Summary


In this chapter, you learned that IPSec is a suite of protocols used to secure sessions between two or more peers. IPSec's main goal is the creation of an encrypted session between VPN gateways. To achieve this goal, IPSec uses IKE Phase 1 to create a management tunnel between VPN peers. Over this management tunnel, a second tunnel (IPSec) is created during IKE Phase 2. To provide for integrity, IPSec defines the use of hash algorithms and digital signatures. To provide for confidentiality, IPSec defines the use of symmetric key encryption algorithms. Providing secure key agreement, IPSec during IKE Phase 1 uses the services of the D-H algorithm. D-H is subject to man-in-the-middle attacks and will use authentication to mitigate this type of threat.



CCSP SECUR Exam Cram 2
CCSP SECUR Exam Cram 2 (642-501)
ISBN: B000MU86IQ
EAN: N/A
Year: 2003
Pages: 291
Authors: Raman Sud

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net