The IPSec Model
For the purpose of this illustration, I will use two computers, Computer ABC and Computer XYZ. These computers need to use IPSec to establish a secure connection and transfer some payroll data for the PDQ Corporation. Here's how it works:
Note
This example demonstrates the method Windows 2000 uses to establish this connection. Although most IPSec implementation works in a similar fashion, your mileage might vary. With so many vendors and a complex specification, many implementations vary from solution to solution. As an aside, expecting your Windows 2000 IPSec VPN client to interoperate with a Cisco or a 3Com VPN is probably not realistic, at least not at the time of this writing.
The payroll application on Computer ABC initiates ...
Get Microsoft® Windows® 2000 Security Handbook now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.