Site-to-Site IPsec VPN Operation参考.pptVIP

  • 5
  • 0
  • 约3.8千字
  • 约 27页
  • 2018-03-15 发布于贵州
  • 举报
Site-to-Site IPsec VPN Operation参考

IPsec VPNs Site-to-Site IPsec VPN Operation Five Steps of IPsec Step 1: Interesting Traffic Step 2: IKE Phase 1 IKE Policy Negotiates matching IKE transform sets to protect IKE exchange Diffie-Hellman Key Exchange Authenticate Peer Identity Peer authentication methods: Preshared keys RSA signatures RSA encrypted nonces Step 3: IKE Phase 2 Negotiates IPsec security parameters, IPsec transform sets Establishes IPsec SAs Periodically renegotiates IPsec SAs to ensure security Optionally, performs an additional Diffie-Hellman exchange IPsec Transform Sets A transform set is a combination of algori

文档评论(0)

1亿VIP精品文档

相关文档