SonicOS 7.1 IPSec VPN
- SonicOS 7.1
- About SonicOS
- IPSec VPN Overview
- Site to Site VPNs
- VPN Auto Provisioning
- Rules and Settings
- Advanced
- DHCP over VPN
- L2TP Servers and VPN Client Access
- AWS VPN
- SonicWall Support
About IKEv1
In IKEv1, two modes are used to exchange authentication information:
- Main Mode: The node or gateway initiating the VPN queries the node or gateway on the receiving end, and they exchange authentication methods, public keys, and identity information. This usually requires six messages back and forth. The order of authentication messages in Main Mode is:
- The initiator sends a list of cryptographic algorithms the initiator supports.
- The responder replies with a list of supported cryptographic algorithms.
- The initiator send a public key (part of a Diffie-Hellman public/private key pair) for the first mutually supported cryptographic algorithm.
- The responder replies with the public key for the same cryptographic algorithm.
- The initiator sends identity information (usually a certificate).
- The responder replies with identity information.
- Aggressive Mode: To reduce the number of messages exchanged during authentication by half, the negotiation of which cryptographic algorithm to use is eliminated. The initiator proposes one algorithm and the responder replies if it supports that algorithm:
- The initiator proposes a cryptographic algorithm to use and sends its public key.
- The responder replies with a public key and identity proof.
- The initiator sends an identification proof. After authenticating, the VPN tunnel is established with two SAs, one from each node to the other.
Was This Article Helpful?
Help us to improve our support portal