PART A - IPsec Overview
A.1. Traffic protection
Where does IPsec operate?
Which security services are provided?
How are those services provided?
AH (Authentication Header)
ESP (Encapsulating Security Payload)
A.2. Management of the security parameters
Interactions between the components
PART B - IKE Internals
What is IKE?
What does IKE provide?
PKI and IKE
Implications of IKE for deployment and administration
B.2. Course of the protocol
Phase 1 - Main Mode (1) (simplified)
Phase 1 - Main Mode (2) (simplified)
Phase 1 - Main Mode (3) (simplified)
Phase 1 - Aggressive Mode
Phase 2 - Quick Mode
For Further Info