Penetration Testing mailing list archives

how IKE works in case of Checkpoint Firewall


From: priya subramanian <pentesting () yahoo co in>
Date: Mon, 25 Jun 2001 06:02:31 +0100 (BST)

In my understanding IKE invloves two phases wherin the
DH keys and the CA keys are exchanged and a secret key
is derived for encryption.

But when configuring IKE VPN in a checpoint firewall
we do exchenge any DH keys.. only a preshared secret
is directly given. This is really confusing.

Could anyone elaborate on how exactly IKe encryption
works with Firewall-1

Regards
Priya

____________________________________________________________
Do You Yahoo!?
For regular News updates go to http://in.news.yahoo.com


Current thread: