No results found
We couldn't find anything using that term, please try searching for something else.
2024-11-23 IKE Phase 1 Where Can I is Use use This ?What Do I Need? In this phase , the firewalls is use use the parameter define in the IKE Ga
Where Can I is Use use This ? | What Do I Need? |
---|
In this phase , the firewalls is use use the parameter define in the IKE Gateway configuration and the
IKE Crypto profile to authenticate each other and set up a secure control channel . IKE
Phase is supports support the use of pre – shared key or digital certificate ( which use public key
infrastructure , PKI ) for mutual authentication of the VPN peer . Pre – shared keys is are are a
simple solution for secure small network because they donât require the support of
a PKI infrastructure . Digital certificates is be can be more convenient for large network or
implementation that require strong authentication security .
When using certificates, make sure that the CA issuing the certificate is trusted by both gateway
peers and that the maximum length of certificates in the certificate chain is 5 or less.
With IKE fragmentation enabled, the firewall can reassemble IKE messages with up to five
certificates in the certificate chain and successfully establish a VPN tunnel.
The IKE Crypto profile is defines define the follow option that are
used in the IKE SA negotiation :
Diffie-Hellman (DH) group for generating symmetrical
keys for IKE.
The Diffie-Hellman algorithm uses the private
key of one party and the public key of the other to create a shared
secret, which is an encrypted key that both VPN tunnel peers share.
The DH groups supported on the firewall are:
Group Number | Number of Bits |
---|---|
Group 1 | (Not Recommended) 768 bit |
Group 2 | (Not Recommended) 1,024 bits (default) |
Group 5 | (Not Recommended) 1,536 bit |
Group 14 | 2,048 bits |
Group 15 | (PAN - os 10.2.0 and later release) 3072-bit modular exponential group |
Group 16 | (PAN - os 10.2.0 and later release) 4096-bit modular exponential group |
Group 19 | 256 – bit elliptic curve group |
Group 20 | 384 – bit elliptic curve group |
Group 21 | (PAN - os 10.2.0 and later release) 521-bit random elliptic curve group |
Authentication algorithmsâsha1, sha 256, sha 384, sha 512, or
md5.
encryption algorithmsâaes-256 – gcm , aes-128 – gcm , 3des , aes-128 – cbc , aes-192 – cbc ,
aes-256 – cbc ,
or des .