<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How IPSec VPN works in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797297#M1098790</link>
    <description>&lt;P&gt;No, both will use 4500 if one side behind NAT device.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 19 Mar 2023 17:42:19 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-03-19T17:42:19Z</dc:date>
    <item>
      <title>How IPSec VPN works</title>
      <link>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797270#M1098785</link>
      <description>&lt;P&gt;&lt;BR /&gt;Commands Used for IPSec VPN :&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group 2.1.1.2 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set TSet-1 esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------&lt;/P&gt;&lt;P&gt;IPSec VPN :Phase-1 Main Mode&lt;/P&gt;&lt;P&gt;message 1 -Security association proposal&lt;BR /&gt;message 2 -Security association Response&lt;BR /&gt;message 3 -DH Key Exchange and NAT Detection&lt;BR /&gt;message 4 -DH Key Exchange and NAT Detection&lt;BR /&gt;message 5 -Preshared Key Exchange by initiator (Encrypted)&lt;BR /&gt;message 6 -Preshared Key Exchange by responder (Encrypted)&lt;/P&gt;&lt;P&gt;IPSec VPN :Phase-2 Quick Mode&lt;BR /&gt;message 1 - ?&lt;BR /&gt;message 2 - ?&lt;BR /&gt;message 3 - ?&lt;/P&gt;&lt;P&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Question 1: Is is correct that "crypto ikev1 policy 1" is for Phase-1 and "crypto ipsec ikev1 transform-set TSet-1" is for Phase-2 ?&lt;/P&gt;&lt;P&gt;Question 2: Is it correct that phase 2 parameters(proposal) is shared in Quick mode messages ? what is the content of 3 Quick mode messages?&lt;/P&gt;&lt;P&gt;Question 3: Does IPSec vpn use Asyemtric encryption where public key and private key is used ?&lt;/P&gt;&lt;P&gt;Question 4: If we are using aes-256 which is symectric then how Ipsec uses asymetric ?&lt;/P&gt;&lt;P&gt;Question 5: Preshared key is used to authenticate the two devices not as a key for encryption/decryption is it correct ?&lt;/P&gt;&lt;P&gt;Question 6: Where DH group is used ? Key generated by DH is used for what (Is is used as a key for aes-256) ? if yes then how aes-256 is symentric ?&lt;/P&gt;&lt;P&gt;Question 7: Can one side using NAT and other not using NAT be connected through IPSec VPN ? if yes who will be using what port nos (500/4500) ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2023 15:35:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797270#M1098785</guid>
      <dc:creator>bijay.swain</dc:creator>
      <dc:date>2023-03-19T15:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: How IPSec VPN works</title>
      <link>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797288#M1098788</link>
      <description>&lt;P&gt;Question 1: Is is correct that "crypto ikev1 policy 1" is for Phase-1 and "crypto ipsec ikev1 transform-set TSet-1" is for Phase-2 ? Correct&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question 2: Is it correct that phase 2 parameters(proposal) is shared in Quick mode messages ? what is the content of 3 Quick mode messages? not only Quick but also in Main Mode&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question 3: Does IPSec vpn use Asyemtric encryption where public key and private key is used ? depend one auth PSK or RSA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question 4: If we are using aes-256 which is symectric then how Ipsec uses asymetric ? this Need to check&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question 5: Preshared key is used to authenticate the two devices not as a key for encryption/decryption is it correct ? Correct and also the PSK is used as Seed for new Key of encrypt/decrypt&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question 6: Where DH group is used ? Key generated by DH is used for what (Is is used as a key for aes-256) ? if yes then how aes-256 is symentric ? relate to Q.4 this Need to check&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question 7: Can one side using NAT and other not using NAT be connected through IPSec VPN ? if yes who will be using what port nos (500/4500) ? one Side use NATing&amp;nbsp; and other not use NATing. this case can happened but I dont get your Q about port?&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2023 16:56:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797288#M1098788</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-19T16:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: How IPSec VPN works</title>
      <link>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797294#M1098789</link>
      <description>&lt;P&gt;Hi MMH&lt;/P&gt;&lt;P&gt;Q7 : in this case is both port 500 and 4500 used .&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2023 17:22:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797294#M1098789</guid>
      <dc:creator>bijay.swain</dc:creator>
      <dc:date>2023-03-19T17:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: How IPSec VPN works</title>
      <link>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797297#M1098790</link>
      <description>&lt;P&gt;No, both will use 4500 if one side behind NAT device.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2023 17:42:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797297#M1098790</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-19T17:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: How IPSec VPN works</title>
      <link>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797300#M1098791</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/269499"&gt;@bijay.swain&lt;/a&gt; both UDP 500 and UDP 4500 will be used.&lt;/P&gt;
&lt;P&gt;The initial IKE communication will always start using UDP/500, if NAT is detected then communication changes to use UDP/4500 for all encrypted traffic.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="RobIngram_0-1679249066640.png" style="width: 782px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/179515i9F07503B9CE7C294/image-dimensions/782x311?v=v2" width="782" height="311" role="button" title="RobIngram_0-1679249066640.png" alt="RobIngram_0-1679249066640.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2023 18:05:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797300#M1098791</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-03-19T18:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: How IPSec VPN works</title>
      <link>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797304#M1098792</link>
      <description>&lt;P&gt;And in end what they use, they will use both 4500,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;He ask if one side will use 4500 and other will use 500 and I reply both side will use 4500.&lt;/P&gt;
&lt;P&gt;Check his Q above&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2023 18:19:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797304#M1098792</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-03-19T18:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: How IPSec VPN works</title>
      <link>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797307#M1098793</link>
      <description>&lt;P&gt;is there any document to know the exact process used by IPSec VPN like from creating tunnel to actual data transfer step by step.&lt;/P&gt;&lt;P&gt;Or Can anyone clarify every protocol role in each step like once SA proposal is shared and accepted next which protocol is doing what activity.&lt;/P&gt;&lt;P&gt;IF below protocols are agreed upon&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 1&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes-256&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group 2.1.1.2 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set TSet-1 esp-aes-256 esp-sha-hmac&lt;/P&gt;&lt;P&gt;1st msg is Proposal sharing&lt;BR /&gt;2nd msg is sharing accepted proposal&lt;BR /&gt;3rd mgs is dh key shring and nat detection &lt;STRONG&gt;(where this dhkey will be used)&lt;/STRONG&gt;&lt;BR /&gt;4th msg is dh key shring and nat detection &lt;STRONG&gt;(where this dhkey will be used)&lt;/STRONG&gt;&lt;BR /&gt;5th msg is authenticating deivce with preshared key &lt;STRONG&gt;(msg is encrypted by which encryption method and which key is used for encryption and decryption)&lt;/STRONG&gt;&lt;BR /&gt;6th msg is authenticating deivce with preshared key&lt;STRONG&gt; (msg is encrypted by which encryption method and which key is used for encryption and decryption)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Phase 2 Quick mode&lt;BR /&gt;1st msg&lt;BR /&gt;2nd msg&lt;BR /&gt;3rd msg&lt;BR /&gt;&lt;STRONG&gt;Is again proposal sharing is done for phase 2 in the above 3 msgs&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 19 Mar 2023 18:28:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/how-ipsec-vpn-works/m-p/4797307#M1098793</guid>
      <dc:creator>bijay.swain</dc:creator>
      <dc:date>2023-03-19T18:28:25Z</dc:date>
    </item>
  </channel>
</rss>

