![]() Using Aggressive Mode with pre-shared keys is the least secure option. There are inherent risks to configurations that use pre-shared keys which are exaggerated when Aggressive Mode is used. Every participant in IKE must possess a key which may be either pre-shared (PSK) or a public key. Phase 1 is where the two ISAKMP peers establish a secure, authenticated channel with which to communicate. IKE is used during Phase 1 and Phase 2 of establishing an IPSec connection. Pre-shared Key Off-line Bruteforcing Using IKE Aggressive Mode port 500/udp Is my Pre-shared key too short - 8 characters? ![]() Our vulnerability scanner (Qualys) has come back with this vulnerability against our Cisco 837 DSL router VPN that connects to a Cisco Concentrator.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |