IKE is not the same as IPSec. IPSec uses IKE for key exchange. IKE is actually optional, you can configure secret keys manually for an IPSec tunnel.
Two other protocols used by IPSec are AH and ESP. Stephen Tam -----Original Message----- From: brian dell [mailto:[EMAIL PROTECTED] Sent: Friday, April 04, 2003 3:20 PM To: [EMAIL PROTECTED] Subject: [FW-1] ipsec compliant ? would it be correct to say that an IKE implementation is ipsec compliant. ie if a vpn tunnel is using IKE implementation then one could say that the tunnel is ipsec compliant ? if not what are the additional protocols or implementations required to make the tunnel ipsec compliant ? __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com ================================================= To set vacation, Out Of Office, or away messages, send an email to [EMAIL PROTECTED] in the BODY of the email add: set fw-1-mailinglist nomail ================================================= To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================= If you have any questions on how to change your subscription options, email [EMAIL PROTECTED] ================================================= ================================================= To set vacation, Out Of Office, or away messages, send an email to [EMAIL PROTECTED] in the BODY of the email add: set fw-1-mailinglist nomail ================================================= To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================= If you have any questions on how to change your subscription options, email [EMAIL PROTECTED] =================================================
