MicroNugget: How to Negotiate in IKE Phase 1 (IPsec)
Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security In this video, Keith Barker covers the five essential items for negotiating I...

CBT Nuggets
58.5K views β’ Oct 11, 2012

About this video
Start learning cybersecurity with CBT Nuggets. https://courses.cbt.gg/security
In this video, Keith Barker covers the five essential items for negotiating IPsec's IKE Phase 1. The best way to make sure your site-to-site tunnels get built is to remember to HAGLE: make sure your HASH, Authentication, Group, Lifetime and Encryption are negotiated and agreed on.
If you have two internal networks that you need to talk to one another securely across the Internet via two ASAs, IPsec is a great way to implement your site-to-site tunnel.
Before the devices will establish the tunnel, you need to negotiate IPsec's IKE Phase 1. There are 5 items. To remember each step, Keith's recommended method is "HAGLE".
β’ H: Hashing algorithms to verify data integrity
β’ A: Authentication to verify one another
β’ G: Groups to generate secret keys
β’ L: Lifetime to determine how long the tunnel stands up
β’ E: Encryption to agree which algorithm to use
With these five items negotiated, your ASAs can stand up an IKE Phase 1 tunnel and connect your sites securely across the Internet.
π Download the Free Ultimate Security Cert Guide: https://blog.cbt.gg/ex8o
β¬οΈ 15-Week Study Plan: CCNP Security Core (350-701 SCOR): https://blog.cbt.gg/5r83
Start learning with CBT Nuggets:
β’ Intro to Networking | https://courses.cbt.gg/tuv
β’ CompTIA Network+ (N10-007) | https://courses.cbt.gg/lvb
In this video, Keith Barker covers the five essential items for negotiating IPsec's IKE Phase 1. The best way to make sure your site-to-site tunnels get built is to remember to HAGLE: make sure your HASH, Authentication, Group, Lifetime and Encryption are negotiated and agreed on.
If you have two internal networks that you need to talk to one another securely across the Internet via two ASAs, IPsec is a great way to implement your site-to-site tunnel.
Before the devices will establish the tunnel, you need to negotiate IPsec's IKE Phase 1. There are 5 items. To remember each step, Keith's recommended method is "HAGLE".
β’ H: Hashing algorithms to verify data integrity
β’ A: Authentication to verify one another
β’ G: Groups to generate secret keys
β’ L: Lifetime to determine how long the tunnel stands up
β’ E: Encryption to agree which algorithm to use
With these five items negotiated, your ASAs can stand up an IKE Phase 1 tunnel and connect your sites securely across the Internet.
π Download the Free Ultimate Security Cert Guide: https://blog.cbt.gg/ex8o
β¬οΈ 15-Week Study Plan: CCNP Security Core (350-701 SCOR): https://blog.cbt.gg/5r83
Start learning with CBT Nuggets:
β’ Intro to Networking | https://courses.cbt.gg/tuv
β’ CompTIA Network+ (N10-007) | https://courses.cbt.gg/lvb
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
58.5K
Likes
753
Duration
3:01
Published
Oct 11, 2012
User Reviews
4.5
(11) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.