SonicOS 7.1 IPSec VPN

About IKEv1

In IKEv1, two modes are used to exchange authentication information:

  • Main Mode: The node or gateway initiating the VPN queries the node or gateway on the receiving end, and they exchange authentication methods, public keys, and identity information. This usually requires six messages back and forth. The order of authentication messages in Main Mode is:
    1. The initiator sends a list of cryptographic algorithms the initiator supports.
    2. The responder replies with a list of supported cryptographic algorithms.
    3. The initiator send a public key (part of a Diffie-Hellman public/private key pair) for the first mutually supported cryptographic algorithm.
    4. The responder replies with the public key for the same cryptographic algorithm.
    5. The initiator sends identity information (usually a certificate).
    6. The responder replies with identity information.
  • Aggressive Mode: To reduce the number of messages exchanged during authentication by half, the negotiation of which cryptographic algorithm to use is eliminated. The initiator proposes one algorithm and the responder replies if it supports that algorithm:
    1. The initiator proposes a cryptographic algorithm to use and sends its public key.
    2. The responder replies with a public key and identity proof.
    3. The initiator sends an identification proof. After authenticating, the VPN tunnel is established with two SAs, one from each node to the other.

Was This Article Helpful?

Help us to improve our support portal

Techdocs Article Helpful form

  • Hidden
  • Hidden

Techdocs Article NOT Helpful form

  • Still can't find what you're looking for? Try our knowledge base or ask our community for more help.
  • Hidden
  • Hidden