The IPSec Model

For the purpose of this illustration, I will use two computers, Computer ABC and Computer XYZ. These computers need to use IPSec to establish a secure connection and transfer some payroll data for the PDQ Corporation. Here's how it works:

Note

This example demonstrates the method Windows 2000 uses to establish this connection. Although most IPSec implementation works in a similar fashion, your mileage might vary. With so many vendors and a complex specification, many implementations vary from solution to solution. As an aside, expecting your Windows 2000 IPSec VPN client to interoperate with a Cisco or a 3Com VPN is probably not realistic, at least not at the time of this writing.

  1. The payroll application on Computer ABC initiates ...

Get Microsoft® Windows® 2000 Security Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.