588CHAPTER 41: CONFIGURING IKE

Figure 176 Diagram of relationship between IKE and IPSec

 

IKE

SA negotiation

 

 

 

Router A

 

TCP/UDP

SA

SA

 

IPSec

 

IP

 

 

 

 

Encrypted IP message

IKE

Router B

TCP/UD

P

IPSec

IKE features

Avoid specifying manually all IPSec security parameters in password mapping of

 

both communication ends.

 

Allow specifying the lifetime of IPSec SA

 

Allow exchanging ciphering key during IPSec session

 

Can provide anti-replay service by IPSec

 

Allow manageable and scalable IPSec to implement certificate authorization

 

support.

 

Allow dynamic end-to-end authentication.

 

 

Configuring IKE

IKE configuration includes:

 

Creating an IKE Security Policy

 

Selecting an Encryption Algorithm

 

Selecting an Authentication Algorithm

 

Configuring Pre-shared Key

 

Selecting the Hashing Algorithm

 

Selecting DH Group ID

 

Setting the Lifetime of IKE Association SA

 

Configuring IKE Keepalive Timer

Creating an IKE Security

IKE negotiation determines whether IKE policies at both ends are matched and

Policy

then reach a negotiation using an IKE policy. During the subsequent negotiation,

 

the security data provided by this IKE policy will be used to protect negotiation

 

data.

 

Multiple policies with priority must be created on each terminal to ensure that at

 

least one policy can match that of the remote terminal.

 

Encryption algorithm: At present, it includes 56-bit DES-CBC (DES-Cipher Block

 

Chaining) algorithm and 168-bit 3DES-CBC algorithm.

Page 592
Image 592
3Com 10014299 manual Configuring IKE, IKE features, Policy