beautypg.com

Configuring ike, Feature and hardware compatibility, Ike overview – H3C Technologies H3C SecPath F1000-E User Manual

Page 133: Ike security mechanism, Data authentication

background image

121

Configuring IKE

Feature and hardware compatibility

Feature F1000-A-EI/E-SI/S-AI

F1000-E

F5000-A5 Firewall

module

FIPS No

No No Yes

IKE overview

Built on a framework defined by the Internet Security Association and Key Management Protocol
(ISAKMP), Internet Key Exchange (IKE) provides automatic key negotiation and SA establishment services

for IPsec, simplifying the application, management, configuration and maintenance of IPsec

dramatically.
Instead of transmitting keys directly across a network, IKE peers transmit keying materials between them,
and calculate shared keys respectively. Even if a third party captures all exchanged data for calculating

the keys, it cannot calculate the keys.

IKE security mechanism

IKE has a series of self-protection mechanisms and supports secure identity authentication, key

distribution, and IPsec SA establishment on insecure networks.

Data authentication

Data authentication involves two concepts:

Identity authentication—Mutual identity authentication between peers. Two authentication

methods are available: pre-shared key authentication and PKI-based digital signature
authentication (RSA signature).

Identity protection—Encrypts the identity information with the generated keys before sending the
information.

DH

The Diffie-Hellman (DH) algorithm is a public key algorithm. With this algorithm, two peers can

exchange keying material and then use the material to calculate the shared keys. Due to the decryption
complexity, a third party cannot decrypt the keys even after intercepting all keying materials.

PFS

The Perfect Forward Secrecy (PFS) feature is a security feature based on the DH algorithm. By making

sure keys have no derivative relations, it guarantees a broken key brings no threats to other keys. For IPsec,

PFS is implemented by adding an additional key exchange at IKE negotiation phase 2.