Re: How to initialize IKE
The above mentioned methods are general in including (and logical) functional level. The first exchanges are used to define the security association. The second category of trade permits for the shared secret. The third and final section of the handshake authenticates the parties and to validate all the previous trade ( and Skeyid the same time). In this first phase, aggressive mode aims to reduce trade by forcing certain parameters.
I'm the Proud Owner of the most dangerous weapon
known to man kind: Human Brain
Bookmarks