VPN Tunnel

of exchange,

IPSec Security Association IKE

VPN Tunnel Negotiation Steps

1)Communication request sent to VPN Gateway

VPN Gateway

VPN Gateway

 

2) IKE Phase I authentication

 

3) IKE Phase II negotiation

4)Secure data transfer

5)IPSec tunnel termination

Figure 9-9: IPSec SA negotiation

1.The IPSec software on Host A initiates the IPSec process in an attempt to communicate with Host B. The two computers then begin the Internet Key Exchange (IKE) process.

Virtual Private Networking

D-9

202-10085-01, March 2005

Page 223
Image 223
NETGEAR FVS124G manual Exchange, IPSec Security Association IKE VPN Tunnel Negotiation Steps