Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Virtual private networks, Part 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
3. The VPN technology
  


More on ISAKMP page 3 of 11


To actually process AH or ESP, systems need to have their base assumptions synchronized. A security association (SA) contains all the security assumptions, such as the cryptography to be used, keying information, and party identities. The ISAKMP protocol actually covers how these SAs negotiate all this in an automated way.

Automating this process allows a VPN to scale without manual intervention. This scalability is one of IPSec's main attractions. ISAKMP deals with the initial key exchanges through the Internet Key Exchange (IKE) key management protocol. (Previously, this was called ISAKMP/Oakley but has been superceded.) IKE is mandatory, because managing keys is one of the most potentially damaging events as far as security is concerned. An initial exchange of keys is a stricture point where an eavesdropper might be able to launch a man-in-the-middle (MITM) attack or just steal information about the keys. ISAKMP authenticates the parties in the exchange before it exchanges any key information that could be of use to an attacker. When IKE does exchange key information, it encrypts the information before it hits the network.


Main menuSection menuGive feedback on this tutorialPreviousNext
PrivacyLegalContact