What is the correct order of the IKEv2 request-and-response protocol?
A.
Create_Child_SA, IKEAUTH, IKESAJNIT
B.
Create_Child_SA, IKE_SA_INIT. IKE_AUTH
C.
IKE SA INIT, IKE AUTH. Create Child SA OIKE AUTH.
D.
IKE_AUTH_IKE_SA_INIT, Create_Child_SA
The Answer Is:
C
This question includes an explanation.
Explanation:
The Internet Key Exchange version 2 (IKEv2) protocol simplifies the negotiation process compared to IKEv1. It is defined by a specific sequence of message exchanges to establish a secure IPsec tunnel.
The correct chronological order of the IKEv2 exchanges is:
IKE_SA_INIT (Initial Exchange):
This is the first exchange. It negotiates the security parameters for the IKE Security Association (IKE SA), sends nonces, and performs the Diffie-Hellman key exchange. At the end of this exchange, the communication is encrypted, but the peers are not yet authenticated.
IKE_AUTH (Authentication Exchange):
This is the second exchange. It authenticates the previous messages, exchanges identities and certificates (if used), and establishes the first Child SA (the actual IPsec Security Association used for data traffic).
CREATE_CHILD_SA (Subsequent Exchanges):
This exchange occurs after the IKE SA and the initial Child SA are established. It is used to create additional Child SAs (for different traffic selectors) or to perform re-keying for the IKE SA or existing Child SAs.
Why other options are incorrect:
A & B: Incorrect because CREATE_CHILD_SA cannot happen before the SA is initialized (IKE_SA_INIT) and authenticated (IKE_AUTH).
D: Incorrect because IKE_AUTH cannot occur before IKE_SA_INIT.
Therefore, the protocol flow is IKE_SA_INIT $\rightarrow$ IKE_AUTH $\rightarrow$ CREATE_CHILD_SA.
FCSS_NST_SE-7.6 PDF/Engine
Printable Format
Value of Money
100% Pass Assurance
Verified Answers
Researched by Industry Experts
Based on Real Exams Scenarios
100% Real Questions
Get 75% Discount on All Products,
Use Coupon: "ac75sure"