beautypg.com

Functions of ike, Relationship between ike and ipsec, Protocols and standards – H3C Technologies H3C SecPath F1000-E User Manual

Page 167: Ike configuration task list

background image

3

Functions of IKE

IKE automatically negotiates IPsec parameters such as the keys, reducing the manual configuration
complexity greatly.

IKE always performs DH exchange when establishing an SA, ensuring that each SA has a key with

no relation with any other key.

IPsec uses the sequence number, a 32-bit value in the AH or ESP header, for anti-replay. If the value

overflows, a new SA needs to be established for anti-replay, in which procedure IKE is required.

IKE allows for end-to-end dynamic authentication.

Identity authentication and management of peers influence IPsec deployment. A large-scale IPsec
deployment needs the support of certificate authorities (CAs) or other institutes which manage

identity data centrally.

Relationship Between IKE and IPsec

Figure 10 Relationship between IKE and IPsec

Figure 10

illustrates the relationship between IKE and IPsec:

IKE is an application layer protocol using UDP and functions as the signaling protocol of IPsec.

IKE negotiates SAs for IPsec and delivers negotiated parameters and generated keys to IPsec.

IPsec uses the SAs set up through IKE negotiation for encryption and/or authentication of IP
packets.

Protocols and Standards

These protocols and standards are relevant to IKE:

RFC 2408: Internet Security Association and Key Management Protocol (ISAKMP)

RFC 2409: The Internet Key Exchange (IKE)

RFC 2412: The OAKLEY Key Determination Protocol

IKE Configuration Task List

Prior to IKE configuration, you need to: