How Intel Packet Protect Works

When two computers require security each time they attempt to communicate with each other, Intel Packet Protect follows these steps to attempt a protected communication:

  1. Each system uses IKE (Internet Key Exchange) to verify the identity of each of the systems, either by using pre-shared keys or certificates. More details.

  2. If identity is successfully authenticated, the two systems use IKE to negotiate an agreement on which IPSec settings to use. More details.

  3. If this negotiation is successful, both systems will use the agreed-on IPSec settings to protect the data packets as they travel over the LAN. More details.

As long as the protected communication is active, the two systems can exchange information. The following diagram illustrates these steps:

What is IKE?

Internet Key Exchange (IKE) is a standard protocol used to negotiate a protected communication. Negotiation is the first phase in setting up a secure communication. IKE verifies the identity of the systems using pre-shared keys or certificates. Then it negotiates a set of security settings to protect the communication.

IKE is a protocol that operates inside a framework defined by ISAKMP (Internet Security Association Key Management Protocol) and is used to support the establishment of Security Associations.

What is IPSec

Internet Protocol (IP) Security (commonly called IPSec) is a set of standard protocols used to protect the confidentiality and authenticity of IP communications. IPSec accomplishes this using the following:


Copyright © 2000, Intel Corporation. All rights reserved.

Intel Corporation assumes no responsibility for errors or omissions in this document. Nor does Intel make any commitment to update the information contained herein.

* Other product and corporate names may be trademarks of other companies and are used only for explanation and to the owners' benefit, without intent to infringe.