Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation

IKE Key Management Protocol Overview

IKE is a key management protocol that creates dynamic SAs; it negotiates SAs for IPsec. An IKE configuration defines the algorithms and keys used to establish a secure connection with a peer security gateway.

IKE does the following:

  • Negotiates and manages IKE and IPsec parameters
  • Authenticates secure key exchange
  • Provides mutual peer authentication by means of shared secrets (not passwords) and public keys
  • Provides identity protection (in main mode)

IKE occurs over two phases. In the first phase, it negotiates security attributes and establishes shared secrets to form the bidirectional IKE SA. In the second phase, inbound and outbound IPsec SAs are established. The IKE SA secures the exchanges in the second phase. IKE also generates keying material, provides Perfect Forward Secrecy, and exchanges identities.

Published: 2012-11-15