30.01.2015 Views

CSC 774 -- Network Security - Dr. Peng Ning

CSC 774 -- Network Security - Dr. Peng Ning

CSC 774 -- Network Security - Dr. Peng Ning

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ISAKMP Phases<br />

• Phase 1<br />

– Establish ISAKMP SA to protect further ISAKMP<br />

exchanges<br />

– Or use pre-established ISAKMP SA<br />

– ISAKMP SA identified by initiator cookie and<br />

responder cookie<br />

• Phase 2<br />

– Negotiate security services in SA for target<br />

security protocol or application.<br />

Computer Science<br />

<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 31<br />

ISAKMP<br />

• Disadvantage<br />

– Additional overhead due to 2 phases<br />

• Advantages<br />

– Same ISAKMP SA can be used to negotiate phase<br />

2 for multiple protocols<br />

– ISAKMP SA can be used to facilitate maintenance<br />

of SAs.<br />

– ISAKMP SA can simplify phase 2.<br />

Computer Science<br />

<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 32

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!