Google News
logo
CCSA - Interview Questions
Explain IKE and IPSec.
For managing encryption keys and sending encrypted packets, CheckPoint VPNs (Virtual Private Networks) utilize two secure VPN protocols as follows :
 
IKE (Internet Key Exchange) : It is a standard key management protocol that establishes a secure, authenticated communication channel between two devices. Using IKE, a secure VPN communication channel between VPN peers is established over the Internet. 

IPSec : As part of "IPsec," "IP" stands for "Internet Protocol" and "sec" stands for "secure". ​IPsec provides secure encrypted communication between two computers over an IP network by authenticating and encrypting data packets. It is commonly used in virtual private networks (VPNs).
Advertisement