Download Secure Entry Client
Transcript
SECURE ENTRY CLIENT n examples and explanations IKE Modes Essentially two types of IKE policies can be configured. They differ according to the type of authentication, which can be either over Pre-shared Key or RSA signature. Each of the two types of Internet Key Exchange can be executed in two different modes. These are; Main Mode also referred to as Identity Protection Mode or Aggressive Mode. These modes are differentiated by the number of messages and by the encryption. In Main Mode (standard setting) six messages are sent over the Control Channel and the last two messages are encrypted. The last two messages contain the user ID, the signature, the certificate and, if required, a hash value. This is why it is also known as Identity Protection Mode. In Aggressive Mode only three messages are sent over the Control Channel and nothing is encrypted. You determine the IKE mode (Exchange Mode), Main Mode or Aggressive Mode “Security” parameter fields under “Link Profiles” (for a dynamic SPD) and under “IPSec, Secure Policy Database” (for a static SPD). (See also → Exchange Mode). IKE Main Mode (Identity Protection Mode) with Preshared Keys Initiator Destination Message #1: Header, Security Association Message #2: Header, Security Association Message #3: Header, Key Exchange, Nonce Message #4: Header, Key Exchange, Nonce Message #5: Header, ID, Hash Message #6: Header, ID, Hash If the pre-shared key method is used in Main Mode then the client on the VPN/Gateway must be clearly identifiable by his IP address. This is because the pre-shared key will be introduced into the symmetric key calculation and encrypted before the transfer of any other information that could identify the client. However a client dialing in to the provider is not identifiable by an IP address because he receives a new one with each dial in. This means that in Main Mode only the same pre-shared key can be given out which weakens the authentication. 188 © NCP engineering GmbH