'ISAMKP is also referred to as "IKE encryption".  IKE supports
authentication schemes using pre-shared secrets and certificates.  The
basic mechanism is the Diffie-Hellman key-exchange algorithm,' - CP2K
manual.

It's basically an encryption standard with a key management protocol.
Firewall-1 supports IKE and "hybrid mode IKE", the latter being an
extension of IKE to enable a few other authentication methods supported by
FW-1 ( RADIUS, SecureID, TACACS etc )  This is done by the SecuRemote
server unidirectionally authenticating itself to the user using a
certificate issued by an internal Certificate Authority.  The SecuRemote
server then challenges the user to provide credentials for the
authentication scheme you've chosen in the setup.  If the requested
credentials are valid, the peers initiate IKE encryption.



Ashleigh Martin
Systems Engineer
DATA#3 Limited
Ph: +61 3 9864 2000
Fx: +61 3 9864 2099
mailto: [EMAIL PROTECTED]
Web Site: http://www.data3.com.au


                                                                                       
                                                   
                    [EMAIL PROTECTED]                                            
                                                   
                    Sent by:                                    To:     
[EMAIL PROTECTED]                          
                    [EMAIL PROTECTED]        cc:                    
                                                   
                    kpoint.com                                  Subject:     [FW1] 
ISAKMP                                                 
                                                                                       
                                                   
                                                                                       
                                                   
                    25/01/2001 01:33 AM                                                
                                                   
                                                                                       
                                                   
                                                                                       
                                                   




Hi all,

can anyone explain ISAKMP to me with 10 to 20 sentences ?

Thankx,
Joerg



================================================================================

     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================







================================================================================
     To unsubscribe from this mailing list, please see the instructions at
               http://www.checkpoint.com/services/mailing.html
================================================================================

Reply via email to