For authentication you can use pre-shared keys, rsa-sig and rsa-encr. Don't
take the answer literally.

With regards
Kings

On Wed, Feb 16, 2011 at 4:39 AM, Jerome Dolphin <[email protected]> wrote:

> Hi Folks, any input much appreciated.
>
> Q: VPN solution provides network security using the data assurance security
> model (CIA triad: confidentiality, integrity and authentication) ... what
> does authentication provide, and using what technique?
> A: Authentication provides data origin authentication (message
> authentication) using digital signatures and certificate mechanism (PKI).
>
>
> I am wondering why PSK is not mentioned in the answer? My understanding is
> that:
>
> 1- during ISAKMP SA setup, data origin authentication happens via digital
> signatures or PSK.
> 2- once IPSec SA is established, data origin authentication and data
> integrity happens via hashing.
>
> Thanks : )
>
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to