As stated earlier, the IPsec protocol framework describes the messaging to secure the communications, but it relies on existing algorithms.

There are two main IPsec protocols depicted in Figure 1:

Figure 2 illustrates the components of IPsec configuration. There are four basic building blocks of the IPsec framework that must be selected.

It is the combination of these building blocks that provides the confidentiality, integrity, and authentication options for IPsec VPNs.

Note: This section introduced IPsec to provide an understanding of how IPsec secures VPN tunnels. Configuring IPsec VPNs are beyond the scope of this course.