Chapter 9: Key Management

Throughout this book, the discussion of keys and security associations has been the focus of IPSec and the creation of a secured, authenticated relationship between two or more systems. The creation of keys and the use of those keys to create a secure channel are the most critical steps in the creation of an IPSec VPN. This chapter details the negotiation, authentication, and management of keys within a VPN.

IKE (Internet Key Exchange) is responsible for the origin authentication, the creation and management of keys for subsequent communications. On the surface, the process of these three basic properties appears straightforward. However, the protocol must be prepared to accommodate several variations of each property. ...

Get A Technical Guide to IPSec Virtual Private Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.