange any packet/traffic originating from one peer that is destined for the other peer. If there's an IKE phase 1 tunnel between two routers, Router A and Router B, if one router wants to send a message to the other, the traffic will use the IKE phase 1 tunnel only.
- The IKE phase 1 is used to negotiate all the SA between the two peers.
- The SA are mutual hashing algorithms, authentication methods, key exchange method, encryption algorithm, and the time the tunnel should be...