I don't know about your PIX questions, but the difference between IKE and
IPSec is easy.  IKE is the key exchange protocol.  It is used to pick a
transform set to use, what encryption protocol, what key length, etc.  It
also is used to actually share the symmetric keys used in ESP (one of the
IPSec methods).  IPSec is the "data" channel, it is the protocol that is
used to actually transmit data between two peers.  You can think of IKE as
the control channel in FTP, and IPSec (AH and/or ESP) as the data channel.

Fred Reimer - CCNA


Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177  Cell: 770-490-3071  Pager: 888-260-2050


NOTICE; This email contains confidential or proprietary information which
may be legally privileged. It is intended only for the named recipient(s).
If an addressing or transmission error has misdirected the email, please
notify the author by replying to this message. If you are not the named
recipient, you are not authorized to use, disclose, distribute, copy, print
or rely on this email, and should immediately delete it from your computer.


-----Original Message-----
From: Vijay M [mailto:[EMAIL PROTECTED] 
Sent: Saturday, August 02, 2003 11:23 AM
To: [EMAIL PROTECTED]
Subject: Re: IPSec and IKE [7:23599]

hello,

I want to know that i am already having IPsec VPN connectivity with 2
different PIX 515s, can i have 1 more connection onto the same PIX515. I
mean these commands:-

crypto ipsec transform-set TRANS_ESP_DES_SHA esp-des esp-md5-hmac
crypto ipsec transform-set vcustomer esp-3des esp-md5-hmac
crypto map fingerhut 1 ipsec-isakmp
crypto map fingerhut 1 match address 1
crypto map fingerhut 1 set peer a.b.c.d
crypto map fingerhut 1 set transform-set vcustomer
crypto map fingerhut 2 ipsec-isakmp
crypto map fingerhut 2 match address 2
crypto map fingerhut 2 set peer x.y.z.a
crypto map fingerhut 2 set transform-set vcustomer
crypto map fingerhut interface outside
isakmp enable outside
isakmp key ******** address a.b.c.d netmask 255.255.255.255 no-xauth no-co
nfig-mode
isakmp key ******** address x.y.z.a netmask 255.255.255.255 no-xauth no-c
onfig-mode
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000



""Theodore stout""  wrote in message
news:[EMAIL PROTECTED]
> Personally speaking I am confused too.  I am a CCSE and passed MCNS with
> perfect points on both on the IPSEC section and I still don't understand
it
> perfectly.  I can use the isakmp, crypto, and FW-1 commands effortlessly
yet
> I really still don't know what the real difference is between IPSEC and
> IKE.  I even read that like 70 page file from Cisco, deploying IPSec blah
> blah and I was just more confused.  What I do really understand it ESP and
> AH.  That is really clear and necessary to understand for transform sets.
>
> Watch me get a perfect on this section tomorrow on the Advanced PIX and
> still not really have a clue!
>
> Peace
>
> Theo
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=73419&t=23599
--------------------------------------------------
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html

Reply via email to