¨Internet Key Exchange (IKE) protocol
–For negotiating security parameters and establishing authenticated keys
–Uses UDP port 500 for ISAKMP
¨Encapsulating Security Payload (ESP) protocol
–For encrypting, authenticating, and securing data
–IP protocol 50
¨Authentication Header (AH) protocol
–For authenticating and securing data
–IP protocol 51