Can you explain IKE (Internet Key Exchange)?



Can you explain IKE (Internet Key Exchange)?..

Answer / sami

IKE - Internet Key Exchange - negotiates security parameters
and authentication keys and handle the exchange of public keys
and manage the keys afterwords.
its a combination of 3 protocols
skeme - enables public key encryption for authentication
isaskmp - which defines how messages will be exchanged
oakley - which defines the mechanism for key exchanges

Is This Answer Correct ?    1 Yes 1 No

Post New Answer

More CCNA Interview Questions

Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0

0 Answers  


A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?

15 Answers   TCS, Wipro,


Which OSI Reference Layer is concerned with path determination? A.) Datalink B.) Physical C.) Network D.) Transport E.) Session

2 Answers  


What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards

1 Answers  


Identify the OSI layer which is responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP

2 Answers   HCL,






The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.

2 Answers  


As the system administrator, you type "ppp authentication chap pap secret". Which authentication method is used first in setting up a session? A. secret B. PAP C. CHAP D. PPP/SLIP

1 Answers  


How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three

1 Answers  


hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha

0 Answers   HCL,


How does L2TP process?

0 Answers   CCIE,


What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.

1 Answers  


You want to clear the outputs on your serial interface showing errors on the interface. Which command do you type?

1 Answers  


Categories