Lancom Systems LCOS 3.50 User Manual

Page 333

Advertising
background image

̈

Chapter 14: Virtual Private Networks—VPN

LANCOM Reference Manual LCOS 3.50

333

V

irt

ua

l Pri

vat

e Ne

two

rks—

VP

N

The AH process in the sender

In the sender, the authentication data is generated in 3 steps.

A checksum is calculated for the complete package using a hash
algorithm.

This checksum is once again sent through a hash algorithm together with
a key known to both the sender and the recipient.

This results in the required authentication data which is inserted in the AH
header.

Checking of integrity and authenticity by the recipient

The AH protocol works in a very similar manner at the recipient's end. The
recipient also uses his key to calculate the authentication data for the received

Authentication data,

ICV

Checksum

(hash code)

IP header

AH header

Data

Advertising