![]() Here’s a picture of our two routers that completed IKE phase 2: We use this tunnel as a secure method to establish the second tunnel called the IKE phase 2 tunnel or IPsec tunnel and for management traffic like keepalives. The IKE phase 1 tunnel is only used for management traffic. Here’s an example of two routers that have established the IKE phase 1 tunnel: The collection of parameters that the two devices will use is called a SA (Security Association). This is also called the ISAKMP tunnel or IKE phase 1 tunnel. In this phase, an ISAKMP (Internet Security Association and Key Management Protocol) session is established. In IKE phase 1, two peers will negotiate about the encryption, authentication, hashing and other protocols that they want to use and some other parameters that are required. There are two phases to build an IPsec tunnel: To establish an IPsec tunnel, we use a protocol called IKE (Internet Key Exchange). In this lesson I will start with an overview and then we will take a closer look at each of the components.īefore we can protect any IP packets, we need two IPsec peers that build the IPsec tunnel. IPsec is pretty complex and there are a lot of different ways to implement it.
0 Comments
Leave a Reply. |