IKE is not the same as IPSec.

IPSec uses IKE for key exchange. IKE is actually optional, you can configure
secret keys manually for an IPSec tunnel.

Two other protocols used by IPSec are AH and ESP.

Stephen Tam

-----Original Message-----
From: brian dell [mailto:[EMAIL PROTECTED]
Sent: Friday, April 04, 2003 3:20 PM
To: [EMAIL PROTECTED]
Subject: [FW-1] ipsec compliant ?


would it be correct to say that an IKE implementation
is ipsec compliant.

ie if a vpn tunnel is using IKE implementation then
one could say that the tunnel is ipsec compliant ?

if not what are the additional protocols or
implementations required to make the tunnel ipsec
compliant ?

__________________________________________________
Do you Yahoo!?
Yahoo! Tax Center - File online, calculators, forms, and more
http://tax.yahoo.com

=================================================
To set vacation, Out Of Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================

=================================================
To set vacation, Out Of Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================

Reply via email to