Tunnels and key management

Use a tunnel to negotiate and manage the security associations that are required to set up secure communication between two hosts.

The following types of tunnels are supported, each using a different key management technique:

  • IKE tunnels (dynamically changing keys, IETF standard)
  • Manual tunnels (static, persistent keys, IETF standard)