following paragraphs.
  • IKE Phase 1.5 (optional): To further authenticate VPN participants (clients), you can use a protocol called Extended Authentication (Xauth) that provides user authentication of IPsec tunnels within the IKE protocol. Additionally, you can exchange other parameters between the peers. Mode configuration is used to deliver parameters such as the IP address and Domain Name System (DNS) address to the client.
  • IKE Phase 2: Phase 2 SAs are negotiated by the IKE process (ISAKMP) on behalf of other services such as IPsec that need key material for operation. Because the SAs that are used by IPsec are unidirectional, separate key exchanges are needed for data that is flowing in the forward direction and the reverse direction. The two peers have already agreed upon the transform sets, hash methods, and other parameters during the Phase 1 negotiation. Quick mode is the method used for the Phase 2 SA negotiations.
  • To establish a secure communication channel between two peers, the IKE protocol uses these three modes of operation: Figure illustrates how an IKE negotiation results in secure communications between two SAs.

    Content 3.2 Understanding IPsec Components and IPsec VPN Features 3.2.5 Other IKE Functions IKE can deliver additional functions that are used to verify if the peer device is still active, to pass IPsec through Network Address Translation (NAT) devices, or to exchange additional configuration parameters. These functions are summarized in Figure . Dead Peer Detection (DPD) and Cisco IOS Keepalives
    DPD and Cisco IOS keepalives function on the basis of a timer. If the timer is set for 10 seconds, the router will send a “hello” message every 10 seconds. The benefit of Cisco IOS keepalives and periodic DPD is early detection of dead peers. However, Cisco IOS keepalives and periodic DPD rely on periodic messages that have to be sent frequently. The result of sending frequent messages is that the communicating peers must encrypt and decrypt more packets. The default operation of DPD is on-demand messaging. With on-demand DPD, messages are sent on the basis of traffic patterns. If a router has no traffic to send, the router never sends a DPD message. If a peer is dead and the router never has any traffic to send to the peer, the router will not find out that the peer is dead until the IKE or IPsec SA has to be rekeyed (the liveliness of the peer is unimportant if the router is not trying to communicate with the peer). The Problem with NAT
    IPsec peers cannot be located behind a NAT-enabled device. A standard IPsec VPN tunnel does not work if there are one or more NAT (or Port Address Translation [PAT]) points in the delivery path of the IPsec packet. However, Internet service providers (ISPs) and small offices/home offices (SOHO) often use NAT to share single IP addresses. Although NAT helps conserve IP address space, NAT also introduces problems for IPsec. In fact, an IPsec VPN tunnel will not work if there are no port numbers in the IPsec headers that can be used to create and maintain translation tables. The Layer 4 port information is encrypted and therefore cannot be read. The Solution: IPsec NAT Transversal (NAT-T)
    To solve the NAT issue, the IETF, through RFCs 3947 and 3948, has defined IPsec NAT Transversal (IPsec NAT-T). IPsec NAT-T defines both changes in the negotiation process and different methods of sending IPsec-protected data. The IPsec NAT-T, which was introduced in Cisco IOS Release 12.2(13)T, enables IPsec traffic to travel through NAT or PAT devices in the network by encapsulating IPsec packets in a UDP wrapper. NAT-T is negotiated with these factors: