How IPsec Remote Access Works

IPsec Remote Access

IPsec Remote Access allows users outside the office to connect securely to internal company resources. It creates an encrypted path between the remote user and the corporate network, ensuring privacy, authenticity, and protected communication. It’s important to note that IPsec itself is not the VPN, but rather the security framework that protects the VPN connection. The goal is simple: allow remote access without exposing the internal network to the internet.

Overview

The diagram shows a remote user on the left and the corporate network on the right. Between them, there is a Encrypted IPsec Tunnel.

The (dashed) line represents the secure encrypted connection created by IPsec. It indicates that all communication between the remote user and the company’s internal network travels through this protected tunnel, preventing unauthorized access or interception. In short, the diagram visually explains how a remote user connects safely to the corporate network using an IPsec-based VPN tunnel.

Explanation:
A remote user connects to the corporate network through an encrypted tunnel. All traffic between both ends is protected by IPsec, preventing interception or manipulation.

Key Concepts

Tunnel Mode

IPsec wraps the entire original packet in a new encrypted packet. This fully protects the communication.

IKEv1/IKEv2

These protocols negotiate how the tunnel will be built.

  • IKEv1 = older, more steps
  • IKEv2 = faster, cleaner, recommended

ESP (Encapsulating Security Payload)

ESP encrypts the data and ensures no one tampers with it.
This is why AH is rarely used — AH does not encrypt.

Authentication Methods

  • PSK: simple, but weaker
  • Certificates: stronger, scalable
  • EAP/AAA: integrates external authentication servers (RADIUS/TACACS+/MFA)

Split Tunneling

Controls whether all traffic goes through the VPN or only internal traffic.

Operational Flow

(Client) ---> [IKE Phase 1] ---> [IKE Phase 2] ---> [Tunnel Active]

Step-by-step explanation:

  1. Client Initiates
    The remote device attempts to connect to the IPsec gateway.
  2. IKE Phase 1 (ISAKMP SA)
    Both sides authenticate and agree how to protect further negotiation.
  3. IKE Phase 2 (IPsec SA)
    They decide which encryption and integrity algorithms will protect the actual data.
  4. Tunnel is Established
    The user receives:
    • a virtual IP address
    • DNS servers
    • policy rules
  5. Traffic Routing
    The admin decides between full tunnel or split tunnel.
  6. Rekeying / Lifetime Control
    Keys refresh periodically for security.
  7. Session Ends
    Either manually or by timeout.

The Maps

Full Tunnel

The user’s entire connection flows through the company.

Split Tunnel

Only business traffic uses the VPN.

Security Association Map

Each SA is like a rulebook that defines how traffic must be protected.

Components Table

ComponentPurposeExplanation
IKE Phase 1ISAKMP SABuilds the secure negotiation channel
IKE Phase 2IPsec SADefines encryption for user data
AuthenticationIdentity validationPSK, certificates, or AAA
ESPEncryption + integrityMain protocol for secure data
ClientEnd-user platformWindows/macOS/Linux/mobile
Access ControlResource permissionACLs + policies

Concept Schema

Cisco CLI

crypto isakmp policy 10
 encryption aes 256
 hash sha256
 authentication pre-share
 group 14

crypto ipsec transform-set RA-SET esp-aes 256 esp-sha-hmac

ip local pool RA-POOL 10.10.100.1 10.10.100.50

crypto map RA-MAP 10 ipsec-isakmp
 set peer x.x.x.x
 set transform-set RA-SET
 match address RA-ACL

IPsec Remote Access Quick Guide


CCNA Practice Quiz

Q1. What role do security associations play?

Q2. Why is ESP preferred over AH?

Q3. How does IKEv2 improve tunnel setup compared to IKEv1?

Q4. What distinguishes full tunneling from split tunneling?

Q5. What authentication mechanisms can be used?

Answers

A1. They define how the tunnel is secured: encryption, hashing, lifetimes, and keys.

A2. ESP encrypts the data and provides integrity. AH only verifies integrity — it does not encrypt.

A3. It is faster, simpler, requires fewer exchanges, and handles mobility more reliably.

A4. Full tunnel sends all traffic through VPN; split tunnel sends only internal traffic through VPN.

A5. PSK, certificates, and EAP/AAA (RADIUS, TACACS+, MFA).

Questions, comments, or just wanna drop a “hey”?
Go ahead —  Just shoot an email to: fromzerotoccna@gmail.com

Home Page | Blog Page | CCNA Study Hub

Scroll to Top