TMS zl Management and Configuration Guide ST.1.0.090213
7-9
Virtual Private Networks
IPsec VPNs
IKE Phase 1. During phase 1, IKE must complete three tasks:
■ Negotiate security parameters for the IKE SA
■ Generate the keys used to secure data sent over the IKE SA
■ Authenticate the endpoints of the tunnel (the two hosts)
Therefor, IKE phase 1 typically involves three exchanges between hosts, or
six total messages.
Exchange 1: Security parameters. In the first exchange, the endpoint that
initiates the VPN connection sends a message to the remote endpoint with one
or more security proposals. Each proposal includes one of the options for
these parameters:
■ Authentication algorithm:
•MD5
•SHA-1
■ Encryption algorithm:
•DES
•3DES
• AES with 128, 192, or 256-bit keys
■ Authentication method:
• Preshared key
• Certificates (Digital Signature Algorithm [DSA] or Rivest-Shamir-
Adleman [RSA] Signature)
■ Diffie-Hellman group:
• Group 1 (768)
• Group 2 (1024)
• Group 5 (1536)
■ SA lifetime in seconds
You will specify these proposals in an IKE policy.