IKE
Gateway
    
  
    
  
| Where
                                                  Can I Use This? | What
                                                  Do I Need? | 
|---|
    
  
 
  
The Palo Alto Networks firewalls or a firewall and another security device that initiate and
            terminate VPN connections across the two networks are called the IKE Gateways. To set up
            the VPN tunnel and send traffic between the IKE Gateways, each peer must have an IP
            address—static or dynamic—or FQDN. The VPN peers use pre-shared keys  or certificates to
            authenticate each other mutually. 
(In IKEv1) The peers must also negotiate the mode—main or aggressive—for setting up the
      VPN tunnel and the SA lifetime in IKE Phase 1. The main mode protects the identity of the
      peers and is more secure because more packets are exchanged when setting up the tunnel. Main
      mode is the recommended mode for IKE negotiation if both peers support it. Aggressive mode
      uses fewer packets to set up the VPN tunnel and is hence a faster but a less secure option for
      setting up the VPN tunnel.
(In IKEv2) IKEv2 negotiation process between the IKE gateways is much more
      efficient and simplified compared to IKEv1 negotiation. IKEv2 performs three types of
      exchanges: initial exchanges, CREATE_CHILD_SA exchange, and INFORMATIONAL exchange. IKEv2 uses
      the following two exchanges during the initial exchange process each with two messages.
- IKE_SA_INIT exchange—Negotiates IKE SA parameters and exchanges keys.
- IKE_AUTH exchange—Authenticates the identity of the peer and establishes IPSec SAs.
After the four-message initial exchanges, IKEv2 sets up one IKE SA and one pair of
      IPSec SAs. To set up one IKE SA and one pair of IPSec SAs, IKEv1 goes through two phases that
      use a minimum of six messages.
To set up one more pair of IPSec SAs within the IKE SA, IKEv2 goes on to perform an
      additional two-message exchange—the CREATE_CHILD_SA exchange. One CREATE_CHILD_SA exchange
      creates one pair of IPSec SAs. IKEv2 also uses the CREATE_CHILD_SA exchange to re-key IKE SAs
      and Child SAs.
IKEv2 uses the INFORMATIONAL exchange for errors and notifications.