̈ Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50
333
Virtual Private Networks—
VPN
The AH process in the sender
In the sender, the authentication data is generated in 3 steps.
ቢ A checksum is calculated for the complete package using a hash
algorithm.
ባ This checksum is once again sent through a hash algorithm together with
a key known to both the sender and the recipient.
ቤ This results in the required authentication data which is inserted in the AH
header.
Checking of integrity and authenticity by the recipient
The AH protocol works in a very similar manner at the recipient's end. The
recipient also uses his key to calculate the authentication data for the received
Authentication data,
ICV
Checksum
(hash code)
ቢ
ባ
ቤ
IP header AH header Data
ቤ