VPN Tunnel

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

PCs

 

 

 

PCs

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

IPSec Security Association IKE

 

 

VPN Tunnel Negotiation Steps

 

 

1) Communication

 

 

request sent to VPN Gateway

 

 

VPN Gateway

VPN Gateway

 

2) IKE Phase I authentication

 

 

3) IKE Phase II negotiation

 

 

4) Secure data transfer

 

 

5) IPSec tunnel termination

 

Figure

IPSec Security Association (SA) negotiation

 

Or, you can configure your gateways using manual key exchange, which involves manually configuring each paramter on both gateways.

1.The IPSec software on Host A initiates the IPSec process in an attempt to communicate with Host B. The two computers then begin the Internet Key Exchange (IKE) process.

Virtual Private Networking

C-9

202-10098-01, April 2005

Page 175
Image 175
NETGEAR fvs114 IPSec Security Association IKE VPN Tunnel Negotiation Steps, IPSec Security Association SA negotiation