
Figure 83 VPN: IKE SA and IPSec SA
In this example, a computer in network A is exchanging data with a computer in network B. Inside networks A and B, the data is transmitted the same way data is normally transmitted in the networks. Between routers X and Y, the data is protected by tunneling, encryption, authentication, and other security features of the IPSec SA. The IPSec SA is established securely using the IKE SA that routers X and Y established first.
The rest of this section discusses IKE SA and IPSec SA in more detail.
13.1.1 IKE SA (IKE Phase 1) OverviewThe IKE SA provides a secure connection between the ZyXEL Device and remote IPSec router.
It takes several steps to establish an IKE SA. The negotiation mode determines the number of steps to use. There are two negotiation
Note: Both routers must use the same negotiation mode.
These modes are discussed in more detail in Negotiation Mode on page 143. Main mode is used in various examples in the rest of this section.
13.1.1.1 IP Addresses of the ZyXEL Device and Remote IPSec RouterIn the ZyXEL Device, you have to specify the IP addresses of the ZyXEL Device and the remote IPSec router to establish an IKE SA.
You can usually provide a static IP address or a domain name for the ZyXEL Device. Sometimes, your ZyXEL Device might also offer another alternative, such as using the IP address of a port or interface.
You can usually provide a static IP address or a domain name for the remote IPSec router as well. Sometimes, you might not know the IP address of the remote IPSec router (for example, telecommuters). In this case, you can still set up the IKE SA, but only the remote IPSec router can initiate an IKE SA.
13.1.2 IKE SA SetupThis section provides more details about IKE SAs.
140 | Chapter 13 IPSec VPN |