Tags: , ,


Forum Replies

  1. Rene,

    Hi. Just to confirm I am reading this correctly for IKE Phase I ISAKMP process it is used to build the secure tunnel for the Phase II, but it and of itself is not securing the information/parameters/valued exchanged under phase I?

  2. Hi Francesco,

    DH is used to generate a shared private key over an insecure network (like the Internet). Here’s an example of the different DH groups:

    Diffie-Hellman group 1 - 768 bit modulus
    Diffie-Hellman group 2 - 1024 bit modulus
    Diffie-Hellman group 5 - 1536 bit modulus
    Diffie-Hellman group 14 - 2048 bit modulus
    Diffie-Hellman group 19 - 256 bit elliptic curve
    Diffie-Hellman group 20 - 384 bit elliptic curve
    Diffie-Hellman group 21 - 521 bit elliptic curve

    The higher the DH group number, the more secure the exchange will be.

    Here’s an interesting link f

    ... Continue reading in our forum

  3. Hi Rene,

    Am I right about DH if i say:
    I configured PSK on both sides, then DH use its own (differrent) key to secure the configured PSK and it will do the exchange?
    Thanks

35 more replies! Ask a question or join the discussion by visiting our Community Forum