The IPSec protocol suite uses Internet Key Exchange (IKE) to securely handle the security associations in the creation of an IPSec VPN. Before the IPSec VPN is established, IKE needs to establish an IKE phase 1 tunnel and an IKE phase 2 tunnel.
Internet Key Exchange
IKE phase 1
The IKE phase 1 is used to authenticate the IPSec VPN peers and established a secure, encrypted tunnel to further allow the peers to exchange IKE information.
The main characteristics of the IKE phase 1 are as follows:
- The phase 1 tunnel is used to exchange any packet/traffic originating from one peer that is destined for the other peer. If there's an IKE phase 1 tunnel between two routers, Router A and Router B, if one router wants to send a...