Configure Virtual Private Networking (VPN) IPsec parameters
Digi TransPort WR Routers User Guide 407
IPsec Tunnels > IPsec n parameters
Once the IKE parameters have been set-up, the next stage is to define the characteristics of the
IPsec tunnels, or encrypted routes. This includes items such as what source and destination
addresses will be connected by the tunnel and what type of encryption and authentication
procedures will be applied to the packets being tunneled. For obvious reasons it is essential that
parameters such as encryption and authentication are the same at each end of the tunnel. If they
are not, then the two systems cannot agree on which set of rules or policy to adopt for the IPsec
tunnel, and communication cannot occur.