IPSec and IKE [7:23599]

2001-10-19 Thread Hunt Lee

Can anyone please explain to me what is the difference between IPSec and
IKE? I understand that IP Sec is just IP Security, which provides IP
network layer encryption and authentication to end-to-end security on an
infrastructure, but what's IKE?  I read the Cisco MCNS book from Chapter
15 to 17 many times, yet I'm still very confused.

Any help will be greatly appreciated.

Best Regards,
Hunt




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=23599&t=23599
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: IPSec and IKE [7:23599]

2001-10-19 Thread JffryH(Yahoo)

I had the same problem as you before. Below link is what I think most clear
one in this. Need partner login though.

http://www.cisco.com/warp/customer/cc/so/neso/sqso/eqso/ipsec_wp.htm



CCIE Study Professional Checklist
http://www.geocities.com/berdde/



-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of
Hunt Lee
Sent: Saturday, October 20, 2001 9:16 AM
To: [EMAIL PROTECTED]
Subject: IPSec and IKE [7:23599]


Can anyone please explain to me what is the difference between IPSec and
IKE? I understand that IP Sec is just IP Security, which provides IP
network layer encryption and authentication to end-to-end security on an
infrastructure, but what's IKE?  I read the Cisco MCNS book from Chapter
15 to 17 many times, yet I'm still very confused.

Any help will be greatly appreciated.

Best Regards,
Hunt




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=23600&t=23599
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



RE: IPSec and IKE [7:23599]

2001-10-20 Thread Keyur Shah

In a nutshell,

IPSEC is encryption methodology open standard. IPSEC SAs can be configured
using IKE or manual keying. IKE saves time and manual work in hub and spoke
configurations. It is an algorithm that uses policy to determine matching
parameters with the other side. In absence of IKE, you would have to
configure each parameter manually on all participating routers and clients.

IKE is called phase I negotiation, which ensures that peer is who it says it
is.

 -Keyur Shah-
CCIE# 4799 (Security; Routing and Switching)
CSS1,CCNA,CCDA,SCSA,SCNA,MCT,MCSE,MCP+I,MCP,CNI,MCNE,CNE,CNA
Hello Computers
"Say Hello to Your Future!"
http://www.hellocomputers.com
Toll-Free: 1.877.794.3556
International: 1.510.795.6815
Eurpoe: +(44)20 7900 3011
Fax: 1.510.291.2250




-Original Message-
From: Hunt Lee [mailto:[EMAIL PROTECTED]] 
Sent: Friday, October 19, 2001 6:16 PM
To: [EMAIL PROTECTED]
Subject: IPSec and IKE [7:23599]


Can anyone please explain to me what is the difference between IPSec and
IKE? I understand that IP Sec is just IP Security, which provides IP network
layer encryption and authentication to end-to-end security on an
infrastructure, but what's IKE?  I read the Cisco MCNS book from Chapter 15
to 17 many times, yet I'm still very confused.

Any help will be greatly appreciated.

Best Regards,
Hunt




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=23630&t=23599
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: IPSec and IKE [7:23599]

2001-10-21 Thread Circusnuts

Lee- I'm not sure if you realize that you're asking about a feature of
IPSec.  IKE stands for Internet Key Exchange and is a part of the Cisco
IPSec process.  I have a Cisco PDF from a class I took a year or so ago.
Let me know if you are interested...

All the best !!!
Phil

- Original Message -
From: "Keyur Shah" 
To: 
Sent: Saturday, October 20, 2001 4:51 PM
Subject: RE: IPSec and IKE [7:23599]


> In a nutshell,
>
> IPSEC is encryption methodology open standard. IPSEC SAs can be configured
> using IKE or manual keying. IKE saves time and manual work in hub and
spoke
> configurations. It is an algorithm that uses policy to determine matching
> parameters with the other side. In absence of IKE, you would have to
> configure each parameter manually on all participating routers and
clients.
>
> IKE is called phase I negotiation, which ensures that peer is who it says
it
> is.
>
>  -Keyur Shah-
> CCIE# 4799 (Security; Routing and Switching)
> CSS1,CCNA,CCDA,SCSA,SCNA,MCT,MCSE,MCP+I,MCP,CNI,MCNE,CNE,CNA
> Hello Computers
> "Say Hello to Your Future!"
> http://www.hellocomputers.com
> Toll-Free: 1.877.794.3556
> International: 1.510.795.6815
> Eurpoe: +(44)20 7900 3011
> Fax: 1.510.291.2250
>
>
>
>
> -Original Message-
> From: Hunt Lee [mailto:[EMAIL PROTECTED]]
> Sent: Friday, October 19, 2001 6:16 PM
> To: [EMAIL PROTECTED]
> Subject: IPSec and IKE [7:23599]
>
>
> Can anyone please explain to me what is the difference between IPSec and
> IKE? I understand that IP Sec is just IP Security, which provides IP
network
> layer encryption and authentication to end-to-end security on an
> infrastructure, but what's IKE?  I read the Cisco MCNS book from Chapter
15
> to 17 many times, yet I'm still very confused.
>
> Any help will be greatly appreciated.
>
> Best Regards,
> Hunt




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=23672&t=23599
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: IPSec and IKE [7:23599]

2001-10-30 Thread Theodore stout

Personally speaking I am confused too.  I am a CCSE and passed MCNS with
perfect points on both on the IPSEC section and I still don't understand it
perfectly.  I can use the isakmp, crypto, and FW-1 commands effortlessly yet
I really still don't know what the real difference is between IPSEC and
IKE.  I even read that like 70 page file from Cisco, deploying IPSec blah
blah and I was just more confused.  What I do really understand it ESP and
AH.  That is really clear and necessary to understand for transform sets.

Watch me get a perfect on this section tomorrow on the Advanced PIX and
still not really have a clue!

Peace 

Theo


Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=24758&t=23599
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Re: IPSec and IKE [7:23599]

2003-08-02 Thread Vijay M
hello,

I want to know that i am already having IPsec VPN connectivity with 2
different PIX 515s, can i have 1 more connection onto the same PIX515. I
mean these commands:-

crypto ipsec transform-set TRANS_ESP_DES_SHA esp-des esp-md5-hmac
crypto ipsec transform-set vcustomer esp-3des esp-md5-hmac
crypto map fingerhut 1 ipsec-isakmp
crypto map fingerhut 1 match address 1
crypto map fingerhut 1 set peer a.b.c.d
crypto map fingerhut 1 set transform-set vcustomer
crypto map fingerhut 2 ipsec-isakmp
crypto map fingerhut 2 match address 2
crypto map fingerhut 2 set peer x.y.z.a
crypto map fingerhut 2 set transform-set vcustomer
crypto map fingerhut interface outside
isakmp enable outside
isakmp key  address a.b.c.d netmask 255.255.255.255 no-xauth no-co
nfig-mode
isakmp key  address x.y.z.a netmask 255.255.255.255 no-xauth no-c
onfig-mode
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000



""Theodore stout""  wrote in message
news:[EMAIL PROTECTED]
> Personally speaking I am confused too.  I am a CCSE and passed MCNS with
> perfect points on both on the IPSEC section and I still don't understand
it
> perfectly.  I can use the isakmp, crypto, and FW-1 commands effortlessly
yet
> I really still don't know what the real difference is between IPSEC and
> IKE.  I even read that like 70 page file from Cisco, deploying IPSec blah
> blah and I was just more confused.  What I do really understand it ESP and
> AH.  That is really clear and necessary to understand for transform sets.
>
> Watch me get a perfect on this section tomorrow on the Advanced PIX and
> still not really have a clue!
>
> Peace
>
> Theo




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=73411&t=23599
--
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html


RE: IPSec and IKE [7:23599]

2003-08-02 Thread Reimer, Fred
I don't know about your PIX questions, but the difference between IKE and
IPSec is easy.  IKE is the key exchange protocol.  It is used to pick a
transform set to use, what encryption protocol, what key length, etc.  It
also is used to actually share the symmetric keys used in ESP (one of the
IPSec methods).  IPSec is the "data" channel, it is the protocol that is
used to actually transmit data between two peers.  You can think of IKE as
the control channel in FTP, and IPSec (AH and/or ESP) as the data channel.

Fred Reimer - CCNA


Eclipsys Corporation, 200 Ashford Center North, Atlanta, GA 30338
Phone: 404-847-5177  Cell: 770-490-3071  Pager: 888-260-2050


NOTICE; This email contains confidential or proprietary information which
may be legally privileged. It is intended only for the named recipient(s).
If an addressing or transmission error has misdirected the email, please
notify the author by replying to this message. If you are not the named
recipient, you are not authorized to use, disclose, distribute, copy, print
or rely on this email, and should immediately delete it from your computer.


-Original Message-
From: Vijay M [mailto:[EMAIL PROTECTED] 
Sent: Saturday, August 02, 2003 11:23 AM
To: [EMAIL PROTECTED]
Subject: Re: IPSec and IKE [7:23599]

hello,

I want to know that i am already having IPsec VPN connectivity with 2
different PIX 515s, can i have 1 more connection onto the same PIX515. I
mean these commands:-

crypto ipsec transform-set TRANS_ESP_DES_SHA esp-des esp-md5-hmac
crypto ipsec transform-set vcustomer esp-3des esp-md5-hmac
crypto map fingerhut 1 ipsec-isakmp
crypto map fingerhut 1 match address 1
crypto map fingerhut 1 set peer a.b.c.d
crypto map fingerhut 1 set transform-set vcustomer
crypto map fingerhut 2 ipsec-isakmp
crypto map fingerhut 2 match address 2
crypto map fingerhut 2 set peer x.y.z.a
crypto map fingerhut 2 set transform-set vcustomer
crypto map fingerhut interface outside
isakmp enable outside
isakmp key  address a.b.c.d netmask 255.255.255.255 no-xauth no-co
nfig-mode
isakmp key  address x.y.z.a netmask 255.255.255.255 no-xauth no-c
onfig-mode
isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000



""Theodore stout""  wrote in message
news:[EMAIL PROTECTED]
> Personally speaking I am confused too.  I am a CCSE and passed MCNS with
> perfect points on both on the IPSEC section and I still don't understand
it
> perfectly.  I can use the isakmp, crypto, and FW-1 commands effortlessly
yet
> I really still don't know what the real difference is between IPSEC and
> IKE.  I even read that like 70 page file from Cisco, deploying IPSec blah
> blah and I was just more confused.  What I do really understand it ESP and
> AH.  That is really clear and necessary to understand for transform sets.
>
> Watch me get a perfect on this section tomorrow on the Advanced PIX and
> still not really have a clue!
>
> Peace
>
> Theo
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=73419&t=23599
--
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html


RE: IPSec and IKE [7:23599]

2003-08-04 Thread [EMAIL PROTECTED]
Vijay,

start with a list per dest lan:

access-list customerx 10.1.1.0 255.255.255.0 192.168.1.0 255.255.255.0 

then a map per dest lan
crypto map fingerhut x ipsec-isakmp
crypto map fingerhut x match address customerx 
crypto map fingerhut x set peer x.x.x.x
crypto map fingerhut x set transform-set vcustomer

crypto map fingerhut interface outside

ISAkmp
isakmp key **NEWKEYNEWCUSTO** address  x.x.x.x netmask 255.255.255.255
no-xauth no-config-mode

off the top of myn hat

Martijn 

-Oorspronkelijk bericht-
Van: Vijay M [mailto:[EMAIL PROTECTED]
Verzonden: zaterdag 2 augustus 2003 17:23
Aan: [EMAIL PROTECTED]
Onderwerp: Re: IPSec and IKE [7:23599]


hello,

I want to know that i am already having IPsec VPN connectivity with 2
different PIX 515s, can i have 1 more connection onto the same PIX515. I
mean these commands:-

crypto ipsec transform-set TRANS_ESP_DES_SHA esp-des esp-md5-hmac
crypto ipsec transform-set vcustomer esp-3des esp-md5-hmac
crypto map fingerhut 1 ipsec-isakmp
crypto map fingerhut 1 match address 1
crypto map fingerhut 1 set peer a.b.c.d
crypto map fingerhut 1 set transform-set vcustomer

crypto map fingerhut 2 ipsec-isakmp
crypto map fingerhut 2 match address 2
crypto map fingerhut 2 set peer x.y.z.a
crypto map fingerhut 2 set transform-set vcustomer


crypto map fingerhut interface outside
isakmp enable outside
isakmp key  address a.b.c.d netmask 255.255.255.255 no-xauth no-co
nfig-mode
isakmp key  address x.y.z.a netmask 255.255.255.255 no-xauth no-c
onfig-mode

isakmp identity address
isakmp policy 1 authentication pre-share
isakmp policy 1 encryption 3des
isakmp policy 1 hash md5
isakmp policy 1 group 1
isakmp policy 1 lifetime 1000



""Theodore stout""  wrote in message
news:[EMAIL PROTECTED]
> Personally speaking I am confused too.  I am a CCSE and passed MCNS with
> perfect points on both on the IPSEC section and I still don't understand
it
> perfectly.  I can use the isakmp, crypto, and FW-1 commands effortlessly
yet
> I really still don't know what the real difference is between IPSEC and
> IKE.  I even read that like 70 page file from Cisco, deploying IPSec blah
> blah and I was just more confused.  What I do really understand it ESP and
> AH.  That is really clear and necessary to understand for transform sets.
>
> Watch me get a perfect on this section tomorrow on the Advanced PIX and
> still not really have a clue!
>
> Peace
>
> Theo
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info:
http://www.groupstudy.com/list/cisco.html




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=73467&t=23599
--
**Please support GroupStudy by purchasing from the GroupStudy Store:
http://shop.groupstudy.com
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html