Re: Ipsec funda [7:28036]

2001-12-04 Thread VoIP Guy

If I remember correctly, IKE is the process for excanging the secret keys
over a public line.


Ramesh c  wrote in message
[EMAIL PROTECTED]">news:[EMAIL PROTECTED]...
 Folks,

 I was reading the article about IPSec and thought some of u might
enlighten
 my doubts. As we know IETF had split the IPsec into 2 parts namely Ipsec
and
 IKE.


 1)Since IPsec(Ah or ESP)can provide all the Encryption,Authentication and
 intergrity,do we still need a IKE for creating Encrpytion tunnel?

 2)Whats the use of IKE? Is it just used to create the key which Ipsec uses
 for Encryption or Authentication? Or does itself create
 the Encryption tunnel and authenticates?.

 3)Who does the Encrption and Authentication?

 cheers
 Ramesh




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=28054t=28036
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]



Ipsec funda [7:28036]

2001-12-03 Thread Ramesh c

Folks,

I was reading the article about IPSec and thought some of u might enlighten
my doubts. As we know IETF had split the IPsec into 2 parts namely Ipsec and
IKE.


1)Since IPsec(Ah or ESP)can provide all the Encryption,Authentication and
intergrity,do we still need a IKE for creating Encrpytion tunnel?

2)Whats the use of IKE? Is it just used to create the key which Ipsec uses
for Encryption or Authentication? Or does itself create
the Encryption tunnel and authenticates?.

3)Who does the Encrption and Authentication?

cheers
Ramesh




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7i=28036t=28036
--
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]