For authentication you can use pre-shared keys, rsa-sig and rsa-encr. Don't take the answer literally.
With regards Kings On Wed, Feb 16, 2011 at 4:39 AM, Jerome Dolphin <[email protected]> wrote: > Hi Folks, any input much appreciated. > > Q: VPN solution provides network security using the data assurance security > model (CIA triad: confidentiality, integrity and authentication) ... what > does authentication provide, and using what technique? > A: Authentication provides data origin authentication (message > authentication) using digital signatures and certificate mechanism (PKI). > > > I am wondering why PSK is not mentioned in the answer? My understanding is > that: > > 1- during ISAKMP SA setup, data origin authentication happens via digital > signatures or PSK. > 2- once IPSec SA is established, data origin authentication and data > integrity happens via hashing. > > Thanks : ) > > > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
