beautypg.com

Operation of ike – H3C Technologies H3C SecPath F1000-E User Manual

Page 166

background image

2

PFS

The Perfect Forward Secrecy (PFS) feature is a security feature based on the DH algorithm. It guarantees

that decryption of a key makes no impact on the security of other keys because the keys have no
derivative relations. For IPsec, PFS is implemented by adding an additional key exchange at IKE

negotiation phase 2.

Operation of IKE

IKE negotiates keys and establishes SAs for IPsec in two phases:

1.

Phase 1: The two peers establish an ISAKMP SA, a secure, authenticated channel for

communication. In this phase, two modes are available: main mode and aggressive mode.

2.

Phase 2: Using the ISAKMP SA established in phase 1, the two peers negotiate to establish IPsec

SAs.

Figure 9 IKE exchange process in main mode

As shown in

Figure 9

, the main mode of IKE negotiation in phase 1 involves three pairs of messages:

SA exchange, used for negotiating the security policy.

Key exchange, used for exchanging the Diffie-Hellman public value and other values like the
random number. Key data is generated in this stage.

ID and authentication data exchange, used for identity authentication and authentication of data
exchanged in phase 1.

The main difference between main mode and aggressive mode is that aggressive mode does not provide

identity protection and only exchanges the above three messages. As aggressive mode exchanges less

information and features higher negotiation speed, it is better for scenarios where the requirement for
identity protection is lower. For scenarios with higher requirement for identity protection, main mode is

recommended.