Penetration Testing mailing list archives
how IKE works in case of Checkpoint Firewall
From: priya subramanian <pentesting () yahoo co in>
Date: Mon, 25 Jun 2001 06:02:31 +0100 (BST)
In my understanding IKE invloves two phases wherin the DH keys and the CA keys are exchanged and a secret key is derived for encryption. But when configuring IKE VPN in a checpoint firewall we do exchenge any DH keys.. only a preshared secret is directly given. This is really confusing. Could anyone elaborate on how exactly IKe encryption works with Firewall-1 Regards Priya ____________________________________________________________ Do You Yahoo!? For regular News updates go to http://in.news.yahoo.com
Current thread:
- how IKE works in case of Checkpoint Firewall priya subramanian (Jun 25)
- Re: how IKE works in case of Checkpoint Firewall Tina Bird (Jun 26)
- <Possible follow-ups>
- RE: how IKE works in case of Checkpoint Firewall DABDELMO (Jun 25)
- RE: how IKE works in case of Checkpoint Firewall DABDELMO (Jun 25)
- RE: how IKE works in case of Checkpoint Firewall DABDELMO (Jun 27)