Ref: https://learn.cantrill.io/courses/2022818/lectures/45662396 [TECH-FUNDAMENTALS] =OR= https://learn.cantrill.io/courses/1820301/lectures/42306709 [SAA-C03]

YouTube: https://www.youtube.com/watch?v=15amNny_kKI


IPsec - Key Concepts

IPsec Architecture

Untitled


IPsec Phases - Internet Key Exchange (IKE) Phases

IKE Phase 1 (Peers communicate via asymmetric encryption)

Untitled

  1. Peers authenticate via pre-shared keys (passwords) or certificates → prove identity
  2. Peers exchange keys with asymmetric encryption, e.g. via Diffie-Hellman (DH)
    1. Each peer creates a DH private key (signs stuff & decrypts data)
    2. Each peer derives the DH public key (encrypts data that only private DH key can decrypt)
    3. Public keys exchanged → each peer gets public key of the other
    4. Via complicated math, each side combines their private key with peer's public key and generates symmetric DH key
      • ‼️ Same DH key for both peers, even if they derived it themselves independently!!
    5. DH key used to exchange additional key materials & agreements
  3. IKE Security Association (SA) created = Phase 1 tunnel