Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50
333
Virtual Private Networks—
VPN
The AH process in the sender
In the sender, the authentication data is generated in 3 steps.
A checksum is calculated for the complete package using a hash
algorithm.
This checksum is once again sent through a hash algorithm together with
a key known to both the sender and the recipient.
This results in the required authentication data which is inserted in the AH
header.
Checking of integrity and authenticity by the recipient
The AH protocol works in a very similar manner at the recipient's end. The
recipient also uses his key to calculate the authentication data for the received
Authentication data,
ICV
Checksum
(hash code)
IP header AH header Data