<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IKEv1 to IKEv2 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3336762#M969405</link>
    <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;I have a IKEv1 tunnels to another companies, I have been told to move to Ikev2, is there any secuorty loop holes in IKEv1 or the advisor is only asking for additional features in ikev2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to know what are the enhance security features in ikev2 rather than ikev1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 15:24:58 GMT</pubDate>
    <dc:creator>adamgibs7</dc:creator>
    <dc:date>2020-02-21T15:24:58Z</dc:date>
    <item>
      <title>IKEv1 to IKEv2</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3336762#M969405</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;
&lt;P&gt;I have a IKEv1 tunnels to another companies, I have been told to move to Ikev2, is there any secuorty loop holes in IKEv1 or the advisor is only asking for additional features in ikev2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to know what are the enhance security features in ikev2 rather than ikev1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 15:24:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3336762#M969405</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2020-02-21T15:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv1 to IKEv2</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3336791#M969406</link>
      <description>&lt;P&gt;Hi, IKEv2 is more secure than IKEv1 - it supports NGE (Next Generation Encryption), it supports asyncronous authentication and it's also faster as it exchanges less messages to setup SA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 17:30:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3336791#M969406</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-02-23T17:30:22Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv1 to IKEv2</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3336807#M969407</link>
      <description>&lt;P&gt;Dear&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;OK agreed but I want to know that one should upgrade with the new technologies but again my &amp;nbsp;original question IKEV1 can be hacked,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IKE2&amp;nbsp;supports asyncronous authentication ??? means&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Fri, 23 Feb 2018 18:08:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3336807#M969407</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-02-23T18:08:32Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv1 to IKEv2</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3336849#M969408</link>
      <description>If you are using IKEv1 agressive mode with PSK, then yes it can theoretically be hacked.&lt;BR /&gt;&lt;BR /&gt;Sorry I meant asymmetric authentication, this means you can use PSK on one router/asa and the other router/asa could use certificate or vice versa. IKEv2 also supports EAP for authentication.</description>
      <pubDate>Fri, 23 Feb 2018 19:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3336849#M969408</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-02-23T19:29:21Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv1 to IKEv2</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3338072#M969409</link>
      <description>&lt;P&gt;Dear&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a vpn tunnel with IKEv1 between hq and branch the EAP packets still pass from the vpn tunnel for the branch users who are authenticating (dot1X) &amp;nbsp;to the ISE server in HQ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so what new EAP is doing in IKEv2&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 17:58:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3338072#M969409</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-02-26T17:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv1 to IKEv2</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3338112#M969410</link>
      <description>&lt;P&gt;EAP as an authentication method is used in FlexVPN Remote Access VPN scenarios only&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/flexvpn/115755-flexvpn-ike-eap-00.html" target="_self"&gt;https://www.cisco.com/c/en/us/support/docs/security/flexvpn/115755-flexvpn-ike-eap-00.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/flexvpn/200555-FlexVPN-AnyConnect-IKEv2-Remote-Access.html" target="_self"&gt;https://www.cisco.com/c/en/us/support/docs/security/flexvpn/200555-FlexVPN-AnyConnect-IKEv2-Remote-Access.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Feb 2018 19:17:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3338112#M969410</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-02-26T19:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv1 to IKEv2</title>
      <link>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3341647#M969411</link>
      <description>&lt;P&gt;Dear&lt;/P&gt;
&lt;P&gt;I 'm using in MM and not in AM so according to your reply IKEv1 in MM has no harm of hacking&amp;nbsp; instead as a suggestion we should move to new technologies but from the security audit perspective if it is available in the configuration of ASA it has no loop holes of hacking the tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please confirm&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 03 Mar 2018 08:43:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ikev1-to-ikev2/m-p/3341647#M969411</guid>
      <dc:creator>adamgibs7</dc:creator>
      <dc:date>2018-03-03T08:43:18Z</dc:date>
    </item>
  </channel>
</rss>

